Level: Foundation

Certified Security Analyst/LPT (ECSA)

5 Day | Instructor Led

EC-Council Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.

Inquire About
Certified Security Analyst/LPT (ECSA)

Ideal Candidates for Certified Security Analyst/LPT (ECSA) Class

Certified Security Analyst/LPT (ECSA) Prerequisites

Experience with Windows and/or UNIX/Linux operating systems

Knowledge of TCP/IP and networking


Security+ certification is recommended


Certified Ethical Hacker certification is strongly recommended

What You'll Get in Certified Security Analyst/LPT (ECSA)

EC Council Certified System Analyst Student Kit

Access to iLabs

Prime Prometric Exam Voucher

Hands-on practice/skills development on hacking from both Microsoft and Linux

70% hands-on activity during the class

What You'll Learn in Certified Security Analyst/LPT (ECSA)

Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose.

Certified Security Analyst/LPT (ECSA) Certification

The ECSA certification exam will be conducted on the last day of training. Students need to pass the online Prometric Prime exam ECSA v8 to receive the ECSA certification. The Student also will be prepared for the LPT certification.

Certified Security Analyst/LPT (ECSA) Outline

Security Analysis and Penetration Testing Methodologies

TCP IP Packet Analysis

Pre-penetration Testing Steps

Information Gathering Methodology

Vulnerability Analysis

External Network Penetration Testing Methodology

Internal Network Penetration Testing Methodology

Firewall Penetration Testing Methodology

IDS Penetration Testing Methodology

Web Application Penetration Testing Methodology

SQL Penetration Testing Methodology

Database Penetration Testing Methodology

Wireless Network Penetration Testing Methodology

Mobile Devices Penetration Testing Methodology

Cloud Penetration Testing Methodology

Report Writing and Post Test Actions

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. CEH provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEHv8 course-ware. Latest tools and exploits uncovered from the underground community are featured in the new package.



EC-Council released the most advanced computer forensic investigation program in the world. This course covers major forensic investigation scenarios that enable you to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation. Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life. With the onset of sophisticated cyber attacks, the need for advanced cybersecurity and investigation training is critical. If you or your organization requires the knowledge or skills to identify, track, and prosecute cyber criminals, then this is the course for you. You will learn how to excel in digital evidence acquisition, handling, and forensically sound analysis. These skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats, and other intricate cases involving computer systems.



Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client systems, to tracing the originator of defamatory emails, to recovering signs of fraud.

The CHFI course will provide participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute in the court of law.



© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W