top of page
C)PEH | Certified Professional Ethical Hacker

C)PEH | Certified Professional Ethical Hacker

 

To protect an information system you need to be able to see that system through the eyes of the attacker. The Certified Professional Ethical Hacker certification course is the foundational training to Mile2’s line of penetration testing courses because it teaches you to think like a hacker.  Therefore, you can set up dynamic defenses to prevent intrusion.

 

Live Class Duration

  • 5 Days

 

Class Formats

  • Instructor-led
  • Self-Study
  • Live Virtual Training

 

What you'll learn

First, you will learn the value of vulnerability assessments.  Then, you will discover how to use those assessments to make powerful changes in an information system’s security.  Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack.

 

Who Should Attend

  • IS Security Owners
  • Security Officers
  • Ethical Hackers
  • Information Owners
  • Penetration Testers
  • System Owners and Managers
  • Cyber Security Engineers

 

Suggested Prior Knowledge

  • 12 months of IT security experience
  • 12 months of Networking experience

 

 

MODULES

Module 0

  • Course Introduction

Module 1

  • Introduction to Ethical Hacking

Module 2

  • Linux Fundamentals

Module 3

  • Protocols

Module 4

  • Cryptography

Module 5

  • Password Cracking

Module 6

  • Malware

Module 7

  • Security Devices

Module 8

  • Information Gathering
  • Passive Reconnaissance

Module 9

  • Social Engineering

Module 10

  • Active Reconnaissance

Module 11

  • Vulnerability Assessment

Module 12

  • Network Attacks

Module 13

  • Hacking Servers

Module 14

  • Hacking Web Technologies

Module 15

  • Hacking Wireless Technologies

Module 16

  • Maintaining Access and Covering Tracks

 

Labs

Module 1

  • Introduction to the C)PEH Setup

Module 2

  • Linux Fundamentals

Module 3

  • Understanding Protocols

Module 4

  • Cryptography

Module 5

  • Password Cracking

Module 6

  • Malware

Module 7

  • Information Gathering

Module 8

  • Information Gathering
  • Active Reconnaissance

Module 9

  • Vulnerability Assessment

Module 10

  • Network Sniffing/IDS

Module 11

  • Windows Hacking

Module 12

  • Attacking Databases

Module 13

  • Attacking Web Applications

Module 14

  • Backdoors

 

Descargue el temario para conocer el detalle completo de los contenidos

 

Debido a las constantes actualizaciones de los contenidos de los cursos por parte del fabricante, el contenido de este temario puede variar con respecto al publicado en el sitio oficial, sin embargo, Netec siempre entregará la versión actualizada de éste

C)PEH | Certified Professional Ethical Hacker

SKU: MILE2-C)PEH
bottom of page