Course Outline
Module 01: Introduction to Ethical Hacking for Government
Module 02: Footprinting and Reconnaissance for Government
Module 03: Scanning Networks for Government
Module 04: Enumeration for Government
Module 05: Vulnerability Analysis for Government
Module 06: System Hacking for Government
Module 07: Malware Threats for Government
Module 08: Sniffing for Government
Module 09: Social Engineering for Government
Module 10: Denial-of-Service for Government
Module 11: Session Hijacking for Government
Module 12: Evading IDS, Firewalls, and Honeypots for Government
Module 13: Hacking Web Servers for Government
Module 14: Hacking Web Applications for Government
Module 15: SQL Injection for Government
Module 16: Hacking Wireless Networks for Government
Module 17: Hacking Mobile Platforms for Government
Module 18: IoT and OT Hacking for Government
Module 19: Cloud Computing for Government
Module 20: Cryptography for Government
The training package includes a CEH v13 Elite offering, which provides comprehensive materials, an exam voucher, access to the video library and labs (for six months), and one additional retake of the exam.
Requirements
What is New in CEH Version 13?
- AI-Enhanced: This certification introduces the first ethical hacking program to integrate artificial intelligence, providing advanced capabilities for government and private sector professionals.
- Practical Experience: Participants gain hands-on experience through real-world scenarios and labs, where they practice attack vectors and master cutting-edge hacking tools.
- Increased Efficiency: The curriculum includes AI-driven techniques to enhance cyber defense efficiency by up to 40%, streamlining workflows for government and organizational use.
- Updated Curriculum: Master the latest advanced attack methods, emerging trends, and effective countermeasures.
- Productivity Gains: The program offers tools for advanced threat detection, enhanced decision-making, adaptive learning, improved reporting, and automation of repetitive tasks, leading to significant productivity improvements.
- Proven Mastery: Engage in monthly global hacking competitions to test and refine your skills, competing with peers and ranking on the leaderboard.
Prerequisites
- An understanding of Windows and Linux operating systems.
- Basic experience in cybersecurity and IT.
Audience for Government and Private Sector Professionals
- Mid-Level Information Security Auditor
- Cybersecurity Auditor
- Security Administrator
- IT Security Administrator
- Information Security Analyst 1
- Infosec Security Administrator
- Cybersecurity Analyst (Levels 1, 2, & 3)
- Network Security Engineer
- SOC Security Analyst
- Network Engineer
- Senior Security Consultant
- Information Security Manager
- Senior SOC Analyst
- Solution Architect
- Cybersecurity Consultant
- Cyber Defense Analyst
- Vulnerability Assessment Analyst
- Warning Analyst
- All-Source Analyst
- Cyber Defense Incident Responder
- Research & Development Specialist
- Senior Cloud Security Analyst
- Third Party Risk Management Specialist
- Threat Hunting Analyst
- Penetration Tester
- Cyber Delivery Manager
- Application Security Risk Analyst
- Threat Modelling Specialist
- Web Application Penetration Testing Specialist
- SAP Vulnerability Management - Solution Delivery Advisor
- Ethical Hacker
- SIEM Threat Responder
- Product Security Engineer / Manager
- Endpoint Security Engineer
- Cybersecurity Instructor
- Red Team Specialist
- Data Protection & Privacy Officer
- SOAR Engineer
- AI Security Engineer
- Sr. IAM Engineer
- PCI Security Advisor
- Exploitation Analyst (EA)
- Zero Trust Solutions Engineer / Analyst
- Cryptographic Engineer
- AI/ML Security Engineer
- Machine Learning Security Specialist
- AI Penetration Tester
- AI/ML Security Consultant
- Crypto Security Consultant
Testimonials (1)
The really lot of extra tools that was mentioned and the real life examples form Mane's experience.