4 hours x 10 days
Weekend, evening, weekdays - Classes Available
+ 18% GST
You are an ethical hacker. In fact, you are a Certified Ethical Hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep. You have sufficient knowledge and an arsenal of hacking tools and you are also proficient in writing custom hacking code.
Can you become an industry accepted security professional? Will organizations hire you to help them protect their systems? Do you have any knowledge in applying a suitable methodology to conduct a penetration test for an enterprise client? Do you have any experience writing a custom penetration testing report?
More importantly, do you have a globally recognized certification that can verify your penetration testing capabilities?
If you are the person above, what you may be lacking is the knowledge and experience to execute a successful penetration test according to accepted industry standards.
The ECSA is a security credential like no other! The ECSA course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.
The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in CEH by utilizing EC-Council's published penetration testing methodologies.
It is a highly interactive, comprehensive, standards-based and methodology intensive 5-day security training program 5-day which teaches information security professionals to conduct real life penetration tests.
This course is part of the Information Security Track of EC-Council. This is a "Professional" level course, with the Certified Ethical Hacker being the "Core" and the Licensed Penetration Tester being the "Master" level certification.
As the ECSA course is a fully hands-on program, the exercises cover real world scenario. By practicing the skills that are provided to you in the ECSA class, we are able to bring you up to speed with the latest threats that organizations may be vulnerable to.
This can be achieved with the EC-Council Cyber Range iLabs. It allows you to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.
Our web portal enables you to launch an entire range of target machines and access them remotely with one simple click. It is the most cost effective and easy to use live range lab solution available.
With iLabs, lab exercises can be accessed 24x7, allowing the student to practice skills in a safe and fully functional network anytime it is convenient.
Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art "Open Environment" allowing you to launch a complete live range open for any form of hacking or testing.
Available target machines are completely virtualized, allowing you to control and reset machines quickly and easily with no required instructor or administrative interaction.
The ECSAV9 penetration testing course is designed to enhance the skills based competency of a penetration tester. This course is intensively hands-on and a tremendous amount of emphasis is placed on the practical competency of the student.
Unlike the previous version of ECSA exam, in the new ECSAv9, a student will only be allowed to challenge the ECSA exam after meeting certain eligibility requirements.
To become eligible, a student must conduct a detailed penetration test through the EC-Council Cyber Range iLabs environment and submit a written report via EC-Council's ASPEN system.
Only candidates that successfully complete the penetration test in the Cyber Range iLabs environment are allowed to challenge the ECSA exam.
You will conduct a penetration test on a company that has various departments, subnets and servers, and multiple operating systems with defense mechanisms architecture that has both militarized and non-militarized zones.
The design of the course is such that the instructor in the class will actually take you through the core concepts of conducting a penetration test based on EC-Council's published penetration testing methdology and guide you through the report writing process for this organization.
Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals.
The ECSA exam aims to test a candidate's knowledge and application of critical penetration testing methodologies.
To be eligible to attempt the exam, candidates are required to perform real-world penetration testing over EC-Council's secure cyber range and to produce a penetration test report that clearly documents the vulnerabilities found. This report will be graded by our professionals. Candidates that successfully submit an acceptable report will proceed on to a multiple-choice exam that tests a candidate's knowledge.
Candidates that successfully pass the multiple-choice exam will be awarded the ECSA credential.
Candidates that submit reports to the required standards will be provided with exam vouchers for the multiple-choice ECSA v9 exam.
Multiple-choice exams are proctored online through the EC-Council Exam portal:
The course comprises of 2 sets of lab challenges. Both are on the EC- Council ilabs Cyber Range.
The first set covers practice labs for each module. In all, there are 45 such labs in total.
The other is a Challenge Scenario which mimics an actual penetration test in an imaginary financial service company. As a pre-requisite, you will be required to actually complete a penetration testing activity and submit a report to EC-Council before you will be allowed to attempt the ECSA V9 Exam.
Fields marked with * are mandatory.