EC-Council – Certified Security Analyst (Practical Exam) Opslaan als favoriet Deel deze pagina Printen Deze cursus hebben we niet meer in ons assortiment maar nog wel andere cursussen, bijvoorbeeld: De cursus Kunnen wij je helpen? Neem contact met mij op Ik neem zelf contact op ECSA (Practical) is a 12-hour, rigorous practical exam built to test your penetration testing skills. ECSA (Practical) presents you with an organization and its network environment, containing multiple hosts. The internal network consists of several subnets housing various organizational units. It is made up of militarized and demilitarized zones, connected with a huge pool of database servers in a database zone. As a security precaution, and by design, all the internal resource zones are configured with different subnet IPs. The militarized zone houses the domain controllers and application servers that provide application frameworks for various departments of the organization. The candidates are required to demonstrate the application of the penetration testing methodology that is presented in the ECSA program, and are required to perform a comprehensive security audit of an organization, just like in the real world. You will start with challenges requiring you to perform advanced network scans beyond perimeter defenses, leading to automated and manual vulnerability analysis, exploit selection, customization, launch, and post exploitation maneuvers. The World’s First Penetration Testing Industry Readiness Assessment That Is 100% Verified, Online, Live, Proctored! The ECSA (Practical) tests your ability to perform threat and exploit research, understand exploits in the wild, write your own exploits, customize payloads, and make critical decisions at different phases of a pen testing engagement that can make or break the whole assessment. You will also be required to create a professional pen testing report with essential elements and guidance for the organization in the scenario to act on. ECSA (Practical) Credential Holders Are Proven To Be Able To: Perform advanced network scans beyond perimeter defenses, leading to automated and manual vulnerability analysis, exploit selection, customization, launch and post exploitation maneuvers. Customize payloads Make critical decisions at different phases of a pen-testing engagement Perform advanced network scans beyond perimeter defenses Perform automated and manual vulnerability analysis Customization, launch, and post exploitation maneuvers Perform a full fledged Penetration Testing engagement Create a professional pen-testing report Demonstrate the application of penetration testing methodology presented in the ECSA program ECSA (Practical) Training Program: Penetration Testing The preparatory course for this certification is the EC-Council Certified Security Analyst (ECSA) course. While there is no additional course or training required after the ECSA, we strongly recommend that you attempt the ECSA (Practical) exam only if you have attended the current ECSA course/equivalent. The aim of this credential is to help set gifted penetration testing practitioners apart from the crowd. Doel Key issues plaguing the information security world, incident management process, and penetration testing Various types of footprinting, footprinting tools, and countermeasures Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures System hacking methodology, steganography, steganalysis attacks, and covering tracks Dierent types of Trojans, Trojan analysis, and Trojan countermeasures Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures Packet sning techniques and how to defend against sniffing Social Engineering techniques, identify theft, and social engineering countermeasures DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures Session hijacking techniques and countermeasures Different types of webserver attacks, attack methodology, and countermeasures Different types of web application attacks, web application hacking methodology, and countermeasures SQL injection attacks and injection detection tools Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi- security tools Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures Various cloud computing concepts, threats, attacks, and security techniques and tools Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap Doelgroep Ethical Hackers Penetration Testers Network server administrators Firewall Administrators Security Testers System Administrators and Risk Assessment professionals Bijzonderheden Dit zijn EC-Council iLearn trainingen. Vijfhart IT Opleidingen is EC-Council Authorized Reseller van de iLearn oplossingen van EC-Council. Deze officiële geautoriseerde EC-Council iLearn oplossing bevat alles wat je nodig hebt om jezelf te certificeren als EC-Council Certified Professional. iLearn is inclusief een online examen (indien aanwezig/beschikbaar) om je certificering af te ronden. In elke iLearn training zit: The official EC-Council E-Courseware Training Videos of Master Instructors Preconfigured Labs (ilabs) Certification/Exam Voucher Let op: Je hebt 180 dagen toegang vanaf het moment dat je inlogt Let op: Helaas kun je deze training niet annuleren na ontvangst van je bestelling. Persoonlijk advies? Dejan de Gooijer accountmanager T. 026 - 791 10 65 E. d.degooijer@vijfhart.nl Onderwerpen Computer Forensics in Today¿s World Computer Forensics Investigation Process Understanding Hard Disks and File Systems Data Acquisition and Duplication Defeating Anti-Forensics Techniques Operating System Forensics Network Forensics Investigating Web Attacks Database Forensics Cloud Forensics Malware Forensics Investigating Email Crimes Mobile Forensics Forensics Report Writing and Presentation Planning & Prijs Gerelateerde cursussen Ervaringen ervaringen verzameld via Lucienne Groenendaal Secretarieel medewerkster "Training was prima, goede tips gekregen met af en toe een grap en grol. Locatie was prima, goed verzogd vwb koffie/thee, fruit en koekje. Mensen ook zeer vriendelijk. Lunch was perfect en zeer uitgebreid." 9 Ariana Scheepers "De cursus was goed, en de verzorging ook!Ik heb er veel van opgestoken! De lokatie in Nieuwegein is goed te bereiken met het openbaar vervoer, dus dat is prettig. Tot een volgenden keer." 10 Eric Pos Procesbeheerder bij Gemeente Amersfoort "Ik vond de training erg leerzaam. De inhoud was van een hoog niveau en de docent was goed thuis in de materie. Ik stel het vooral op prijs dat er diep op de concepten werd ingegaan." 9 Share: Share Share Share Share
Lucienne Groenendaal Secretarieel medewerkster "Training was prima, goede tips gekregen met af en toe een grap en grol. Locatie was prima, goed verzogd vwb koffie/thee, fruit en koekje. Mensen ook zeer vriendelijk. Lunch was perfect en zeer uitgebreid." 9
Ariana Scheepers "De cursus was goed, en de verzorging ook!Ik heb er veel van opgestoken! De lokatie in Nieuwegein is goed te bereiken met het openbaar vervoer, dus dat is prettig. Tot een volgenden keer." 10
Eric Pos Procesbeheerder bij Gemeente Amersfoort "Ik vond de training erg leerzaam. De inhoud was van een hoog niveau en de docent was goed thuis in de materie. Ik stel het vooral op prijs dat er diep op de concepten werd ingegaan." 9