EC-Council Certified Security Analyst (ECSA)

The course specified is not currently on the VTEC Schedule.

Contact us to request a class: 1-866-644-8832.



COURSE TIMES: 9:00am - 4:30pm

Printable version of this course


ECSA is a globally accepted hacking and penetration testing program that covers the testing of modern infrastructures, operating systems, and application environments while teaching the students how to document and write a penetration testing report.

This program takes the tools and techniques covered in CEH to next level by utilizing EC-Council’s published penetration testing methodology.

• Test format: Multiple choice
• Number of Questions: 150
• Passing Score: 70%
• Test Duration: 4 Hours
Penetration testing:
• Complete ECSA Practical Cyber Range
Challenges in thirty Days
• Submit report within thirty Days completion of challenges
• Passing Criteria: 70 / 100 (Max)


Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals.

As a pre-requisite, you will be required to actually complete a penetration testing activity and submit a report to EC-Council before you will be allowed to attempt the ECSA V9 Exam.


This course is subject to meeting a minimum enrollment to run. This course may run as a virtual instructor live online course if a minimum enrollment is not met. Courseware, labs, and exam costs are not included in course cost. For more information, please contact: or call: 207.775.0244. VTEC is an EC-Council Accredited Training Center


Security Analysis and Penetration Testing Methodologies

TCP IP Packet Analysis

Pre-penetration Testing Steps

Information Gathering Methodology

Vulnerability Analysis

External Network Penetration Testing Methodology

Internal Network Penetration Testing Methodology

Firewall Penetration Testing Methodology
Firewall Penetration Testing Methodology

IDS Penetration Testing Methodology

Web Application Penetration Testing Methodology

SQL Penetration Testing Methodology

Database Penetration Testing Methodology

Wireless Network Penetration Testing Methodology

Mobile Devices Penetration Testing Methodology

Cloud Penetration Testing Methodology

Report Writing and Post Test Actions

What Will You Do – The ECSA ASSESSMENT
2 Sets of lab challenges
Practice labs, 45 labs.
Challenge Scenario, mimics an actual penetration test in an imaginary financial service company