EC-Council Security Analyst v10 | ECSA
The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.
Unlike most other pen testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals.
It is a highly interactive, comprehensive, standards based, intensive 5-days training program that teaches information security professionals how professional real-life penetration testing are conducted.
Building on the knowledge, skills and abilities covered in the new CEH v10 program, we have simultaneously re-engineered the ECSA program as a progression from the former.
Organizations today demand a professional level pentesting program and not just pentesting programs that provide training on how to hack through applications and networks.
Such professional level programs can only be achieved when the core of the curricula maps with and is compliant to government and/or industry published pentesting frameworks
This course is a part of the VAPT Track of EC-Council. This is a “Professional” level course, with the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.
In the new ECSAv10 course, students that passes the knowledge exam are given an option to pursue a fully practical exam that provides an avenue for them to test their skills, earning them the ECSA (Practical) credential. This new credential allows employers to validate easily the skills of the student.
EC-Council Security Analyst v10 | ECSA
The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.
Unlike most other pen testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals.
It is a highly interactive, comprehensive, standards based, intensive 5-days training program that teaches information security professionals how professional real-life penetration testing are conducted.
Building on the knowledge, skills and abilities covered in the new CEH v10 program, we have simultaneously re-engineered the ECSA program as a progression from the former.
Organizations today demand a professional level pentesting program and not just pentesting programs that provide training on how to hack through applications and networks.
Such professional level programs can only be achieved when the core of the curricula maps with and is compliant to government and/or industry published pentesting frameworks
This course is a part of the VAPT Track of EC-Council. This is a “Professional” level course, with the Certified Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.
In the new ECSAv10 course, students that passes the knowledge exam are given an option to pursue a fully practical exam that provides an avenue for them to test their skills, earning them the ECSA (Practical) credential. This new credential allows employers to validate easily the skills of the student.
1. Introduction to Penetration Testing and Methodologies
2. Penetration Testing Scoping and Engagement Methodology
3. Open Source Intelligence (OSINT) Methodology
4. Social Engineering Penetration Testing Methodology
5. Network Penetration Testing Methodology – External
6. Network Penetration Testing Methodology – Internal
7. Network Penetration Testing Methodology – Perimeter Devices
8. Web Application Penetration Testing Methodology
9. Database Penetration Testing Methodology
10. Wireless Penetration Testing Methodology
11. Cloud Penetration Testing Methodology
12. Report Writing and Post Testing Actions
Check out what our students have to say
EC-Council Security Analyst v10 | ECSA
1. Maps to NICE 2.0 Framework ECSAv10 maps to NICE framework’s Analyze (AN) and Collect and Operate (CO) specialty area
2. ALL NEW Module for Social Engineering Pen Testing The ECSA curriculum presents a comprehensive Social Engineering Pen Testing Methodology where others program only makes a mere reference of this. According to 2017 Verizon Data Breach Investigation Report, on an overall, 43% of the documented breaches involved social engineering attacks!
We see this as a huge gap and that is where, the ECSA program is carefully designed and developed to be comprehensive in its coverage of the pen-testing domain.
3. Increased Focus on Methodologies ECSA V10 brings an enhanced concentration on methodology for network, web application, database, wireless, and cloud pen testing, whereas other certifications cover this superficially.
The new ECSA v10 program takes the tools you have learnt in the CEH and includes a wide-range of comprehensive scoping and engagement penetration testing methodologies that improves upon the best from ISO 27001, OSSTMM, and NIST Standards.
4. Blended with both manual and automated penetration testing approach There are many numbers of automated pen testing tools out there in the marketplace including high priced sophisticated tools, but they are not adequate. Most advanced tools are of little value if no one knows how to use them.
Manual penetration testing is the perfect complement to automated penetration Testing. Certain penetration test such as logic testing cannot be performed using automated tools. It requires human intervention to test against such vulnerabilities
According to the MITRE Corporation, automated pen testing tools cover only 45% of the known vulnerability types. Hence, the remaining 55% requires manual intervention.
5. Designed based on the most common penetration testing services provided by the penetration testing service providers and consulting firms in the market including:
Network Penetration Testing Identify security issues in network design and implementation
Web Application Penetration Testing Detect security issues in web applications that exists due to insecure design and development practices
Social Engineering Penetration Testing Identify employees that do not properly authenticate, follow, validate, handle, the processes and technology
Wireless Penetration Testing Identify misconfigurations in organization’s wireless infrastructure including WLAN, Mobile,
Cloud Penetration Testing Determine security issues in organization’s cloud infrastructure
Database Penetration Testing Identify security issues in the configuration of database server and their instances
6. Presents a comprehensive scoping and engagement methodology Defining scope of penetration test is arguably one of the most important components of a penetration test, yet it is also one of the most overlooked in most of the penetration testing programs. A complete module is dedicated in the course to describe the pre-engagement activities in detailed, tells how to initiate and set the scope and Rule of Engagement (RoE) for the penetration test assignment.
EC-Council Security Analyst v10 | ECSA
7. Provides strong reporting writing guidance to draft valuable and comprehensive penetration report The report is the tangible output of the testing process, and the only real evidence that a test actually took place. Ultimately, it is the report that is sellable in penetration test assignment. If it is not well planned and drafted, the client may disagree with the findings of a test and will not justify the expense of the test. A separate module is dedicated in the course to describe the skills required to draft effective penetration test report depending upon the target audiences.
8. Hands-on labs demonstrating practical and realtime experience on each of area of penetration testing Practical knowledge can lead to a deeper understanding of a concept through the act of doing. The course is also aiming to provide practical experience through handson labs on thorough penetration testing process from scoping and engagement to report writing The student will get a direct experience by working on these hands-on labs.
9. Provides standard templates that are required during penetration test The course is bundled with the bunch of standard templates that are necessary which helps students during scoping and engagement process well as collecting and reporting test results. No other program offers a set of comprehensive penetration templates like the ECSA!
Other IT Security and Governance Courses
Gary Singh –
The Trainers and instructors are highly qualified. I learnt lots of new things and performed hands on lab. Mr. Gordon and Ms. Shaheena gave a good learning experience in the class as well as the labs. I will highly recommend Info-Savvy institute for Info security trainings.