Certified Professional Ethical Hacker

Planning Information

The duration of this course is 5 Days. The list price is $3,000.00.

Description

The Certified Professional Ethical Hacker vendor-neutral certification course is the foundational training to Mile2’s line of penetration testing courses. 

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack. 

Intended Audience

  • Information System Owners
  • Security Officers
  • Ethical Hackers
  • Information Owners
  • Penetration Testers
  • System Owner and Managers
  • Cyber Security Engineers  

At Completion

Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam.

Prerequisites

  • 12 months of IT security experience
  • 12 months of Networking Experience

Exams & Certifications

This course prepares students for the  Certified Professional Ethical Hacker exam (C)PEH™). The Certified Professional Ethical Hacker exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple-choice questions. The cost is $400 USD and must be purchased from Mile2.

Materials

  • Student Workbook
  • Student Lab guide
  • Exam Prep Guide

Course Outline

Course Outline

  • Module 0 - Course Introduction 
  • Module 1 – Introduction to Ethical Hacking
  • Module 2 - Linux Fundamentals
  • Module 3 - Protocols
  • Module 4 - Cryptography
  • Module 5 - Password Cracking
  • Module 6 - Malware
  • Module 7 - Security Devices
  • Module 8 - Information Gathering - Passive Reconnaissance
  • Module 9 - Social Engineering
  • Module 10 - Active Reconnaissance
  • Module 11 - Vulnerability Assessment
  • Module 12 - Network Attacks
  • Module 13 - Hacking Servers
  • Module 14 - Hacking Web Technologies
  • Module 15 -  Hacking Wireless Technologies
  • Module 16 - Maintaining Access and Covering Tracks

Lab Outline

  • Lab 1 – Intro to C_PEH Setup
  • Lab 2 – Linux Fundamentals
  • Lab 3 - Understanding Protocols
  • Lab 4 - Cryptography Lab
  • Lab 5 - Password Cracking
  • Lab 6 - Malware
  • Lab 7 - Information Gathering
  • Lab 8 - Vulnerability Assessment
  • Lab 9 - Network Sniffing / IDS
  • Lab 10 - Windows Hacking
  • Lab 11 - Attacking Databases
  • Lab 12 - Attacking Web Applications
  • Lab 13 - Backdoors

This course is also available for private training. Please contact us to learn more.
Register your interest now



Related Courses

Pin It on Pinterest