Course Outline

Module 1: Introduction to Ethical Hacking for Government
Module 2: Footprinting and Reconnaissance for Government
Module 3: Scanning Networks for Government
Module 4: Enumeration for Government
Module 5: System Hacking for Government
Module 6: Trojans and Backdoors for Government
Module 7: Viruses and Worms for Government
Module 8: Sniffers for Government
Module 9: Social Engineering for Government
Module 10: Denial of Service for Government
Module 11: Session Hijacking for Government
Module 12: Hacking Webservers for Government
Module 13: Hacking Web Applications for Government
Module 14: SQL Injection for Government
Module 15: Hacking Wireless Networks for Government
Module 16: Hacking Mobile Platforms for Government
Module 17: Evading IDS, Firewalls, and Honeypots for Government
Module 18: Buffer Overflow for Government
Module 19: Cryptography for Government
Module 20: Penetration Testing for Government

Requirements

There are no specific prerequisites for the Certified Ethical Hacker (CEH) program; however, we strongly recommend that candidates have a minimum of two years of experience in information technology security prior to enrolling in the CEH training program. This training involves testing systems and using them for purposes beyond their original design. Therefore, it is essential that candidates have a solid understanding of the basic functions of IT systems before attempting to engage in ethical hacking practices. This alignment with professional standards ensures that participants are well-prepared to contribute effectively to cybersecurity initiatives for government and other critical sectors.
 35 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories