HK$18,018.30 – HK$19,555.16

(Hong Kong) ECSAv10: EC-Council Certified Security Analyst (ECSA) Certifica...

Event Information

Share this event

Date and Time

Location

Location

Cyber Security Training Co. Ltd.

30 Canton Road

Tsim Sha Tsui

Hong Kong

View Map

Refund Policy

Refund Policy

Refunds up to 30 days before event

Event description

Description

COURSE SCHEDULE:

0900 - 1700 Each Day | Monday (June 4, 2018) - Friday (June 8, 2018)

TOTAL DURATION: 40 Hours

CERTIFIED SECURITY ANALYST TRAINING PROGRAM v10 (ECSAv10)

The ECSA program offers a seamless learning progress, continuing where the CEH program left off.

Unlike most other pen-testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals.

Who Is It For?

  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals

The ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning.

Course Outline
Module 00: Penetration Testing Essential Concepts (Self-Study)
Module 01: Introduction to Penetration Testing and Methodologies
Module 02: Penetration Testing Scoping and Engagement Methodology
Module 03: Open-Source Intelligence (OSINT) Methodology
Module 04: Social Engineering Penetration Testing Methodology
Module 05: Network Penetration Testing Methodology – External
Module 06: Network Penetration Testing Methodology – Internal
Module 07: Network Penetration Testing Methodology – Perimeter Devices
Module 08: Web Application Penetration Testing Methodology
Module 09: Database Penetration Testing Methodology
Module 10: Wireless Penetration Testing Methodology
Module 11: Cloud Penetration Testing Methodology
Module 12: Report Writing and Post Testing Actions

Share with friends

Date and Time

Location

Cyber Security Training Co. Ltd.

30 Canton Road

Tsim Sha Tsui

Hong Kong

View Map

Refund Policy

Refunds up to 30 days before event

Save This Event

Event Saved