Course Outline
Module 01: Introduction to Ethical Hacking for Government
- Overview of Information Security for Government
- Hacking Methodologies and Frameworks for Government
- Concepts in Hacking for Government
- Ethical Hacking Concepts for Government
- Information Security Controls for Government
- Information Security Laws and Standards for Government
Module 02: Footprinting and Reconnaissance for Government
- Concepts in Footprinting for Government
- Footprinting through Search Engines for Government
- Footprinting through Web Services for Government
- Footprinting through Social Networking Sites for Government
- Website Footprinting for Government
- Email Footprinting for Government
- Whois Footprinting for Government
- DNS Footprinting for Government
- Network Footprinting for Government
- Footprinting through Social Engineering for Government
- Footprinting Tools for Government
- Footprinting Countermeasures for Government
Module 03: Scanning Networks for Government
- Concepts in Network Scanning for Government
- Scanning Tools for Government
- Host Discovery for Government
- Port and Service Discovery for Government
- OS Discovery (Banner Grabbing/OS Fingerprinting) for Government
- Scanning Beyond IDS and Firewall for Government
- Network Scanning Countermeasures for Government
Module 04: Enumeration for Government
- Concepts in Enumeration for Government
- NetBIOS Enumeration for Government
- SNMP Enumeration for Government
- LDAP Enumeration for Government
- NTP and NFS Enumeration for Government
- SMTP and DNS Enumeration for Government
- Other Enumeration Techniques for Government
- Enumeration Countermeasures for Government
Module 05: Vulnerability Analysis for Government
- Concepts in Vulnerability Assessment for Government
- Vulnerability Classification and Assessment Types for Government
- Vulnerability Assessment Tools for Government
- Vulnerability Assessment Reports for Government
Module 06: System Hacking for Government
- Gaining Access for Government
- Escalating Privileges for Government
- Maintaining Access for Government
- Clearing Logs for Government
Module 07: Malware Threats for Government
- Concepts in Malware for Government
- APT Concepts for Government
- Trojan Concepts for Government
- Virus and Worm Concepts for Government
- Fileless Malware Concepts for Government
- Malware Analysis for Government
- Malware Countermeasures for Government
- Anti-Malware Software for Government
Module 08: Sniffing for Government
- Concepts in Sniffing for Government
- Sniffing Technique: MAC Attacks for Government
- Sniffing Technique: DHCP Attacks for Government
- Sniffing Technique: ARP Poisoning for Government
- Sniffing Technique: Spoofing Attacks for Government
- Sniffing Technique: DNS Poisoning for Government
- Sniffing Tools for Government
- Sniffing Countermeasures for Government
Module 09: Social Engineering for Government
- Concepts in Social Engineering for Government
- Techniques in Social Engineering for Government
- Insider Threats for Government
- Impersonation on Social Networking Sites for Government
- Identity Theft for Government
- Countermeasures for Social Engineering for Government
Module 10: Denial-of-Service for Government
- Concepts in DoS/DDoS for Government
- Botnets for Government
- DoS/DDoS Attack Techniques for Government
- DDoS Case Study for Government
- Countermeasures for DoS/DDoS Attacks for Government
Module 11: Session Hijacking for Government
- Concepts in Session Hijacking for Government
- Application-Level Session Hijacking for Government
- Network-Level Session Hijacking for Government
- Session Hijacking Tools for Government
- Countermeasures for Session Hijacking for Government
Module 12: Evading IDS, Firewalls, and Honeypots for Government
- Concepts in IDS, IPS, Firewall, and Honeypot for Government
- Solutions for IDS, IPS, Firewall, and Honeypot for Government
- Evading IDS for Government
- Evading Firewalls for Government
- Evading NAC and Endpoint Security for Government
- Tools for Evading IDS/Firewall for Government
- Detecting Honeypots for Government
- Countermeasures for IDS/Firewall Evasion for Government
Module 13: Hacking Web Servers for Government
- Concepts in Web Server for Government
- Web Server Attacks for Government
- Methodology for Web Server Attacks for Government
- Countermeasures for Web Server Attacks for Government
- Patch Management for Government
Module 14: Hacking Web Applications for Government
- Concepts in Web Application for Government
- Threats to Web Applications for Government
- Methodology for Hacking Web Applications for Government
- Web API, Webhooks, and Web Shell for Government
- Security for Web Applications for Government
Module 15: SQL Injection for Government
- Concepts in SQL Injection for Government
- Types of SQL Injection for Government
- Methodology for SQL Injection for Government
- Tools for SQL Injection for Government
- Evasion Techniques for SQL Injection for Government
- Countermeasures for SQL Injection for Government
Module 16: Hacking Wireless Networks for Government
- Concepts in Wireless for Government
- Wireless Encryption for Government
- Threats to Wireless Networks for Government
- Methodology for Hacking Wireless Networks for Government
- Tools for Hacking Wireless Networks for Government
- Bluetooth Hacking for Government
- Countermeasures for Wireless Attacks for Government
- Security Tools for Wireless for Government
Module 17: Hacking Mobile Platforms for Government
- Attack Vectors for Mobile Platforms for Government
- Hacking Android OS for Government
- Hacking iOS for Government
- Mobile Device Management for Government
- Guidelines and Tools for Mobile Security for Government
Module 18: IoT and OT Hacking for Government
- Hacking IoT for Government
- Concepts in IoT for Government
- Attacks on IoT for Government
- Methodology for Hacking IoT for Government
- Countermeasures for IoT Attacks for Government
- Hacking OT for Government
- Concepts in OT for Government
- Attacks on OT for Government
- Methodology for Hacking OT for Government
- Countermeasures for OT Attacks for Government
Module 19: Cloud Computing for Government
- Concepts in Cloud Computing for Government
- Container Technology for Government
- Serverless Computing for Government
- Threats to Cloud Computing for Government
- Hacking Cloud for Government
- Security in the Cloud for Government
Module 20: Cryptography for Government
- Concepts in Cryptography for Government
- Encryption Algorithms for Government
- Tools for Cryptography for Government
- Public Key Infrastructure (PKI) for Government
- Email Encryption for Government
- Disk Encryption for Government
- Cryptanalysis for Government
- Countermeasures for Cryptography Attacks for Government
Requirements
Prerequisites
- Knowledge of Windows and Linux operating systems
- Fundamental experience in cybersecurity and information technology
Audience
- Information Security Auditor, Analyst, or Manager
- Cybersecurity Auditor, Consultant, or Analyst
- Security Administrator or Analyst
- IT Security Administrator
- Cyber Defense Analyst
- Vulnerability Assessment Analyst
- Warning Analyst
- Infosec Security Administrator
- Network Security Engineer
- Network Engineer
- Senior Security Consultant
-
Solution Architect
These prerequisites and audience specifications are designed to ensure that participants are well-prepared for government-related cybersecurity roles, aligning with the training objectives of Govtra.
Testimonials (2)
The really lot of extra tools that was mentioned and the real life examples form Mane's experience.
Tamas Adam - Ericsson
Course - Certified Ethical Hacker CEH v.13 AI
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us