Our Courses

ECSA - EC-COUNCIL CERTIFIED SECURITY ANALYST



ECSA/LPT is a security class like no other! Providing real world hands on experience, it is only in-depth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments. EC-Council's Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach security professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure.
As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security testing topics.


  • The need for security analysis
  • Advanced Googling
  • TCP/IP Packet Analysis
  • Advanced Sniffing Technologies
  • Vulnerability Analysis with Nessus
  • Advanced Wireless Testing
  • Designing a DMZ
  • Snort Analysis
  • Log Analysis
  • Advanced Exploits and Tools
  • Penetration Testing Methodologies
  • Customers and Legal Agreements
  • Rules of Engagement
  • Penetration Testing Planning and Scheduling
  • Pre Penetration Testing Checklist
  • Information Gathering
  • Vulnerability Gathering
  • External Penetration Testing
  • Internal Network Penetration Testing
  • Routers and Switches Penetration Testing
  • Firewall Penetration Testing
  • IDS Penetration Testing
  • Wireless Network Penetration Testing
  • Denial of Service Penetration Testing
  • Password Cracking Penetration Testing
  • Social Engineering Penetration Testing
  • Stolen Laptop, PDAs and Cell Phones Penetration Testing
  • Application Penetration Testing
  • Physical Security Penetration Testing
  • Database Penetration Testing
  • VoIP Penetration Testing
  • VPN Penetration Testing
  • War Dialing
  • Virus and Trojans Detection
  • Log Management Penetration Testing
  • File Integrity Checking
  • Bluetooth and Hand Held Device Penetration Testing
  • Telecommunications and Broadband Penetration Testing
  • E-mail Security Patches Penetration Testing
  • Security Patches Penetration Testing
  • Data Leakage Penetration Testing
  • Penetration Testing Deliverables and Conclusion
  • Penetration Testing Report and Documentation Writing
  • Penetration Testing Report Analysis
  • Post Testing Actions
  • Ethics of Licensed Penetration Tester
  • Standards and Compliance

*Upon successful completion of the EC ECA Program, you may apply to be an LPT.

REQUEST A CALL BACK Please fill all the texts in the fields.