EC Council Certified Security Analyst

by NobleProg MEA

This course concludes with students conducting a penetration test on a firm that has different departments, servers and subnets, and operating systems with a defense mechanisms architecture that comes with both militarized and non-militarize

AED 15498

Contact the Institutes

Fill this form
NobleProg MEA Logo

img Duration

5 Days

Course Details

This program concludes with students conducting a penetration test on a firm that has different departments, servers and subnets, and operating systems with a defense mechanisms architecture that comes with both militarized and non-militarized zones.

Outline

- Security Analysis 

- Penetration Testing Methodologies
- Pre-penetration Testing Steps
- TCP IP Packet Analysis 
- Information Gathering Methodology
- External Network Penetration Testing Methodology
- Internal Network Penetration Testing Methodology
- Vulnerability Analysis
- Firewall Penetration Testing Methodology
- Web Application Penetration Testing Methodology
- DS Penetration Testing Methodology 
- SQL Penetration Testing Methodology
- Database Penetration Testing Methodology
- Mobile Devices Penetration Testing Methodology
- Wireless Network Penetration Testing Methodology
- Report Writing and Post Test Actions

- Cloud Penetration Testing Methodology 

Note: Outline is subject to change.

NobleProg is a leading IT training and consultancy provider that has branches all over the globe in different countries. NobleProg offers an extensive selection of vendor-authorized certifications and training. The vendors include some of the biggest names in the industry like;

  • Microsoft
  •  Adobe
  • VMware
  • Citrix
  • Cisco
  • CompTia
  • Oracle
  • And many more

 

These partnerships allow NobleProg to deliver the most up-to-date curriculum with specific standards set in alignment with these top vendors. NobleProg offers all sorts of training options to the individuals and business community ranging from instructor-led classes to private, online and on-site training opportunity.

Led by qualified, experienced and certified instructors, NobleProg is the place to turn raw ambitions into tangible result through personal and career development in your respective field. 

 

Approved By: 

  • KHDA (Knowledge and Human Development Authority)
  • Bur Dubai Branch

    Khalid Bin Walid Street, Bur Dubai, Dubai

2 Reviews

  • 0

    (Institute Review)

    55 years ago

    0
  • (Institute Review)

    55 years ago

Submit Your Course Review (For Enrolled Students Only)

This form is for submitting course reviews only. If you have questions about the course, please use the Ask Us? form.

Check out more Cybersecurity courses in UAE

Learnovate Training Center Logo

Fortinet FortiGate Training

Fortinet Firewall encompasses one of the best firewalls in the Network Security industry. Fortinet’s next-generation firewalls (NGFWs) play the task of filtering network traffic for protecting an organization from external and internal threats.

by Learnovate Training Center
Mesk Management Sciences Institute Logo

Certified Security Compliance Specialist (CSCS)

'Certified Security Compliance Specialist' training is offered by Mesk Management Sciences Institute. Kindly contact us to inquire and find out about the schedule and complete outline.

by Mesk Management Sciences Institute
LEORON Institute Logo

Cyber Security Fundamentals

The ISACA Cybersecurity Fundamentals and Career Development Course is designed to offer insight into the importance of cybersecurity and the integral role of cybersecurity professionals.

by LEORON Institute
Mesk Management Sciences Institute Logo

Certified Information Security Specialist

'Certified Information Security Specialist' training is offered by Mesk Management Sciences Institute. Kindly contact us to inquire and find out about the schedule and complete outline.

by Mesk Management Sciences Institute
G-TEC Education Institute Logo

Cyber Security

The Cyber Security Essentials Course at G-TEC Education Institute in Dubai is a comprehensive program designed to equip individuals with the essential knowledge and skills to safeguard digital assets and counteract cyber threats. In a world

by G-TEC Education Institute

© 2025 www.coursetakers.ae All Rights Reserved. Terms and Conditions of use | Privacy Policy