EC-Council’s Certified Security Analyst/LPT program

canvas informationcanvas assurancecanvas and  canvas risk  canvas assessmentcanvas trainingcanvas program  canvas ecsa
ecsa-banner
Computek is one of the largest and first Ec-council learning solution in egypt with 20 years of experience delivering training and certifications in all technologies.All Ec-Council Training in computek is held by Ec-Council Certified Instructors with over than 10 years experience in the technical and training field .

eccouncil-homepage-img2

EC Council Certified Security Analyst, ECSA an advanced ethical hacking training certification that complements the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking. While the Certified Ethical Hacker certification exposes the learner to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking network penetration testing training methods and techniques, this pen testing computer security certification helps students perform the intensive assessments required to effectively identify and mitigate risks to the information security of the infrastructure.

This makes the Certified Security Analyst "Pen Testing" certification a relevant milestone toward achieving
 EC Council’s Licensed penetration Tester, which also ingrains the learner in the business aspect of network penetration testing. The Licensed Penetration Tester certification standardizes the knowledge base for network penetration testing professionals by incorporating the best practices followed by experienced experts in the field.

The objective of Certified Security Analyst “pen testing” certification is to add value to experienced Information security professionals by providing data security training that will help them analyze the outcomes of their Vulnerability Assessments. Network Penetration Testing Training leads the learner into the advanced stages of ethical hacking. 
lpt-certificate 
lpt-and-security-analysis
Certified-Security-Analyst The Certified Security Analyst “pen testing” program is a computer security certification designed to teach Information Security Professionals the advanced uses of the available methodologies, tools and techniques expected from a premier ethical hacking training and are required to perform comprehensive information security pen tests.  Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose.

Data Security Program Advanced Penetration Testing

Data-Security-ProgramBy teaching the Licensed Penetration Tester, LPT methodology and ground breaking techniques for security and penetration testing, this risk assessment training class will help you perform the intensive assess information assurance trainingents required to effectively identify and mitigate risks to the security of your infrastructure.

As students learn to identify Information Security problems in this ethical hacking training certification course, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.
This makes the Certified Security Analyst "Pen Testing" certification a relevant milestone toward achieving  EC Council’s Licensed penetration Tester, which also ingrains the learner in the business aspect of network penetration testing.
The Licensed Penetration Tester certification standardizes the knowledge base for network penetration testing professionals by incorporating the best practices followed by experienced experts in the field.
The objective of Certified Security Analyst “pen testing” certification is to add value to experienced Information security professionals by providing data security training that will help them analyze the outcomes of their Vulnerability Assessments.
Network Penetration Testing Training leads the learner into the advanced stages of ethical hacking.

ecsa-requirements
Pass exam 412-79 to achieve EC-Council Certified Security Analyst (ECSA) certification.

ecsa-benefits1

 

  • lpt-benefits
  • ECSA is for experienced hands in the industry and is backed by a curriculum designed by the best in the field.
  • Greater industry acceptance as seasoned security professional.
  • Learn to analyze the outcomes from using security tools and security testing techniques.
  • Requirement for the LPT certification.

pen-testing-training

Network server administrators, Firewall Administrators, Information Security Testers, System Administrators and Risk Assessment professionals.

ecsa-text3

ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments.
EC-Council’s Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose.
By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure.
As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.

Duration: 5 days (9:00 - 5:00) Certification

network-Certification-Exam

The ECSA certification exam will be conducted on the last day of training. Students need to pass the online Prometric exam 412-79 to receive the ECSA certification. The Student also will be prepared for the LPT certification.

canvas2014 1canvas2014 2canvas2014 3canvas2014 4course222outline333


The Need for Security Analysis

Need-for-Security-Analysis

Sexual-HarassmentWhat Are We Concerned About?

So What Are You Trying To Protect?

Why Are Intrusions So Often Successful?

What Are The Greatest Challenges?

Environmental Complexity

New Technologies

New Threats, New Exploits

Limited Focus

Limited Expertise

Authentication

Authorization

Confidentiality

Integrity

Availability

Nonrepudiation

We Must Be Diligento:p>

Threat Agents

Assessment Questions

How Much Security is Enough?

Risk

Simplifying Risk

Risk Analysis

Risk Assessment Answers Seven Questions

Steps of Risk Assessment

Risk Assessment Values

Information Security Awareness

Security policies

Types of Policies

Promiscuous Policy

Permissive Policy

Prudent Policy

Paranoid Policy

Acceptable-Use Policy

User-Account Policy

Remote-Access Policy

Information-Protection Policy

Firewall-Management Policy

Special-Access Policy

Network-Connection Policy

Business-Partner Policy

Other Important Policies

Policy Statements

Basic Document Set of Information Security Policies

ISO 17799

Domains of ISO 17799

No Simple Solutions

U.S. Legislation

California SB 1386

Sarbanes-Oxley 2002

Gramm-Leach-Bliley Act (GLBA)

Health Insurance Portability and Accountability Act (HIPAA)

USA Patriot Act 2001

U.K. Legislation

How Does This Law Affect a Security Officer?

The Data Protection Act 1998

The Human Rights Act 1998

Interception of Communications

The Freedom of Information Act 2000

The Audit Investigation and Community Enterprise Act 2005

back to top

 

Advanced Googling

Advanced-Googling

google-advancedSite Operator

intitle:index.of

error | warning

login | logon

username | userid | employee.ID | “your username is”

password | passcode | “your password is”

admin | administrator

admin login

–ext:html –ext:htm –ext:shtml –ext:asp –ext:php

inurl:temp | inurl:tmp | inurl:backup | inurl:bak

intranet | help.desk

Locating Public Exploit Sites

Locating Exploits Via Common Code Strings

Searching for Exploit Code with Nonstandard Extensions

Locating Source Code with Common Strings

Locating Vulnerable Targets

Locating Targets Via Demonstration Pages

“Powered by” Tags Are Common Query Fodder for Finding Web Applications

Locating Targets Via Source Code

Vulnerable Web Application Examples

Locating Targets Via CGI Scanning

A Single CGI Scan-Style Query

Directory Listings

Finding IIS 5.0 Servers

Web Server Software Error Messages

IIS HTTP/1.1 Error Page Titles

“Object Not Found” Error Message Used to Find IIS 5.0

Apache Web Server

Apache 2.0 Error Pages

Application Software Error Messages

ASP Dumps Provide Dangerous Details

Many Errors Reveal Pathnames and Filenames

CGI Environment Listings Reveal Lots of Information

Default Pages

A Typical Apache Default Web Page

Locating Default Installations of IIS 4.0 on Windows NT 4.0/OP

Default Pages Query for Web Server

Outlook Web Access Default Portal

Searching for Passwords

Windows Registry Entries Can Reveal Passwords

Usernames, Cleartext Passwords, and Hostnames!

back to top

TCP/IP Packet Analysis

TCP-IP-Packet-Analysis

investigating-dos-attacks

TCP/IP Model

Application Layer

Transport Layer

Internet Layer

Network Access Layer

Comparing OSI and TCP/IP

Addressing

IPv4 Addresses

IP Classes of Addresses

Reserved IP Addresses

Private Addresses

Subnetting

IPv4 and IPv6

Transport Layer

Flow Control

Three-Way Handshake

TCP/IP Protocols

TCP Header

IP Header

IP Header: Protocol Field

UDP

TCP and UDP Port Numbers

Port Numbers

TCP Operation

Synchronization or 3-way Handshake

Denial of Service (DoS) Attacks

DoS Syn Flooding Attack

Windowing

Acknowledgement

Windowing and Window Sizes

Simple Windowing

Sliding Windows

Sequencing Numbers

Positive Acknowledgment and Retransmission (PAR)

UDP Operation

Port Numbers Positioning between Transport and Application Layer (TCP and UDP)

Port Numbers

http://www.iana.org/assignments/port-numbers

What Makes Each Connection Unique?

Internet Control Message Protocol (ICMP)

Error Reporting and Error Correction

ICMP Message Delivery

Format of an ICMP Message

Unreachable Networks

Destination Unreachable Message

ICMP Echo (Request) and Echo Reply

Detecting Excessively Long Routes

IP Parameter Problem

ICMP Control Messages

ICMP Redirects

Clock Synchronization and Transit Time Estimation

Information Requests and Reply Message Formats

Address Masks

Router Solicitation and Advertisement

back to top

 

Advanced Sniffing Techniques

Advanced-Sniffing-Techniques

wireless-network

What is Wireshark?

Wireshark: Filters

IP Display Filters

Example

Wireshark: Tshark

Wireshark: Editcap

Wireshark: Mergecap

Wireshark: Text2pcap

Using Wireshark for Network Troubleshooting

Network Troubleshooting Methodology

Using Wireshark for System Administration

ARP Problems

ICMP Echo Request/Reply Header Layout

TCP Flags

TCP SYN Packet Flags Bit Field

Capture Filter Examples

Scenario 1: SYN no SYN+ACK

Scenario 2: SYN Immediate Response RST

Scenario 3: SYN SYN+ACK ACK

Using Wireshark for Security Administration

Detecting Internet Relay Chat Activity

Wireshark as a Detector for Proprietary Information Transmission

Sniffer Detection

Wireless Sniffing with Wireshark

AirPcap

Using Channel Hopping

Interference and Collisions

Recommendations for Sniffing Wireless

Analyzing Wireless Traffic

IEEE 802.11 Header

IEEE 802.11 Header Fields

Filters

Filtering on Source MAC Address and BSSID

Filtering on BSSID

Filter on SSID

Wireless Frame Types Filters

Unencrypted Data Traffic

Identifying Hidden SSIDs

Revealed SSID

Identifying EAP Authentication Failures

Identifying the EAP Type

Identifying Key Negotiation Properties

EAP Identity Disclosure

Identifying WEP

Identifying TKIP and CCMP

Identifying IPSec/VPN

Decrypting Traffic

Scanning

TCP Connect Scan

SYN Scan

XMAS Scan

Null Scan

Remote Access Trojans

NetBus Analysis

Trojan Analysis Example NetBus Analysis

back to top

 

Vulnerability Analysis with Nessus

Vulnerability-Analysis-with-Nessus

log-analysis22

Nessus

Features of Nessus

Nessus Assessment Process

Nessus: Scanning

Nessus: Enumeration

Nessus: Vulnerability Detection

Configuring Nessus

Updating Nessus Plug-Ins

Using the Nessus Client

Starting a Nessus Scan

Generating Reports

Data Gathering

Host Identification

Port Scan

SYN scan

Timing

Port Scanning Rules of Thumb

Plug-in Selection

Dangerous plugins

Scanning Rules of Thumb

Report Generation

Reports: Result

Identifying False Positives

Suspicious Signs

False Positives

Examples of False Positives

Writing Nessus Plugins

Writing a Plugin

Installing and Running the Plugin

Nessus Report with output from our plugin

Security Center http://www.tenablesecurity.com

back to top

 

Advanced Wireless Testing

Advanced-Wireless-Testing

network-protocalWireless Concepts

Wireless Concepts

802.11 Types

Core Issues with 802.11

What’s the Difference?

Other Types of Wireless

Spread Spectrum Background

Channels

Access Point

Service Set ID

Default SSIDs

Chipsets

Wi-Fi Equipment

Expedient Antennas

Vulnerabilities to 802.1x and RADIUS

Wired Equivalent Privacy

Security - WEP

Wired Equivalent Privacy

Exclusive OR

Encryption Process

Chipping Sequence

WEP Issues

WEP - Authentication Phase

WEP - Shared Key Authentication

WEP - Association Phase

WEP Flaws

WEP Attack

WEP: Solutions

WEP Solution – 802.11i

Wireless Security Technologies

WPA Interim 802.11 Security

WPA

802.1X Authentication and EAP

EAP Types

Cisco LEAP

TKIP (Temporal Key Integrity Protocol)

Wireless Networks Testing

Wireless Communications Testing

Report Recommendations

Wireless Attack Countermeasures

Wireless Penetration Testing with Windows

Attacks And Tools

War Driving

The Jargon – WarChalking

WarPumpkin

Wireless: Tools of the Trade

Mapping with Kismet

WarDriving with NetStumbler

How NetStumbler Works?

“Active” versus “Passive” WLAN Detection

Disabling the Beacon

Running NetStumbler

Captured Data Using NetStumbler

Filtering by Channels

Airsnort

WEPCrack

Monkey-Jack

How Monkey-Jack Works

Before Monkey-Jack

After Monkey-Jack

AirCrack-ng

How Does It Work?

FMS and Korek Attacks

Crack WEP

Available Options

Usage Examples

Cracking WPA/WPA2 Passphrases

Notes

Determining Network Topology: Network View

WarDriving and Wireless Penetration Testing with OS X

What is the Difference between “Active" and “Passive" Sniffing?

Using a GPS

Attacking WEP Encryption with KisMAC

Deauthenticating Clients

Attacking WPA with KisMAC

Brute-force Attacks Against 40-bit WEP

Wordlist Attacks

Mapping WarDrives with StumbVerter

MITM Attack basics

MITM Attack Design

MITM Attack Variables

Hardware for the Attack Antennas, Amps, WiFi Cards

Wireless Network Cards

Choosing the Right Antenna

Amplifying the Wireless Signal

Identify and Compromise the Target Access Point

Compromising the Target

Crack the WEP key

Aircrack-ng Cracked the WEP Key

The MITM Attack Laptop Configuration

IP Forwarding and NAT Using Iptables

Installing Iptables and IP Forwarding

Establishing the NAT Rules

Dnsmasq

Configuring Dnsmasq

Apache Web Servers

Virtual Directories

Clone the Target Access Point and Begin the Attack

Start the Wireless Interface

Deauthenticate Clients Connected to the Target Access Point

Wait for the Client to Associate to Your Access Point

Spoof the Application

Modify the Page

Example Page

Login/php page

Redirect Web Traffic Using Dnsmasq

back to top

 

Designing a DMZ

Designing-a-DMZ

image-forensicIntroduction

DMZ Concepts

Multitiered Firewall With a DMZ Flow

DMZ Design Fundamentals

Advanced Design Strategies

Designing Windows DMZ

Designing Windows DMZ

Precautions for DMZ Setup

Security Analysis for the DMZ

Designing Sun Solaris DMZ

Placement of Servers

Advanced Implementation of a Solaris DMZ Server

Solaris DMZ Servers in a Conceptual Highly Available Configuration

Private and Public Network Firewall Ruleset

DMA Server Firewall Ruleset

Solaris DMZ System Design

Disk Layout and Considerations

Designing Wireless DMZ

Placement of Wireless Equipment

Access to DMZ and Authentication Considerations

Wireless DMZ Components

Wireless DMZ Using RADIUS to Authenticate Users

WLAN DMZ Security Best-Practices

DMZ Router Security Best-Practice

DMZ Switch Security Best-Practice

Six Ways to Stop Data Leaks

Reconnex

back to top

 

Snort Analysis

Snort-Analysis

investigating-networkSnort Overview

Modes of Operation

Features of Snort

Configuring Snort

Variables

Preprocessors

Output Plugins

Rules

Working of Snort

Initializing Snort

Signal Handlers

Parsing the Configuration File

Decoding

Possible Decoders

Preprocessing

Detection

Content Matching

Content-Matching Functions

The Stream4 Preprocessor

Inline Functionality

Writing Snort Rules

Snort Rule Header

Snort Rule Header: Actions

Snort Rule Header: Other Fields

IP Address Negation Rule

IP Address Filters

Port Numbers

Direction Operator

Rule Options

Activate/Dynamic Rules

Meta-Data Rule Options: msg

Reference Keyword

sid/rev Keyword

Classtype Keyword

Payload Detection Rule Options: content

Modifier Keywords

Offset/depth Keyword

Uricontent keyword

fragoffset keyword

ttl keyword

id keyword

flags keyword

itype keyword : icmp id

Writing Good Snort Rules

Sample Rule to Catch Metasploit Buffer Overflow Exploit

Tool for writing Snort rules: IDS Policy Manager

Subscribe to Snort Rules

Honeynet Security Console Tool

Key Features

back to top

 

Log Analysis

Log-Analysis1

security-policies

Introduction to Logs

Types of Logs

Events that Need to be Logged

What to Look Out For in Logs

W3C Extended Log File Format

Automated Log Analysis Approaches

Log Shipping

Analyzing Syslog

Syslog

Setting up a Syslog

Syslog: Enabling Message Logging

Main Display Window

Configuring Kiwi Syslog to Log to a MS SQL Database

Configuring Ethereal to Capture Syslog Messages

Sending Log Files via email

Configuring Cisco Router for Syslog

Configuring DLink Router for Syslog

Configuring Cisco PIX for Syslog

Configuring an Intertex / Ingate/ PowerBit/ SurfinBird ADSL router

Configuring a LinkSys wireless VPN Router

Configuring a Netgear ADSL Firewall Router

Analyzing Web Server Logs

Apache Web Server Log

AWStats

Configuring AWStats for IIS

Log Processing in AWStats

Analyzing Router Logs

Router Logs

Analyzing Wireless Network Devices Logs

Wireless Traffic Log

Analyzing Windows Logs

Configuring Firewall Logs in Local Windows System

Viewing Local Windows Firewall Log

Viewing Windows Event Log

AAnalyzing Linux Logs

iptables

Log Prefixing with iptables

Firewall Log Analysis with grep

Analyzing SQL Server Logs

SQL Database Log

ApexSQL Log

Configuring ApexSQL Log

Analyzing VPN Server Logs

VPN Client Log

Analyzing Firewall Logs

Why Firewall Logs are Important

Firewall Log Sample

ManageEngine Firewall Analyzer

Installing Firewall Analyzer

Viewing Firewall Analyzer Reports

Firewall Analyzer Log Reports

Analyzing IDS Logs

SnortALog

IDS Log Sample

Analyzing DHCP Logs

DHCP Log

NTP Configuration

Time Synchronization and Logging

NTP Overview

NTP Client Configuration

Configuring an NTP client using the Client Manager

Configuring an NTP Server

NTP: Setting Local Date and Time

Log Analysis Tools

All-Seeing Eye Tool: Event Log Tracker

Network Sniffer Interface Test Tool

Syslog Manager 2.0.1

Sawmill

WALLWATCHER

Log Alert Tools

Network Eagle Monitor

Network Eagle Monitor: Features

SQL Server Database Log Navigator

What Log Navigator does?

How Does Log Navigator Work?

Snortsnarf

Types of Snort Alarms

ACID (Analysis Console for Intrusion Databases)

back to top

 

Advanced Exploits and Tools

Advanced-Exploits-and-Tools

viruses-worms2

Common Vulnerabilities

Buffer Overflows Revisited

Smashing the Stack for Fun and Profit

Smashing the Heap for Fun and Profit

Format Strings for Chaos and Mayhem

The Anatomy of an Exploit

Vulnerable code

Shellcoding

Shellcode Examples

Delivery Code

Delivery Code: Example

Linux Exploits Versus Windows

Windows Versus Linux

Tools of the Trade: Debuggers

Tools of the Trade: GDB

Tools of the Trade: Metasploit

Metasploit Frame work

User-Interface Modes

Metasploit: Environment

Environment: Global Environment

Environment: Temporary Environment

Metasploit: Options

Metasploit: Commands

Metasploit: Launching the Exploit

MetaSploit: Advanced Features

Tools of the Trade: Canvas

Tools of the Trade: CORE Impact

IMPACT Industrializes Penetration Testing

Ways to Use CORE IMPACT

Other IMPACT Benefits

ANATOMY OF A REAL-WORLD ATTACK

CLIENT SIDE EXPLOITS

Impact Demo Lab

back to top

 

LPT Methodology

LPT-Methodology

internet-security-icon2

Penetration Testing Methodologies

Customers and Legal Agreements

Rules of Engagement

Penetration Testing Planning and Scheduling

Pre Penetration Testing Checklist

Information Gathering

Vulnerability Analysis

External Penetration Testing

Internal Network Penetration Testing

Routers and Switches Penetration Testing

Firewall Penetration Testing

IDS Penetration Testing

Wireless Network Penetration Testing

Denial of Service Penetration Testing

Password Cracking Penetration Testing

Social Engineering Penetration Testing

Stolen Laptop, PDAs and Cell phones Penetration Testing

Application Penetration Testing

Physical Security Penetration Testing

Database Penetration testing

VoIP Penetration Testing

VPN Penetration Testing

War Dialing

Virus and Trojan Detection

Log Management Penetration Testing

File Integrity Checking

Blue Tooth and Hand held Device Penetration Testing

Telecommunication and Broadband Communication Penetration Testing

Email Security Penetration Testing

Security Patches Penetration Testing

Data Leakage Penetration Testing

Penetration Testing Deliverables and Conclusion

Penetration Testing Report and Documentation Writing

Penetration Testing Report Analysis

Post Testing Actions

Ethics of a Licensed Penetration Tester

Standards and Compliance

back to top

 


computer-security next step

lpt-network-adminstration

EC Council the world leader in ethical hacking training brings you Licensed Penetration Tester License. The Certified Ethical Hacker & Certified Security Analyst certifications are the base qualifications for a candidate to apply for the Licensed Penetration Tester, LPT.
For the Licensed Penetration Tester Application, click on the link below:
Licensed Penetration Tester

 

 

become an ethical hackerbecoma a forensic Investigator

become a secure computer userbecome an Enryption Specialist
become a network security administratorBecome a Network Defense Architect
 

sat-guaranteed

We are committed to providing our customers with the best service and products available.

100% satisfaction guarantee

why students prefer computek as the best training center in egypt new

1.Computek Training Center has trained over 1,000,000 trainees in Egypt and over 100,000 trainees in Middle East and africa.

2.Our programs are designed to meet our clients' training necessities including budget and time limitation.

3.We will cooperate with you to bring out effective programs fitting your organization.

4.Computek Training Center provides customer-focus training in mutable deliverymethods offering top quality training and high qualified instructor to meet individual learning styles and organization profession training.

5.Computek instructors are selected from the best of training professional instructors in Egypt who awarded the trust worthy certified international companies, Computek instructors not only provide superior education but also reliable work experience in the field of giving courses

6.Trainees prefer Computek Training Center not only due to our high quality training but also for our reasonable and cost-effective price list.

7.Computek Classroom is designed with cutting edge facilities strong from hardware and software technologies to the most sophisticated educational aids.

8.The information desk with our friendly and professional customers support representative is highly qualified to answer any questions and also deliver your unique requirements.

9.Computek Training Center staff is available 7 days in week from 10:00 AM to 10:00 PM to deal with any inquiries and assist student with anything they need.

10.Computek Training Center is partner of world's technology leads such as Microsoft, Cisco, Compatia, EC Council ,Adobe , Autodesk, prometric and Pearson VUE.

 
All Rights Reseved © Computekeg.com