C)PEH | Certified Professional Ethical Hacker
To protect an information system you need to be able to see that system through the eyes of the attacker. The Certified Professional Ethical Hacker certification course is the foundational training to Mile2’s line of penetration testing courses because it teaches you to think like a hacker. Therefore, you can set up dynamic defenses to prevent intrusion.
Live Class Duration
- 5 Days
Class Formats
- Instructor-led
- Self-Study
- Live Virtual Training
What you'll learn
First, you will learn the value of vulnerability assessments. Then, you will discover how to use those assessments to make powerful changes in an information system’s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack.
Who Should Attend
- IS Security Owners
- Security Officers
- Ethical Hackers
- Information Owners
- Penetration Testers
- System Owners and Managers
- Cyber Security Engineers
Suggested Prior Knowledge
- 12 months of IT security experience
- 12 months of Networking experience
MODULES
Module 0
- Course Introduction
Module 1
- Introduction to Ethical Hacking
Module 2
- Linux Fundamentals
Module 3
- Protocols
Module 4
- Cryptography
Module 5
- Password Cracking
Module 6
- Malware
Module 7
- Security Devices
Module 8
- Information Gathering
- Passive Reconnaissance
Module 9
- Social Engineering
Module 10
- Active Reconnaissance
Module 11
- Vulnerability Assessment
Module 12
- Network Attacks
Module 13
- Hacking Servers
Module 14
- Hacking Web Technologies
Module 15
- Hacking Wireless Technologies
Module 16
- Maintaining Access and Covering Tracks
Labs
Module 1
- Introduction to the C)PEH Setup
Module 2
- Linux Fundamentals
Module 3
- Understanding Protocols
Module 4
- Cryptography
Module 5
- Password Cracking
Module 6
- Malware
Module 7
- Information Gathering
Module 8
- Information Gathering
- Active Reconnaissance
Module 9
- Vulnerability Assessment
Module 10
- Network Sniffing/IDS
Module 11
- Windows Hacking
Module 12
- Attacking Databases
Module 13
- Attacking Web Applications
Module 14
- Backdoors
Descargue el temario para conocer el detalle completo de los contenidos
Debido a las constantes actualizaciones de los contenidos de los cursos por parte del fabricante, el contenido de este temario puede variar con respecto al publicado en el sitio oficial, sin embargo, Netec siempre entregará la versión actualizada de éste
C)PEH | Certified Professional Ethical Hacker
Métodos de entrega 👤 💻 Duración 5 días Versión 1 Temario Descarga aquí ⇩ Fechas Netec Consultar