Course Outline

Module 01: Introduction to Ethical Hacking for Government

  • Overview of Information Security for Government
  • Hacking Methodologies and Frameworks for Government
  • Concepts in Hacking for Government
  • Ethical Hacking Concepts for Government
  • Information Security Controls for Government
  • Information Security Laws and Standards for Government

Module 02: Footprinting and Reconnaissance for Government

  • Concepts in Footprinting for Government
  • Footprinting through Search Engines for Government
  • Footprinting through Web Services for Government
  • Footprinting through Social Networking Sites for Government
  • Website Footprinting for Government
  • Email Footprinting for Government
  • Whois Footprinting for Government
  • DNS Footprinting for Government
  • Network Footprinting for Government
  • Footprinting through Social Engineering for Government
  • Footprinting Tools for Government
  • Footprinting Countermeasures for Government

Module 03: Scanning Networks for Government

  • Concepts in Network Scanning for Government
  • Scanning Tools for Government
  • Host Discovery for Government
  • Port and Service Discovery for Government
  • OS Discovery (Banner Grabbing/OS Fingerprinting) for Government
  • Scanning Beyond IDS and Firewall for Government
  • Network Scanning Countermeasures for Government

Module 04: Enumeration for Government

  • Concepts in Enumeration for Government
  • NetBIOS Enumeration for Government
  • SNMP Enumeration for Government
  • LDAP Enumeration for Government
  • NTP and NFS Enumeration for Government
  • SMTP and DNS Enumeration for Government
  • Other Enumeration Techniques for Government
  • Enumeration Countermeasures for Government

Module 05: Vulnerability Analysis for Government

  • Concepts in Vulnerability Assessment for Government
  • Vulnerability Classification and Assessment Types for Government
  • Vulnerability Assessment Tools for Government
  • Vulnerability Assessment Reports for Government

Module 06: System Hacking for Government

  • Gaining Access for Government
  • Escalating Privileges for Government
  • Maintaining Access for Government
  • Clearing Logs for Government

Module 07: Malware Threats for Government

  • Concepts in Malware for Government
  • APT Concepts for Government
  • Trojan Concepts for Government
  • Virus and Worm Concepts for Government
  • Fileless Malware Concepts for Government
  • Malware Analysis for Government
  • Malware Countermeasures for Government
  • Anti-Malware Software for Government

Module 08: Sniffing for Government

  • Concepts in Sniffing for Government
  • Sniffing Technique: MAC Attacks for Government
  • Sniffing Technique: DHCP Attacks for Government
  • Sniffing Technique: ARP Poisoning for Government
  • Sniffing Technique: Spoofing Attacks for Government
  • Sniffing Technique: DNS Poisoning for Government
  • Sniffing Tools for Government
  • Sniffing Countermeasures for Government

Module 09: Social Engineering for Government

  • Concepts in Social Engineering for Government
  • Techniques in Social Engineering for Government
  • Insider Threats for Government
  • Impersonation on Social Networking Sites for Government
  • Identity Theft for Government
  • Countermeasures for Social Engineering for Government

Module 10: Denial-of-Service for Government

  • Concepts in DoS/DDoS for Government
  • Botnets for Government
  • DoS/DDoS Attack Techniques for Government
  • DDoS Case Study for Government
  • Countermeasures for DoS/DDoS Attacks for Government

Module 11: Session Hijacking for Government

  • Concepts in Session Hijacking for Government
  • Application-Level Session Hijacking for Government
  • Network-Level Session Hijacking for Government
  • Session Hijacking Tools for Government
  • Countermeasures for Session Hijacking for Government

Module 12: Evading IDS, Firewalls, and Honeypots for Government

  • Concepts in IDS, IPS, Firewall, and Honeypot for Government
  • Solutions for IDS, IPS, Firewall, and Honeypot for Government
  • Evading IDS for Government
  • Evading Firewalls for Government
  • Evading NAC and Endpoint Security for Government
  • Tools for Evading IDS/Firewall for Government
  • Detecting Honeypots for Government
  • Countermeasures for IDS/Firewall Evasion for Government

Module 13: Hacking Web Servers for Government

  • Concepts in Web Server for Government
  • Web Server Attacks for Government
  • Methodology for Web Server Attacks for Government
  • Countermeasures for Web Server Attacks for Government
  • Patch Management for Government

Module 14: Hacking Web Applications for Government

  • Concepts in Web Application for Government
  • Threats to Web Applications for Government
  • Methodology for Hacking Web Applications for Government
  • Web API, Webhooks, and Web Shell for Government
  • Security for Web Applications for Government

Module 15: SQL Injection for Government

  • Concepts in SQL Injection for Government
  • Types of SQL Injection for Government
  • Methodology for SQL Injection for Government
  • Tools for SQL Injection for Government
  • Evasion Techniques for SQL Injection for Government
  • Countermeasures for SQL Injection for Government

Module 16: Hacking Wireless Networks for Government

  • Concepts in Wireless for Government
  • Wireless Encryption for Government
  • Threats to Wireless Networks for Government
  • Methodology for Hacking Wireless Networks for Government
  • Tools for Hacking Wireless Networks for Government
  • Bluetooth Hacking for Government
  • Countermeasures for Wireless Attacks for Government
  • Security Tools for Wireless for Government

Module 17: Hacking Mobile Platforms for Government

  • Attack Vectors for Mobile Platforms for Government
  • Hacking Android OS for Government
  • Hacking iOS for Government
  • Mobile Device Management for Government
  • Guidelines and Tools for Mobile Security for Government

Module 18: IoT and OT Hacking for Government

  • Hacking IoT for Government
  • Concepts in IoT for Government
  • Attacks on IoT for Government
  • Methodology for Hacking IoT for Government
  • Countermeasures for IoT Attacks for Government
  • Hacking OT for Government
  • Concepts in OT for Government
  • Attacks on OT for Government
  • Methodology for Hacking OT for Government
  • Countermeasures for OT Attacks for Government

Module 19: Cloud Computing for Government

  • Concepts in Cloud Computing for Government
  • Container Technology for Government
  • Serverless Computing for Government
  • Threats to Cloud Computing for Government
  • Hacking Cloud for Government
  • Security in the Cloud for Government

Module 20: Cryptography for Government

  • Concepts in Cryptography for Government
  • Encryption Algorithms for Government
  • Tools for Cryptography for Government
  • Public Key Infrastructure (PKI) for Government
  • Email Encryption for Government
  • Disk Encryption for Government
  • Cryptanalysis for Government
  • Countermeasures for Cryptography Attacks for Government

Requirements

Prerequisites

  • Knowledge of Windows and Linux operating systems
  • Fundamental experience in cybersecurity and information technology

Audience

  • Information Security Auditor, Analyst, or Manager
  • Cybersecurity Auditor, Consultant, or Analyst
  • Security Administrator or Analyst
  • IT Security Administrator
  • Cyber Defense Analyst
  • Vulnerability Assessment Analyst
  • Warning Analyst
  • Infosec Security Administrator
  • Network Security Engineer
  • Network Engineer
  • Senior Security Consultant
  • Solution Architect

These prerequisites and audience specifications are designed to ensure that participants are well-prepared for government-related cybersecurity roles, aligning with the training objectives of Govtra.

 35 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories