If you possess sound knowledge of security or have certification you are ready to opt for course. Since Security Analyst, is an advanced ethical hacking training certification that complements the ethical hacking , ethical hacking by exploring the analytical phase of ethical hacking.
While the Certified Ethical Hacker certification exposes the delegate to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking network penetration testing methods and techniques, this pen testing computer security certification helps delegates perform the intensive assessments required to effectively identify and mitigate risks to the information security of the infrastructure.
This makes the Certified Security Analyst 'Pen Testing' certification a relevant milestone toward achieving EC Council's Licensed Penetration Tester, which also ingrains the learner in the business aspect of network penetration testing. The Licensed Penetration Tester standardizes the knowledge base for network penetration testing professionals by incorporating the best practices followed by experienced experts in the field.
The objective of Certified Security Analyst 'pen testing' certification is to add value to experienced Information security professionals by providing computer security training that will help them analyze the outcomes of their Vulnerability Assessments. Network Penetration Testing Training leads the learner into the advanced stages of ethical hacking.
Target Audience:» Network server administrators, Firewall Administrators, Information Security Testers, System Administrators and Risk Assessment professionals.
» This certification is a pre-requisite to EC-Council's Licensed Penetration Tester Program.
Do I have to be ethical hacking to Attempt the ?? No. While the ethical hacking is not a prerequisite for the Security Analyst course, we strongly advise candidates to attain the ethical hacking prior to the commencement of the Security Analyst course .
The Need for Security Analysis
Advanced Googling
TCP/IP Packet Analysis
Advanced Sniffing Techniques
Vulnerability Analysis with Nessus
Advanced Wireless Testing
Designing a DMZ
Log Analysis
Advanced Exploits and Tools
Pen Testing Methodologies
Customers and Legal Agreements
Rules of Engagement
Penetration Testing Planning and Scheduling
Pre Penetration Testing Checklist
Information Gathering
Vulnerability Analysis
External Penetration Testing
Internal Network Penetration Testing
Routers and Switches Penetration Testing
Firewall Penetration Testing
IDS Penetration Testing
Wireless Network Penetration Testing
Denial of Service Penetration Testing
Password Cracking Penetration Testing
Social Engineering Penetration Testing
Stolen Laptop, PDAs and Cell phones Penetration Testing
Application Penetration Testing
Physical Security Penetration Testing
Database Penetration testing
VPN Penetration Testing
War Dialing
Virus and Trojan Detection
Log Management Penetration Testing
File Integrity Checking
Blue Tooth and Hand held Device Penetration Testing
Telecommunication and Broadband Communication Penetration Testing
Email Security Penetration Testing
Security Patches Penetration Testing
Data Leakage Penetration Testing
Penetration Testing Deliverables and Conclusion
Penetration Testing Report and Documentation Writing
Penetration Testing Report Analysis
File Integrity Checking
Ethics of a Licensed Penetration Tester
Standards and Compliance
Delivery method: Classroom / Attend from Anywhere