NetCom Learning

EC-Council Certified Security Analyst (ECSA) v9 iClass|iLearn

EC-Council Certified Security Analyst (ECSA) v9 iClass|iLearn Course Description

Duration: 365.00 days (40 hours)

EC-Council

EC-Council’s Penetration Testing Certification Training Course - ECSA v9 iClass|iLearn, a self-paced learning, takes the skills taught in our CEH course to the next level by offering cyber security professionals a pen test methodology deployed through its hand-on component; EC-Council's online cyber range.

The ECSA penetration tester course was designed by professionals to teach ethical hackers how to apply their hacking skills (Not limited to but including The Five Phases of Ethical Hacking) in a pen test scenario. The scenarios cover the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

Each candidate will be required to write and submit a penetration test report which they will develop throughout the course and which will be based on the labs in the course delivered via EC-Council’s iLabs cyber range platform. Only candidates who can successfully complete the challenges and pass the report writing portion of the course will be allowed to take the EC-Council Certified Security Analyst (ECSA) certification exam.


What's Included
- Self-paced online training
- One year access to the official e-courseware
- Six months access to EC-Council's official Online lab environment (iLabs)
- Certification Voucher


Buy eLearning

Next Class Dates

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this EC-Council Certified Security Analyst (ECSA) v9 iClass|iLearn Course

  • » Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers,System Administrators and Risk Assessment Professionals.

Back to Top

EC-Council Certified Security Analyst (ECSA) v9 iClass|iLearn Course Objectives

  • » Explore how to conduct Security Analysis, TCP IP Packet Analysis and Vulnerability Analysis
  • » Work on Pre-penetration Testing Steps and Information Gathering Methodology
  • » Practice different Penetration Testing Methodologies covering firewall, IDS , Web Application, SQL Penetration Testing Methodology and more
  • » Understand other Penetration Testing Methodologies covering Wireless Network, Mobile Devices, and Cloud Penetration Testing Methodology
  • » Learn how to write reports and take post test actions

Back to Top

EC-Council Certified Security Analyst (ECSA) v9 iClass|iLearn Course Outline

      1. Security Analysis and Penetration Testing Methodologies
      2. TCP IP Packet Analysis
      3. Pre-penetration Testing Steps
      4. Information Gathering Methodology
      5. Vulnerability Analysis
      6. External Network Penetration Testing Methodology
      7. Internal Network Penetration Testing Methodology
      8. Firewall Penetration Testing Methodology
      9. IDS Penetration Testing Methodology
      10. Web Application Penetration Testing Methodology
      11. SQL Penetration Testing Methodology
      12. Database Penetration Testing Methodology
      13. Wireless Network Penetration Testing Methodology
      14. Mobile Devices Penetration Testing Methodology
      15. Cloud Penetration Testing Methodology
      16. Report Writing and Post Test Actions

Back to Top

EC-Council Certified Security Analyst (ECSA) v9 iClass|iLearn Course Benefits

  • » The ECSA certification will prepare you to challenge the pinnacle of the EC-Council Certification track: Licensed Penetration Tester (LPT) Master

Back to Top

Do you have the right background for EC-Council Certified Security Analyst (ECSA) v9 iClass|iLearn?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

Emilio G.
- Vastly experienced working within multinational environments and capable of connecting to different audiences - In-depth expertise in the implementation, troubleshooting and documentation of networks and security systems, with strong "hands on" technical knowledge of CISSP, CEH and CHFI. - Master of Science in Electronics Engineering, and holder of several technical certifications. - Highly-skilled in diverse fields ranging from Security, Computer Forensics, Networking, Routing Protocols, Programming, Databases and Applications to name a few. Bio: With over 25 years of technical experience, Emilio brings a dynamic set of skills supported by a Masters Degree in Electronics Engineering and on-the-field experience working in multinational environments. He also holds more than 12 Cisco, CompTIA, and Microsoft certifications. Although he is well versed and thorough in multiple technological fields, his technical forte lies in the security domain, specifically CISSP, CEH and CHFI. Emilio's skills have evolved over time, studying closely and constantly staying well informed of the growing cyber threats. These are just some of the few reasons why Emilio brings to his classes more than just what's in the books.
Larry G.
- More than 14 years of experience as a Security Subject Matter Expert as well as black belt in a variety of martial arts.
- Numerous Challenge Coins from the US Government including the US Army, and the Criminal Investigation Command.
- Much acclaimed instructor at NetCom Learning, with evaluation scores of 8.8 out of 9.

Bio:

Larry is a unique instructor and IT security expert. If you sit in one of his classes you might get the feeling of being in a martial arts class - That's exactly how Larry wants it! "The principles behind IT security are the same as those in a variety of martial arts," Larry says. In addition to teaching IT security for over 14 years, he has practiced martial arts since he was 13 years old and holds black belts in multiple disciplines including Tai Chi, Kung Fu, and Kick Boxing. "All of these techniques are like tools for different types of attacks," Larry explains.

Larry's excellence in certification training and passion for IT security has earned him numerous Challenge Coins from the US Government including the US Army, and the Criminal Investigation Command. He is also a much acclaimed instructor at NetCom Learning, with evaluation scores of 8.8 out of 9.
Richard L.
- Over 20 years experience in the IT industry.
- CEH and Microsoft training for many government agencies, including the United States Department of Homeland Security, and the Federal Bureau of Investigation.
- CEH and Microsoft training for Fortune corporations such as Merrill Lynch and ADP.

Bio:

Richard is a premier Microsoft Certified Trainer and Certified EC-Council Instructor. He has over 20 years of experience as a network administrator, security consultant, vulnerability assessor, and penetration tester for assorted Fortune companies.

Richard??s knowledge on the development and implementation of policies and procedures concerning the security of network data is unsurpassed. He has conducted successful CEH and Microsoft training classes for many government agencies including the United States Department of Homeland Security, the Department of Justice and the Federal Bureau of Investigation, as well as Fortune enterprises such as Merrill Lynch and ADP.

See more...   See more instructors...

Back to Top

Recent Client Testimonials & Reviews

Highly professional, engaging and informative!

- Chris A.
Course(s) Taken

» Technical Webinar: Raise your defenses against Malware & Ransomware attacks

  More testimonials »  

Back to Top