Certified Professional Ethical Hacker

Our classes are always live and instructor led from our Exton, PA or EPIC Partner locations. Springhouse AnywhereLive options require Internet Access. Select classes are Guaranteed to Run (GTR). View our complete schedule policies.

 

 

 

 

Overview

The Certified Professional Ethical Hacker vendor neutral certification course is the foundational training to mile2's line of penetration testing courses.

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack.

The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to assess your company's security posture, help implement controls to better secure your company's network infrastructure and how to combat against hackers and/or viruses, etc.

Intended Audience

  • Information System Owners
  • Security Officers
  • Ethical Hackers
  • Information Owners
  • Penetration Testers
  • System Owner and Managers
  • Cyber Security Engineers

At Completion

​Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam.


Prerequisites

  • ​12 months of IT security experience
  • 12 months of Networking Experience

Exams & Certifications

​The Certified Professional Ethical Hacker exam is taken online through Mile2's Assessment and Certification System ("MACS"), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple-choice questions. The cost is $400 USD and must be purchased from Mile2.com.


Materials

  • Student Workbook
  • Student Lab guide
  • Exam Prep Guide

Course Outline

​Module 1 - Security Fundamentals

 

Module 2 – Access Controls

 

Module 3 - Protocols

 

Module 4 -Cryptography

 

Module 5 - Why Vulnerability Assessments?

 

Module 6 - Vulnerability Tools of the Trade

 

Module 7 - Output Analysis and Reports

 

Module 8 - Reconnaissance, Enumeration & Scanning

 

Module 9 - Gaining Access

 

Module 10 - Maintaining Access

 

Module 11 - Covering Tracks

 

Module 12 - Malware

 

Module 13 - Buffer Overflows

 

Module 14 - Password Cracking

 

 

Certified Professional Ethical Hackerhttp://springhouse.com/course-catalog/CPEHCertified Professional Ethical Hacker

Get More Information
Name:

Phone:  

Email:  

Comments:

Help us prove you're not a robot:
 

 ‭(Hidden)‬ Catalog-Item Reuse

Microsoft Gold Partner

PMI R.E.P.

AXELOS Limited

The Microsoft Gold CPLS logo is a mark of Microsoft, Inc.

The PMI R.E.P. logo is a mark of the Project Management Institute, Inc.

ITIL® is a registered trade mark of AXELOS Limited.
IT Infrastructure Library® is a registered trade mark of AXELOS Limited
The Swirl logo™ is a registered trade mark of AXELOS Limited
Accredited course material is property of ITSM Academy.

Connect with us

Springhouse Education & Consulting Services

Corporate HQ:Eagleview Corporate Park
707 Eagleview Boulevard
Suite 207
Exton, PA 19341

610-321-3500 - info@springhouse.com