EC-Council Certified Security Analyst (ECSA): Penetration Testing
ADDRESS
Training @ any Bitbase Centers VIEW MAP >
CATEGORIES
Cyber Security

What is ESCA?

ESCA is penetration testing program that covers the tools and techiniquies you learned in the Certified Ethical HAcker course & teaches exploitation skills by applying the skills learnned in C|Eh & utilizing EC-Council’s published penetration testing methodology

Unlike most other penetration-testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pen testing requirements across different verticals.
The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.

The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.

Who is it for?

  • Ethical Hackers
  • Penetration Testers
  • Security Analysts
  • Security Engineers
  • Network Server Administrators


+ Course Outline
  • Lesson 1: Introduction To Penetration Testing And Methodologies
  • Lesson 2: Penetration Testing Scoping And Engagement Methodology
  • Lesson 3: Open Source Intelligence (OSINT) Methodology
  • Lesson 4: Social Engineering Penetration Testing Methodology
  • Lesson 5: Network Penetration Testing Methodology – External
  • Lesson 6: Network Penetration Testing Methodology – Internal
  • Lesson 7: Network Penetration Testing Methodology – Perimeter Devices
  • Lesson 8: Web Application Penetration Testing Methodology
  • Lesson 9: Database Penetration Testing Methodology
  • Lesson 10: Wireless Penetration Testing Methodology
  • Lesson 11: Cloud Penetration Testing Methodology
  • Lesson 12: Report Writing And Post Testing Actions

Learning Objectives

  • Understand the key issues plaguing the information security world
  • Learn to combat different types of cybersecurity threats, attack vectors, threat actors and their motives
  • Learn the fundamentals of incident management including the signs and costs of an incident
  • Understand the fundamentals of vulnerability management, threat assessment, risk management, and incident response automation and orchestration
  • Master all incident handling and response best practices, standards, cybersecurity frameworks, laws, acts, and regulations
  • Decode the various steps involved in planning an incident handling and response program
  • Gain an understanding of the fundamentals of computer forensics and forensic readiness
  • Comprehend the importance of the first response procedure including evidence collection, packaging, transportation, storing, data acquisition, volatile and static evidence collection, and evidence analysis
  • Understand anti-forensics techniques used by attackers to find cybersecurity incident cover-ups


Related Course

Bitbase Training Locations


Ojo Contact

148, Olojo Drive High Taste B/Stop, EIIT/FCMB Building, Ojo, Lagos State.

Satelite Town Contact

No 1 Community Road Abulado Satelite Town, Lagos State.

Lekki Contact

No 9, Otunba Adedoyin Ogungbe Crescent, Opposite ELIM Motors Lekki
Phase 1, Lagos State.