• Duration: 4 Months

Course Overview:

ESCA is penetration testing program that covers the tools and techiniquies you learned in the Certified Ethical HAcker course & teaches exploitation skills by applying the skills learnned in C|Eh & utilizing EC-Council’s published penetration testing methodology

Unlike most other penetration-testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pen testing requirements across different verticals.The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.

The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.

Learning Objectives

Target Audience

  • Ethical Hackers
  • Penetration Testers
  • Security Analysts
  • Security Engineers
  • Network Server Administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and
  • Risk Assessment Professionals.

Course Content

Lesson 1: Introduction To Penetration Testing And Methodologies

Lesson 2: Penetration Testing Scoping And Engagement Methodology

Lesson 3 Open Source Intelligence (OSINT) Methodology

Lesson 4: Social Engineering Penetration Testing Methodology

Lesson 5 Network Penetration Testing Methodology – External

Lesson 6: Network Penetration Testing Methodology – Internal

Lesson 7: Network Penetration Testing Methodology – Perimeter Devices

Lesson 8: Web Application Penetration Testing Methodology

Lesson 9: Database Penetration Testing Methodology

Lesson 10: Wireless Penetration Testing Methodology

Lesson 11: Cloud Penetration Testing Methodology

Lesson 12: Report Writing And Post Testing Actions


ENROLL NOW


ENROLL NOW

Retail Courses on Demand

What Client\’s Say

Testimonials

Imanche Victor AdeniyiATC Nigeria Read More
I am satisfied with the training offered here and the instructor. I look forward to having another training session with New Horizons.
Christian UdehAMCON Read More
The Excel training was well laid out and the facilitator was very versed, he used multiple scenarios to explain the concept. I am very glad to have chosen New Horizons for this training.
Hammed MuritalaMIS, IITA Read More
The training is very excellent and it will help me to identify and resolve some database problems.
Iroegbu BrightSAIPEM Read More
The course was helpful, interactive to know the fitment of business with IT service.
Vihishima J. TIOM Read More
The course was well taught and well understood.
Previous
Next

New Horizons Training Locations

Lagos Center

  •  

    ikeja@newhorizonsnigeria.com,
    gloria@newhorizonsnigeria.com

  •  

    08122690415 08125990663
    08122690443, 014537623

  •  

    1, Oba-Akran Road, (Adebayo Akande Centre),
    Ikeja, Lagos State.

Abuja Center

  •  

    olawaleogedengbe@newhorizonsnigeria.com

  •  

    08122690463, 07081626364

  •  

    Basement & 3rd Floor, Nigerian Reinsurance Building, Beside Unity Bank Headquarters,
    close to NNPC Towers, Herbert Macaulay Way, CBD, Abuja

Festac Contact

  •  

    anifowosesolomon@newhorizonsnigeria.com, olagunjuzainab@newhorizonsnigeria.com

  •  

    08122690409, 08122690485, 08030856880, 08129687431

  •  

    1st Avenue,Mr. BIGGS Building,
    Beside Polaris Bank, Festac, Lagos State

Lekki Contact

  •  

    ademolaallen@newhorizonsnigeria.com

    lekki@newhorizonsnigeria.com

  •  

    07015887034, 08125990586
    08125990674

  •  

    No 9, Otunba Adedoyin Ogungbe Crescent, Opposite ELIM Motors Lekki Phase 1,
    Lagos State.

Ikorodu Contact

  •  

    ethelalade@newhorizonsnigeria.com

  •  

    08125990562, 08127485821
    09078277980

  •  

    112, Lagos road, beside FIRS building,
    Haruna Bus stop, Ikorodu, Lagos State

Surulere Contact

  •  

    akinwaleabiodun@newhorizonsnigeria.com

  •  

    08125990567, 08125990584,
    08125990436, 08062265092,
    014537628

  •  

    148/150 Bode Thomas Street,
    Surulere, Lagos State.

  • Duration: 4 Months

Course Overview:

ESCA is penetration testing program that covers the tools and techiniquies you learned in the Certified Ethical HAcker course & teaches exploitation skills by applying the skills learnned in C|Eh & utilizing EC-Council’s published penetration testing methodology

Unlike most other penetration-testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pen testing requirements across different verticals.The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.

The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.

Learning Objectives

Target Audience

  • Ethical Hackers
  • Penetration Testers
  • Security Analysts
  • Security Engineers
  • Network Server Administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and
  • Risk Assessment Professionals.

Course Modules

 

Lesson 5 Network Penetration Testing Methodology – External

Lesson 6: Network Penetration Testing Methodology – Internal

Lesson 7: Network Penetration Testing Methodology – Perimeter Devices

Lesson 8: Web Application Penetration Testing Methodology

Lesson 9: Database Penetration Testing Methodology

Lesson 10: Wireless Penetration Testing Methodology

Lesson 11: Cloud Penetration Testing Methodology

Lesson 12: Report Writing And Post Testing Actions

 

 

 

Lesson 6: Network Penetration Testing Methodology – Internal

Lesson 7: Network Penetration Testing Methodology – Perimeter Devices

Lesson 8: Web Application Penetration Testing Methodology

Lesson 9: Database Penetration Testing Methodology

Lesson 10: Wireless Penetration Testing Methodology

Lesson 11: Cloud Penetration Testing Methodology

Lesson 12: Report Writing And Post Testing Actions

 

Lesson 7: Network Penetration Testing Methodology – Perimeter Devices

Lesson 8: Web Application Penetration Testing Methodology

Lesson 9: Database Penetration Testing Methodology

Lesson 10: Wireless Penetration Testing Methodology

Lesson 11: Cloud Penetration Testing Methodology

Lesson 12: Report Writing And Post Testing Actions

 

Lesson 8: Web Application Penetration Testing Methodology

Lesson 9: Database Penetration Testing Methodology

Lesson 10: Wireless Penetration Testing Methodology

Lesson 11: Cloud Penetration Testing Methodology

Lesson 12: Report Writing And Post Testing Actions

 

What Client\’s Say

Testimonials

Imanche Victor AdeniyiATC Nigeria

I am satisfied with the training offered here and the instructor. I look forward to having another training session with New Horizons.

Christian UdehAMCON 

The Excel training was well laid out and the facilitator was very versed, he used multiple scenarios to explain the concept. I am very glad to have chosen New Horizons for this training.

Hammed MuritalaMIS, IITA 

The training is very excellent and it will help me to identify and resolve some database problems.
Iroegbu BrightSAIPEM 

The course was helpful, interactive to know the fitment of business with IT service.

Vihishima J. TIOM 

The course was well taught and well understood.

What Client's Say

Testimonials