Course Outline

Module 01: Introduction to Ethical Hacking for Government

Module 02: Footprinting and Reconnaissance for Government

Module 03: Scanning Networks for Government

Module 04: Enumeration for Government

Module 05: Vulnerability Analysis for Government

Module 06: System Hacking for Government

Module 07: Malware Threats for Government

Module 08: Sniffing for Government

Module 09: Social Engineering for Government

Module 10: Denial-of-Service for Government

Module 11: Session Hijacking for Government

Module 12: Evading IDS, Firewalls, and Honeypots for Government

Module 13: Hacking Web Servers for Government

Module 14: Hacking Web Applications for Government

Module 15: SQL Injection for Government

Module 16: Hacking Wireless Networks for Government

Module 17: Hacking Mobile Platforms for Government

Module 18: IoT and OT Hacking for Government

Module 19: Cloud Computing for Government

Module 20: Cryptography for Government

The training package includes a CEH v13 Elite offering, which provides comprehensive materials, an exam voucher, access to the video library and labs (for six months), and one additional retake of the exam.

Requirements

What is New in CEH Version 13?

  • AI-Enhanced: This certification introduces the first ethical hacking program to integrate artificial intelligence, providing advanced capabilities for government and private sector professionals.
  • Practical Experience: Participants gain hands-on experience through real-world scenarios and labs, where they practice attack vectors and master cutting-edge hacking tools.
  • Increased Efficiency: The curriculum includes AI-driven techniques to enhance cyber defense efficiency by up to 40%, streamlining workflows for government and organizational use.
  • Updated Curriculum: Master the latest advanced attack methods, emerging trends, and effective countermeasures.
  • Productivity Gains: The program offers tools for advanced threat detection, enhanced decision-making, adaptive learning, improved reporting, and automation of repetitive tasks, leading to significant productivity improvements.
  • Proven Mastery: Engage in monthly global hacking competitions to test and refine your skills, competing with peers and ranking on the leaderboard.

Prerequisites

  • An understanding of Windows and Linux operating systems.
  • Basic experience in cybersecurity and IT.

Audience for Government and Private Sector Professionals

  • Mid-Level Information Security Auditor
  • Cybersecurity Auditor
  • Security Administrator
  • IT Security Administrator
  • Information Security Analyst 1
  • Infosec Security Administrator
  • Cybersecurity Analyst (Levels 1, 2, & 3)
  • Network Security Engineer
  • SOC Security Analyst
  • Network Engineer
  • Senior Security Consultant
  • Information Security Manager
  • Senior SOC Analyst
  • Solution Architect
  • Cybersecurity Consultant
  • Cyber Defense Analyst
  • Vulnerability Assessment Analyst
  • Warning Analyst
  • All-Source Analyst
  • Cyber Defense Incident Responder
  • Research & Development Specialist
  • Senior Cloud Security Analyst
  • Third Party Risk Management Specialist
  • Threat Hunting Analyst
  • Penetration Tester
  • Cyber Delivery Manager
  • Application Security Risk Analyst
  • Threat Modelling Specialist
  • Web Application Penetration Testing Specialist
  • SAP Vulnerability Management - Solution Delivery Advisor
  • Ethical Hacker
  • SIEM Threat Responder
  • Product Security Engineer / Manager
  • Endpoint Security Engineer
  • Cybersecurity Instructor
  • Red Team Specialist
  • Data Protection & Privacy Officer
  • SOAR Engineer
  • AI Security Engineer
  • Sr. IAM Engineer
  • PCI Security Advisor
  • Exploitation Analyst (EA)
  • Zero Trust Solutions Engineer / Analyst
  • Cryptographic Engineer
  • AI/ML Security Engineer
  • Machine Learning Security Specialist
  • AI Penetration Tester
  • AI/ML Security Consultant
  • Crypto Security Consultant
 35 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories