Course Outline

Module 1: Security Concepts
Module 2: Risk Management
Module 3: Phases of Hacker Attacks
Module 4: Penetration Testing for Government
Module 5: Networking Man-in-the-Middle (MitM) Attacks
Module 6: Overview of Web Technologies and Frameworks for Government
Module 7: Essential Tools for Cybersecurity Operations
Module 8: Bypassing Client-Side Controls
Module 9: Authentication Attacks for Government Systems
Module 10: Design and Implementation Flaws in Government Applications
Module 11: Web Application Attacks: Injection (A1)
Module 12: Web Application Attacks: Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) (A3/A8)
Module 13: Web Application Attacks: Broken Authentication and Session Management (A2)
Module 14: Web Application Attacks: Insecure Direct Object References and Missing Function-Level Access Control (A4/A7)
Module 15: Web Application Attacks: Security Misconfiguration and Sensitive Data Exposure (A5/A6)
Module 16: Web Application Attacks: Unvalidated Redirects and Forwards (A10)
Module 17: Logical Flaws in Government Systems

 28 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories