You are on page 1of 14

Version 4

EC Council
EC-Council

Class, Please Introduce Yourself

Name
Company Affiliation
Title / Function
Job Responsibility
System security related experience
Expectations

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Course Materials

~
~
~
~
~
~

EC-Council

Identity Card
Student Courseware
Lab Manual/Workbook
C
Compact
Di
Disc
Course Evaluation
Reference Materials

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Course Outline
Module 01: The Need for Security Analysis
Module 02: Advanced Googling
Module 03: TCP/IP Packet Analysis
Module 04: Advanced Sniffing Techniques
Module 05: Vulnerability Analysis with Nessus
Module 06: Advanced Wireless Testing
Module 07: Designing a DMZ
Module 08: Snort Analysis
Module 09: Log Analysis
Module 10: Advanced Exploits and Tools
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Course Outline (contd.)


Module 11: Penetration Testing Methodologies
Module 12: Customers and Legal Agreements
Module 13: Rules of Engagement
Module 14: Penetration Testing Planning and Scheduling
Module 15: Pre Penetration Testing Checklist
Module 16: Information Gathering
Module 17: Vulnerability Analysis
Module 18: External Penetration Testing
Module 19: Internal Network Penetration Testing
Module 20: Routers and Switches Penetration Testing
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Course Outline (contd.)


Module 21: Firewall Penetration Testing
Module 22: IDS Penetration Testing
Module 23: Wireless Network Penetration Testing
Module 24: Denial of Service Penetration Testing
Module 25: Password Cracking Penetration Testing
Module 26: Social Engineering Penetration Testing
Module 27: Stolen Laptop, PDAs and Cell phones Penetration Testing
Module 28: Application Penetration Testing
Module 29: Physical Security Penetration Testing
Module 30: Database Penetration testing
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Course Outline (contd.)


Module 31: VoIP Penetration Testing
Module 32: VPN Penetration Testing
Module 33
33: War Dialing
g
Module 34: Virus and Trojan Detection
Module 35: Log Management Penetration Testing
Module 36: File Integrity Checking
Module 37: Blue Tooth and Hand held Device Penetration Testing
Module 38: Telecommunication and Broadband Communication Penetration Testing
Module 39: Email Security Penetration Testing
Module 40: Security Patches Penetration Testing
EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Course Outline (contd.)

Module 41: Data Leakage Penetration Testing


Module 42: Penetration Testing Deliverables and Conclusion
Module 43: Penetration Testing Report and Documentation Writing
Module 44: Penetration Testing Report Analysis
Anal sis
Module 45: Post Testing Actions
Module 46: Ethics of a Licensed Penetration Tester
Module 47: Standards and Compliance

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

EC-Council Certification
There are several levels of certification tracks under EC-Council:
1.

Certified e-Business Professional

2.

Certified Ethical Hacker (CEH)

3.

C
Computer
H
Hacking
ki Forensic
F
i IInvestigator
i
(CHFI)

4.

EC-Council Certified Security Analyst (ECSA) You are here

5.

Licensed Penetration Tester (LPT) You are here

6.

EC-Council Certified Secure Programmer (ECSA)

7.

Certified Secure Application Developer (CSAD)

8.

Master of Security Science (MSS)

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

ECSA Track

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

LPT Track

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

What next after ECSA Training?


~

If you have completed the CEH and ECSA programs then


you are eligible to apply for the Licensed Penetration
Tester certification
To apply for the LPT license please visit
http://www.eccouncil.org Certification LPT

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Student Facilities
Class Hours

B ildi H
Building
Hours

Ph
Phones

Parking
k

Messages

Restrooms

Smoking

Meals

Recycling

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

Lab Sessions

The ECSA/LPT programs


covers the penetration testing
p and methodology
gy
concepts
80% of the course will be
presented as theoryy (seminar
p
style)
20% of the course will have
hands-on labs

EC-Council

Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited

You might also like