Course Outline

Module 1: Introduction to Ethical Hacking for Government
Module 2: Footprinting and Reconnaissance for Government
Module 3: Scanning Networks for Government
Module 4: Enumeration for Government
Module 5: System Hacking for Government
Module 6: Trojans and Backdoors for Government
Module 7: Viruses and Worms for Government
Module 8: Sniffers for Government
Module 9: Social Engineering for Government
Module 10: Denial of Service for Government
Module 11: Session Hijacking for Government
Module 12: Hacking Webservers for Government
Module 13: Hacking Web Applications for Government
Module 14: SQL Injection for Government
Module 15: Hacking Wireless Networks (theory or practice based on mode of delivery) for Government
Module 16: Hacking Mobile Platforms for Government
Module 17: Evading IDS, Firewalls and Honeypots for Government
Module 18: Buffer Overflow for Government
Module 19: Cryptography for Government
Module 20: Penetration Testing for Government

Requirements

There are no specific prerequisites required to attend this course for government personnel.

 35 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories