Course Outline

Module 01: Introduction to Ethical Hacking for Government

Module 02: Footprinting and Reconnaissance for Government

Module 03: Scanning Networks for Government

Module 04: Enumeration for Government

Module 05: Vulnerability Analysis for Government

Module 06: System Hacking for Government

Module 07: Malware Threats for Government

Module 08: Sniffing for Government

Module 09: Social Engineering for Government

Module 10: Denial-of-Service for Government

Module 11: Session Hijacking for Government

Module 12: Evading IDS, Firewalls, and Honeypots for Government

Module 13: Hacking Web Servers for Government

Module 14: Hacking Web Applications for Government

Module 15: SQL Injection for Government

Module 16: Hacking Wireless Networks for Government

Module 17: Hacking Mobile Platforms for Government

Module 18: IoT and OT Hacking for Government

Module 19: Cloud Computing for Government

Module 20: Cryptography for Government

The training package includes the CEH v13 Elite program, which provides comprehensive resources such as training materials, an exam voucher, access to a video library and labs (for six months), and one additional retake of the exam.

Requirements

What is New in CEH Version 13?

  • AI-Driven Capabilities - This certification introduces the first ethical hacking program to incorporate artificial intelligence, enhancing cybersecurity professionals' ability to anticipate and counter threats.
  • Practical Experience - Participants gain hands-on experience through realistic labs that simulate real-world attack scenarios, allowing them to practice advanced hacking techniques and tools.
  • Enhanced Efficiency - The curriculum includes AI-driven methods designed to increase efficiency by 40% in cyber defense operations and streamline workflows for government agencies and other organizations.
  • Updated Curriculum - The program covers the latest advanced attack techniques, trends, and countermeasures, ensuring that participants are well-prepared to address current cybersecurity challenges.
  • Productivity Gains - Participants can expect significant productivity improvements through advanced threat detection, enhanced decision-making, adaptive learning, improved reporting, and automation of repetitive tasks.
  • Proven Mastery - The program includes monthly global hacking competitions where participants can compete with peers and demonstrate their skills on a leaderboard, reinforcing their mastery of ethical hacking techniques.

Prerequisites

  • Knowledge of Windows and Linux operating systems
  • Basic experience in cybersecurity and information technology

Audience for Government and Private Sector Professionals

  • Mid-Level Information Security Auditor
  • Cybersecurity Auditor
  • Security Administrator
  • IT Security Administrator
  • Information Security Analyst 1
  • Infosec Security Administrator
  • Cybersecurity Analyst (Levels 1, 2, & 3)
  • Network Security Engineer
  • SOC Security Analyst
  • Network Engineer
  • Senior Security Consultant
  • Information Security Manager
  • Senior SOC Analyst
  • Solution Architect
  • Cybersecurity Consultant
  • Cyber Defense Analyst
  • Vulnerability Assessment Analyst
  • Warning Analyst
  • All-Source Analyst
  • Cyber Defense Incident Responder
  • Research & Development Specialist
  • Senior Cloud Security Analyst
  • Third Party Risk Management Specialist
  • Threat Hunting Analyst
  • Penetration Tester
  • Cyber Delivery Manager
  • Application Security Risk Analyst
  • Threat Modeling Specialist
  • Web Application Penetration Testing Expert
  • SAP Vulnerability Management - Solution Delivery Advisor
  • Ethical Hacker
  • SIEM Threat Responder
  • Product Security Engineer / Manager
  • Endpoint Security Engineer
  • Cybersecurity Instructor
  • Red Team Specialist
  • Data Protection & Privacy Officer
  • SOAR Engineer
  • AI Security Engineer
  • Sr. IAM Engineer
  • PCI Security Advisor
  • Exploitation Analyst (EA)
  • Zero Trust Solutions Engineer / Analyst
  • Cryptographic Engineer
  • AI/ML Security Engineer
  • Machine Learning Security Specialist
  • AI Penetration Tester
  • AI/ML Security Consultant
  • Crypto Security Consultant
 35 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories