Certified Professional Ethical Hacker C)PEH

Certified Penetration Testing Engineer

Penetration Testing Consultant

Penetration Testing Consultant

Incident Handling Engineer

Request more information

We'll connect you at the earliest
Certified Professional Ethical Hacker C)PEH
Certified Professional Ethical Hacker C)PEH

Tools Covered in this Course

Course Details

What you’ll learn

  • Learn the fundamentals of network security
  • Implement access controls
  • Understand the network security protocols
  • Learn cryptography and its uses
  • Conduct effective vulnerability assessments
  • Learn how to cover tracks
  • Understand the functioning of malware
  • Crack passwords

Who should attend

This course was designed for the benefit of the following organization roles:

  • Information System Owners
  • Security Officers; Ethical Hackers
  • Information Owners; Penetration Testers
  • System Owner and Managers
  • Cyber Security Engineers

Prerequisites

A student needs to meet the following prerequisites in order to fully benefit from the course:

  • 12 months of IT security experience
  • 12 months of Networking Experience

Course outcome

Students who complete this course will be able to assess their company’s security posture and implement network security controls.

Course Outline

  • Module 0 – Course Introduction
  • Module 1 – Introduction to Ethical Hacking
  • Module 2 – Linux Fundamentals
  • Module 3 – Protocols
  • Module 4 – Cryptography
  • Module 5 – Password Cracking
  • Module 6 – Malware
  • Module 7 – Security Devices
  • Module 8 – Information Gathering – Passive Reconnaissance
  • Module 9 – Social Engineering
  • Module 10 – Active Reconnaissance
  • Module 11 – Vulnerability Assessment
  • Module 12 – Network Attacks
  • Module 13 – Hacking Servers
  • Module 14 – Hacking Web Technologies
  • Module 15 –  Hacking Wireless Technologies
  • Module 16 – Maintaining Access and Covering Tracks

Lab Outline

  • Lab 1 – Intro to C_PEH Setup
  • Lab 2 – Linux Fundamentals
  • Lab 3 – Understanding Protocols
  • Lab 4 – Cryptography Lab
  • Lab 5 – Password Cracking
  • Lab 6 – Malware
  • Lab 7 – Information Gathering
  • Lab 8 – Vulnerability Assessment
  • Lab 9 – Network Sniffing / IDS
  • Lab 10 – Windows Hacking
  • Lab 11 – Attacking Databases
  • Lab 12 – Attacking Web Applications
  • Lab 13 – Backdoors

We also recommend further training and certification:

  • C)PTE – Certified Penetration Testing Engineer
  • C)PTC – Penetration Testing Consultant
  • C)IHE – Incident Handling Engineer

 Accreditations & Acknowledgements

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS’s Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

FAQ