0% found this document useful (0 votes)
117 views2 pages

ECSA Training for Aspiring Analysts

The document discusses the EC-Council Security Analyst (ECSA) program. The ECSA program takes a hands-on approach to penetration testing training using real-time scenarios. It teaches students penetration testing methodologies. The program covers topics such as open source intelligence methodology, social engineering penetration testing, network penetration testing both externally and internally, wireless and cloud penetration testing, and report writing. Requirements for the program include having taken the CEH Coaching previously. The program includes 5 meetings, a jacket, certificates, and lifetime consultation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views2 pages

ECSA Training for Aspiring Analysts

The document discusses the EC-Council Security Analyst (ECSA) program. The ECSA program takes a hands-on approach to penetration testing training using real-time scenarios. It teaches students penetration testing methodologies. The program covers topics such as open source intelligence methodology, social engineering penetration testing, network penetration testing both externally and internally, wireless and cloud penetration testing, and report writing. Requirements for the program include having taken the CEH Coaching previously. The program includes 5 meetings, a jacket, certificates, and lifetime consultation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CO URSE-NE T

EC–Council Security Analyst (ECSA)

qualified instructor full facilities hands on lab


ECSA
EC–Council Security Analyst

P R O G R A M Materi EC–Council
Security Analyst :
Introduction to Penetration Testing and
1 Methodologies
Penetration Testing Scoping and
ECSA adalah pelatihan dengan pendekatan 2 Engagement Methodology
praktek untuk kursus Penetrasi Pengujian ini Open Source Intelligence (OSINT)
3
menggunakan skenario real-time untuk Methodology

melatih siswa dalam metodologi pengujian Social Engineering Penetration Testing


4 Methodology
penetrasi. EC–Council Security Analyst (ECSA) Network Penetration Testing
tentu saja akan membantu Anda menguasai 5 Methodology - External

metodologi pengujian penetrasi yang 6


Network Penetration Testing
Methodology - Internal
berulang dan yang dapat digunakan dalam Network Penetration Testing
pengujian penetrasi, secara global. 7 Methodology - Perimeter Devices
Web Application Penetration Testing
8 Methodology
Database Penetration Testing
9 Methodology
Wireless Penetration Testing
10 Methodology

Requirement: 11 Cloud Penetration Testing Methodology

- Sudah pernah mengikuti Coaching CEH 12 Report Writing and Post Testing Actions

- 5 kali pertemua n

qualified instructor full facilities hands on lab

I N C LUDE :
Exclusive Jacket Certificates Consultation (Lifetime)

Course-Net Jakarta Course-Net Indonesia [email protected]


Ruko Business Park Kbn. Jeruk Ruko Bolsena Blok A No.7 0-8111-8111-10
Blok E1/9 - Jakarta Barat Gading Serpong - Tangerang www.course-net.com

You might also like