Information Request



Register Now


Course Number: ECSA

The ECSA is an advanced security certification that complements the Certified Ethical Hacker (CEH) certification by validating the analytical phase of ethical hacking. An ECSA is a step ahead of a CEH by being able to analyze the outcome of hacking tools and technologies.

The ECSA certification adds value to experienced Information security professionals and helps them analyze the outcomes of vulnerability assessments.


Who Should Attend:

Ethical Hackers, Penetration Testers Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.

What is the EC-Council Security Analyst program?

You are an ethical hacker. In fact, you are a Certified Ethical Hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep. You have suffiicient knowledge and an arsenal of hacking tools and you are also proficient in writing custom hacking code.

Is that enough?

Can you become an industry accepted security professional? Will organizations hire you to help them protect their systems? Do you have any knowledge in applying a suitable methodology to conduct a

penetration test for an enterprise client? Do you have any experience writing a custom penetration testing report?

More importantly, do you have a globally recognized certification that can verify your penetration testing capabilities?
If you are the person above, what you may be lacking is the knowledge and experience to execute a successful penetration test according to accepted industry standards.
The ECSA is a security credential like no other! The ECSA course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application
environments while teaching the students how to document and write a penetration testing report.
The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker course(CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology It is a highly interactive, comprehensive, standards-based and methodology intensive training program

5-day security class which teaches information security professionals to conduct real life penetration tests.

This course is the part of the Information Security Track of EC-Council. This is a “Professional” level course,
with the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master”level certification.

Duration: 5 days

The iLabs Cyber Range

ECSA course is a fully hands-on program, the exercises cover real world scenario. By practicing the skills that are provided to you in the ECSA class, we are able to bring you up to speed with the latest
threats that organizations may be vulnerable to.c
Core Modules and Course Outline

1. Security Analysis and Penetration Testing Methodologies
2. TCP IP Packet Analysis
3. Pre-penetration Testing Steps
4. Information Gathering Methodology
5. Vulnerability Analysis
6. External Network Penetration Testing Methodology
7. Internal Network Penetration Testing Methodology
8. Firewall Penetration Testing Methodology
9. IDS Penetration Testing Methodology
10.Web Application Penetration Testing Methodology
11.SQL Penetration Testing Methodology
12.Database Penetration Testing Methodology
13.Wireless Network Penetration Testing Methodology
14.Mobile Devices Penetration Testing Methodology
15.Cloud Penetration Testing Methodology
16.Report Writing and Post Test Actions

Certification Exam:

The ECSA exam aims to test a candidate’s knowledge and application of critical penetration testing methodologies.

To be eligible to attempt the exam, candidates are required to perform real-world penetration testing over EC-Council’s secure cyber range and to produce a penetration test report that clearly documents the vulnerabilities found.  This report will be graded by our professionals.  Candidates that successfully submit an acceptable report will proceed on to a multiple-choice exam that tests a candidate’s knowledge.

Candidates that successfully pass the multiple-choice exam will be awarded the ECSA credential.

Register Now



To request complete program details, group training discounts & upcoming schedules please send an email to or call 877-724-3477.

For more information on how CertFirst can assist you please Contact Us

Payment Policy | Terms & Conditions

Close [X]