ENSA - Network Security Administrator

PREREQUISITE FOR EC-COUNCIL'S CEH

Develop the fundamental skills that you'll need to analyze the internal and external security threats against a network, and learn security policies that will protect an organization’s informations

ENSA Boot Camp Overview


COURSE LENGTH:
5-DAY COMBO
CERTIFICATIONS:
CEH, ENSA


The ENSA certification looks at the network security in defensive view while the CEH certification program looks at the security in offensive mode. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization's information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them.

  • ENSA is for experienced hands in the industry and is backed by a curriculum designed by the best in the field.
  • Greater industry acceptance as seasoned Network Security professional.
  • Learn to configure firewalls, intrusion detection systems and AV systems.
  • Develop effective security policy in the company.

  • Over 90% Pass Rate - Now CEHv7.1
  • On-site exam proctoring
  • Over $3000 in tools & software(details)
"I was blown away by the instructor's knowledge and expertise. ... Would recommend to anyone thinking about being a pen tester"

Connie Brown

United States Air Force

What You'll LEARN

Take this course as a combination with Ethical Hacking and learn the offensive and defensive sides of network security!

 

  • Module I:  Fundamentals of Computer Network
  • Module II: Network Protocols
  • Module III: Protocol Analysis
  • Module IV: Hardening Physical Security
  • Module V: Network Security
  • Module VI: Security Standards Organizations
  • Module VII: Security Standards
  • Module VIII: Security Policy
  • Module IX: IEEE Standards
  • Module X: Network Security Threats
  • Module XI: Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS)
  • Module XII: Firewalls
  • Module XIII: Packet Filtering and Proxy Servers
  • Module XIV: Bastion Host and Honeypots
  • Module XV: Securing Modems
  • Module XVI: Troubleshooting Network
  • Module XVII: Hardening Routers Module XVIII: Hardening Operating Systems
  • Module XIX: Patch Management
  • Module XX: Log Analysis
  • Module XXI: Application Security
  • Module XXII: Web Security
  • Module XXIII: E-mail Security
  • Module XXIV: Authentication: Encryption, Cryptography and Digital Signatures
  • Module XXV: Virtual Private Networks and Remote Networking
  • Module XXVI: Wireless Network Security
  • Module XXVII: Creating Fault Tolerance
  • Module XXVIII: Incident Response
  • Module XXIX: Disaster Recovery and Planning
  • Module XXX: Network Vulnerability Assessment

 



Dates & Locations

Dates Location Reserve a Seat!
Any Date! Any Location! Hacker Training Online - More Details Here
-Atlanta, GA Reserve a Seat
-San Francisco, CA Reserve a Seat
-Las Vegas, NV Reserve a Seat
05/12/14-05/16/14Dulles, VA Reserve a Seat
05/12/14-05/16/14Live Online, Reserve a Seat
05/19/14-05/23/14Chicago, IL Reserve a Seat
06/02/14-06/06/14Huntsville, AL Reserve a Seat
06/16/14-06/20/14Live Online, Reserve a Seat
06/16/14-06/20/14Colorado Springs, CO Reserve a Seat
06/16/14-06/20/14Dulles, VA Reserve a Seat
06/22/14-06/26/14Abu Dhabi, UAE Reserve a Seat
06/23/14-06/27/14San Diego, CA Reserve a Seat
07/07/14-07/11/14Atlanta, GA Reserve a Seat
07/14/14-07/18/14Live Online, Reserve a Seat
07/14/14-07/18/14Dulles, VA Reserve a Seat
07/21/14-07/25/14Dallas, TX Reserve a Seat
08/04/14-08/08/14New York City, NY Reserve a Seat
08/11/14-08/15/14Live Online, Reserve a Seat
08/11/14-08/15/14Dulles, VA Reserve a Seat
08/11/14-08/15/14Chicago, IL Reserve a Seat
09/08/14-09/12/14Las Vegas, NV Reserve a Seat
09/15/14-09/19/14Live Online, Reserve a Seat
09/15/14-09/19/14Dulles, VA Reserve a Seat
09/21/14-09/25/14Dubai, UAE Reserve a Seat
09/22/14-09/26/14Colorado Springs, CO Reserve a Seat
10/06/14-10/10/14Live Online, Reserve a Seat
10/06/14-10/10/14Dulles, VA Reserve a Seat
10/06/14-10/10/14Phoenix/Scottsdale, AZ Reserve a Seat
10/20/14-10/24/14Huntsville, AL Reserve a Seat
10/20/14-10/24/14Atlanta, GA Reserve a Seat
10/27/14-10/31/14San Diego, CA Reserve a Seat
11/03/14-11/07/14Chicago, IL Reserve a Seat
11/03/14-11/07/14Live Online, Reserve a Seat
11/03/14-11/07/14Dulles, VA Reserve a Seat
11/17/14-11/21/14Baltimore, MD Reserve a Seat
11/17/14-11/21/14Dallas, TX Reserve a Seat
12/01/14-12/05/14Colorado Springs, CO Reserve a Seat
12/08/14-12/12/14Dulles, VA Reserve a Seat
12/08/14-12/12/14San Francisco, CA Reserve a Seat
12/08/14-12/12/14Live Online, Reserve a Seat
12/14/14-12/18/14Abu Dhabi, UAE Reserve a Seat
12/15/14-12/19/14Orlando, FL Reserve a Seat
Any Date Your Office!
Get Information for On-Site Training

See what our students are saying

More testimonials for Ethical Hacking here

  • David P. Curly

    Senior Consultant

    Booz Allen Hamilton

    "a must for any true
    security professional"

    "This was a phenomenal class! The instructor was extremely knowledgeable and crafted the exercises so that we truly learned the material. I have a whole new appreciation for how vulnerabilities are exploited. I have gained very practical skills and knowledge in this class which will help me tremendously in my job. I will highly recommend this course to all of my co-workers. This class should be a must for any true security professional. There were several moments during the week when I was amazed at how vulnerable systems truly are. The practical labs and competition teams made the experience fun. I have learned some extremely valuable skills."


    Find out more
  • Aaron Bento

    IBM Global Services

    "hands-on experience was invaluable"

    "The class was great! The instructor knew his his information very well. It was nice to have someone who is more than just book knowledge, someone who is just giving you the info for the cert test. His hands on experience in real world pen-testing was invaluable, as it gave a touch-stone to how the methods learned in class can be extended to real pen-testing."


    Find out more
  • "nice to have a dedicated training laptop provided"

    "I got a lot out of the real world scenarios presented in class. Jeremy is very knowledgeable in the field of penetration testing. Would definitely take classes again if he is the instructor. The course books are a great reference, and it was nice to have a dedicated training laptop provided by Infosec and not have to bring my own and waste time installing programs during class"


    Find out more
  • Rummy Dabgotra

    MTS Allstream

    "invaluable to my career"

    "Dan is an excellent instructor and incredibly knowledgeable. Great presenter and very helpful. The course was very intense but well structured. The hours were long but it really allows you to get your head wrapped around it. Slide notes were very good as well as the lab pre-info. The labs tied well into the course. The content and knowledge gained will be invaluable to my career."


    Find out more

Certifications & Compliance

EC-Council's ENSA

You will become certified in EC-Council's ENSA - (Network Security Administrator). The EC-Council's ENSA certification looks at the network security in defensive view while the CEH certification program looks at the security in offensive mode. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. Ask your account manager for more information on this certification. The ENSA 312-38 exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the ENSA certification. 


Pricing for Ethical Hacking - including the CEH v7.1 and ENSA

 

Instant Pricing

Call (866)-471-0059 or fill out this short form for current pricing

YOU ALSO GET

  • $3000 worth of tools
    and software!

    InfoSec's Custom Hacking Tools Enterprise Suite, includes every program covered in the course for at home study. (558 Tools). Regular Price: Hacking Tools Enterprise Suite available for individual purchase for only $1,499!

     

    Core Impact SEL License

  • Course Materials, Test Fees and Class Guarantees!

    Small class sizes (usually 10-20 Students), you get an intimate learning setting not offered by any of our competitors.

    5 Full Days of Boot camp style training --- our instructors teach from 8am to 10:30pm every day. Course runs from 8am to 5pm daily with optional ethical capture the flag hacking exercises to 10:30pm.

    All meals, snacks and refreshments included. Snacks not included in Las Vegas courses.

    Certified Ethical Hacker exam fees.

    Lecture, Lab Exercise and Text book --- Train your ethical friends and co-workers hacking!

  • Continued Access to
    the Course ONLINE

    Total Access to Live Recorded Ethical Hacking Lectures:

    InfoSec Institute's Ethical Hacking class is structured for maximum retention of knowledge learned in class. Because we believe in a commitment to your ongoing education after you attend a hands-on Ethical Hacking class, InfoSec Institute makes available for every student access to all of the Live Recorded lectures you attended in-class. These are available in online format for 30 days after the training session!

Other Related Tools & Resources For Our Students

Be sure to check out our R&D site. We post tutorials, labs, white papers and articles to help you in your continued ethical hacking training. There are frequently forensics videos available. If you haven't taken a course with us yet, check out some of the types of thigns you'll be doing and learning about in class.

  • Murdering Dexter
  • 04/15/2014

    In this article we are going to solve a Bot challenge. The name of the bot is Dexter and the vulnerable VM which we are going to use is created by Brian Wallace. The challenge is to gain root privileges of the bot command and control center and the system’s [...]

    The post Murdering Dexter appeared first on InfoSec Institute.

  • Information Gathering Using Metasploit
  • 04/14/2014

    Your goals during information gathering should be to gain accurate information about your targets without revealing your presence or your intentions, to learn how the organization operates, and to determine the best route. Metasploit is the best console for information gathering, as it is a very comprehensive penetration testing tool. [...]

    The post Information Gathering Using Metasploit appeared first on InfoSec Institute.

OUR STUDENTS SAY:
InfoSec Institute has an excellent instructor and this is the best IT security class I have ever taken. His knowledge and method of teaching are unsurpassed.