ECSAv4 Module 00 Student Introduction_NoRestriction

14
Version 4 EC Council EC-Council

description

ECSAv4 Module 00 Student Introduction_NoRestriction

Transcript of ECSAv4 Module 00 Student Introduction_NoRestriction

Page 1: ECSAv4 Module 00 Student Introduction_NoRestriction

Version 4

EC CouncilEC-Council

Page 2: ECSAv4 Module 00 Student Introduction_NoRestriction

Class, Please Introduce Yourself

Name

Company AffiliationCompany Affiliation

Title / Function

Job Responsibility

System security related experience System security related experience

Expectations

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Page 3: ECSAv4 Module 00 Student Introduction_NoRestriction

Course Materials

Identity Card

Student Courseware

Lab Manual/Workbook

C DiCompact Disc

Course Evaluation

Reference MaterialsReference Materials

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Page 4: ECSAv4 Module 00 Student Introduction_NoRestriction

Course Outline

Module 01: The Need for Security Analysis

Module 02: Advanced Googling

Module 03: TCP/IP Packet Analysis

Module 04: Advanced Sniffing Techniques

Module 05: Vulnerability Analysis with Nessus

Module 06: Advanced Wireless Testing

Module 07: Designing a DMZ

Module 08: Snort Analysis

Module 09: Log Analysis

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Module 10: Advanced Exploits and Tools

Page 5: ECSAv4 Module 00 Student Introduction_NoRestriction

Course Outline (contd.)

Module 11: Penetration Testing Methodologies

Module 12: Customers and Legal Agreements

Module 13: Rules of Engagement

Module 14: Penetration Testing Planning and Scheduling

Module 15: Pre Penetration Testing Checklist

Module 16: Information Gathering

Module 17: Vulnerability Analysis

Module 18: External Penetration Testing

Module 19: Internal Network Penetration Testing

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Module 20: Routers and Switches Penetration Testing

Page 6: ECSAv4 Module 00 Student Introduction_NoRestriction

Course Outline (contd.)

Module 21: Firewall Penetration Testing

Module 22: IDS Penetration Testing

Module 23: Wireless Network Penetration Testing

Module 24: Denial of Service Penetration Testing

Module 25: Password Cracking Penetration Testing

Module 26: Social Engineering Penetration Testing

Module 27: Stolen Laptop, PDAs and Cell phones Penetration Testing

Module 28: Application Penetration Testing

Module 29: Physical Security Penetration Testing

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Module 30: Database Penetration testing

Page 7: ECSAv4 Module 00 Student Introduction_NoRestriction

Course Outline (contd.)

Module 31: VoIP Penetration TestingModule 31: VoIP Penetration Testing

Module 32: VPN Penetration Testing

Module 33: War Dialing33 g

Module 34: Virus and Trojan Detection

Module 35: Log Management Penetration Testing

Module 36: File Integrity Checking

Module 37: Blue Tooth and Hand held Device Penetration Testing

Module 38: Telecommunication and Broadband Communication Penetration Testing

Module 39: Email Security Penetration Testing

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Module 40: Security Patches Penetration Testing

Page 8: ECSAv4 Module 00 Student Introduction_NoRestriction

Course Outline (contd.)

Module 41: Data Leakage Penetration Testing

Module 42: Penetration Testing Deliverables and ConclusionModule 42: Penetration Testing Deliverables and Conclusion

Module 43: Penetration Testing Report and Documentation Writing

Module 44: Penetration Testing Report Anal sisModule 44: Penetration Testing Report Analysis

Module 45: Post Testing Actions

Module 46: Ethics of a Licensed Penetration Tester

Module 47: Standards and Compliance

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Page 9: ECSAv4 Module 00 Student Introduction_NoRestriction

EC-Council Certification

There are several levels of certification tracks under EC-Council:

1. Certified e-Business Professional

2. Certified Ethical Hacker (CEH)

C H ki F i I i (CHFI)3. Computer Hacking Forensic Investigator (CHFI)

4. EC-Council Certified Security Analyst (ECSA) You are here

5. Licensed Penetration Tester (LPT) You are here5. Licensed Penetration Tester (LPT) You are here

6. EC-Council Certified Secure Programmer (ECSA)

7. Certified Secure Application Developer (CSAD)

8. Master of Security Science (MSS)

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Page 10: ECSAv4 Module 00 Student Introduction_NoRestriction

ECSA Track

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Page 11: ECSAv4 Module 00 Student Introduction_NoRestriction

LPT Track

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Page 12: ECSAv4 Module 00 Student Introduction_NoRestriction

What next after ECSA Training?

If you have completed the CEH and ECSA programs then you are eligible to apply for the Licensed Penetration you are eligible to apply for the Licensed Penetration Tester certification

To apply for the LPT license please visit http://www.eccouncil.org Certification LPT

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Page 13: ECSAv4 Module 00 Student Introduction_NoRestriction

Student Facilities

Class Hours

B ildi H Ph

Class Hours

Building Hours Phones

kParking Messages

Restrooms Smoking

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

RecyclingMeals

Page 14: ECSAv4 Module 00 Student Introduction_NoRestriction

Lab Sessions

The ECSA/LPT programs covers the penetration testing concepts and methodologyp gy

80% of the course will be presented as theory (seminar p ystyle)

20% of the course will have 20% of the course will have hands-on labs

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited Copyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited