Certified Professional Ethical Hacker C)PEH


Course Description

The Certified Professional Ethical Hacker vendor-neutral certification course is the foundational training to Mile2’s line of penetration testing courses.

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack.

Quote a Price

What you’ll learn

  • Learn the fundamentals of network security
  • Implement access controls
  • Understand the network security protocols
  • Learn cryptography and its uses
  • Conduct effective vulnerability assessments
  • Learn how to cover tracks
  • Understand the functioning of malware
  • Crack passwords

Who should attend

This course was designed for the benefit of the following organization roles:

  • Information System Owners
  • Security Officers; Ethical Hackers
  • Information Owners; Penetration Testers
  • System Owner and Managers
  • Cyber Security Engineers

Prerequisites

A student needs to meet the following prerequisites in order to fully benefit from the course:

  • 12 months of IT security experience
  • 12 months of Networking Experience

Course outcome

Students who complete this course will be able to assess their company’s security posture and implement network security controls.

Course Outline

  • Module 0 – Course Introduction
  • Module 1 – Introduction to Ethical Hacking
  • Module 2 – Linux Fundamentals
  • Module 3 – Protocols
  • Module 4 – Cryptography
  • Module 5 – Password Cracking
  • Module 6 – Malware
  • Module 7 – Security Devices
  • Module 8 – Information Gathering – Passive Reconnaissance
  • Module 9 – Social Engineering
  • Module 10 – Active Reconnaissance
  • Module 11 – Vulnerability Assessment
  • Module 12 – Network Attacks
  • Module 13 – Hacking Servers
  • Module 14 – Hacking Web Technologies
  • Module 15 –  Hacking Wireless Technologies
  • Module 16 – Maintaining Access and Covering Tracks

Lab Outline

  • Lab 1 – Intro to C_PEH Setup
  • Lab 2 – Linux Fundamentals
  • Lab 3 – Understanding Protocols
  • Lab 4 – Cryptography Lab
  • Lab 5 – Password Cracking
  • Lab 6 – Malware
  • Lab 7 – Information Gathering
  • Lab 8 – Vulnerability Assessment
  • Lab 9 – Network Sniffing / IDS
  • Lab 10 – Windows Hacking
  • Lab 11 – Attacking Databases
  • Lab 12 – Attacking Web Applications
  • Lab 13 – Backdoors

We also recommend further training and certification:

  • C)PTE – Certified Penetration Testing Engineer
  • C)PTC – Penetration Testing Consultant
  • C)IHE – Incident Handling Engineer

 Accreditations & Acknowledgements

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS’s Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Course Highlights

  • Certified Penetration Testing Engineer
  • Penetration Testing Consultant
  • Incident Handling Engineer

Get Quote