Processing your application. Please be patient while we make sure we receive every piece of it.
Information Security
Certified Security Analyst iClass (EICSA)
5 Day(s)
Course OverviewEC-Council | iClass Online Event Venue is a robust learning environment designed to enhance the remote learning experience of our Information Security Students. iClass encompasses current technologies in online Web Conferencing, VOIP Services, distributed Video Platforms, and our new iLabs product allowing every student full hands on access to live servers to conduct labs in virtualized environments. By combining live instruction, classroom interactivity, remote control capabilities, live hands-on labs, and the power of the world wide web, students now have more learning options than ever when it comes to EC-Council titles. EC-Council Certified Security Analyst (ECSA) complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. While CEH exposes the learner to hacking tools and technologies, ECSA takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking penetration testing methods and techniques, ECSA class helps students perform the intensive assessments required to effectively identify and mitigate risks to the security of the infrastructure. This makes ECSA a relevant milestone towards achieving EC-Council’s Licensed penetration Tester, which also ingrains the learner in the business aspect of penetration testing. The Licensed Penetration Tester standardizes the knowledge base for penetration testing professionals by incorporating the best practices followed by experienced experts in the field. The objective of EC-Council Certified Security Analyst is to add value to experienced security professionals by helping them analyze the outcomes of their tests. ECSA leads the learner into the advanced stages of ethical hacking. Advanced Penetration Testing and Security Analysis The ECSA/LPT training program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the available methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the LPT methodology and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.Objectives - noneAudienceNetwork server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.Prerequisites - none
Price: $3,330
To find out more available information
about this course, please contact us:

To find out more available information
about this course, please contact us:

To find out more available information
about this course, please contact us:


CertifiedSecurity Analyst iClass (ECSA)


Module 1:The Need for Security Analysis

Module 2:Advanced Googling

Module 3:TCP/IP Packet Analysis

Module 4:Advanced Sniffing Techniques

Module 5:Vulnerability Analysis with Nessus

Module 6:Advanced Wireless Testing

Module 7:Designing a DMZ

Module 8:Snort Analysis

Module 9:Log Analysis

Module10: Advanced Exploits and Tools

Module11: Penetration Testing Methodologies

Module12: Customers and Legal Agreements

Module13: Rules of Engagement

Module14: Penetration Testing Planning and Scheduling

Module15: Pre Penetration Testing Checklist

Module16: Information Gathering

Module17: Vulnerability Analysis

Module18: External Penetration Testing

Module19: Internal Network Penetration Testing

Module20: Routers and Switches Penetration Testing

Module21: Firewall Penetration Testing

Module22: IDS Penetration Testing

Module23: Wireless Network Penetration Testing

Module24: Denial of Service Penetration Testing

Module25: Password Cracking Penetration Testing

Module26: Social Engineering Penetration Testing

Module27: Stolen Laptop, PDAs and Cell phones Penetration Testing

Module28: Application Penetration Testing

Module29: Physical Security Penetration Testing

Module30: Database Penetration testing

Module31: VoIP Penetration Testing

Module32: VPN Penetration Testing

Module33: War Dialing

Module34: Virus and Trojan Detection

Module35: Log Management Penetration Testing

Module36: File Integrity Checking

Module37: Blue Tooth and Hand held Device Penetration Testing

Module38: Telecommunication and Broadband Communication Penetration Testing

Module39: Email Security Penetration Testing

Module40: Security Patches Penetration Testing

Module41: Data Leakage Penetration Testing

Module42: Penetration Testing Deliverables and Conclusion

Module43: Penetration Testing Report and Documentation Writing

Module44: Penetration Testing Report Analysis

Module45: Post Testing Actions

Module46: Ethics of a Licensed Penetration Tester

Module47: Standards and Compliance