Certified Security Analyst (ECSA)

Cas Training > Nuestros cursos > Certified Security Analyst (ECSA)
Icono Duración del curso
Duración del curso
5 días
Lugar de impartición
Madrid / Online
Icono modalidad del curso
Modalidad
Presencial|Virtual
Icono Fecha del curso
Fecha de inicio
Próximamente

Acerca del curso

You are an ethical hacker. In fact, you are a Certified Ethical Hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep. You have sufficient knowledge and an arsenal of hacking tools and you are also proficient in writing custom hacking code.

Is that enough?

Can you become a Certified Security Analyst (ECSA) and an industry accepted security professional? Will organizations hire you to help them protect their systems? Do you have any knowledge in applying a suitable methodology to conduct a penetration test for an enterprise client?

Próximas convocatorias

Estamos preparando nuevas convocatorias. Déjanos tus datos a través del formulario y te avisaremos lo antes posible.

Objetivos

  • The APT is a Follow-on to the ECSA
  • You should have completed the ECSA Practical
  • Prepares you for the LPT Master Certification.
  • Teaches you how to assess targets and escalate privileges.
  • You will learn a repeatable and measurable approach to penetration testing
  • Contenidos

    Module 00: Penetration Testing Essential Concepts (Self-Study)
    Module 01: Introduction to Penetration Testing and Methodologies
    Module 02: Penetration Testing Scoping and Engagement Methodology
    Module 03: Open-Source Intelligence (OSINT) Methodology
    Module 04: Social Engineering Penetration Testing Methodology
    Module 05: Network Penetration Testing Methodology – External
    Module 06: Network Penetration Testing Methodology – Internal
    Module 07: Network Penetration Testing Methodology – Perimeter Devices
    Module 08: Web Application Penetration Testing Methodology
    Module 09: Database Penetration Testing Methodology
    Module 10: Wireless Penetration Testing Methodology
    Module 11: Cloud Penetration Testing Methodology
    Module 12: Report Writing and Post Testing Actions

    Compartir:

    Solicita más información

    Solicitar Información
    Mensaje enviado correctamente
    No se ha enviado su mensaje. Por favor revisa los campos e inténtalo otra vez.