Monday, March 28, 2011


Career Academy – EC-Council Certified Security Analyst / Licensed Penetration Tester + LAB DVD
Genre: Training | ISO | English | 15.59 GB


The ECSA/LPT training program is a highly interactive security course designed to teach Security Professionals the advanced uses of the available methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the LPT methodology and ground breaking techniques for security and penetration testing, this course will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure.
As students learn to identify security problems, they also learn how to avoid and eliminate them, with the course providing complete coverage of analysis and network security-testing topics. This course will prepare you to pass exam 412-79 to achieve EC-Council Certified Security Analyst (ECSA) certification
Career Academy is an EC-Council endorsed training provider. We have invited the best security trainers in the industry to help us develop the ultimate training and certification program which includes everything you will need to fully prepare for and pass your certification exams. This officially endorsed product gives our students access to the exam by providing you with a Voucher Number. The EC-Council Voucher Number can be used at any Prometric center, this voucher number is required and mandatory for you to schedule and pay for your exam. Without this voucher number Prometric will not entertain any of your requests to schedule and take the exam.

Course outline:-

Module 00 – Student Introduction
Module 01 – The Need for Security Analysis
Module 02 – Advanced Googling
Module 03 – TCP/IP Packet Analysis
Module 04 – Advanced Sniffing
Module 05 – Vulnerability Analysis
Module 06 – Advanced Wireless
Module 07 – Designing a DMZ
Module 08 – Snort Analysis
Module 09 – Log Analysis
Module 10 – Advanced Exploits and Tools
Module 11 – Penetration Testing Methodologies
Module 12 – Customers and Legal Agreements
Module 13 – Rules of Engagement
Module 14 – Penetration Testing Planning and Scheduling
Module 15 – Customers and Legal Agreements
Module 16 – Information Gathering
Module 17 – Vulnerability Analysis
Module 18 – External Penetration Testing
Module 19 – Internal Network Penetration Testing
Module 20 – Router and Switches Penetration Testing
Module 21 – Firewall Penetration Testing
Module 22 – IDS Penetration Testing
Module 23 – Wireless Network Penetration Testing
Module 24 – Denial of Service Penetration Testing
Module 25 – Password Cracking Penetration Testing
Module 26 – Social Engineering Penetration Testing
Module 27 – Stolen Laptops, PDAs, and Cell Phones Penetration Testing
Module 28 – Application Penetration Testing
Module 29 – Physical Security Penetration Testing
Module 30 – Database Penetration Testing
Module 31 – VoIP Penetration Testing
Module 32 – VPN Penetration Testing
Module 33 – War Dialing
Module 34 – Virus and Trojan Detection
Module 35 – Log Management Penetration Testing
Module 36 – File Integrity Checking
Module 37 – Bluetooth and Hand Held Device Penetration Testing
Module 38 – Telecommunication and Broadband Communication Penetration Testing
Module 39 – Email Security Penetration Testing
Module 40 – Security Patches Penetration Testing
Module 41 – Data Leakage Penetration Testing
Module 42 – Penetration Testing Deliverables and Conclusion
Module 43 – Penetration Testing Report and Documentation Writing
Module 44 – Penetration Testing Report Analysis
Module 45 – Post Testing Actions
Module 46 – Ethics of a Licensed Penetration Tester
Module 47 – Standards and Compliance


Download Torrent:





Leave a Reply

Subscribe to Posts | Subscribe to Comments

Pageviews

Followers

Blog Archive

Powered by Blogger.

- Copyright © 2013 Selva Sharing -Selvasharing- Powered by Blogger - Designed by @ Access -