ECSA - EC Council Certified Security Analyst

Curso

En BUENOS AIRES

Precio a consultar

Descripción

  • Tipología

    Curso

  • Lugar

    Buenos aires

  • Duración

    5 Días

Dirigido a: Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals

Sedes y fechas disponibles

Ubicación

inicio

BUENOS AIRES (Capital Federal)
Ver mapa
MAIPU 464 5° PISO, 1006

inicio

Consultar

Información relevante sobre el curso

It is strongly recommended that you attend the CEH class before enrolling into ECSA program.

Preguntas & Respuestas

Añadí tu pregunta

Nuestros asesores y otros usuarios podrán responderte

¿Quién querés que te responda?

Dejanos tus datos para recibir respuesta

Sólo publicaremos tu nombre y pregunta

Opiniones

Plan de estudios

Course Description
ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments.
EC-Council’s Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.
Course Outline
Module 1: The Need for Security Analysis
Module 2: Advanced Googling
Module 3: TCP/IP Packet Analysis
Module 4: Advanced Sniffing Techniques
Module 5: Vulnerability Analysis with Nessus
Module 6: Advanced Wireless Testing
Module 7: Designing a DMZ
Module 8: Snort Analysis
Module 9: Log Analysis
Module 10: Advanced Exploits and Tools
Module 11: Penetration Testing Methodologies
Module 12: Customers and Legal Agreements
Module 13: Penetration Testing Planning and Scheduling
Module 14: Pre Penetration Testing Checklist
Module 15: Information Gathering
Module 16: Vulnerability Analysis
Module 17: External Penetration Testing
Module 18: Internal Network Penetration Testing
Module 19: Router Penetration Testing
Module 20: Firewall Penetration Testing
Module 21: IDS Penetration Testing
Module 22: Wireless Network Penetration Testing
Module 23: Denial of Service Penetration Testing
Module 24: Password Cracking Penetration Testing
Module 25: Social Engineering Penetration Testing
Module 26: Stolen Laptop Penetration Testing
Module 27: Application Penetration Testing
Module 28: Physical Security Penetration Testing
Module 29: Database Penetration testing
Module 30: VoIP Penetration Testing
Module 31: VPN Penetration Testing
Module 32: Penetration Testing Report Analysis
Module 33: Penetration Testing Report and Documentation Writing
Module 34: Penetration Testing Deliverables and Conclusion
Module 35: Ethics of a Licensed Penetration Tester

ECSA - EC Council Certified Security Analyst

Precio a consultar