Course Outline
Module 1: Introduction to Ethical Hacking for Government
Module 2: Footprinting and Reconnaissance
Module 3: Network Scanning Techniques
Module 4: Enumeration Processes
Module 5: System Hacking Methods
Module 6: Trojans and Backdoors Analysis
Module 7: Viruses and Worms Overview
Module 8: Sniffers and Data Capture Tools
Module 9: Social Engineering Tactics
Module 10: Denial of Service Attacks
Module 11: Session Hijacking Techniques
Module 12: Web Server Hacking Strategies
Module 13: Web Application Security Assessments
Module 14: SQL Injection Vulnerabilities
Module 15: Wireless Network Security
Module 16: Mobile Platform Security
Module 17: Evading Intrusion Detection Systems, Firewalls, and Honeypots
Module 18: Buffer Overflow Exploits
Module 19: Cryptographic Principles
Module 20: Penetration Testing Procedures
Requirements
There are no specific prerequisites for the C|EH program; however, we strongly recommend that candidates possess a minimum of two years of experience in information technology (IT) security prior to enrolling in a C|EH training program. The C|EH training focuses on testing systems and employing them for purposes beyond their original design. Therefore, it is essential that candidates have a foundational understanding of the basic functions of IT systems before attempting to engage in ethical hacking activities. This ensures readiness and effectiveness in the application of these skills for government and other public sector environments.
Testimonials (1)
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us