ECSA: Certified Security Analyst Porto
OBJECTIVOS
ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments.
EC-Council’s Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.
DESTINATÁRIOS
Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.
PRÉ-REQUISITOS
Pass exam 412-79 to achieve EC-Council Certified Security Analyst (ECSA) certification.
PROGRAMA
The Need for Security Analysis
Advanced Googling
TCP/IP Packet Analysis
Advanced Sniffing Techniques
Vulnerability Analysis with Nessus
Advanced Wireless Testing
Designing a DMZ
Snort Analysis
Log Analysis
Advanced Exploits and Tools
Penetration Testing Methodologies
Customers and Legal Agreements
Rules of Engagement
Penetration Testing Planning and Scheduling
Pre Penetration Testing Checklist
Information Gathering
Vulnerability Analysis
External Penetration Testing
Internal Network Penetration Testing
Routers and Switches Penetration Testing
Firewall Penetration Testing
IDS Penetration Testing
Wireless Network Penetration Testing
Denial of Service Penetration Testing
Password Cracking Penetration Testing
Social Engineering Penetration Testing
Stolen Laptop, PDAs and Cell phones Penetration Testing
Application Penetration Testing
Physical Security Penetration Testing
Database Penetration testing
VoIP Penetration Testing
VPN Penetration Testing
War Dialing
Virus and Trojan Detection
Log Management Penetration Testing
File Integrity Checking
Blue Tooth and Hand held Device Penetration Testing
Telecommunication and Broadband Communication Penetration Testing
Email Security Penetration Testing
Security Patches Penetration Testing
Data Leakage Penetration Testing
Penetration Testing Deliverables and Conclusion
Penetration Testing Report and Documentation Writing
Penetration Testing Report Analysis
Post Testing Actions
Ethics of a Licensed Penetration Tester
Standards and Compliance
O seu pedido de informação foi enviado correctamente. Obrigado.
Local: Sede Principal (Porto, Porto)
Turno: Todo o dia
Datas: Inicio: 2012-05-23 Fim: 2012-05-30
Copyright 2009-2024. Todos os direitos reservados. Política de Privacidade | Aviso Legal