Diversamente da altri corsi di pen testing, il corso ECSA presenta un insieme di metodologie che permettono di rispondere alle richieste di mercato.
La nuova versione del corso è stata arricchita di nuovi moduli e mostra le ultime tecniche di pen testing.
Si tratta di un corso interattivo, con numerosi casi di studio e laboratori, che si eroga in 5 giorni per permettere agli studenti di eseguire pen testing professionali.
Core Modules
Module 1: Introduction to Penetration Testing and Methodologies
Module 2: Penetration Testing Scoping and Engagement Methodology
Module 3: Open Source Intelligence (OSINT) Methodology
Module 4: Social Engineering Penetration Testing Methodology
Module 5: Network Penetration Testing Methodology - External
Module 6: Network Penetration Testing Methodology - Internal
Module 7: Network Penetration Testing Methodology - Perimeter Devices
Module 8: Web Application Penetration Testing Methodology
Module 9: Database Penetration Testing Methodology
Module 10: Wireless Penetration Testing Methodology
Module 11: Cloud Penetration Testing Methodology
Module 12: Report Writing and Post Testing Actions
Self-study Modules
Module 1: Penetration Testing Essential Concepts
Module 2: Password Cracking Penetration Testing
Module 3: Denial-of-Service Penetration Testing
Module 4: Stolen Laptop, PDAs and Cell Phones Penetration Testing
Module 5: Source Code Penetration Testing
Module 6: Physical Security Penetration Testing
Module 7: Surveillance Camera Penetration Testing
Module 8: VoIP Penetration Testing
Module 9: VPN Penetration Testing
Module 10: Virtual Machine Penetration Testing
Module 11: War Dialing
Module 12: Virus and Trojan Detection
Module 13: Log Management Penetration Testing
Module 14: File Integrity Checking
Module 15: Telecommunication and Broadband Communication
Module 16: Email Security Penetration Testing
Module 17: Security Patches Penetration Testing
Module 18: Data Leakage Penetration Testing
Module 19: SAP Penetration Testing
Module 20: Standards and Compliance
Module 21: Information System Security Principles
Module 22: Information System Incident Handling and Response
Module 23: Information System Auditing and Certification