Menu

CERTIFIED SECURITY ANALYST (ECSA)

4.7( 3 REVIEWS )
48 STUDENTS
Overview The Certified Security Analyst is a practical, hands-on course that focuses on the real-life penetration test. It is perfect …

Overview

The Certified Security Analyst is a practical, hands-on course that focuses on the real-life penetration test. It is perfect for your career goal if you aspire to become a Certified Security Analyst. This course is a step up from Ethical Hacker and would be ideal if you’ve completed it and could move onto Certified Security Analyst. Apply the tools and techniques you learned from Ethical Hacker, in order for you to gain an understanding of real-world situations. It is a comprehensive programme that will focus on penetration testing methodology.

The course is extensive and covers a range of key modules such as penetration testing essentials, open source intelligence methodology, social engineering penetration testing and network penetration testing methodology. Each module is discussed in-depth ensuring learners gain a firm understanding of the importance of applying skills learned in penetration testing methodology.

The Certified Security Analyst will help you advance your career with a wealth of knowledge and experience. Build on your skillset gained in Ethical Trainer and progress further to the specialised area of becoming a penetration tester. Qualifying in this course will lead to numerous opportunities in the information security field in a number of high-paying job roles.

  • Why consider learning at Study 365?
  • Who is this course aimed at?
  • Entry Requirements      
  • Method of Assessment
  • Certification
  • Awarding Body
  • Progression and Career Path

With so many commitments in our lives, we may not have the time to learn new skills. The beauty of studying online is that you get to find this balance between your education and your daily commitments

Study 365 offers hundreds of online courses to students across the world. Gaining new skills as never been this easy as many of our courses are open to students with little or no qualifications or previous experience. All the courses are up-to-date and relevant, affordable, will build on existing expertise or give you a jump-start to a new career. The courses are meticulously designed and equal what is offered in a classroom setting. With a solid reputation that has established and made us made us one of the most trusted and reliable online course providers we offer the most convenient path to gain recognised skills and training that will give you the opportunity to put into practice your knowledge and expertise in your chosen career. You can learn at your own pace at Study 365 and you will be provided with all the necessary material, tutorials, qualified course instructor, narrated e-learning modules, interactive quizzes and free resources which include Free CV writing pack, free career support and course demo to make your learning experience enriching and more rewarding.

This course will benefit Security Officers, Auditors, Site Administrators and Security Professionals. Additionally, it is suitable for any individual interested in the integrity of network infrastructure.

  • Learners should be age 19 or over, and must have a basic understanding of Maths, English, and ICT.
  • Learners must have 2 years of work experience in information security.

In order to successfully complete the Certified Security Analyst, learners have to sit for the EC-Council exam that demonstrates academic rigour and real-world applicability. Learners are expected to maintain high integrity by achieving the relevant test score.

  • Number of Questions: 150
  • Passing Score: 70%
  • Test Duration: 4 Hours

Successful learners will be awarded the Certified Security Analyst by EC-Council Certified.

EC-Council is a global leader in creating information security trainings and certification programmes. EC-Council operates in 145 countries and is widely recognised for developing Certified Ethical Hacker and Certified Security Analyst amongst a range of courses and programmes. They are proud to have trained information security professionals globally and influenced the mindset of organisations around the world. Their primary goal is to certify individuals and organisations in information security skills.

This course in Certified Security Analyst will enhance your qualification for a number of jobs in the IT and application security industries. The qualification will demonstrate your skills and expertise in penetration testing methodology and prove to potential employers that you will be a valuable asset to an organisation. You can also use this certificate as an opportunity to win various job incentives put forth by your employer or to study further in the area and improve your knowledge on the subject. Below given are few of the jobs this certificate will help you in, along with the average UK salary per annum according to http://payscale.com/

  • Security Officers
  • Security Professionals
  • Site Administrators
  • Auditors
  • Tester

Course Curriculum

01: Introduction to Penetration Testing and Methodologies
Introduction to Penetration Testing and Methodologies 00:00:00
02: Penetration Testing Scoping and Engagement Methodology
Penetration Testing Scoping and Engagement Methodology 00:00:00
03: Open-Source Intelligence (OSINT) Methodology
Open-Source Intelligence (OSINT) Methodology 00:00:00
04: Social Engineering Penetration Testing Methodology
Social Engineering Penetration Testing Methodology 00:00:00
05: Network Penetration Testing Methodology – External
Network Penetration Testing Methodology – External 00:00:00
06: Network Penetration Testing Methodology – Internal
Network Penetration Testing Methodology – Internal 00:00:00
07: Network Penetration Testing Methodology – Perimeter Devices
Network Penetration Testing Methodology – Perimeter Devices 00:00:00
08: Web Application Penetration Testing Methodology
Web Application Penetration Testing Methodology 00:00:00
09: Database Penetration Testing Methodology
Database Penetration Testing Methodology 00:00:00
10: Wireless Penetration Testing Methodology
Wireless Penetration Testing Methodology 00:00:00
11: Cloud Penetration Testing Methodology
Cloud Penetration Testing Methodology 00:00:00
12: Report Writing and Post Testing Actions
Report Writing and Post Testing Actions 00:00:00
Penetration Testing Essential Concepts (Self-Study)
Penetration Testing Essential Concepts (Self-Study) 00:00:00

Students feedback

4.7

Avarage rating (3)
4.7
5 Star
4 Star
3 Star
2 Star
1 Star
    O R

    Orion Richardson

    February 08, 2020 - 1:04pm
    Excellent presentation

    The training excellent and presented very well. The tutor was knowledgeable and knew exactly how to make it engaging and detailed. While the content was serious, it was still light because of the step by step manner it was presented in. I was highly impressed by this training conducted by Study365.

    K M

    Kobi Mitchell

    January 21, 2020 - 4:26pm
    High standard

    I was thoroughly impressed by the high standard of the course. It was akin to learning inside a classroom. The video series was engaging and highly detailed. While I expected it to sound and feel monotonous, I couldn’t have been more wrong. I have completed this course and hope to take more courses in information security at a later date.

    G H

    Georgina Henderson

    January 02, 2020 - 12:08pm
    Organised well

    The course was well organised and effectively presented. While the subject matter was complex, the information was simplified so as to make even a new learner understand the content without having gaps in the middle. As someone who was new to all this, I was pleased with the outcome.

Contact Us

Certificate Code

Secure Payment
top
Copyright © 2020 -Study365 - All rights reserved.
WhatsApp chat