Thursday, December 20, 2018

EC-Council’s New Version ECSA V10


A professional level pen testing program is the demand of the day in any of the organizations.
 
To attain this professional level skills, the core curricula of the certification professional gains must map with it and is anticipated to be in compliance with Government and the industry published frameworks.
 
Evidently, EC-Council new release, ECSA v10 curricula exactly present the comprehensive methodologies that match with the pentesting requirements across varied industrial segments.
 
Let’s explore what’s new in version: ECSA v10



The new ECSA v10 has the updated curricula in alignment with the industry recognized penetration testing methodology. It elevates the participant’s ability to apply new skills, provides a deeper understanding of Web Application Penetration Testing, Internal Network Testing, Password Cracking, Web Application Penetration Testing, and so forth.  
 
In correspondence with the new updates of CEH v10 program, the ECSA v10 program has been re-engineered as a progression. This 5-day intensive course is highly interactive, standard based, and helps the security professionals to know the real-life penetration testing.
 
Further, the participants who clear the knowledge exam have an option to pursue practical exam that enables them to test the skills and earn ECSA [Practical] credential.
 
Mention not to say, it forms the “Professional” level course in the VAPT Track of EC-Council.
 

Highlights of ECSA v10:
 

1.Compliant with NICE 2.0 Framework:
 

ECSAv10 maps with NICE framework’s Analyze (AN) and Collect and Operate (CO) specialty area.
 

2. New Module:


Social Engineering Pen Testing Methodology: The 2017 Verizon Data BreachInvestigation Report states that 43% of the documented breaches are due to social engineering attacks. As a compensatory and preventive effort to fill the huge gap, this ECSA v10 program comprehensively covers the pentesting domain.
 

3. An Insight into Methodologies:
 

It focuses on the methodologies like Network, Database, Wireless, Web Application, Cloud pen testing, and, etc. The methodologies are as best as from ISO 27001, OSSTMM, and NIST Standards.
 

4. A perfect blend of manual and automated testing approach:
 

It is evident that manual testing complements with the automated ones. Human intervention is as necessary as the automated tools. For instance: Logic testing.
 
The testing approach here combines both of them to derive maximum benefit.
 

5. Designed depending on the most common testing services:
 

The penetration testing methodologies are designed as per the market approach which includes
 
·         Network Penetration Testing
·         Web Application Penetration Testing
·         Social Engineering Penetration Testing
·         Wireless Penetration Testing
·         Cloud Penetration Testing
·         Database Penetration Testing
 

6. Presents an engagement methodology:
 

A module is completely dedicated to alert the pre-engagement activities, initiate and set the Rule of Engagement [RoE] for the penetration test.
 

7. Guidance for Report Writing:
 

Just like for engagement methodology, a module is dedicated to report writing too. It describes the needed skills to draft the test report in such a way that the findings of the test are agreeable and justifiable to the concerned client.
 

8. Hands-on Labs:
 

This course helps the participants to have a direct experience on penetration testing process starting from scoping to report writing.
 

9. Standard Templates:
 

The course offers a bundle of standard templates essential for scoping, engagement process, collecting, and report writing and makes the participant’s learning easier.
 

Moving forward, let us have a brief comparison of the EC-Council products CEH v10 and ECSA v10.


As a known fact, ECSA is the learning progress in continuation of the CEH program. Built on the skills and abilities covered in new CEH v10 program, it takes the tools learned over there as a practical challenge.
 
Some of the main differentiation have been tabulated below for your easy reference.

CEH v10
ECSA v10
Core level in the VAPT Track
A Professional level in the VAPT Track
Learn Baseline Skills
Learn Advanced Skills
Learn about the tools used
Learn more tools
Learn to defend against
Conduct Penetration Testing Methodologies
Can be compared to ‘A Soldier’ ie. it refers to dodging a bullet
Can be compared to ‘The General’ ie. it refers to expertise the Art of War


Let us continue further and know about the course in detail.
 

Course Outline:
 

The course outline is enlisted below:
 
·         Introduction to Penetration Testing and Methodologies
·         Penetration Testing Scoping and Engagement Methodology
·         Open Source Intelligence (OSINT) Methodology
·         Social Engineering Penetration Testing Methodology
·         Network Penetration Testing Methodology - External
·         Network Penetration Testing Methodology - Internal
·         Network Penetration Testing Methodology - Perimeter Devices
·         Web Application Penetration Testing Methodology
·         Database Penetration Testing Methodology
·         Wireless Penetration Testing Methodology
·         Cloud Penetration Testing Methodology
·         Report Writing and Post Testing Actions
 

Intended Audience:
 

The target audience for this course are as follows:
 
·         Ethical Hackers
·         Penetration Testers
·         Security Analysts
·         Security Engineers
·         Network Server Administrators
·         Firewall Administrators
·         Security Testers
·         System Administrators
·         Risk Assessment Professionals
 

Self-study Modules:
 

·         Penetration Testing Essential Concepts
·         Password Cracking Penetration Testing
·         Denial-of-Service Penetration Testing
·         Stolen Laptop, PDAs and Cell Phones Penetration Testing
·         Source Code Penetration Testing
·         Physical Security Penetration Testing
·         Surveillance Camera Penetration Testing
·         VoIP Penetration Testing
·         VPN Penetration Testing
·         Virtual Machine Penetration Testing
·         War Dialing
·         Virus and Trojan Detection
·         Log Management Penetration Testing
·         File Integrity Checking
·         Telecommunication and Broadband Communication Penetration Testing
·         Email Security Penetration Testing
·         Security Patches Penetration Testing
·         Data Leakage Penetration Testing
·         SAP Penetration Testing
·         Standards and Compliance
·         Information System Security Principles
·         Information System Incident Handling and Response
·         Information System Auditing and Certification

Prerequisites:

ECSA Exam

·         Attend Training through EC-Council Accredited Training Center
·         Possess a minimum of 2 years of experience in related Infosec domain


No comments:

Post a Comment

Which Python course is best for beginners?

Level Up Your Python Prowess: Newbie Ninjas: Don't fret, little grasshoppers! Courses like "Learn Python 3" on Codecade...