ECSA - EC-Council Certified Security Analyst
در این دوره افراد با مباحث ضد هک آشنا می شوند. در واقع پس از گذراندن دوره CEH دانشجویان باید به مباحثی مثل مقابله با هک و نفوذ تسلط کامل پیدا کنند که در این دوره به آنها دست می یابند. و در پایان می توانند از شرکت EC-Council مدرک معتبر آنرا دریافت نمایند.
در این دوره موارد زیر مطرح می شود:
The Need for Security Analysis
Advanced Googling
TCP/IP Packet Analysis
Advanced Sniffing Techniques
Vulnerability Analysis with Nessus
Advanced Wireless Testing
Designing a DMZ
Snort Analysis
Log Analysis
Advanced Exploits and Tools
Penetration Testing Methodologies
Customers and Legal Agreements
Rules of Engagement
Penetration Testing Planning and Scheduling
Pre Penetration Testing Checklist
Information Gathering
Vulnerability Analysis
External Penetration Testing
Internal Network Penetration Testing
Routers and Switches Penetration Testing
Firewall Penetration Testing
IDS Penetration Testing
Wireless Network Penetration Testing
Denial of Service Penetration Testing
Password Cracking Penetration Testing
Social Engineering Penetration Testing
Stolen Laptop, PDAs and Cell phones Penetration Testing
Application Penetration Testing
Physical Security Penetration Testing
Database Penetration testing
VoIP Penetration Testing
VPN Penetration Testing
War Dialing
Virus and Trojan Detection
Log Management Penetration Testing
File Integrity Checking
Blue Tooth and Hand held Device Penetration Testing
Telecommunication and Broadband Communication Penetration Testing
Email Security Penetration Testing
Security Patches Penetration Testing
Data Leakage Penetration Testing
Penetration Testing Deliverables and Conclusion
Penetration Testing Report and Documentation Writing
Penetration Testing Report Analysis
Post Testing Actions
Ethics of a Licensed Penetration Tester
Standards and Compliance
دیدگاه ها (0)