The ECSA pen-testing program takes the tools & techniques you learned in the Certified Ethical Hacker course & teaches exploitation skills by applying the skills learned in CEH & utilizing EC-Council’s published penetration testing methodology.
Penetration Testing Essential Concepts
Introduction to Penetration Testing and Methodologies
Penetration Testing Scoping and Engagement Methodology
Open-Source Intelligence (OSINT) Methodology
Social Engineering Penetration Testing Methodology
Network Penetration Testing Methodology – External
Network Penetration Testing Methodology – Internal