Course Outline

Module 01: Introduction to Ethical Hacking for Government

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: Vulnerability Analysis

Module 06: System Hacking

Module 07: Malware Threats

Module 08: Sniffing

Module 09: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypots

Module 13: Hacking Web Servers

Module 14: Hacking Web Applications

Module 15: SQL Injection

Module 16: Hacking Wireless Networks

Module 17: Hacking Mobile Platforms

Module 18: IoT and OT Hacking

Module 19: Cloud Computing for Government

Module 20: Cryptography

The training package includes the CEH v13 Elite program, which provides comprehensive materials, an exam voucher, access to a video library and labs (for 6 months), and one additional exam retake.

Requirements

What is new in CEH version 13?

  • AI-Driven - This certification marks the first integration of artificial intelligence in ethical hacking, enhancing capabilities for government.
  • Practical Experience - Gain hands-on experience through real-world scenarios and labs, where participants practice attack vectors and advanced hacking tools.
  • Increased Efficiency - Learn AI-driven methods to improve efficiency by 40% in cyber defense, optimizing workflows for government operations.
  • Updated Curriculum - Master the latest advanced attack techniques, trends, and countermeasures, ensuring alignment with current cybersecurity challenges.
  • Enhanced Productivity - Achieve significant productivity gains through advanced threat detection, enhanced decision-making, adaptive learning, improved reporting, and automation of repetitive tasks.
  • Proven Mastery - Participate in monthly global hacking competitions to compete with peers and demonstrate skills, contributing to a robust cybersecurity community for government.

Prerequisites

  • Understanding of Windows and Linux operating systems
  • Basic experience in cybersecurity and IT

Audience

  • Mid-Level Information Security Auditor
  • Cybersecurity Auditor
  • Security Administrator
  • IT Security Administrator
  • Information Security Analyst 1
  • Infosec Security Administrator
  • Cybersecurity Analyst Level 1, Level 2, & Level 3
  • Network Security Engineer
  • SOC Security Analyst
  • Network Engineer
  • Senior Security Consultant
  • Information Security Manager
  • Senior SOC Analyst
  • Solution Architect
  • Cybersecurity Consultant
  • Cyber Defense Analyst
  • Vulnerability Assessment Analyst
  • Warning Analyst
  • All-Source Analyst
  • Cyber Defense Incident Responder
  • Research & Development Specialist
  • Senior Cloud Security Analyst
  • Third Party Risk Management
  • Threat Hunting Analyst
  • Penetration Tester
  • Cyber Delivery Manager
  • Application Security Risk Specialist
  • Threat Modeling Specialist
  • Web Application Penetration Testing Analyst
  • SAP Vulnerability Management - Solution Delivery Advisor
  • Ethical Hacker
  • SIEM Threat Responder
  • Product Security Engineer / Manager
  • Endpoint Security Engineer
  • Cybersecurity Instructor
  • Red Team Specialist
  • Data Protection & Privacy Officer
  • SOAR Engineer
  • AI Security Engineer
  • Sr. IAM Engineer
  • PCI Security Advisor
  • Exploitation Analyst (EA)
  • Zero Trust Solutions Engineer / Analyst
  • Cryptographic Engineer
  • AI/ML Security Engineer
  • Machine Learning Security Specialist
  • AI Penetration Tester
  • AI/ML Security Consultant
  • Crypto Security Consultant
 35 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories