ECSA-LPT

  • About ECSA-IPT Exam
  • IS Lab Access
  • Prerequisites
  • Topics
  • FEE AND DELIVERABLES

 

 

ECSA

Google Review

The ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report

The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology

"Security is not an assert ,Luxury nor an one time activity."

This course is an intermediate to advance level certification.

Benefits of ECSA-IPT

  • An ECSA professional gets greater industrial acceptance for their methods inherited through the training
  • pentesting methodology with an emphasis on hands-on learning
  • You will have a good knowledge of analyzing the security concepts of an organization
  • you will have knowledge of an existing security posture of the entire network
  • This certification is up to expectation of the security domain, because it updated with the day-to-day security analysis.

  

For Query & Registration

 

For Queries, Contact - 044-39 572 572

Participant Feedback

 

Upcoming events

CISA Certification Training
24-11-2018 9:00 am
EC-Council Certified Security Analyst (ECSA)
24-11-2018 9:30 am

About Trainer

All our consultants are senior professional with tremendous exposure to Information Security and Governance Risk & Compliance. With over a decade of experience in training & consulting, they help bring a lot of practical and industry relevant examples with case studies to the classroom which improves the overall learning experience. Our professional hold industry acclaimed accreditation such as : Phd , M.S , CISSP, CHFI, CISA, CISM, CEH, ISO 27001 LI / LA, CCNP, CWNA , MCSE & ITIL.

 

 

 

 

server1
Uninterrupted Dedicated Server
work from home
Work From Home
gaming mod threats
Learn With Fun

infySEC IS Lab is an extreme Online Virtual Remote Lab provided to participants where they can work from any place at any point of time without restriction. ISLab provides login privilege to Certified Ethical Cracker participants where they can work in our Virtual Remote Server and start doing their Labs.

Our ISLab was created in such a concept called “Learn with Fun” where each participant will face gaming-like structured online hacking program called 'Live Hacking Zone' which contains many Levels relevant to the topics covered on the program. Each participant has to cross levels to face CEC exam, Hence CEc will only deliver equipped candidates. Participant have to cross multiple Levels starting with easy to toughest level. Each participant can track other participants activity live which helps each participants to get involved into Live Hacking Zone competition, Prepare to be SHOCKED, ENTERTAINED and EDUCATED all at the same time.

 

Prerequisites

  • Should know how to use Web Browsers
  • Basic HTML Familiarity
  • Basic networking will be helpful 

Who Should Attend

  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals

The content of infySEC syllabuses is regularly updated to ensure that it remains relevant and reflects the latest thinking in par with the scenario of current technology . However, as part of the latest review, the documents themselves have been given a fresh design.

certificate flow

FLOW OF ECSA-LPT COURSE

ECSA-LPT Topics:

 

S.No TOPICS
1 The need for security analysis
2 Advanced googling
3 TCP/IP packet analysis
4 Advanced Sniffing tecniques
5 Vulnerability analysis with nessus
6 Advanced wireless testing
7 Desiging a DMZ
8 Snort Analysis
9 Log Analysis
10 Advanced Exploits and Tools
11 Penetration Testing Methodologies
12 Customer and Legal Agreements
13 Rules of Engagements
14 Penetration Testing Planning and Scheduling
15 Pre Penetration testing Checklist
16 Information Gathering
17 Vulnerability analysis
18 Penetration testing
19 External Penetration testing
20 Internal network Penetration testing
21 Routers and Switches
22 Firewall
23 IDS
24 Wireless
25 Denial of Service
26 Password Cracking
27 Social engineering
28 Stolen laptop, PDA's and cell phones
29 Application
30 Physical security
31 Database
32 VoIP
33 VPN
34 War Dialing
35 Virus and Trogans Detections
36 Log management
37 File Integrity Checking
38 Bluetooth and hand held device
39 Telecommunications and broadband
40 Email security
41 Security Patches
42 Data Leakage
43 Penetration testing deliverables and conclutions
44 Penetration testing report and documentation writing
45 Penetration testing report analysis
46 Post testing action
47 Ethics of licensed Penetration tester
48 Standards and compliance.