ECSA Training In Baltimore
ECSA Online iLearn Self-Paced Course Description
The CSA exam is designed to test and validate a candidate’s comprehensive understanding of the jobs tasks required as a SOC analyst. Thereby validating their comprehensive understanding of a complete SOC workflow
Exam Eligibility Requirement
The CSA program requires a candidate to have 1 year of work experience in the Network Admin/ Security domain and should be able to provide proof of the same as validated through the application process unless the candidate attends official training
TARGET CANDIDATE
SOC Analysts (Tier I and Tier II)
Network and Security Administrators, Network and Security Engineers, Network Defense Analyst, Network Defense Technicians, Network Security Specialist, Network Security Operator, and any security professional handling network security operations
Cybersecurity Analyst
Entry-level cybersecurity professionals
Anyone who wants to become a SOC Analyst.
ECSA COURSE OUTLINE
Module 1 – Security Operations and Management
Module 2 – Understanding Cyber Threats, IoCs, and Attack Methodology
Module 3 – Incidents, Events, and Logging
Module 4 – Incident Detection with Security Information and Event Management (SIEM)
Module 5 – Enhanced Incident Detection with Threat Intelligence
Module 6 – Incident Response
Course Outline
Module 1 – Security Operations and Management
Module 2 – Understanding Cyber Threats, IoCs, and Attack Methodology
Module 3 – Incidents, Events, and Logging
Module 4 – Incident Detection with Security Information and Event Management (SIEM)
Module 5 – Enhanced Incident Detection with Threat Intelligence
Module 6 – Incident Response
ECSA Exam Voucher
- Vouchers are non-refundable and non-returnable.
- One voucher is applicable towards one exam.
- All vouchers, including any retakes, are valid for 12 months.
- Certification exam retirement dates supersede voucher expiration dates.
- Visit the EC-Council website for certification exam information.
Why ECSA Training
Despite best efforts to prevent breaches, many organizations are still being compromised. Therefore organizations must have, as part of their defense mechanisms, trained network engineers who are focused on protecting, detecting, and responding to the threats on their networks.