SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Hackers are here. Where are you?
1
Analyze. Secure. Defend.
Do you hold ECSA credential?
CertifiedEC-Council
ASecurity Analyst
TM
CE S
Hackers are here. Where are you?
1
EC-Council Cyber Security Professional Path
CORE
EXPERT
MASTER
Certified
HEthical Hacker
TM
C E
Threat Agent
Application of
Methodology
”So You Can Do It?
......Prove It”
Discover and Exploit
Vulnerabilities Penetration Testing
Framework Report Writing
and Ethics
CertifiedEC-Council
ASecurity Analyst
TM
CE S L P TLicensed Penetration Tester
TM
Hackers are here. Where are you?
6
(ECSA)
Hackers are here. Where are you?
What is the EC-Council Security Analyst program?
2
You are an ethical hacker. In fact, you are a Certified Ethical Hacker. Your last name is Pwned. You dream
about enumeration and you can scan networks in your sleep. You have sufficient knowledge and an
arsenal of hacking tools and you are also proficient in writing custom hacking code.
Is that enough?
Can you become an industry accepted security professional? Will organizations hire you to help them
protect their systems? Do you have any knowledge in applying a suitable methodology to conduct a
penetration test for an enterprise client? Do you have any experience writing a custom penetration
testing report?
More importantly, do you have a globally recognized certification that can verify your penetration
testing capabilities?
If you are the person above, what you may be lacking is the knowledge and experience to execute a
successful penetration test according to accepted industry standards.
The ECSA is a security credential like no other! The ECSA course provides you with a real world hands-on
penetration testing experience and is a globally accepted hacking and penetration testing class
available that covers the testing of modern infrastructures, operating systems and application
environments while teaching the students how to document and write a penetration testing report.
The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker course
(CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in
the CEH by utilizing EC-Council’s published penetration testing methodology
It is a highly interactive, comprehensive, standards-based and methodology intensive training program
5-day security class which teaches information security professionals to conduct real life penetration
tests.
This course is the part of the Information SecurityTrack of EC-Council.This is a“Professional”level course,
with the Certified Ethical Hacker being the“Core”and the Licensed Penetration Tester being the“Master”
level certification.
Hackers are here. Where are you?
The iLabs Cyber Range
I Class
24x7
ECSA Class
As the ECSA course is a fully hands-on
program, the exercises cover real world
scenario. By practicing the skills that are
provided to you in the ECSA class, we are able
to bring you up to speed with the latest
threats that organizations may be vulnerable
to.
This can be achieved with the EC-Council
iLabs cyber range. It allows students to
dynamically access a host of Virtual Machines
preconfigured with vulnerabilities, exploits,
tools, and scripts from anywhere with an
internet connection.
Our web portal enables the student to launch
an entire range of target machines and access
them remotely with one simple click. It is the
most cost effective, easy to use, live range lab
solution available.
With iLabs, lab exercises can be accessed 24x7
allowing the student to practice skills in a safe,
fully functional network anytime it’s
convenient.
Our guided step-by-step labs include
exercises with detailed tasks, supporting tools,
and additional materials as well as our
state-of-the-art “Open Environment” allowing
students to launch a complete Live range
open for any form of hacking or testing.
Available target machines are completely
virtualized allowing us to control and reset
machines quickly and easily with no required
instructor or administrative interaction.
3
Hackers are here. Where are you?
4
Skills Based Competency
The ECSAV9 penetration testing course is designed to enhance the skills based competency
of a penetration tester. This course is intensively hands-on and a tremendous amount of
emphasis is placed on the practical competency of the student.
Unlike the previous version of ECSA exam, in the new ECSAv9, a student will only be allowed
to challenge the ECSA exam after meeting certain eligibility requirements.
To become eligible, a student must conduct a detailed penetration test through the
EC-Council Cyber Range iLabs environment and submit a written report via EC-Council’s
ASPEN system.
Only candidates that successfully complete the penetration test in the Cyber Range iLabs
environment are allowed to challenge the ECSA exam.
You will conduct a penetration test on a company that has various departments, subnets
and servers, and multiple operating systems with defense mechanisms architecture that
has both militarized and non-militarized zones.
The design of the course is such that the instructor in the class will actually take you through
the core concepts of conducting a penetration test based on EC-Council’s published
penetration testing methdology and guide you through the report writing process for this
organization.
What’s New in ECSA V9?
Hackers are here. Where are you?
9
Who Should Attend
Ethical Hackers, Penetration Testers Network server administrators, Firewall Administrators, Security Testers,
System Administrators and Risk Assessment professionals.
Duration
5 days (9:00 - 5:00)
Certification Exam
The ECSA exam aims to test a candidate’s knowledge and application of critical penetration testing
methodologies.
The exam requires a candidate to perform real-world penetration testing over EC-Council’s secure
cyber-range and to produce a penetration testing report which clearly document the vulnerabilities found.
This report will be graded by our professionals. Candidates that successfully submit an acceptable report will
proceed on to a multiple choice exam that tests a candidates knowledge.
Candidates that successfully submit an acceptable report and the pass the multiple choice exam will be
awarded the ECSA credential.
5
Hackers are here. Where are you?
10
Core Modules
What is the Outline of ECSA?
6
1. Security Analysis and Penetration Testing Methodologies
2. TCP IP Packet Analysis
3. Pre-penetration Testing Steps
4. Information Gathering Methodology
5. Vulnerability Analysis
6. External Network Penetration Testing Methodology
7. Internal Network Penetration Testing Methodology
8. Firewall Penetration Testing Methodology
9. IDS Penetration Testing Methodology
10. Web Application Penetration Testing Methodology
11. SQL Penetration Testing Methodology
12. Database Penetration Testing Methodology
13. Wireless Network Penetration Testing Methodology
14. Mobile Devices Penetration Testing Methodology
15. Cloud Penetration Testing Methodology
16. Report Writing and Post Test Actions
Hackers are here. Where are you?
11
Self-Study Modules
1. Password Cracking Penetration Testing
2. Router and Switches Penetration Testing
3. Denial-of-Service Penetration Testing
4. Stolen Laptop, PDAs and Cell Phones Penetration Testing
5. Source Code Penetration Testing
6. Physical Security Penetration Testing
7. Surveillance Camera Penetration Testing
8. VoIP Penetration Testing
9. VPN Penetration Testing
10. Virtual Machine Penetration Testing
11. War Dialing
12. Virus and Trojan Detection
13. Log Management Penetration Testing
14. File Integrity Checking
15. Telecommunication and Broadband Communication
Penetration Testing
16. Email Security Penetration Testing
17. Security Patches Penetration Testing
18. Data Leakage Penetration Testing
19. SAP Penetration Testing
20. Standards and Compliance
21. Information System Security Principles
22. Information System Incident Handling and Response
23. Information System Auditing and Certification
Note: Self-study modules are available in ASPEN portal
7
Hackers are here. Where are you?
8
GET CERTIFIED
ECSA v9 Exam Information
The ECSAv9 exam includes 2 required stages.
Report writing stage requires candidates to perform various penetration testing exercises on
EC-Council’s iLabs before submitting a pentest report to EC-Council for assessment. Candidates that
submit reports to the required standards will be provided with exam vouchers for the multiple choice
exam.
Multiple choice exams are proctored online through the EC-Council Exam portal or VUE:
Credit Towards Certification: ECSA v9
Number of Questions: 150
Passing Score: 70%
Test Duration: 4 hours
What Will You Do – The ECSA ASSESSMENT
The course comprises of 2 sets of lab challenges. Both are on the EC- Council ilabs Cyber Range.
The first set covers practise labs for each module. In all, there are 45 such labs in total.
The other is a Challenge Scenario which mimics an actual penetration test in an imaginary financial
service company. As a pre-requisite, you will be required to actually complete a penetration testing
activity and submit a report to EC-Council before you will be allowed to attempt the ECSAV9 Exam.
The Challenge Scenario
Brian works as a personal loan manager at FNB Financial Services which is a large multinational
consulting corporation, headquartered in Atlanta, U.S.A. FNB specializes in personal, home equity, and
debt consolidation loans around the world. Brian has been a trusted foot soldier for his organization for
over a decade and is reeled in to handle only high-profile cases. Since Brian mostly telecommutes with
his overseas clientele, he relies heavily on the network infrastructure of his organization.
Infrastructure Available to Brian
Like any large organization, FNB’s internal network consists of several subnets housing various
organizational units.The front office is connected to a separate subnet which connects to the company’s
public-facing computers. The company has installed various kiosks to help customers understand their
product and services. The front office also has a Wi-Fi connectivity to cater users who carry their own
smartphones and laptops.
The FNB’s internal network is made up of Militarized and Demilitarized Zones connected with a huge
pool of database servers in Database Zone. As a security precaution, and by design, all the internal
resource zones are configured with different subnet IPs. The militarized zone houses the application
servers that provide application frameworks for various departments of the organization.
Hackers are here. Where are you?
9
The Demilitarized Zone contains public facing systems of the organization such as web and mail servers.
FNB headquarters’ network topology and protocols are replicated around the world in all its satellite
offices for easy communication with the headquarters.
Brian’s Predicament
Brian is all set to present a loan consolidation plan to one of his biggest client from Japan. Mr. Takamashi,
client’s representative, has agreed for a video conference to go over and discuss Brian’s proposal. Half an
hour before the call, Brian switches on his laptop which is connected to the company’s Wi-Fi and LAN, to
make last minute tweaks in his proposal. To his horror he finds all his files gone. The hard drive of his
laptop had been wiped clean with just one file sitting in there titled, “Gothcha!” Brian obviously had to
postpone his call with the client which he knew did not go down well. He called the network admin of
FNB to take a look at his computer. To his surprise the network admin informed him that this was
something that employees of FNB were facing throughout the world.
Computers of FNB employees around the world were systematically being victimized by rampant
hacking. The hacking was not only widespread, but was being executed so flawlessly that the attackers,
after compromising a system, stole everything of value and completely erased their tracks within 20
minutes.
Brian immediately brought this to the notice of the top management. Understandably they were
concerned about their network and the reputation of their organization. The sheer volume of systems
hacked was an alarming revelation for them.
The management has decided to seek the service of a penetration tester or security auditor to audit their
networks for security vulnerabilities in order to avoid future attacks.
FNB has identified you as a third-party penetration tester to perform the pen testing of their information
infrastructure. Your challenge is to perform a thorough pen test so that people like Brian don’t have to
cancel their business calls in future.
Hackers are here. Where are you?
22
EC-Council
Hackers are here. Where are you?
101 C Sun Ave NE
Albuquerque, NM 87109
http://www.eccouncil.org
Email: ecsaexam@eccouncil.org

Contenu connexe

Tendances

Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingAmine SAIGHI
 
N3XAsec CPTE plan de estudios detallado
N3XAsec CPTE plan de estudios detalladoN3XAsec CPTE plan de estudios detallado
N3XAsec CPTE plan de estudios detalladoRafael Seg
 
Scalable threat modelling with risk patterns
Scalable threat modelling with risk patternsScalable threat modelling with risk patterns
Scalable threat modelling with risk patternsStephen de Vries
 
AppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security AgileAppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security AgileOleg Gryb
 
Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudTjylen Veselyj
 
Why should developers care about container security?
Why should developers care about container security?Why should developers care about container security?
Why should developers care about container security?Eric Smalling
 
Frugal - Web Application Penetration Testing
Frugal - Web Application Penetration TestingFrugal - Web Application Penetration Testing
Frugal - Web Application Penetration Testingharshal chandorkar
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patternsStephen de Vries
 
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"Nazar Tymoshyk, CEH, Ph.D.
 
Network Security Open Source Software Developer Certification
Network Security Open Source Software Developer CertificationNetwork Security Open Source Software Developer Certification
Network Security Open Source Software Developer CertificationVskills
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information securityAnant Shrivastava
 
Server Side Template Injection by Mandeep Jadon
Server Side Template Injection by Mandeep JadonServer Side Template Injection by Mandeep Jadon
Server Side Template Injection by Mandeep JadonMandeep Jadon
 
[OPD 2019] Life after pentest
[OPD 2019] Life after pentest[OPD 2019] Life after pentest
[OPD 2019] Life after pentestOWASP
 

Tendances (14)

Web application Testing
Web application TestingWeb application Testing
Web application Testing
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
N3XAsec CPTE plan de estudios detallado
N3XAsec CPTE plan de estudios detalladoN3XAsec CPTE plan de estudios detallado
N3XAsec CPTE plan de estudios detallado
 
Scalable threat modelling with risk patterns
Scalable threat modelling with risk patternsScalable threat modelling with risk patterns
Scalable threat modelling with risk patterns
 
AppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security AgileAppSec California 2016 - Making Security Agile
AppSec California 2016 - Making Security Agile
 
Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the Cloud
 
Why should developers care about container security?
Why should developers care about container security?Why should developers care about container security?
Why should developers care about container security?
 
Frugal - Web Application Penetration Testing
Frugal - Web Application Penetration TestingFrugal - Web Application Penetration Testing
Frugal - Web Application Penetration Testing
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patterns
 
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
 
Network Security Open Source Software Developer Certification
Network Security Open Source Software Developer CertificationNetwork Security Open Source Software Developer Certification
Network Security Open Source Software Developer Certification
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
Server Side Template Injection by Mandeep Jadon
Server Side Template Injection by Mandeep JadonServer Side Template Injection by Mandeep Jadon
Server Side Template Injection by Mandeep Jadon
 
[OPD 2019] Life after pentest
[OPD 2019] Life after pentest[OPD 2019] Life after pentest
[OPD 2019] Life after pentest
 

Similaire à EC-Council Certified Security Analyst Program

Cehv10 Complete Details - brochure
Cehv10 Complete Details - brochureCehv10 Complete Details - brochure
Cehv10 Complete Details - brochureHBServices7
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCRAW CYBER SECURITY PVT LTD
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseMercury Solutions Limited
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?ITpreneurs
 
ethical hacking
ethical hackingethical hacking
ethical hackingarnoldog1
 
Certified_Ethical_Hacker_Training ppt.pdf
Certified_Ethical_Hacker_Training ppt.pdfCertified_Ethical_Hacker_Training ppt.pdf
Certified_Ethical_Hacker_Training ppt.pdfScode Network Institute
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
cyber_security_syllabus .pdf | scode network institute
cyber_security_syllabus .pdf | scode network institutecyber_security_syllabus .pdf | scode network institute
cyber_security_syllabus .pdf | scode network instituteScode Network Institute
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academyamallblitz0
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academyananthakrishnansblit
 
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.cnetworks
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.cnetworks
 
Security Operation Centre Specialist Course Content
Security Operation Centre Specialist Course ContentSecurity Operation Centre Specialist Course Content
Security Operation Centre Specialist Course ContentInfosec train
 

Similaire à EC-Council Certified Security Analyst Program (20)

Ecsa LPT V8 brochure
Ecsa LPT V8 brochureEcsa LPT V8 brochure
Ecsa LPT V8 brochure
 
Cehv10 Complete Details - brochure
Cehv10 Complete Details - brochureCehv10 Complete Details - brochure
Cehv10 Complete Details - brochure
 
Ce hv10 brochure
Ce hv10 brochureCe hv10 brochure
Ce hv10 brochure
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
 
Ecsa Course
Ecsa CourseEcsa Course
Ecsa Course
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
 
ceh pdf work.pdf
ceh pdf work.pdfceh pdf work.pdf
ceh pdf work.pdf
 
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
EC-Council Certified Ethical Hacker (CEH) v9 - Hackers are here. Where are you?
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Certified_Ethical_Hacker_Training ppt.pdf
Certified_Ethical_Hacker_Training ppt.pdfCertified_Ethical_Hacker_Training ppt.pdf
Certified_Ethical_Hacker_Training ppt.pdf
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
cyber_security_syllabus .pdf | scode network institute
cyber_security_syllabus .pdf | scode network institutecyber_security_syllabus .pdf | scode network institute
cyber_security_syllabus .pdf | scode network institute
 
Ce hv8 module 00
Ce hv8 module 00Ce hv8 module 00
Ce hv8 module 00
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
 
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
 
MyResume.pdf
MyResume.pdfMyResume.pdf
MyResume.pdf
 
Security Operation Centre Specialist Course Content
Security Operation Centre Specialist Course ContentSecurity Operation Centre Specialist Course Content
Security Operation Centre Specialist Course Content
 

Plus de ITpreneurs

CCC-Internet of Things Foundation
CCC-Internet of Things FoundationCCC-Internet of Things Foundation
CCC-Internet of Things FoundationITpreneurs
 
TOGAF Portfolio from ITpreneurs
TOGAF Portfolio from ITpreneursTOGAF Portfolio from ITpreneurs
TOGAF Portfolio from ITpreneursITpreneurs
 
How ITpreneurs enables training providers to offer quality DevOps training pr...
How ITpreneurs enables training providers to offer quality DevOps training pr...How ITpreneurs enables training providers to offer quality DevOps training pr...
How ITpreneurs enables training providers to offer quality DevOps training pr...ITpreneurs
 
The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)ITpreneurs
 
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps SkillsITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps SkillsITpreneurs
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9ITpreneurs
 
Step by Step Guide
Step by Step Guide Step by Step Guide
Step by Step Guide ITpreneurs
 
Why SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersWhy SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersITpreneurs
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
Enterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneursEnterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneursITpreneurs
 
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...ITpreneurs
 
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...ITpreneurs
 
[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).ITpreneurs
 
EC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU ProgramEC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU ProgramITpreneurs
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsITpreneurs
 
ITpreneurs Corporate Brochure
ITpreneurs Corporate BrochureITpreneurs Corporate Brochure
ITpreneurs Corporate BrochureITpreneurs
 
10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneursITpreneurs
 
PRINCE2®とPMBOK・ITIL®の比較
PRINCE2®とPMBOK・ITIL®の比較PRINCE2®とPMBOK・ITIL®の比較
PRINCE2®とPMBOK・ITIL®の比較ITpreneurs
 
Agile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky BusinessAgile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky BusinessITpreneurs
 

Plus de ITpreneurs (20)

CCC-Internet of Things Foundation
CCC-Internet of Things FoundationCCC-Internet of Things Foundation
CCC-Internet of Things Foundation
 
TOGAF Portfolio from ITpreneurs
TOGAF Portfolio from ITpreneursTOGAF Portfolio from ITpreneurs
TOGAF Portfolio from ITpreneurs
 
How ITpreneurs enables training providers to offer quality DevOps training pr...
How ITpreneurs enables training providers to offer quality DevOps training pr...How ITpreneurs enables training providers to offer quality DevOps training pr...
How ITpreneurs enables training providers to offer quality DevOps training pr...
 
The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)The Sky Is The Limit (CCC)
The Sky Is The Limit (CCC)
 
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps SkillsITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
ITpreneurs’ DevOps Portfolio- Professionalizing DevOps Skills
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
Step by Step Guide
Step by Step Guide Step by Step Guide
Step by Step Guide
 
Why SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersWhy SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking Careers
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Enterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneursEnterprise Architecture Courseware by ITpreneurs
Enterprise Architecture Courseware by ITpreneurs
 
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
[Infographic] Top 10 Reasons Why You and Your IT Organization Should Adopt Ke...
 
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
[Infographic] Top 5 Reasons To Become a Licensed Kepner-Tregoe Foundation Tra...
 
[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).[Infographic] How Simulations accelerate change management (5 stages).
[Infographic] How Simulations accelerate change management (5 stages).
 
EC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU ProgramEC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU Program
 
IT4IT™
IT4IT™IT4IT™
IT4IT™
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and Certifications
 
ITpreneurs Corporate Brochure
ITpreneurs Corporate BrochureITpreneurs Corporate Brochure
ITpreneurs Corporate Brochure
 
10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs10 Questions Any Training Business Should Answer - by ITpreneurs
10 Questions Any Training Business Should Answer - by ITpreneurs
 
PRINCE2®とPMBOK・ITIL®の比較
PRINCE2®とPMBOK・ITIL®の比較PRINCE2®とPMBOK・ITIL®の比較
PRINCE2®とPMBOK・ITIL®の比較
 
Agile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky BusinessAgile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky Business
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Dernier (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

EC-Council Certified Security Analyst Program

  • 1. Hackers are here. Where are you? 1 Analyze. Secure. Defend. Do you hold ECSA credential? CertifiedEC-Council ASecurity Analyst TM CE S
  • 2. Hackers are here. Where are you? 1 EC-Council Cyber Security Professional Path CORE EXPERT MASTER Certified HEthical Hacker TM C E Threat Agent Application of Methodology ”So You Can Do It? ......Prove It” Discover and Exploit Vulnerabilities Penetration Testing Framework Report Writing and Ethics CertifiedEC-Council ASecurity Analyst TM CE S L P TLicensed Penetration Tester TM
  • 3. Hackers are here. Where are you? 6 (ECSA)
  • 4. Hackers are here. Where are you? What is the EC-Council Security Analyst program? 2 You are an ethical hacker. In fact, you are a Certified Ethical Hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep. You have sufficient knowledge and an arsenal of hacking tools and you are also proficient in writing custom hacking code. Is that enough? Can you become an industry accepted security professional? Will organizations hire you to help them protect their systems? Do you have any knowledge in applying a suitable methodology to conduct a penetration test for an enterprise client? Do you have any experience writing a custom penetration testing report? More importantly, do you have a globally recognized certification that can verify your penetration testing capabilities? If you are the person above, what you may be lacking is the knowledge and experience to execute a successful penetration test according to accepted industry standards. The ECSA is a security credential like no other! The ECSA course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report. The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology It is a highly interactive, comprehensive, standards-based and methodology intensive training program 5-day security class which teaches information security professionals to conduct real life penetration tests. This course is the part of the Information SecurityTrack of EC-Council.This is a“Professional”level course, with the Certified Ethical Hacker being the“Core”and the Licensed Penetration Tester being the“Master” level certification.
  • 5. Hackers are here. Where are you? The iLabs Cyber Range I Class 24x7 ECSA Class As the ECSA course is a fully hands-on program, the exercises cover real world scenario. By practicing the skills that are provided to you in the ECSA class, we are able to bring you up to speed with the latest threats that organizations may be vulnerable to. This can be achieved with the EC-Council iLabs cyber range. It allows students to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection. Our web portal enables the student to launch an entire range of target machines and access them remotely with one simple click. It is the most cost effective, easy to use, live range lab solution available. With iLabs, lab exercises can be accessed 24x7 allowing the student to practice skills in a safe, fully functional network anytime it’s convenient. Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing students to launch a complete Live range open for any form of hacking or testing. Available target machines are completely virtualized allowing us to control and reset machines quickly and easily with no required instructor or administrative interaction. 3
  • 6. Hackers are here. Where are you? 4 Skills Based Competency The ECSAV9 penetration testing course is designed to enhance the skills based competency of a penetration tester. This course is intensively hands-on and a tremendous amount of emphasis is placed on the practical competency of the student. Unlike the previous version of ECSA exam, in the new ECSAv9, a student will only be allowed to challenge the ECSA exam after meeting certain eligibility requirements. To become eligible, a student must conduct a detailed penetration test through the EC-Council Cyber Range iLabs environment and submit a written report via EC-Council’s ASPEN system. Only candidates that successfully complete the penetration test in the Cyber Range iLabs environment are allowed to challenge the ECSA exam. You will conduct a penetration test on a company that has various departments, subnets and servers, and multiple operating systems with defense mechanisms architecture that has both militarized and non-militarized zones. The design of the course is such that the instructor in the class will actually take you through the core concepts of conducting a penetration test based on EC-Council’s published penetration testing methdology and guide you through the report writing process for this organization. What’s New in ECSA V9?
  • 7. Hackers are here. Where are you? 9 Who Should Attend Ethical Hackers, Penetration Testers Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals. Duration 5 days (9:00 - 5:00) Certification Exam The ECSA exam aims to test a candidate’s knowledge and application of critical penetration testing methodologies. The exam requires a candidate to perform real-world penetration testing over EC-Council’s secure cyber-range and to produce a penetration testing report which clearly document the vulnerabilities found. This report will be graded by our professionals. Candidates that successfully submit an acceptable report will proceed on to a multiple choice exam that tests a candidates knowledge. Candidates that successfully submit an acceptable report and the pass the multiple choice exam will be awarded the ECSA credential. 5
  • 8. Hackers are here. Where are you? 10 Core Modules What is the Outline of ECSA? 6 1. Security Analysis and Penetration Testing Methodologies 2. TCP IP Packet Analysis 3. Pre-penetration Testing Steps 4. Information Gathering Methodology 5. Vulnerability Analysis 6. External Network Penetration Testing Methodology 7. Internal Network Penetration Testing Methodology 8. Firewall Penetration Testing Methodology 9. IDS Penetration Testing Methodology 10. Web Application Penetration Testing Methodology 11. SQL Penetration Testing Methodology 12. Database Penetration Testing Methodology 13. Wireless Network Penetration Testing Methodology 14. Mobile Devices Penetration Testing Methodology 15. Cloud Penetration Testing Methodology 16. Report Writing and Post Test Actions
  • 9. Hackers are here. Where are you? 11 Self-Study Modules 1. Password Cracking Penetration Testing 2. Router and Switches Penetration Testing 3. Denial-of-Service Penetration Testing 4. Stolen Laptop, PDAs and Cell Phones Penetration Testing 5. Source Code Penetration Testing 6. Physical Security Penetration Testing 7. Surveillance Camera Penetration Testing 8. VoIP Penetration Testing 9. VPN Penetration Testing 10. Virtual Machine Penetration Testing 11. War Dialing 12. Virus and Trojan Detection 13. Log Management Penetration Testing 14. File Integrity Checking 15. Telecommunication and Broadband Communication Penetration Testing 16. Email Security Penetration Testing 17. Security Patches Penetration Testing 18. Data Leakage Penetration Testing 19. SAP Penetration Testing 20. Standards and Compliance 21. Information System Security Principles 22. Information System Incident Handling and Response 23. Information System Auditing and Certification Note: Self-study modules are available in ASPEN portal 7
  • 10. Hackers are here. Where are you? 8 GET CERTIFIED ECSA v9 Exam Information The ECSAv9 exam includes 2 required stages. Report writing stage requires candidates to perform various penetration testing exercises on EC-Council’s iLabs before submitting a pentest report to EC-Council for assessment. Candidates that submit reports to the required standards will be provided with exam vouchers for the multiple choice exam. Multiple choice exams are proctored online through the EC-Council Exam portal or VUE: Credit Towards Certification: ECSA v9 Number of Questions: 150 Passing Score: 70% Test Duration: 4 hours What Will You Do – The ECSA ASSESSMENT The course comprises of 2 sets of lab challenges. Both are on the EC- Council ilabs Cyber Range. The first set covers practise labs for each module. In all, there are 45 such labs in total. The other is a Challenge Scenario which mimics an actual penetration test in an imaginary financial service company. As a pre-requisite, you will be required to actually complete a penetration testing activity and submit a report to EC-Council before you will be allowed to attempt the ECSAV9 Exam. The Challenge Scenario Brian works as a personal loan manager at FNB Financial Services which is a large multinational consulting corporation, headquartered in Atlanta, U.S.A. FNB specializes in personal, home equity, and debt consolidation loans around the world. Brian has been a trusted foot soldier for his organization for over a decade and is reeled in to handle only high-profile cases. Since Brian mostly telecommutes with his overseas clientele, he relies heavily on the network infrastructure of his organization. Infrastructure Available to Brian Like any large organization, FNB’s internal network consists of several subnets housing various organizational units.The front office is connected to a separate subnet which connects to the company’s public-facing computers. The company has installed various kiosks to help customers understand their product and services. The front office also has a Wi-Fi connectivity to cater users who carry their own smartphones and laptops. The FNB’s internal network is made up of Militarized and Demilitarized Zones connected with a huge pool of database servers in Database Zone. As a security precaution, and by design, all the internal resource zones are configured with different subnet IPs. The militarized zone houses the application servers that provide application frameworks for various departments of the organization.
  • 11. Hackers are here. Where are you? 9 The Demilitarized Zone contains public facing systems of the organization such as web and mail servers. FNB headquarters’ network topology and protocols are replicated around the world in all its satellite offices for easy communication with the headquarters. Brian’s Predicament Brian is all set to present a loan consolidation plan to one of his biggest client from Japan. Mr. Takamashi, client’s representative, has agreed for a video conference to go over and discuss Brian’s proposal. Half an hour before the call, Brian switches on his laptop which is connected to the company’s Wi-Fi and LAN, to make last minute tweaks in his proposal. To his horror he finds all his files gone. The hard drive of his laptop had been wiped clean with just one file sitting in there titled, “Gothcha!” Brian obviously had to postpone his call with the client which he knew did not go down well. He called the network admin of FNB to take a look at his computer. To his surprise the network admin informed him that this was something that employees of FNB were facing throughout the world. Computers of FNB employees around the world were systematically being victimized by rampant hacking. The hacking was not only widespread, but was being executed so flawlessly that the attackers, after compromising a system, stole everything of value and completely erased their tracks within 20 minutes. Brian immediately brought this to the notice of the top management. Understandably they were concerned about their network and the reputation of their organization. The sheer volume of systems hacked was an alarming revelation for them. The management has decided to seek the service of a penetration tester or security auditor to audit their networks for security vulnerabilities in order to avoid future attacks. FNB has identified you as a third-party penetration tester to perform the pen testing of their information infrastructure. Your challenge is to perform a thorough pen test so that people like Brian don’t have to cancel their business calls in future.
  • 12. Hackers are here. Where are you? 22 EC-Council Hackers are here. Where are you? 101 C Sun Ave NE Albuquerque, NM 87109 http://www.eccouncil.org Email: ecsaexam@eccouncil.org