Overview

The ECSA pen-test program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilising EC-Council’s published penetration testing methodology. It focuses on pen-testing methodology with an emphasis on hands-on learning.

Learning Outcome

After completing the course, the participants will be able to:

  • Understand the different pen-testing methodologies
  • Apply the pen-testing methodology to:
    • Social Engineering Pen-testing
    • External Network Pen-testing
    • Internal Network Pen-testing
    • Perimeter Device Pen-testing
    • Web Application Pen-testing
    • Database Pen-testing
    • Wireless Network Pen-testing
    • Cloud Based Environment Pen-testing
  • Write a professional pen-testing report of the activities, findings and recommendation of the pen-testing project. 

Who should Attend?

  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators
  • Risk Assessment professionals 

Eligibility Criteria

EC-Council Certified Ethical Hacker (CEH) certification is not a prerequisite for the ECSA course. We strongly advise candidates to take CEH course to attain the skills prior to the commencement of the ECSA course.

This course is endorsed under Critical Infocomm Technology Resource Programme Plus (CITREP+) Programme.
To find out more about CITREP+ Funding, please refer toProgramme Support under CITREP+ page

Information is accurate as of 23 July 2020