Are you interested in a hacking and penetration testing program that covers the testing of modern infrastructures, operating systems, and application environments? Then the Certified Security Analyst course is for you

  • About this course

    The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning

  • Why should you take this course?

    The ECSA program offers seamless learning progress, continuing where the CEH certification left off. Unlike the majority of pen-testing programs that only follow a generic kill chain methodology, the ECSA will present you with a set of distinguishable, comprehensive methodologies that are able to cover different pen-testing requirements across a variety of verticals.

  • What will you learn by taking this course?

    After completing this course, you will be able to:

    • Explain incident response in an enterprise environment
    • Develop an incident response plan and a response team
    • List the policies and laws related to incident handling
    • Manage the computer security related incidents and prepare for future risk mitigation, from malicious code attacks and threats associated
    • Help organizations built their own Incident Management Systems
    • Design a recovery plan and manage internal threats


  • Chaptar 1. Penetration Testing Essential Concepts

     ✅ Computer Network Fundamentals

     ✅ Windows and Linux Security

     ✅ Web Application Security Mechanisms

     ✅ Information Security Standards

     ✅ Network Security Controls and Devices

     ✅ Web Application and Web Server Architecture and Operations

     ✅ Information Security Attacks

     

  • Chaptar 2. Introduction to Penetration Testing Methodologies

    ✅ Penetration Testing Process and Methodologies & Benefits ✅ Types, Areas and Selection of Pentesting
  • Chaptar 3. Penetration Testing Scoping and Engagement Methodology

    ✅ Penetration Testing Scoping and Rules and Engagement ✅ Penetration Testing Engagement Contract and Preparation
  • Chaptar 4. Open-Source Intelligence (OSINT) Methodology

     ✅ OSINT Through World Wide Web (WWW), Website Analysis, DNS Interrogation ✅ Automating your OSINT Effort Using Tools/Frameworks/Scripts
  • Chaptar 5. Social Engineering Penetration Testing Methodology

    ✅ Social Engineering Penetration Testing Techniques & Steps ✅ Social Engineering Penetration testing using E
  • Chaptar 6. Network Penetration Testing Methodology – External

     ✅ External Network Information & Reconnaissance  ✅ Scanning, and Exploitation
  • Chaptar 7. Network Penetration Testing Methodology – Internal

     ✅ Internal Network Information Reconnaissance and Scanning

     ✅ Local and Remote System Exploitation

     ✅ Internal Network Enumeration and Vulnerability Scanning

     

  • Chaptar 8. Network Penetration Testing Methodology - Perimeter Devices

    ✅ Firewall Security Assessment Techniques

    ✅ Router and Switch Security Assessment Techniques

     ✅iDs Security Assessment Techniques

     

  • Chaptar 9. Web Application Penetration Testing Methodology

    ✅ Web Application Content Discovery and Vulnerability Scanning

    ✅ XSS, Parameter Tampering, Weak Cryptography, Security Misconfiguration and Client side scripting, vulnerabilities penetration techniques

    ✅ SQL Injection Vulnerability Penetration Testing

    ✅ Authentication, Authorization, session, Web Server Vulnerabilities Penetration Testing

  • Chaptar 10. Database Penetration Testing Methodology

    ✅ Database Penetration Testing Techniques & Information Reconnaissance ✅ Database Enumeration & Exploitation
  • Chaptar 11. Wireless Penetration Testing Methodology

    ✅ WLAN Penetration Testing Techniques

    ✅ Mobile Device Penetration Testing Techniques

    ✅ RFID and NFC Penetration Testing Techniques

    ✅ loT Penetration Testing Techniques

  • Chaptar 12. Cloud Penetration Testing Methodology

    ✅ Cloud Specific Penetration Testing Techniques and Recommendations ✅ Cloud Specific Penetration Testing Methods
  • Chaptar 13. Report Writing and Post Testing Actions

    ✅Penetration Testing Report Writing Process ✅Penetration Testing Reporting Formats

  • What are the eligibility criteria to apply for the ECSA v10 exam?

    To be eligible to apply to sit for the ECSA Exam, candidate must either:

    Hold an ECSA certification , any version (Your USD100 application fee will be waived);

    or Have a minimum of 2 years work experience in InfoSec domain (You will need to pay USD100 as a non-refundable application fee);

    Or Have attended an official EC-Council training (All candidates are required to pay the $100 application fee, however your training fee shall include this fee)

  • How long does the application process take?

    On an average, application processing time would be between 5-10 working days once the verifiers on the application respond to EC-Council’s requests for information.

  • What is the next step once the application is approved?

    Once your application is approved you can proceed to purchase your exam voucher either from EC-Council Online Store or from one of our authorised training channels.

  • Is the application form mandatory for all test takers?

    Yes, the application form is mandatory for all test takers who want to take the exam directly without undergoing training.

  • Key Features:
  • Created by a Security expert :
  • Access period : 12 months
  • Course duration : 40+ hours
  • Quizzes & revision exams :
  • Certificate of completion :
  • Support : 24/7 hours
Feature Picture

Why choose the Certified Security Analyst?

Aspire-ethical-hacker Image

The ECSA program offers seamless learning progress, continuing where the CEH certification left off. Unlike the majority of pen-testing programs that only follow a generic kill chain methodology, the ECSA will present you with a set of distinguishable, comprehensive methodologies that are able to cover different pen-testing requirements across a variety of verticals.

What you'll learn

Included in your modules.

Essential skills for your career

       
  • Penetration Testing Essential Concepts (Self Study)
  •    
  • Introduction to Penetration Testing and Methodologies
  •    
  • Penetration Testing Scoping and Engagement Methodology
  •    
  • Social Engineering Penetration Testing Methodology
  •    
  • Network Penetration Testing Methodology – External
  •    
  • Network Penetration Testing Methodology – Internal
  •    
  • Open-Source Intelligence (OSINT)
       
  • Web Application Penetration Testing Methodology
  •    
  • Database Penetration Testing Methodology
  •    
  • Wireless Penetration Testing Methodology
  •    
  • Cloud Penetration Testing Methodology
  •    
  • Report Writing and Post Testing Actions
  •    
  • Network Penetration Testing Methodology – Perimeter Devices
IT-Parofessional Image

Salary Indicator

SALARY PROJECTION

Average

salary after

completing

ADVANCED Training

$180k

You can earn an average of $180,000.00 a year

IT-Parofessional Image
1

Outstanding career prospects

Australia only has 7% of the cyber security professionals that it needs

2

Next level education

This program takes the tools and techniques covered in Ethical Hacker to next level by utilizing EC-Council’s published penetration testing methodology

IT-Parofessional Image
IT-Parofessional Image
3

Great earnings

Due to incredible demand for certified professionals, the average salary for cyber security is currently $80,000

Why learn with us?

       
  • We're tech career experts
  •    
  • 25,000+ students worldwide
  •    
  • Alternative to traditional university education
  •    
  • Start a new career or advance your current one & land your dream job
       
  • Award winning StudentCareTM
  •    
  • Most in-demand skills for job market
  •    
  • Partnered with biggest accreditors in the world
  •    
  • Exclusive student benefits; CV detox, NUS, industry events & loads more
IT-Parofessional Image

Boost Engagement with delivering Communication Tools

Bootcamp Image

Increase employee engagement with a different suite of communication tools like:

Posters

Promote your training program with visuals you can customize to brand... more  

Newsletters

Send training updates and security best practice highlights directly... more  

Digital wallpapers and web banners

Increase program engagement with colorful thought-provoking messaging... more  

Training Videos/Animations

Strengthen key awareness concepts and skills through stylish visual... more  

Why Aspire Tech


Award-winning courses

Aspire's award-winning online course and programs are designed and taught by distinguished Cyber Security expert.

The perfect fit for business

Plans for small to large organizations, with flexibility to fit inside your budget. Volume discounting available.

Cost effective training

Train thousands of staff members across multiple locations for a function of the cost of traditional classroom training.

Speak with an expert