• E-learning

EC-Council Certified Security Analyst v10 (ECSA)


The ECSA program offers a seamless learning progress, continuing where the CEH program left off.

Unlike most other pen-testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals.

A Security Credential Like No Other!

The ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning

 

Este curso e-learning inclui

  • Instructor-led, streaming vídeo training modules – Acesso durante 1 ano
  • Acesso iLabs – Virtual lab platform – Acesso durante 6 meses
  • Manual digital
  • Certificado de participação
  • Voucher de exame de certificação

 

Este curso também está disponível no formato Presencial / Live Training. Para mais informações aceda ao link: EC-Council Certified Security Analyst v10 (ECSA)

Cursos relacionados

Destinatários

  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals

Programa

  • Penetration Testing Essential Concepts
  • Introduction to Penetration Testing and Methodologies
  • Penetration Testing Scoping and Engagement Methodology
  • Open-Source Intelligence (OSINT) Methodology
  • Social Engineering Penetration Testing Methodology
  • Network Penetration Testing Methodology – External
  • Network Penetration Testing Methodology – Internal
  • Network Penetration Testing Methodology – Perimeter Devices
  • Web Application Penetration Testing Methodology
  • Database Penetration Testing Methodology
  • Wireless Penetration Testing Methodology
  • Cloud Penetration Testing Methodology
  • Report Writing and Post Testing Actions

EC-Council Certified Security Analyst v10 (ECSA)

Área

Dados

Como chegou até nós

Os seus dados pessoais são recolhidos em conformidade com o Regulamento Geral de Proteção de Dados (RGPD).

Consente que os seus dados sejam utilizados, nos termos da nossa Politica de Privacidade, para o contacto/envio de:

Ações de informação, de marketing de produtos e serviços, como campanhas e eventos?

Para mais informações, consulte a Política de Privacidade do Grupo Rumos.
pode retirar o seu consentimento a qualquer momento através do botão Cancelar subscrição ou Unsubscribe que estão presentes em cada comunicação enviada, bem como exercer os direitos descritos na politica de privacidade