C)PEH Certified Professional Ethical Hacker

The Certified Professional Ethical Hacker course is the introductory training to mile2's line of penetration testing courses and certifications.

Description

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessment. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack.

 The CPEH course provides in-depth Labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equips the candidate to assess your company’s security posture, help implement controls to better secure your companies network infrastructure and how to combat against hackers and/or viruses, etc.

OUTLINE

  • Module 1 - Security Fundamentals
  • Module 2 – Access Controls
  • Module 3 - Protocols
  • Module 4 -Cryptography
  • Module 5 - Why Vulnerability Assessments?
  • Module 6 - Vulnerability Tools of the Trade
  • Module 7 - Output Analysis and Reports
  • Module 8 - Reconnaissance, Enumeration & Scanning
  • Module 9 - Gaining Access
  • Module 10 - Maintaining Access
  • Module 11 - Covering Tracks
  • Module 12 - Malware
  • Module 13 - Buffer Overflows
  • Module 14 - Password Cracking
  •  Appendix 1 - Economics and Law
  • Appendix 2 - Vulnerability Types
  • Appendix 3 - Assessing Web Servers
  • Appendix 4 - Assessing Remote & VPN Services
  • Appendix 5 - Denial of Service

 

EXAM INFORMATION

The Certified Professional Ethical Hacker exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and is included in the class fee.

Prerequisites

It is recommended that participants have the following:

  • 12 months of IT security experience
  • 12 months of Network 

Target audience

This class is intended for:

  • Information System Owners
  • Security Officers
  • Ethical Hackers
  • Information Owners
  • Penetration Testers
  • System Owner and Managers
  • Cyber Security Engineers

Similar courses

With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today’s security professional. This course will expand upon your knowledge by addressing the essential elements of the 10 domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing the basic skills required to prepare for CISSP certification.

More Information

Held by over 1​ million IT professionals worldwide, CompTIA A+ is the most essential IT certification for establishing an IT career. If you’re new to the IT industry, this will help you put your best foot forward. And if you’re already an IT professional, the CompTIA A+ certification validates your skills and can boost your career.

More Information

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management - making it an important stepping stone of an IT security career.

More Information

The Certified Associate in Project Management (CAPM) is a globally recognized credential that demonstrates your ability to work as a project management professional. This online course is designed to equip you with the foundational knowledge and skills needed to successfully pass the CAPM exam and launch your project management career!

More Information

When a business is hit by a natural disaster, cyber crime or any other disruptive tragedy, how should the organization react? What if the network infrastructure is taken down? Will the business be able to continue operations? How much will it cost if the business is down during repairs? The answer is found in the vendor neutral Certified Disaster Recovery Engineer certification course.

More Information

The Certified Information Systems Security Manager certification course is designed to teach towards and certify a information systems professional high standard of excellence in following areas:

More Information

The Certified Information Systems Security Officer course is designed for forward-thinking security professionals that want the advanced skillset necessary to manage and consult businesses on information security

More Information

This course builds on your existing user-level knowledge and experience with personal computer operating systems and networks to present the fundamental skills and concepts that you will need to use on the job in any type of networking career. It also addresses the content described in the exam objectives for the CompTIA Network+ certification. If you are pursuing a CompTIA technical certification path, obtaining the CompTIA® A+® certification is an excellent first step to take before preparing for the Comp

More Information

The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting.

More Information

The mile2 Certified Security Sentinel training is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks.

More Information

The Certified Vulnerability Assessor course trains students to be proficient in conducting vulnerability assessments The vendor-neutral Certified Vulnerability Assessor certification course helps students understand the importance of vulnerability assessments by providing intricate knowledge and skills in the Vulnerability Assessment arena.

More Information

This workshop helps the student to definitively understand the customer need using various interviewing techniques and templates.

More Information

This course is for persons wishing to take the Microsoft Office Specialist (MOS) PowerPoint exam.

More Information

Looking to boost your project management skills? Join our PMP Certification event online! Learn the ins and outs of project management, from planning to execution, all from the comfort of your home. Our expert instructors will guide you through the process, helping you ace the PMP exam. Don't miss this opportunity to advance your career and become a certified project management pro.

More Information

Organizations use reporting tools to access data sources and generate customized reports. Crystal Reports 2013 enhances report building and report processing techniques with a variety of features that add value to a presentation. In this course, you will create a basic report by connecting to a database and modifying the report's presentation. Information is critical to making sound business decisions. Data presented without any formatting or structure holds little or no meaning for interpretation. Crystal

More Information

Get Certified at your own pace with these Mile 2 Cyber Security Ultimate Self-Study and Certification Bundles.Everything you need to pass 1 mile2 certification on your own time and at your own pace!

More Information

Want to make sure that you are ready for the PMI-PBA® exam and increase your odds of passing it on the first try? This comprehensive workshop will prepare you for the PMI Professional in Business Analysis (PMI-PBA)® exam and help you make the most of the limited study time you have. The course was designed, created, and is taught by recipients of multiple credentials who have been awarded the PMI-PBA in order to help others focus on the critical areas to study and prepare for the exam.

More Information

The PMI-ACP Certification Preparation training course will thoroughly prepare Agile practitioners to sit for and pass the PMI-ACP exam through instructor-led presentations, class discussions, games, exercises, and practice exams. The course is aligned with the PMI-ACP Exam Content Outline (ECO) and provides everything needed to pass the exam

More Information

The Mile2® vendor-neutral Certified Security Awareness 1 certification course is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks.

More Information

The mile2 vendor neutral Certified Security Awareness 1 certification course is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks.

More Information

CIMA Unlimited is a complete programme of study for the Certificate level that provides everything you need to pass your exams at an extremely attractive price.

More Information

This course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organisation's security, collect and analyse cybersecurity intelligence and handle incidents as they occur

More Information

In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives.

More Information

This three-day course prepares you for the examination leading to the Foundation Certificate in IT Service Management. The course is designed as an introduction to ITIL 4 and enables you to understand a new way to look at IT Service Management through a Service Value System (SVS).

More Information