Course Outline
Module 01: Introduction to Ethical Hacking for Government
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT and OT Hacking
Module 19: Cloud Computing for Government
Module 20: Cryptography
The training package includes the CEH v13 Elite program, which provides comprehensive materials, an exam voucher, access to a video library and labs (for 6 months), and one additional exam retake.
Requirements
What is new in CEH version 13?
- AI-Driven - This certification marks the first integration of artificial intelligence in ethical hacking, enhancing capabilities for government.
- Practical Experience - Gain hands-on experience through real-world scenarios and labs, where participants practice attack vectors and advanced hacking tools.
- Increased Efficiency - Learn AI-driven methods to improve efficiency by 40% in cyber defense, optimizing workflows for government operations.
- Updated Curriculum - Master the latest advanced attack techniques, trends, and countermeasures, ensuring alignment with current cybersecurity challenges.
- Enhanced Productivity - Achieve significant productivity gains through advanced threat detection, enhanced decision-making, adaptive learning, improved reporting, and automation of repetitive tasks.
- Proven Mastery - Participate in monthly global hacking competitions to compete with peers and demonstrate skills, contributing to a robust cybersecurity community for government.
Prerequisites
- Understanding of Windows and Linux operating systems
- Basic experience in cybersecurity and IT
Audience
- Mid-Level Information Security Auditor
- Cybersecurity Auditor
- Security Administrator
- IT Security Administrator
- Information Security Analyst 1
- Infosec Security Administrator
- Cybersecurity Analyst Level 1, Level 2, & Level 3
- Network Security Engineer
- SOC Security Analyst
- Network Engineer
- Senior Security Consultant
- Information Security Manager
- Senior SOC Analyst
- Solution Architect
- Cybersecurity Consultant
- Cyber Defense Analyst
- Vulnerability Assessment Analyst
- Warning Analyst
- All-Source Analyst
- Cyber Defense Incident Responder
- Research & Development Specialist
- Senior Cloud Security Analyst
- Third Party Risk Management
- Threat Hunting Analyst
- Penetration Tester
- Cyber Delivery Manager
- Application Security Risk Specialist
- Threat Modeling Specialist
- Web Application Penetration Testing Analyst
- SAP Vulnerability Management - Solution Delivery Advisor
- Ethical Hacker
- SIEM Threat Responder
- Product Security Engineer / Manager
- Endpoint Security Engineer
- Cybersecurity Instructor
- Red Team Specialist
- Data Protection & Privacy Officer
- SOAR Engineer
- AI Security Engineer
- Sr. IAM Engineer
- PCI Security Advisor
- Exploitation Analyst (EA)
- Zero Trust Solutions Engineer / Analyst
- Cryptographic Engineer
- AI/ML Security Engineer
- Machine Learning Security Specialist
- AI Penetration Tester
- AI/ML Security Consultant
- Crypto Security Consultant
Testimonials (1)
The really lot of extra tools that was mentioned and the real life examples form Mane's experience.