Course Outline

Day 1: Overview of cybersecurity, ethical hacking, and contemporary architecture for government

Day 2: Active recognition

Day 3: System operation

Day 4: Exploitation and post-exploitation, and report drafting

Day 5: Certification Exam

Learning Objectives

  • Understand the fundamental concepts of ethical hacking and the technical knowledge required to perform and manage penetration tests for government.
  • Master the concepts, approaches, standards, methods, and techniques used for the operation of an effective ethical hacking process in a public sector environment.
  • Acquire the expertise to conduct a penetration test following a logical path by using a variety of tools and techniques aligned with government workflows and governance.
  • Develop the skills to analyze the results of testing activities and produce comprehensive reports that help organizations effectively address vulnerabilities for government.
  • Strengthen the personal qualities necessary to act with due professional care when conducting penetration tests in public sector settings.
  • Be able to define and explain the different phases of cyberattacks, ensuring alignment with public sector cybersecurity frameworks.
  • Become acquainted with the various tools used to collect information before performing any attack, emphasizing their relevance for government agencies.
  • Learn about the different attacks that affect the security of an organization's network, with a focus on implications for government systems.
  • Understand how to perform the steps comprising a penetration test (ethical hacking) and its associated tools by obtaining information, scanning, enumeration, and executing attack processes in a public sector context.
  • Learn about the most important aspects of Distributed Denial of Service (DDoS) attacks and their tools, with an emphasis on mitigating risks for government operations.

Educational Approach

  • This training combines theoretical instruction with practical exercises. The theoretical component constitutes 40% of the course, while the practical component makes up 60%. Practical exercises are complemented by tutorials to help participants acquire the necessary skills for government applications.
  • The laboratory environment is intensive, providing in-depth knowledge and hands-on experience regarding current security systems to each participant, tailored for government use cases.
  • Learning by doing: Participants will engage in scenarios, situations, and decision-making processes they are likely to encounter during their professional careers in the public sector.
  • Practical tests are designed to mirror the Certification Exam, ensuring participants are well-prepared for the assessment.

Examination

The “PECB Certified Lead Ethical Hacker” exam meets all the requirements of the PECB Examination and Certification Program (ECP). The exam covers the following competency domains:

Domain 1: Fundamental principles and concepts of ethical hacking for government

Domain 2: Attack mechanisms relevant to public sector cybersecurity

Domain 3: Principles and reference frameworks on penetration tests in a government context

Domain 4: Planning and performing penetration tests using various tools and techniques for government operations

Domain 5: Drafting penetration testing reports tailored to public sector needs

The examination consists of two parts. The first part is a paper-based exam, which includes essay-type questions. The second part is more technical, requiring candidates to conduct penetration testing exercises on a computer and draft an analysis report.

Participants are permitted to use their personal notes during both the paper-based exam and the practical portion of the exam.

For more information about exam details, please visit Examination Rules and Policies.

Certification

After successfully completing the exam, you can apply for the credentials listed in the table below. You will receive a certificate once you meet all the requirements related to the selected credential. For more information about Ethical Hacking certifications and the PECB certification process, please refer to Certification Rules and Policies.

To be considered valid, activities related to ethical hacking and penetration testing should follow best practices and include the following steps:

  1. Understanding the scope of ethical hacking in a government context
  2. Defining a penetration testing approach aligned with public sector standards
  3. Understanding the steps that should be followed during an ethical hacking process for government agencies
  4. Defining the penetration testing criteria to meet public sector requirements
  5. Evaluating pen test scenarios and treatment options in a government setting
  6. Understanding the methods that help increase the security of operational systems for government operations
  7. Reporting the results of penetration tests in a format suitable for government review

Requirements

A foundational understanding of Information Security and advanced proficiency in operating systems (such as Microsoft and Linux) are required. Additionally, it is beneficial for the candidate to possess knowledge of computer networks, experience with operating systems, and an understanding of programming concepts, particularly for government applications.

 35 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories