Level: Foundation

Certified Security Analyst/LPT (ECSA)

5 Day | Instructor Led

EC-Council Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.

Inquire About
Certified Security Analyst/LPT (ECSA)

Ideal Candidates for Certified Security Analyst/LPT (ECSA) Class

Certified Security Analyst/LPT (ECSA) Prerequisites

Experience with Windows and/or UNIX/Linux operating systems

Knowledge of TCP/IP and networking

Security+ certification is recommended

Certified Ethical Hacker certification is strongly recommended

What You'll Get in Certified Security Analyst/LPT (ECSA)

EC Council Certified System Analyst Student Kit

Access to iLabs

Prime Prometric Exam Voucher

Hands-on practice/skills development on hacking from both Microsoft and Linux

70% hands-on activity during the class

What You'll Learn in Certified Security Analyst/LPT (ECSA)

Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose.

Certified Security Analyst/LPT (ECSA) Certification

The ECSA certification exam will be conducted on the last day of training. Students need to pass the online Prometric Prime exam ECSA v8 to receive the ECSA certification. The Student also will be prepared for the LPT certification.

Certified Security Analyst/LPT (ECSA) Outline

Security Analysis and Penetration Testing Methodologies

TCP IP Packet Analysis

Pre-penetration Testing Steps

Information Gathering Methodology

Vulnerability Analysis

External Network Penetration Testing Methodology

Internal Network Penetration Testing Methodology

Firewall Penetration Testing Methodology

IDS Penetration Testing Methodology

Web Application Penetration Testing Methodology

SQL Penetration Testing Methodology

Database Penetration Testing Methodology

Wireless Network Penetration Testing Methodology

Mobile Devices Penetration Testing Methodology

Cloud Penetration Testing Methodology

Report Writing and Post Test Actions


A. Erlich


I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin


The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.

Top Related Courses

Business Email Compromise (BEC) XML Entity Injection (XXE) Exercise

The BEC XXE exercise is a customized, six-hour, Cyber Range exercise hosted on ManTech’s Advanced Cyber Range Environment (ACRE). Lead by expert cyber security engineers, the exercise can be executed in a classroom and remotely. In this exercise, BEC-based attacks are simulated. Participants will be introduced to variations of the BEC attack (both external and internal) and will capture, preserve and recover network and host-based artifacts from the attacks. They will also determine the origin of the attacks, the extent of the compromise, and any on-going activity related to it. Discussion focuses on blue team threat hunter tasks. This exercise uses a hands-on keyboard approach to create realistic technical training and management interaction opportunities where participants respond to and report events as identified. Participants are engaged via an Incident Response "Observe/Engage" Model and are encouraged to view the attack as if it were happening to their institutions in real time. Participants are asked to share what they have done or would do based on the facts provided.

Cyber Vanguard Series- Cyber Storm Assault Tactics

All actions in war, regardless of the level, are based upon either taking the initiative or reacting in response to the opponent. By taking the initiative, we dictate the terms of the conflict and force the enemy to meet us on our terms. The initiative allows us to pursue some positive aim even if only to preempt an enemy initiative. It is through the initiative that we seek to impose our will on the enemy.

Cyber Vanguard Series-Cyber Strike

Cyber Vanguard Series - Cyber Strike takes the offensive and defensive assault tactics and applies them in several different real world scenarios. The entire course is hands on and builds upon the skills and knowledge the students have previously received. Applications include Offensive only - Hunt Teaming, Data Harvesting, and Asset Extraction, Defensive Only – Defending Your Assets, Setting Active Intrusion Systems, Vulnerability Assessment and Remediation, and Offensive and Defensive – Capture the Flag, where teams are pitted against each other to protect their own resources while attacking the opposing team.

© 2019 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W