Beruflich Dokumente
Kultur Dokumente
ECSA/LPT
Instructor Guide
http://www.eccouncil.org
http://www.eccouncil.org
EC-Council
EC-Council
R AT I
O
N
ET
N
E
Page 2
LICENSED
Fact Sheet
Title of the course: EC-Council Certified Security Analyst/ Licensed Penetration Tester
Exam Availability Locations
- Prometric Prime
- Prometric APTC
- VUE
Exam Code
The exam code varies when taken at different testing centers.
- Prometric Prime: 412-79
- Prometric APTC: EC0-479
- VUE: 412-79
Exam Title
EC-Council Certified Security Analyst
Exam costs USD 300/-
http://www.eccouncil.org
EC-Council
Number of questions
50
Page 3
Duration
2 hours
Passing score
70%
Instructor pre-requisites
- You must have advanced knowledge of networking and system administration skills. MCSE and
CCNA certifications are preferred.
- You must have CEH certification
- You must have worked on Firewalls, IDS and Anti-virus systems
- Excellent presentation skills
- Knowledge on hacking tools and their usage
- The ability to handle students effectively in the class
- Manage lecture / labs time effectively
http://www.eccouncil.org
EC-Council
interpret the results in successful security assessment and how to document them. The LPT templates
give quite extensive reporting capabilities. Spend 80% on the Penetration Testing methodologies and
20% on labs.
This is heavy theory based course. Explain to the student about this approach before you start the class.
Page 4
The audience
You will find different types of audience sitting in your ECSA/LPT class. They are:
- Network server administrators
- Firewall Administrators
- Security Testers
- System Administrators
- Risk Assessment professionals
Showcase of tools
You will find that each module showcases various tools. Students are exposed to all the tools in that
category. You are demonstrating the concept of each tool and not necessarily recommending their usage.
The students are free to choose any tool that fits their task but they MUST know the complete showcase
of tools that are available to them.
http://www.eccouncil.org
EC-Council
http://www.eccouncil.org
Page 5
EC-Council
34.
35.
Page 6
http://www.eccouncil.org
EC-Council
Page 7
Day 3
--------------------------------------------------------------------------------------------------------------------------Morning
Module 15: Information Gathering
Module 16: Vulnerability Analysis
Module 17: External Penetration Testing
Afternoon
Module 18: Internal Network Penetration Testing
Module 19: Router Penetration Testing
Module 20: Firewall Penetration Testing
Day 4
--------------------------------------------------------------------------------------------------------------------------Morning
Module 21: IDS Penetration Testing
Module 22: Wireless Network Penetration Testing
Module 23: Denial of Service Penetration Testing
Module 24: Password Cracking Penetration Testing
Afternoon
Module 25: Social Engineering Penetration Testing
Module 26: Stolen Laptop Penetration Testing
Module 27: Application Penetration Testing
Module 28: Physical Security Penetration Testing
Day 5
--------------------------------------------------------------------------------------------------------------------------Morning
Module 29: Database Penetration testing
Module 30: VoIP Penetration Testing
Module 31: VPN Penetration Testing
Afternoon
Module 32: Penetration Testing Report Analysis
Module 33: Penetration Testing Report and Documentation Writing
Module 34: Penetration Testing Deliverables and Conclusion
Module 35: Ethics of a Licensed Penetration Tester
http://www.eccouncil.org
EC-Council
Page 8
http://www.eccouncil.org
EC-Council
scanning.
Page 9
http://www.eccouncil.org
EC-Council
Page 10
Additional Labs
o
Conduct Lab 5.1- Lab 5.2
http://www.eccouncil.org
EC-Council
Instructor notes:
Explain network intrusion prevention and detection system, Snort; its features, modes of operation,
configuration and working.
Tell students how to write snort rules
Demonstrate the tool Snort, IDS Policy Manager and Honeynet Security Console
Page 11
Additional Labs
o
Conduct Lab 8.1- Lab 8.5
http://www.eccouncil.org
EC-Council
Additional Labs
o
Conduct Lab 10.1
Page 12
http://www.eccouncil.org
EC-Council
Instructor notes:
Explain to students what steps needed to perform before penetration testing
Discuss things a tester needs to gather as a part of pre penetration testing such as Liability insurance
form, client organization requirements, tools listing, etc.
http://www.eccouncil.org
EC-Council
Page 14
Instructor notes:
Explain External Intrusion Test and how to analyze it.
Discuss the various steps to be carried out to conduct external penetration test.
Demonstrate the tools such as NeoTrace, SamSpade, NMap, Netcraft, IDA Pro, URLScan, etc.
http://www.eccouncil.org
EC-Council
Instructor notes:
Explain what IDS is and its types.
Discuss various steps to be carried out to conduct IDS penetration testing.
Demonstrate IDS testing tools such as IDS Informer, Evasion Gateway, Firewall Informer, Traffic IQ
Professional, etc.
Page 15
http://www.eccouncil.org
EC-Council
Page 16
Instructor notes:
Explain importance of passwords.
Discuss various steps to be carried out to conduct Password cracking penetration testing.
Demonstrate tools such as SAMDUMP, PWDUMP, L0phtcrack, Dictionary maker, Pass list, Brutus,
Password Cracker, dsniff, etc.
http://www.eccouncil.org
EC-Council
http://www.eccouncil.org
EC-Council
Page 18
Instructor notes:
Discuss how to analyze the penetration testing report and findings.
Give various examples of pen test reports.
EC-Council
Page 19
http://www.eccouncil.org
EC-Council