Sign in

Forgot Your Password? New User? Create an account.

Register

logo
USD GBP
    • Information Technologies
    • Business and Management
    • English
    • Project and Processes Management
    • VIEW ALL
    Adobe Technologies Amazon Web Services AutoDesk Technologies Azure Cisco Technologies CyberSecurity Data Science
    DevOps ERP Exchange Server Fiber Optic IT Technical Linux Microsoft 365
    Microsoft Dynamics Microsoft Office Microsoft SharePoint Microsoft SQL Microsoft Windows Oracle Technologies VIEW ALL COURSES
    Auditing & Governance Customer Service Financial Skills Food Safety Hospitality Management HR Best Practices Leadership & Self Development
    Legal NGOs Procurement & Supply Chain Safety Sales & Marketing Social Media Team Building
    VIEW ALL COURSES
    Languages VIEW ALL COURSES
    Frameworks and Processes Governance ISO IT Service Management Project Management VIEW ALL COURSES
  • In-Class Training
  • Online Instructor-Led Training
  • E-learning: Self-paced Training
  • Corporate Training About Us Contact Us
logo
  • Courses
  • Learning format
    • In-Class Training
    • Online Instructor-Led Training
    • E-learning: Self-paced Training
  • Corporate Training
  • About us
  • Contact us
  • Currency
    USD
  • LogIn

Certified Security Analyst

The requested schedule is currently not available. Leave your contact details to send you schedule updates.

Send a Message

Information Technologies

Certified Security Analyst

hours

30

language

English

Target Audience

Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals all benefit from the ECSA program.

Topics Covered

01 Security Analysis and Penetration Testing Methodologies
+

02 TCP IP Packet Analysis
+

03 Pre-penetration Testing Steps
+

04 Information Gathering Methodology
+

05 Vulnerability Analysis
+

06 External Network Penetration Testing Methodology
+

07 Internal Network Penetration Testing Methodology
+

08 Firewall Penetration Testing Methodology
+

09 IDS Penetration Testing Methodology
+

10 Web Application Penetration Testing Methodology
+

11 SQL Penetration Testing Methodology
+

12 Database Penetration Testing Methodology
+

13 Wireless Network Penetration Testing Methodology
+

14 Mobile Devices Penetration Testing Methodology
+

15 Cloud Penetration Testing Methodology
+

16 Report Writing and Post Test Actions
+

minimize course outline

The requested schedule is currently not available. Leave your contact details to send you schedule updates.

Send a Message

Select Learning Format.

Certified Security Analyst

In-Class Training
€ 1,625

Certified Security Analyst

Online Instructor-Led Training
€ 1,300

Register

You Might Also Like

Information Technologies

Ethical Hacking and Countermeasures

Information Technologies

Certified Network Defender

Information Technologies

CERTIFIED SOC ANALYST (CSA)

Information Technologies

Certified Security Analyst

Information Technologies

Computer Hacking Forensic Investigator

Information Technologies

Certified Blockchain Professional

Your experience on this site will be improved by allowing cookies.
  • FAQs
  • Blog
  • Contact us
  • Careers
  • Privacy policy
  • Terms & conditions.
  • Refund policy
logo
All right reserved © 2018