Course Outline
Module 1: Introduction to Ethical Hacking for Government
Module 2: Footprinting and Reconnaissance for Government
Module 3: Scanning Networks for Government
Module 4: Enumeration for Government
Module 5: System Hacking for Government
Module 6: Trojans and Backdoors for Government
Module 7: Viruses and Worms for Government
Module 8: Sniffers for Government
Module 9: Social Engineering for Government
Module 10: Denial of Service for Government
Module 11: Session Hijacking for Government
Module 12: Hacking Webservers for Government
Module 13: Hacking Web Applications for Government
Module 14: SQL Injection for Government
Module 15: Hacking Wireless Networks (theory or practice based on mode of delivery) for Government
Module 16: Hacking Mobile Platforms for Government
Module 17: Evading IDS, Firewalls and Honeypots for Government
Module 18: Buffer Overflow for Government
Module 19: Cryptography for Government
Module 20: Penetration Testing for Government
Requirements
There are no specific prerequisites required to attend this course for government personnel.
Testimonials (2)
The really lot of extra tools that was mentioned and the real life examples form Mane's experience.
Tamas Adam - Ericsson
Course - Certified Ethical Hacker CEH v.13 AI
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us