Course Description
The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning
Program Objectives
- Introduction to Penetration Testing
- Penetration Testing Scoping and Engagement
- Open Source Intelligence (OSINT) Methodology
- Social Engineering Penetration Testing
- Network Penetration Testing – External
- Network Penetration Testing– Internal
- Network Penetration Testing – Perimeter Devices
- Web Application Penetration Testing
- Database Penetration Testing
- Wireless Penetration Testing
- Cloud Penetration Testing
- Report Writing and Post Testing Actions
Upon completion of this course, you will be able to accomplish:
- Advanced Window Attacks
- Attacking IoT Systems
- Writing Exploits: Advanced Binaries Exploitation
- Bypassing a Filtered Network
- Pentesting Operational Technology (OT)
- Access Hidden Networks with Pivoting
- Double Pivoting
- Privilege Escalation
- Evading Defense Mechanisms
- Attack Automation with Scripts
- Build Your Armory: Weaponize Your Exploits
- Write Professional Reports
Prerequisites
- Attend official training via an EC-Council accredited training channel or
- Possess a minimum of 2 years of working experience in a related InfoSec domain
Exam Details
Exam name : EC-Council Certified Security Analyst (ECSA v9) Exam
Number of Questions: 150
Passing Score: 70%
Test Duration:4 Hours
Test Format: Multiple Choice
Eligibility Criteria for ECSA Exam
• Attend offical training via an EC-Council accedited training channel Or
• Possess a minimum of 2 years of working experience in a related InfoSec domain
Course Features
- Lectures 0
- Quizzes 0
- Duration 40 hours
- Skill level All levels
- Language English
- Students 517
- Assessments Yes
Curriculum
- 13 Sections
- 0 Lessons
- 10 Weeks
- Module 00: Penetration Testing Essential Concepts (Self-Study)0
- Module 01: Introduction to Penetration Testing and Methodologies0
- Module 02: Penetration Testing Scoping and Engagement Methodology0
- Module 03: Open-Source Intelligence (OSINT) Methodology0
- Module 04: Social Engineering Penetration Testing Methodology0
- Module 05: Network Penetration Testing Methodology – External0
- Module 06: Network Penetration Testing Methodology – Internal0
- Module 07: Network Penetration Testing Methodology – Perimeter Devices0
- Module 08: Web Application Penetration Testing Methodology0
- Module 09: Database Penetration Testing Methodology0
- Module 10: Wireless Penetration Testing Methodology0
- Module 11: Cloud Penetration Testing Methodology0
- Module 12: Report Writing and Post Testing Actions0




