ECSAv4 Module 00 Student Introduction_NoRestriction
-
Upload
mahmoud-eladawi -
Category
Documents
-
view
90 -
download
1
description
Transcript of ECSAv4 Module 00 Student Introduction_NoRestriction
Version 4
EC CouncilEC-Council
Class, Please Introduce Yourself
Name
Company AffiliationCompany Affiliation
Title / Function
Job Responsibility
System security related experience System security related experience
Expectations
EC-CouncilCopyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Course Materials
Identity Card
Student Courseware
Lab Manual/Workbook
C DiCompact Disc
Course Evaluation
Reference MaterialsReference Materials
EC-CouncilCopyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Course Outline
Module 01: The Need for Security Analysis
Module 02: Advanced Googling
Module 03: TCP/IP Packet Analysis
Module 04: Advanced Sniffing Techniques
Module 05: Vulnerability Analysis with Nessus
Module 06: Advanced Wireless Testing
Module 07: Designing a DMZ
Module 08: Snort Analysis
Module 09: Log Analysis
EC-CouncilCopyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Module 10: Advanced Exploits and Tools
Course Outline (contd.)
Module 11: Penetration Testing Methodologies
Module 12: Customers and Legal Agreements
Module 13: Rules of Engagement
Module 14: Penetration Testing Planning and Scheduling
Module 15: Pre Penetration Testing Checklist
Module 16: Information Gathering
Module 17: Vulnerability Analysis
Module 18: External Penetration Testing
Module 19: Internal Network Penetration Testing
EC-CouncilCopyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Module 20: Routers and Switches Penetration Testing
Course Outline (contd.)
Module 21: Firewall Penetration Testing
Module 22: IDS Penetration Testing
Module 23: Wireless Network Penetration Testing
Module 24: Denial of Service Penetration Testing
Module 25: Password Cracking Penetration Testing
Module 26: Social Engineering Penetration Testing
Module 27: Stolen Laptop, PDAs and Cell phones Penetration Testing
Module 28: Application Penetration Testing
Module 29: Physical Security Penetration Testing
EC-CouncilCopyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Module 30: Database Penetration testing
Course Outline (contd.)
Module 31: VoIP Penetration TestingModule 31: VoIP Penetration Testing
Module 32: VPN Penetration Testing
Module 33: War Dialing33 g
Module 34: Virus and Trojan Detection
Module 35: Log Management Penetration Testing
Module 36: File Integrity Checking
Module 37: Blue Tooth and Hand held Device Penetration Testing
Module 38: Telecommunication and Broadband Communication Penetration Testing
Module 39: Email Security Penetration Testing
EC-CouncilCopyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Module 40: Security Patches Penetration Testing
Course Outline (contd.)
Module 41: Data Leakage Penetration Testing
Module 42: Penetration Testing Deliverables and ConclusionModule 42: Penetration Testing Deliverables and Conclusion
Module 43: Penetration Testing Report and Documentation Writing
Module 44: Penetration Testing Report Anal sisModule 44: Penetration Testing Report Analysis
Module 45: Post Testing Actions
Module 46: Ethics of a Licensed Penetration Tester
Module 47: Standards and Compliance
EC-CouncilCopyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council Certification
There are several levels of certification tracks under EC-Council:
1. Certified e-Business Professional
2. Certified Ethical Hacker (CEH)
C H ki F i I i (CHFI)3. Computer Hacking Forensic Investigator (CHFI)
4. EC-Council Certified Security Analyst (ECSA) You are here
5. Licensed Penetration Tester (LPT) You are here5. Licensed Penetration Tester (LPT) You are here
6. EC-Council Certified Secure Programmer (ECSA)
7. Certified Secure Application Developer (CSAD)
8. Master of Security Science (MSS)
EC-CouncilCopyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
ECSA Track
EC-CouncilCopyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
LPT Track
EC-CouncilCopyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
What next after ECSA Training?
If you have completed the CEH and ECSA programs then you are eligible to apply for the Licensed Penetration you are eligible to apply for the Licensed Penetration Tester certification
To apply for the LPT license please visit http://www.eccouncil.org Certification LPT
EC-CouncilCopyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Student Facilities
Class Hours
B ildi H Ph
Class Hours
Building Hours Phones
kParking Messages
Restrooms Smoking
EC-CouncilCopyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited
RecyclingMeals
Lab Sessions
The ECSA/LPT programs covers the penetration testing concepts and methodologyp gy
80% of the course will be presented as theory (seminar p ystyle)
20% of the course will have 20% of the course will have hands-on labs
EC-CouncilCopyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council
All Rights reserved. Reproduction is strictly prohibited