IT Training /Certification /Consulting - Bangalore

Friday, 17 October 2014

Item details

City: Bangalore, Karnataka
Offer type: Offer
Price: Rs 35,000


Contact name Growmind
Phone 9739762026

Item description

Growmind Solution ECSA Course In Bangalore

Security Analyst
EC Council Certified Security Analyst, ECSA an advanced ethical hacking training certification that complements the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking. While the Certified Ethical Hacker certification exposes the learner to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking network penetration testing training methods and techniques, this pen testing computer security certification helps students perform the intensive assessments required to effectively identify and mitigate risks to the information security of the infrastructure.
This makes the Certified Security Analyst "Pen Testing" certification a relevant milestone toward achieving EC Council’s Licensed penetration Tester, which also ingrains the learner in the business aspect of network penetration testing. The Licensed Penetration Tester certification standardizes the knowledge base for network penetration testing professionals by incorporating the best practices followed by experienced experts in the field.

The objective of Certified Security Analyst “pen testing” certification is to add value to experienced Information security professionals by providing data security training that will help them analyze the outcomes of their Vulnerability Assessments. Network Penetration Testing Training leads the learner into the advanced stages of ethical hacking.
CEH V8 ECSA Course Outline
1The Need for Security Analysis
2Advanced Googling
3TCP/IP Packet Analysis
4Advanced Sniffing Techniques
5Vulnerability Analysis with Nessus
6advanced Wireless Testing
7 Designing a DMZ
8 Snort Analysis
9 Log Analysis
10Advanced Exploits and Tools
11Pen Testing Methodologies
12 Customers and Legal Agreements
13 Rules of Engagement
14 Penetration Testing Planning and Scheduling
15Pre Penetration Testing Checklist
16Information Gathering
17Vulnerability Analysis
18External Penetration Testing
19Internal Network Penetration Testing
20Routers and Switches Penetration Testing
21Firewall Penetration Testing
22IDS Penetration Testing
23Wireless Network Penetration Testing
24Denial of Service Penetration Testing
25Password Cracking Penetration Testing
26Social Engineering Penetration Testing
27Stolen Laptop, PDAs and Cell phones Penetration Testing
28Application Penetration Testing
29Physical Security Penetration Testing
30Database Penetration testing
31 VoIP Penetration Testing
32 VPN Penetration Testing
33 War Dialing
34 Virus and Trojan Detection
35 Log Management Penetration Testing
36File Integrity Checking
37Blue Tooth and Hand held Device Penetration Testing
38 Telecommunication and Broadband Communication Penetration Testing
39 Email Security Penetration Testing
40 Security Patches Penetration Testing
41 Data Leakage Penetration Testing
42 Penetration Testing Deliverables and Conclusion
43 Penetration Testing Report and Documentation Writing
44 Penetration Testing Report Analysis
45 Post Testing Actions
46Ethics of a Licensed Penetration Tester
47Standards and Compliance

For more details contact us
Information Helpdesk
918884851579 / +918026542131 /
Authorized training and certification center from 'EC-Council', USA
Autorirized training and certification center from 'Peoplecert' USA