Overview
Why choose the Certified Security Analyst?
The ECSA - Certified Security Analyst course offered on The Learning People platform offers seamless learning progress, continuing where the CEH certification left off. Unlike the majority of pen-testing programs that only follow a generic kill chain methodology, the ECSA presents a set of distinguishable, comprehensive methodologies that are able to cover different pen-testing requirements across a variety of verticals.
Outstanding career prospects
With a predicted shortfall of 850,000 IT jobs in Europe alone by 2020, there’s never been a better time to get a job in cyber security.
Next level training
This program takes the tools and techniques covered in Ethical Hacker to next level by utilising EC-Council’s published penetration testing methodology.
Great earnings
Due to incredible demand for certified professionals, the average salary for cyber security is currently £50,000.
Programme Structure
Included in your modules:
- Penetration Testing Essential Concepts (Self Study)
- Penetration Testing and Methodologies
- Penetration Testing Scoping and Engagement Methodology
- Open-Source Intelligence (OSINT) Methodology
- Social Engineering Penetration Testing Methodology
- Network Penetration Testing Methodology – External
Key information
Duration
- Part-time
- 3 days
Start dates & application deadlines
Language
Delivered
- Self-paced
- Continuous support with feedback on request
Disciplines
Business Intelligence & Analytics Computer Sciences Cyber Security View 25 other Short Courses in Cyber Security in United KingdomAcademic requirements
We are not aware of any specific GRE, GMAT or GPA grading score requirements for this programme.
English requirements
We are not aware of any English requirements for this programme.
Other requirements
General requirements
- Prerequisites: Official training from an accredited provider, such as the Learning People, or two years work experience in information security
- Ideal for: Security analysts, information security officers, vulnerability analysts
Work experience
- Two years work experience in information security
Technological requirements
- Internet access and email
Tuition Fee
The prices are uniquely tailored to every individual.
Funding
Studyportals Tip: Students can search online for independent or external scholarships that can help fund their studies. Check the scholarships to see whether you are eligible to apply. Many scholarships are either merit-based or needs-based.