Course Outline
Module 1: Introduction to Ethical Hacking for Government
Module 2: Footprinting and Reconnaissance for Government
Module 3: Scanning Networks for Government
Module 4: Enumeration for Government
Module 5: System Hacking for Government
Module 6: Trojans and Backdoors for Government
Module 7: Viruses and Worms for Government
Module 8: Sniffers for Government
Module 9: Social Engineering for Government
Module 10: Denial of Service for Government
Module 11: Session Hijacking for Government
Module 12: Hacking Webservers for Government
Module 13: Hacking Web Applications for Government
Module 14: SQL Injection for Government
Module 15: Hacking Wireless Networks for Government
Module 16: Hacking Mobile Platforms for Government
Module 17: Evading IDS, Firewalls, and Honeypots for Government
Module 18: Buffer Overflow for Government
Module 19: Cryptography for Government
Module 20: Penetration Testing for Government
Requirements
Testimonials (1)
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us