Course Outline
Module 01: Introduction to Ethical Hacking for Government
Module 02: Footprinting and Reconnaissance for Government
Module 03: Scanning Networks for Government
Module 04: Enumeration for Government
Module 05: Vulnerability Analysis for Government
Module 06: System Hacking for Government
Module 07: Malware Threats for Government
Module 08: Sniffing for Government
Module 09: Social Engineering for Government
Module 10: Denial-of-Service for Government
Module 11: Session Hijacking for Government
Module 12: Evading IDS, Firewalls, and Honeypots for Government
Module 13: Hacking Web Servers for Government
Module 14: Hacking Web Applications for Government
Module 15: SQL Injection for Government
Module 16: Hacking Wireless Networks for Government
Module 17: Hacking Mobile Platforms for Government
Module 18: IoT and OT Hacking for Government
Module 19: Cloud Computing for Government
Module 20: Cryptography for Government
The training package includes the CEH v13 Elite program, which provides comprehensive resources such as training materials, an exam voucher, access to a video library and labs (for six months), and one additional retake of the exam.
Requirements
What is New in CEH Version 13?
- AI-Driven Capabilities - This certification introduces the first ethical hacking program to incorporate artificial intelligence, enhancing cybersecurity professionals' ability to anticipate and counter threats.
- Practical Experience - Participants gain hands-on experience through realistic labs that simulate real-world attack scenarios, allowing them to practice advanced hacking techniques and tools.
- Enhanced Efficiency - The curriculum includes AI-driven methods designed to increase efficiency by 40% in cyber defense operations and streamline workflows for government agencies and other organizations.
- Updated Curriculum - The program covers the latest advanced attack techniques, trends, and countermeasures, ensuring that participants are well-prepared to address current cybersecurity challenges.
- Productivity Gains - Participants can expect significant productivity improvements through advanced threat detection, enhanced decision-making, adaptive learning, improved reporting, and automation of repetitive tasks.
- Proven Mastery - The program includes monthly global hacking competitions where participants can compete with peers and demonstrate their skills on a leaderboard, reinforcing their mastery of ethical hacking techniques.
Prerequisites
- Knowledge of Windows and Linux operating systems
- Basic experience in cybersecurity and information technology
Audience for Government and Private Sector Professionals
- Mid-Level Information Security Auditor
- Cybersecurity Auditor
- Security Administrator
- IT Security Administrator
- Information Security Analyst 1
- Infosec Security Administrator
- Cybersecurity Analyst (Levels 1, 2, & 3)
- Network Security Engineer
- SOC Security Analyst
- Network Engineer
- Senior Security Consultant
- Information Security Manager
- Senior SOC Analyst
- Solution Architect
- Cybersecurity Consultant
- Cyber Defense Analyst
- Vulnerability Assessment Analyst
- Warning Analyst
- All-Source Analyst
- Cyber Defense Incident Responder
- Research & Development Specialist
- Senior Cloud Security Analyst
- Third Party Risk Management Specialist
- Threat Hunting Analyst
- Penetration Tester
- Cyber Delivery Manager
- Application Security Risk Analyst
- Threat Modeling Specialist
- Web Application Penetration Testing Expert
- SAP Vulnerability Management - Solution Delivery Advisor
- Ethical Hacker
- SIEM Threat Responder
- Product Security Engineer / Manager
- Endpoint Security Engineer
- Cybersecurity Instructor
- Red Team Specialist
- Data Protection & Privacy Officer
- SOAR Engineer
- AI Security Engineer
- Sr. IAM Engineer
- PCI Security Advisor
- Exploitation Analyst (EA)
- Zero Trust Solutions Engineer / Analyst
- Cryptographic Engineer
- AI/ML Security Engineer
- Machine Learning Security Specialist
- AI Penetration Tester
- AI/ML Security Consultant
- Crypto Security Consultant
Testimonials (1)
The really lot of extra tools that was mentioned and the real life examples form Mane's experience.