Build your IT career the UNIQUE way.
facebook twitter
Home>>EC-Council Certified Security Analyst/Licensed Penetration Tester (ECSA)

EC-Council Certified Security Analyst/Licensed Penetration Tester (ECSA/LPT)


 

Aim

ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments. EC-Council’s Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.

 

Key Features in ECSA

  • Updated information for all penetration testing and security concepts
  • Well organized content for a better understanding
  • Classroom and instructor friendly
  • Diagrammatic representation of concepts and pen testing process
  • New penetration testing techniques
  • New penetration testing and security tools
  • Detailed recommendation after each penetration testing steps
  • Contains report templates and checklist for all pen testing steps
  • Well tested lab to evaluate the presented concepts
  • Video demonstration of penetration testing techniques
  • Well organized DVD-ROM content
  • LPT comes with Frankenstein and iLabs environments

 

Get the Knowledge on

  • The Need for Security Analysis
  • Advanced Googling
  • TCP/IP Packet Analysis
  • Advanced Sniffing Techniques
  • Vulnerability Analysis with Nessus
  • Advanced Wireless Testing
  • Designing a DMZ
  • Snort Analysis
  • Log Analysis
  • Advanced Exploits and Tools
  • Penetration Testing Methodologies
  • Customers and Legal Agreements
  • Rules of Engagement
  • Penetration Testing Planning and Scheduling
  • Pre Penetration Testing Checklist
  • Information Gathering
  • Vulnerability Analysis
  • External Penetration Testing
  • Internal Network Penetration Testing
  • Routers and Switches Penetration Testing
  • Firewall Penetration Testing
  • IDS Penetration Testing
  • Wireless Network Penetration Testing
  • Denial of Service Penetration Testing
  • Password Cracking Penetration Testing
  • Social Engineering Penetration Testing
  • Stolen Laptop, PDAs and Cell phones
  • Penetration Testing
  • Application Penetration Testing
  • Physical Security Penetration Testing
  • Database Penetration testing
  • VoIP Penetration Testing
  • VPN Penetration Testing
  • War Dialing
  • Virus and Trojan Detection
  • Log Management Penetration Testing
  • File Integrity Checking
  • Blue Tooth and Hand held Device Penetration Testing
  • Telecommunication and Broadband Communication Penetration Testing
  • Email Security Penetration Testing
  • Security Patches Penetration Testing
  • Data Leakage Penetration Testing
  • Penetration Testing Deliverables and Conclusion
  • Penetration Testing Report and Documentation Writing
  • Penetration Testing Report Analysis
  • Post Testing Actions
  • Ethics of a Licensed Penetration Tester
  • Standards and Compliance

 

"This is one of the very few certifications with emphasis on “Web Application Security” which
is one of the major area of concern for corporates. The knowledge of techniques and tools
covered will definitely help the ethical hackers in providing better services to their clients."

- Terry P Cutler - Novell