CG数据库 >> Certified Security Analyst Training

Certified Security Analyst Training的图片1

Certified Security Analyst Training

HDRips | MP4/AVC, ~1100 kb/s | 1280x720 | Duration: 39 hours | English: AAC, 160 kb/s (2 ch) | 14.9 GB

Genre: Development / Programming / Security / Hacking

Learn penetration testing methodologies while preparing for the CSAT certifications. The Certified Security Analyst Training (CSAT) program teaches information security professionals to conduct realistic penetration tests.

The Certified Security Analyst “pen testing” program is a computer security certification designed to teach Information Security Professionals the advanced uses of the available methodologies, tools and techniques expected from a premier ethical hacking training and are required to perform comprehensive information security pen tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the Licensed Penetration Tester, LPT methodology and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify Information Security problems in this ethical hacking training certification course, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.

COURSE CURRICULUM

1. CSAT - Need for Security Analysis

2. TCP IP Packet Analysis

3. Penetration Testing Methodologies

4. Customer and Legal Agreements

5. Rules of Engagement

6. Penetration Testing Planning & Scheduling

7. Pre Penetration Testing Steps

8. Information Gathering

9. Vulnerability Analysis

10. External Penetration Testing

11. Internal Network Penetration Testing

12. Firewall Penetration Testing

13. Intrusion Detection System (IDS) Testing

14. Password Cracking Penetration Testing

15. Social Engineering Penetration Testing

16. Web Application Penetration Testing

17. SQL Penetration Testing

18. Penetration Testing Reports & Post Testing Actions

19. Database Penetration Testing

20. Wireless Network Penetration Testing

21. Mobile Devices Penetration Testing

22. Cloud Penetration Testing Methodology

Certified Security Analyst Training的图片2

Certified Security Analyst Training的图片3

发布日期: 2016-06-15