Está en la página 1de 4

IT Security Solutions,

Services, Training
and Consultancy

EC Council Certified
Security Analyst
Plan and Design Networks.
Implement Security Solutions. Analyze
Security Risks and Threats. Become an ECSA

FIRST
TIME IN
BAHRAIN

http://www.roshcomm.co/ecsa Roshcomm

Hackers are here. Where are you?


Approved Training Center | Official Courseware | Certified Trainer
Roshcomm, P. O. Box 20256, Manama, Kingdom of Bahrain
Phone: 1736 5044 | Fax: 1736 5045 | www.roshcomm.com
ADVANCED ETHICAL HACKING WORKSHOP
ECSA/LPT Training Overview ECSA/LPT is a security class like no other! Providing
Roshcomm is pleased to announce our instructor-led real world hands on experience, it is the only in depth
ECSA Training Course, for the first-time ever in the Advanced Hacking and Penetration Testing class
Kingdom of Bahrain. EC-Council Certified Security available that covers testing in all modern
Analyst (ECSA) complements the Certified Ethical infrastructures, operating systems and application
Hacker certification by exploring the analytical phase environments. EC-Councils Certified Security
Analyst/LPT program is a highly interactive 5-day
of ethical hacking. While CEH exposes the learner to
security class designed to teach Security
hacking tools and technologies, ECSA takes it a step Professionals the advanced uses of the LPT
further by exploring how to analyze the outcome from methodologies, tools and techniques required to
these tools and technologies. Through groundbreaking perform comprehensive information security tests.
penetration testing methods and techniques, ECSA Students will learn how to design, secure and test
class helps students perform the intensive assessments networks to protect your organization from the
required to effectively identify and mitigate risks to the threats hackers and crackers pose. By teaching the
tools and ground breaking techniques for security
security of the infrastructure.
and penetration testing, this class will help you
This makes ECSA a relevant milestone towards perform the intensive assessments required to
achieving EC-Councils Licensed penetration Tester, effectively identify and mitigate risks to the security
which also ingrains the learner in the business aspect of your infrastructure. As students learn to identify
of penetration testing. The Licensed Penetration security problems, they also learn how to avoid and
Tester standardizes the knowledge base for eliminate them, with the class providing complete
coverage of analysis and network security-testing
penetration testing professionals by incorporating the
topics.
best practices followed by experienced experts in the
This course prepares you for EC-Council ECSA
field. The objective of EC-Council Certified Security
exam 412-79
Analyst is to add value to experienced security
professionals by helping them analyze the outcomes of
their tests. ECSA leads the learner into the advanced WORKSHOP OUTCOME
stages of ethical hacking. What is ECSA?
The ECSA/LPT training program is a highly interactive 5-
ECSA teaches you to interpret and analyze outcomes
day security class designed to teach Security you come across during routine and exceptional
Professionals the advanced uses of the available security testing. It helps you analyze the symptoms
methodologies, tools and techniques required to and pin point the causes of those symptoms which
perform comprehensive information security tests. reflect the security posture of the network.
Students will learn how to design, secure and test CEH exposes the learner to various hacking tools and
networks to protect your organization from the techniques, while ECSA exposes the learner to the
analysis and interpretation of results obtained from
threats hackers and crackers pose. By teaching the LPT
using those tools and techniques.
methodology and ground breaking techniques for
Most security certifications highlight the
security and penetration testing, this class will help you management aspects or the technical aspects alone.
perform the intensive assessments required to ECSA helps you bridge the gap to a certain extent by
effectively identify and mitigate risks to the security of helping you detect the causes of security lapses and
your infrastructure. As students learn to identify what implications it might carry for the
security problems, they also learn how to avoid and management. This leads you to a step closer to
becoming a licensed penetration tester, where you
eliminate them, with the class providing complete
become a complete penetration testing professional.
coverage of analysis and network security-testing
topics. Certification
Participation in the Workshop enables you to face any Students will be prepared for EC-Councils ECSA exam
information security situation and more importantly, 412-79. This certification is also pre-requisite to EC-
prepares you to sit for the ECSA exam by EC Council. Councils Licensed Penetration Tester Program.
TRACKS, TOPICS & MODULES WHO SHOULD ATTEND
The course will provide great learning and networking
opportunities to delegates and industry experts. Here is This course will significantly benefit security
a list of modules that will be covered at the training officers, auditors, security professionals, site
program. administrators, and anyone who is concerned
about the integrity of the network infrastructure.
Module 1: The Need for Security Analysis This class is a must for networking professionals,
Module 2: Advanced Googling IT managers and decision-makers that need to
Module 3: TCP/IP Packet Analysis understand the security solutions that exist
Module 4: Advanced Sniffi ng Techniques today. Companies and organizations interested in
Module 5: Vulnerability Analysis with Nessus developing greater e-commerce capability need
Module 6: Advanced Wireless Testing people that know information security. This class
Module 7: Designing a DMZ provides a solid foundation in the security
Module 8: Snort Analysis technologies that will pave the way for
Module 9: Log Analysis organizations that are truly interested in reaping
Module 10: Advanced Exploits and Tools the benefits and tapping into the potential of the
Module 11: Penetration Testing Methodologies Internet.
Module 12: Customers and Legal Agreements
Module 13: Rules of Engagement
This Workshop is specially designed for
Module 14: Penetration Testing Planning and Scheduling
Module 15: Pre Penetration Testing Checklist those employees who are serious about
Module 16: Information Gathering learning and obtaining certification on
Module 17: Vulnerability Analysis information security.
Module 18: External Penetration Testing
Module 19: Internal Network Penetration Testing Any customer facing organization
Module 20: Routers and Switches Penetration Testing Commercial Banks
Module 21: Firewall Penetration Testing
Module 22: IDS Penetration Testing Credit Card Companies
Module 23: Wireless Network Penetration Testing Contact Centers
Module 24: Denial of Service Penetration Testing Finance Companies
Module 25: Password Cracking Penetration Testing
Module 26: Social Engineering Penetration Testing
Government Officials
Module 27: Stolen Laptop, PDAs and Cell phones Local, Regional and International
Penetration Testing Banks
Module 28: Application Penetration Testing
Local, Regional and Multi-national
Module 29: Physical Security Penetration Testing
Module 30: Database Penetration testing Companies
Module 31: VoIP Penetration Testing Investment Banks
Module 32: VPN Penetration Testing Law Firms
Module 33: War Dialing
Module 34: Virus and Trojan Detection Real Estate Organisations
Module 35: Log Management Penetration Testing Insurance Companies
Module 36: File Integrity Checking Auditing Companies
Module 37: Blue Tooth and Hand held Device Penetration
Property Service and Maintenance
Testing
Module 38: Telecommunication and Broadband Companies
Communication Penetration Testing Shopping Mall and Retail enterprises
Module 39: Email Security Penetration Testing Central Banks
Module 40: Security Patches Penetration Testing
Module 41: Data Leakage Penetration Testing Manufacturing organisations
Module 42: Penetration Testing Deliverables and Telecoms
Conclusion Ministries
Module 43: Penetration Testing Report and
Documentation Writing DURATION
Module 44: Penetration Testing Report Analysis
Module 45: Post Testing Actions This course is a very intensive 5-day workshop that
Module 46: Ethics of a Licensed Penetration Tester aims to deliver key learning through theory sessions
and practical hands-on exercises. BE PREPARED!
Module 47: Standards and Compliance
DELEGATE REGISTRATION FORM

Hackers are here. Where are you? Introducing ECSA/LPT


EC-Council Certified Security Analyst (ECSA) complements the Certified Ethical Hacker (CEH) certification
by exploring the analytical phase of ethical hacking. While CEH exposes the learner to hacking tools and
technologies, ECSA takes it a step further by exploring how to analyze the outcome from these tools and
technologies. Through groundbreaking penetration testing methods and techniques, ECSA class helps
students perform the intensive assessments required to effectively identify and mitigate risks to the
security of the infrastructure. This makes ECSA a relevant milestone towards achieving EC-Councils
Licensed penetration Tester, which also ingrains the learner in the business aspect of penetration testing.
The Licensed Penetration Tester standardizes the knowledge base for penetration testing professionals by
incorporating the best practices followed by experienced experts in the field. The objective of EC-Council
Certified Security Analyst is to add value to experienced security professionals by helping them analyze
the outcomes of their tests. ECSA leads the learner into the advanced stages of ethical hacking.

Please complete this form and return by email training@roshcomm.com


or by fax +973 1736 5045.
HIGHLY INTENSIVE WORKSHOP

Organization
WORKSHOP FEES
Delegate Name The Workshop fees include attendance and a 5-day
pass to all tracks, folder, proceedings, light
Job Title breakfast, coffee breaks, lunch, exam fees
Address BHD 1380 (USD 3650)
Telephone
Fax Contact details:
Mobile Event Manager
IT Security Training
E-mail P.O. Box 20256
Training/HR Manama, Kingdom of Bahrain
Contact name Tel.: +973 1736 5044
Finance/Admin Fax: +973 1736 5045
Contact name Email: training@roshcomm.com
Authorised Web: www.roshcomm.com/ecsa
Signature Please make payment in USD or BHD through Bank
transfer or Company cheque drawn on a Bahrain
bank.
The registration fees include attendance and a 5-day pass to all
tracks, Workshop Proceedings, CD/download, folder, light Account Name: ROSHCOMM
Bank Name: Ahli United Bank
breakfast, coffee breaks, lunch. Account Number: 0010576234001
Participation will be confirmed upon receipt of full payment. Branch: Seef Branch
Cancellations within 1 month from event date will attract 25% Swift code: AUBBBHBM
Bank Address: P. O. Box 2424,
cancellation fee
Manama,
Delegate substitutions are allowed Kingdom of Bahrain
Exam fee is included in the Workshop fee

Brought to you by

www.roshcomm.com/ecsa

También podría gustarte