EC-Council Certification Training in Washington, DC Metro Area

EC-Council Certification Training in Washington, DC Metro Area

ECSA v10 is a all-encompassing course on testing security penetration, that provides students with a hands-on penetration testing experience for the real world. This universal hacking and penetration test class covers the state-of-the-art infrastructures, current operating systems and all important application environments while teaching students to document and how to write penetration testing reports. The ECSA pentest program covers the tools and techniques students acquire in the CEH (Certified Ethical Hacker) course and perfects your ability by teaching you to apply skills learned in the CEH and using EC-Council’s penetration testing methodology. This course will allow you to score high on the EC-Council ECSA 412-79 exam.

The EC-Council consist of several member entities that serve the goal of creating an improved, safer technological world through mindfulness and education. Our members include International Council of eCommerce Consultants (EC-Council), iClass, EC-Council University, EC-Council Global Services (EGS), and EC-Council Conferences and Events.

EC-Council Certified Security Analyst (ECSA) v10 Boot Camp?

Course Features

Start Course: 09/27/2018

End Course: 09/30/2018

Course Location: Alexandria VA

Students: 20

Code: 2018ECSA01

Course Price

Enrollment opens on 09/27/2018.

Course Details

EC-Council Certified Security Analyst (ECSA) v10 Boot Camp Course (ECSA 412-79 Certification Exam)

Course Features:

5 days EC-Council Certified Training Instructor-lead class

Exam Voucher for EC-Council ECSA 412-79 exam (on-site, last day of class)

Coffee, Pastries, Lunch, afternoon snacks

Official EC-Council Developed Courseware

Online Class Labs

Practice Exam

Course Objectives:

Security analysis and penetration testing methodologies

TCP IP packet analysis

Pre-penetration testing steps

Information gathering methodology

Vulnerability analysis

External network penetration testing methodology

Internal network penetration testing methodology

Firewall penetration testing methodology

IDS penetration testing methodology

Web application penetration testing methodology

SQL penetration testing methodology

Database penetration testing methodology

Wireless network penetration testing methodology

Mobile devices penetration testing methodology

Cloud penetration testing methodology

Report writing and post-test actions

Course Outline:

Module 00: Penetration Testing Essential Concepts (Self-Study)

Module 01: Introduction to Penetration Testing and Methodologies

Module 02: Penetration Testing Scoping and Engagement Methodology

Module 03: Open-Source Intelligence (OSINT) Methodology

Module 04: Social Engineering Penetration Testing Methodology

Module 05: Network Penetration Testing Methodology – External

Module 06: Network Penetration Testing Methodology – Internal

Module 07: Network Penetration Testing Methodology – Perimeter Devices

Module 08: Web Application Penetration Testing Methodology

Module 09: Database Penetration Testing Methodology

Module 10: Wireless Penetration Testing Methodology

Module 11: Cloud Penetration Testing Methodology

Module 12: Report Writing and Post Testing Actions

Course Labs:

Password Cracking Penetration Testing

Router and Switches Penetration Testing

Denial-of-Service Penetration Testing

Stolen Laptop, PDAs and Cell Phones Penetration Testing

Source Code Penetration Testing

Physical Security Penetration Testing

Surveillance Camera Penetration Testing

VoIP Penetration Testing

VPN Penetration Testing

Virtual Machine Penetration Testing

War Dialing

Virus and Trojan Detection

Log Management Penetration Testing

File Integrity Checking

Telecommunication and Broadband Communication Penetration Testing

Email Security Penetration Testing

Security Patches Penetration Testing

Data Leakage Penetration Testing

SAP Penetration Testing

Standards and Compliance

Information System Security Principles

Information System Incident Handling and Response

Information System Auditing and Certification


EC-Council creates educational materials (course content and exams) and certification distributed through our network of authorized education centers (more than 700 partners) that span over 2,000 locations in over 145 countries around the world. EC-Council owns and develops the world-famous E-Council CEH (Certified Ethical Hacker), CHFI (EC-Council Computer Hacking Forensics Investigator), ECSA (EC-Council Certified Security Analyst), and LPT (EC-Council Licensed Penetration Tester) programs. Our certifications are recognized worldwide and receive endorsements from diverse government agencies, that include the Federal Government, the DoD, the NSA, and the CNSS.

PRICE-MATCH GUARANTEE: Find a different provider offering the same class within 30 days of our date at a lower price and we’ll match that price. Conditions apply.LEARN MORE