Level: Foundation

Certified Security Analyst/LPT (ECSA)

5 Day | Instructor Led

EC-Council Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.

Inquire About
Certified Security Analyst/LPT (ECSA)

Ideal Candidates for Certified Security Analyst/LPT (ECSA) Class

Certified Security Analyst/LPT (ECSA) Prerequisites

Experience with Windows and/or UNIX/Linux operating systems

Knowledge of TCP/IP and networking


Security+ certification is recommended


Certified Ethical Hacker certification is strongly recommended

What You'll Get in Certified Security Analyst/LPT (ECSA)

EC Council Certified System Analyst Student Kit

Access to iLabs

Prime Prometric Exam Voucher

Hands-on practice/skills development on hacking from both Microsoft and Linux

70% hands-on activity during the class

What You'll Learn in Certified Security Analyst/LPT (ECSA)

Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose.

Certified Security Analyst/LPT (ECSA) Certification

The ECSA certification exam will be conducted on the last day of training. Students need to pass the online Prometric Prime exam ECSA v8 to receive the ECSA certification. The Student also will be prepared for the LPT certification.

Certified Security Analyst/LPT (ECSA) Outline

Security Analysis and Penetration Testing Methodologies

TCP IP Packet Analysis

Pre-penetration Testing Steps

Information Gathering Methodology

Vulnerability Analysis

External Network Penetration Testing Methodology

Internal Network Penetration Testing Methodology

Firewall Penetration Testing Methodology

IDS Penetration Testing Methodology

Web Application Penetration Testing Methodology

SQL Penetration Testing Methodology

Database Penetration Testing Methodology

Wireless Network Penetration Testing Methodology

Mobile Devices Penetration Testing Methodology

Cloud Penetration Testing Methodology

Report Writing and Post Test Actions

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

Cyber Vanguard Series- Cyber Storm Assault Tactics

All actions in war, regardless of the level, are based upon either taking the initiative or reacting in response to the opponent. By taking the initiative, we dictate the terms of the conflict and force the enemy to meet us on our terms. The initiative allows us to pursue some positive aim even if only to preempt an enemy initiative. It is through the initiative that we seek to impose our will on the enemy.


Cyber Vanguard Series-Cyber Strike

Cyber Vanguard Series - Cyber Strike takes the offensive and defensive assault tactics and applies them in several different real world scenarios. The entire course is hands on and builds upon the skills and knowledge the students have previously received. Applications include Offensive only - Hunt Teaming, Data Harvesting, and Asset Extraction, Defensive Only – Defending Your Assets, Setting Active Intrusion Systems, Vulnerability Assessment and Remediation, and Offensive and Defensive – Capture the Flag, where teams are pitted against each other to protect their own resources while attacking the opposing team.


FireEye Enterprise Incident Response with MIR

This two-day instructor-led course provides an introduction to using Mandiant for Intelligent Response (MIR) as an incident response tool. Labs take students through a breach, teaching how to perform sweep hit analysis, build live response scripts, basic unknown binary analysis, and basic Indicator of Compromise (IOC) creation.


© 2018 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W