EC-Council Certified Security Analyst (ECSA)


EC-Council’s ECSA course and exam builds on the skillset gained in the Certified Ethical Hacker (CEH) training with an emphasis on how to apply that knowledge to the specialist area of penetration testing.

In stock

SKU: EC113177 Category:

EC-Council’s ECSA course and exam builds on the skillset gained in the Certified Ethical Hacker (CEH) training with an emphasis on how to apply that knowledge to the specialist area of penetration testing.

Professionals who need to continue their career development by gaining this certification need look no further as this is the only place in the UK and Ireland where you can undertake this official EC-Council accredited course. For further information, please see the EC-Council website.

Who Is It For?

This hands-on, online training has been developed with various roles in mind including ethical hackers, penetration testers, network server administrators, firewall administrators, security testers, system administrators and risk assessment professionals.

Why Should I Enrol?

ECSA certification is globally recognised in the field of hacking and penetration testing, covering the testing of modern infrastructures, operating systems and application environments.

Tools and techniques learned in CEH are built on to equip you with EC-Council’s published penetration methodology. The exam now requires candidates to submit a pentesting report. This makes ECSA a more rigorous and therefore more respected qualification.

The intensively practical learning experience is enhanced with EC-Council’s Cyber Range iLabs, which are designed to test every student’s practical competency. Not only do iLabs bring you up-to-date with the latest threats that organisations may be vulnerable to, they can also be accessed 24/7 so students can practise their skills in a safe and fully functional network any time they want to. Indeed, with 12 months’ access to the training and compatibility with Windows, Mac, iPhone, iPad and Android, study options are convenient and easy.

What Will I Learn?

The ECSAV9 penetration testing course is part of the Information Security Track of EC-Council. You will begin by covering security analysis and penetration testing methodologies before moving on to TCP IP packet analysis. Next you will explore pre-penetration testing steps, information gathering methodology and vulnerability analysis. Next you will learn about network penetration testing methodology in the realms of external, internal, firewall, IDS, web application, SQL, database, wireless network, mobile devices and cloud. You will complete your study by learning about report writing and post-test actions.

As the exam is designed to test candidates’ knowledge and application of critical penetration testing methodologies, the ability to perform real-world penetration testing over EC-Council’s secure cyber range and produce a penetration test report that clearly documents the vulnerabilities found is vital. This report will be graded by professionals, and only on submitting an acceptable report will learners be able to proceed to the multiple-choice exam that leads to the awarding of the ECSA credential.


As part of the Information Security Track of EC-Council, this certification is the professional level course that builds on the core level skillset gained in the Certified Ethical Hacker (CEH) credential. On achieving this professional certification, professionals can progress even further to the master-level certification of Licensed Penetration Tester.

Penetrate those previously-closed doors to a better career by signing up to EC-Council Certified Security Analyst (ECSA) today.

  • Security Analysis and Penetration Testing Methodologies
  • TCP IP Packet Analysis
  • Pre-penetration Testing Steps
  • Information Gathering Methodology
  • Vulnerability Analysis
  • External Network Penetration Testing Methodology
  • Internal Network Penetration Testing Methodology
  • Firewall Penetration Testing Methodology
  • IDS Penetration Testing Methodology
  • Web Application Penetration Testing Methodology
  • SQL Penetration Testing Methodology
  • Database Penetration Testing Methodology
  • Wireless Network Penetration Testing Methodology
  • Mobile Devices Penetration Testing Methodology
  • Cloud Penetration Testing Methodology
  • Report Writing and Post Test Actions