Course Outline

Module 01: Introduction to Ethical Hacking for Government

  • Overview of Information Security for Government
  • Hacking Methodologies and Frameworks for Government
  • Hacking Concepts for Government
  • Ethical Hacking Concepts for Government
  • Information Security Controls for Government
  • Information Security Laws and Standards for Government

Module 02: Footprinting and Reconnaissance for Government

  • Footprinting Concepts for Government
  • Footprinting through Search Engines for Government
  • Footprinting through Web Services for Government
  • Footprinting through Social Networking Sites for Government
  • Website Footprinting for Government
  • Email Footprinting for Government
  • Whois Footprinting for Government
  • DNS Footprinting for Government
  • Network Footprinting for Government
  • Footprinting through Social Engineering for Government
  • Footprinting Tools for Government
  • Footprinting Countermeasures for Government

Module 03: Scanning Networks for Government

  • Network Scanning Concepts for Government
  • Scanning Tools for Government
  • Host Discovery for Government
  • Port and Service Discovery for Government
  • OS Discovery (Banner Grabbing/OS Fingerprinting) for Government
  • Scanning Beyond IDS and Firewall for Government
  • Network Scanning Countermeasures for Government

Module 04: Enumeration for Government

  • Enumeration Concepts for Government
  • NetBIOS Enumeration for Government
  • SNMP Enumeration for Government
  • LDAP Enumeration for Government
  • NTP and NFS Enumeration for Government
  • SMTP and DNS Enumeration for Government
  • Other Enumeration Techniques for Government
  • Enumeration Countermeasures for Government

Module 05: Vulnerability Analysis for Government

  • Vulnerability Assessment Concepts for Government
  • Vulnerability Classification and Assessment Types for Government
  • Vulnerability Assessment Tools for Government
  • Vulnerability Assessment Reports for Government

Module 06: System Hacking for Government

  • Gaining Access for Government
  • Escalating Privileges for Government
  • Maintaining Access for Government
  • Clearing Logs for Government

Module 07: Malware Threats for Government

  • Malware Concepts for Government
  • APT Concepts for Government
  • Trojan Concepts for Government
  • Virus and Worm Concepts for Government
  • Fileless Malware Concepts for Government
  • Malware Analysis for Government
  • Malware Countermeasures for Government
  • Anti-Malware Software for Government

Module 08: Sniffing for Government

  • Sniffing Concepts for Government
  • Sniffing Technique: MAC Attacks for Government
  • Sniffing Technique: DHCP Attacks for Government
  • Sniffing Technique: ARP Poisoning for Government
  • Sniffing Technique: Spoofing Attacks for Government
  • Sniffing Technique: DNS Poisoning for Government
  • Sniffing Tools for Government
  • Sniffing Countermeasures for Government

Module 09: Social Engineering for Government

  • Social Engineering Concepts for Government
  • Social Engineering Techniques for Government
  • Insider Threats for Government
  • Impersonation on Social Networking Sites for Government
  • Identity Theft for Government
  • Social Engineering Countermeasures for Government

Module 10: Denial-of-Service for Government

  • DoS/DDoS Concepts for Government
  • Botnets for Government
  • DoS/DDoS Attack Techniques for Government
  • DDoS Case Study for Government
  • DoS/DDoS Attack Countermeasures for Government

Module 11: Session Hijacking for Government

  • Session Hijacking Concepts for Government
  • Application-Level Session Hijacking for Government
  • Network-Level Session Hijacking for Government
  • Session Hijacking Tools for Government
  • Session Hijacking Countermeasures for Government

Module 12: Evading IDS, Firewalls, and Honeypots for Government

  • IDS, IPS, Firewall, and Honeypot Concepts for Government
  • IDS, IPS, Firewall, and Honeypot Solutions for Government
  • Evading IDS for Government
  • Evading Firewalls for Government
  • Evading NAC and Endpoint Security for Government
  • IDS/Firewall Evading Tools for Government
  • Detecting Honeypots for Government
  • IDS/Firewall Evasion Countermeasures for Government

Module 13: Hacking Web Servers for Government

  • Web Server Concepts for Government
  • Web Server Attacks for Government
  • Web Server Attack Methodology for Government
  • Web Server Attack Countermeasures for Government
  • Patch Management for Government

Module 14: Hacking Web Applications for Government

  • Web Application Concepts for Government
  • Web Application Threats for Government
  • Web Application Hacking Methodology for Government
  • Web API, Webhooks, and Web Shell for Government
  • Web Application Security for Government

Module 15: SQL Injection for Government

  • SQL Injection Concepts for Government
  • Types of SQL Injection for Government
  • SQL Injection Methodology for Government
  • SQL Injection Tools for Government
  • Evasion Techniques for Government
  • SQL Injection Countermeasures for Government

Module 16: Hacking Wireless Networks for Government

  • Wireless Concepts for Government
  • Wireless Encryption for Government
  • Wireless Threats for Government
  • Wireless Hacking Methodology for Government
  • Wireless Hacking Tools for Government
  • Bluetooth Hacking for Government
  • Wireless Attack Countermeasures for Government
  • Wireless Security Tools for Government

Module 17: Hacking Mobile Platforms for Government

  • Mobile Platform Attack Vectors for Government
  • Hacking Android OS for Government
  • Hacking iOS for Government
  • Mobile Device Management for Government
  • Mobile Security Guidelines and Tools for Government

Module 18: IoT and OT Hacking for Government

  • IoT Hacking for Government
  • IoT Concepts for Government
  • IoT Attacks for Government
  • IoT Hacking Methodology for Government
  • IoT Attack Countermeasures for Government
  • OT Hacking for Government
  • OT Concepts for Government
  • OT Attacks for Government
  • OT Hacking Methodology for Government
  • OT Attack Countermeasures for Government

Module 19: Cloud Computing for Government

  • Cloud Computing Concepts for Government
  • Container Technology for Government
  • Serverless Computing for Government
  • Cloud Computing Threats for Government
  • Cloud Hacking for Government
  • Cloud Security for Government

Module 20: Cryptography for Government

  • Cryptography Concepts for Government
  • Encryption Algorithms for Government
  • Cryptography Tools for Government
  • Public Key Infrastructure (PKI) for Government
  • Email Encryption for Government
  • Disk Encryption for Government
  • Cryptanalysis for Government
  • Cryptography Attack Countermeasures for Government

Requirements

Prerequisites

  • Familiarity with Windows and Linux operating systems
  • Fundamental knowledge of cybersecurity and information technology

Audience

  • Information Security Auditor, Analyst, or Manager
  • Cybersecurity Auditor, Consultant, or Analyst
  • Security Administrator or Analyst
  • IT Security Administrator
  • Cyber Defense Analyst
  • Vulnerability Assessment Analyst
  • Warning Analyst
  • Infosec Security Administrator
  • Network Security Engineer
  • Network Engineer
  • Senior Security Consultant
  • Solution Architect

This content is designed to support professionals in various cybersecurity roles, ensuring they have the necessary skills and knowledge to effectively manage security operations for government and private sector organizations.

 35 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories