EC-Council Certified Security Analyst (ECSA) (Virtual Classroom Plus)
Description
Virtual Classroom Plus is een unieke methode van IT-University waarmee je voor minder geld op een flexibele manier kan leren onder begeleiding van een ervaren praktijkdocent.EC-Council Certified Security Analyst (ECSA) (Virtual Classroom Plus)
Doelgroep
Ethical Hackers, Penetration Testers, Security Analysts, Security Engineers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators, and Risk Assessment Professionals.
Vereiste voorkennis (incl. eventueel voorafgaande training)
Deelnemers aan deze training moeten beschikken over vijf jaar ervaring heb in informatiebeveiliging.Examen
Deze training is ter voorbereiding op de volgende examens: EC-Counci…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
EC-Council Certified Security Analyst (ECSA) (Virtual Classroom Plus)
Doelgroep
Ethical Hackers, Penetration Testers, Security Analysts, Security Engineers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators, and Risk Assessment Professionals.
Vereiste voorkennis (incl. eventueel voorafgaande training)
Deelnemers aan deze training moeten beschikken over vijf jaar ervaring heb in informatiebeveiliging.Examen
Deze training is ter voorbereiding op de volgende examens: EC-Council Certified Security Analyst (ECSA)
Certificering
Deze training maakt onderdeel uit van het(de) navolgende certificeringstraject(en):
EC-Council Certified Security Analyst (ECSA)
Cursusduur
6 virtual classroom avondsessies verspreid over 7 weken. Deze training wordt binnen heel Europa verkocht. Deze training is Engelstalig. De vermelde prijs is EXCLUSIEF 21% BTW.
Prijs
€ 1250 per training/per cursist (excl 21% btw)
• Introduction to Penetration Testing and Methodologies • Penetration Testing Scoping and Engagement Methodology • Open Source Intelligence (OSINT) Methodology • Social Engineering Penetration Testing Methodology • Network Penetration Testing Methodology - External • Network Penetration Testing Methodology - Internal • Network Penetration Testing Methodology - Perimeter Devices • Web Application Penetration Testing Methodology • Database Penetration Testing Methodology • Wireless Penetration Testing Methodology • Cloud Penetration Testing Methodology • Report Writing and Post Testing ActionsShare your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.