Student Shelter In Computers
Slogan : Our Aim & Mission as a Organization to Promote Information Technology , Cyber Secuirty , Entrepreneurship Education into Young Generation , Teach , Train & Employee them in Eduction Sector , Banks & Different Industries and Bulid them Future Leaders.




Student Shelter In Computers , EC-Council ATC Partner

EC-Council ATC Partner Pakistan Offer’s Low Cost Certification & Coaching / Training for Students & Professionals


EC-Council Certified Security Analyst ECSAv9 Course Outline

Download ECSAv9 Brochure      ECSAv9 Actual Cost

Please Verify us! For Verification Select Drop down Menu , Select Pakistan https://www.eccouncil.org/find-training/ 

Core Modules

  1. Need for Security Analysis
  2. TCP IP Packet Analysis
  3. Penetration Testing Methodologies
  4. Customers and Legal Agreements
  5. Rules of Engagement
  6. Penetration Testing Planning and Scheduling
  7. Pre-penetration Testing Steps
  8. Information Gathering
  9. Vulnerability Analysis
  10. External Penetration Testing
  11. Internal Network Penetration Testing
  12. Firewall Penetration Testing
  13. IDS Penetration Testing  
  14. Password Cracking Penetration Testing
  15. Social Engineering Penetration Testing
  16. Web Application Penetration Testing
  17. SQL Penetration Testing
  18. Penetration Testing Reports and Post Testing Actions

License Penetration Testing LPTv9 Course Outline

 Download LPT Brochure           LPT Actual Cost

Self -Study Modules - LPT

  1. Router and Switches Penetration Testing
  2. Wireless Network Penetration Testing
  3. Denial-of-Service Penetration Testing
  4. Stolen Laptop, PDAs and Cell Phones Penetration Testing
  5. Source Code Penetration Testing
  6. Physical Security Penetration Testing
  7. Surveillance Camera Penetration Testing
  8. Database Penetration Testing
  9. VoIP Penetration Testing
  10. VPN Penetration Testing
  11. Cloud Penetration Testing
  12. Virtual Machine Penetration Testing
  13. War Dialing
  14. Virus and Trojan Detection
  15. Log Management Penetration Testing
  16. File Integrity Checking
  17. Mobile Devices Penetration Testing
  18. Telecommunication and Broadband Communication Penetration Testing
  19. Email Security Penetration Testing
  20. Security Patches Penetration Testing
  21. Data Leakage Penetration Testing
  22. SAP Penetration Testing
  23. Standards and Compliance
  24. Information System Security Principles
  25. Information System Incident Handling and Response
  26. Information System Auditing and Certification

Student Shelter In Computers ® EC-Council Academic Partner
Abbas Shahid Baqir (Director)
BLD. No 18 Sardar St , College road , New Samanabad , Lahore Pakistan
Cell: 0300-4738405 , E-mail : stscomps@yahoo.com Web:
http://www.stscomps.com &    Skype: abbaslums

Download ECSAv9 Brochure      ECSAv9 Actual Cost

 Download LPT Brochure           LPT Actual Cost

What is the EC-Council Security Analyst Program

 

The EC–Council Certified Security Analyst (ECSA) program is a comprehensive, standards-based, methodology intensive training program which teaches information security professionals to conduct real life penetration tests by utilizing EC-Council’s published penetration testing methodology.

The ECSA Program is a 5-day complete hands-on training program. This Penetration Testing training course uses real-time scenarios to train students in penetration testing methodologies.

EC-Council’s Certified Security Analyst (ECSA) course will help you master a documented penetration testing methodology that is repeatable and that can be used in a penetration testing engagement, globally.

 

The ECSA Lab Environment


The ECSA course is a fully hands-on program. The exercises cover real world scenario. By practicing the skills that are provided to you in the ECSA class, we are able to bring candidates up to speed with the latest threats that organizations may be vulnerable to. 

This can be achieved with the EC-Council iLabs cyber range. It allows students to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.



 

Our simplistic web portal enables the student to launch an entire range of target machines and access them remotely with one simple click. It is the most cost effective, easy to use, live range lab solution available.

With iLabs, lab exercises can be accessed 24x7 allowing the student to practice skills in a safe, fully functional network anytime it’s convenient.

Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing students to launch a complete Live range open for any form of hacking or testing.
Available target machines are completely virtualized allowing us to control and reset machines quickly and easily with no required instructor or administrative interaction.

 

Target Audience

Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals all benefit from the ECSA program

 

Benefits of Becoming ECSA

Data Security Program- Advanced Penetration Testing

 

·         1. The EC-Council Certified Security Analyst is for experienced professionals in the industry and is backed by a curriculum designed by the best in the field.

·         2. Students earn greater industry acceptance as seasoned security professionals.

·         3. Certified Security Analysts learn to analyze the outcomes of security tools and security testing techniques.

·         4. The ECSA sets students on the path toward achieving the LPT certification.

 

Job Roles for ECSA


* Perform network and application penetration testing using both automated and manual techniques

·         * Design and perform audits of computer systems to ensure they are operating securely and that data is protected from both internal and external threats

·         * Assess assigned system to determine system security status

·         * Design and recommend security policies and procedures

·         * Ensure compliance to policies and procedures

·        * Evaluate highly complex security systems according to industry best practices to safeguard internal information systems and databases

·        * Lead investigations of security violations and breaches and recommend solutions; prepare reports on intrusions as necessary and provide an analysis summary for management

·         * Respond to more complex queries and request for computer security information and report from both internal and external customers

ECSA v8 Exam Information

 

·         Credit Towards Certification: ECSA v8

·         Number of Questions: 150

·         Passing Score: 70%

·         Test Duration: 4 hours

·         Test Format: Multiple choice

·         Test Delivery: Prometric Prime

 

 

Designed & Developed  by Webmaster Abbas Shahid Baqir  
Webmaster Feedback: stscomps@yahoo.com
 
All Rights Reserved Copyright,  2010-2020 Student Shelter In Computers ®