Certified Professional Ethical Hacker Training (CPEH)
The Certified Professional Ethical Hacker Training (CPEH) Workshop enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the Certified Professional Ethical Hacker (CPEH) course helps students learn how to implement counter response and preventative measures when it comes to a network hack.
The Certified Professional Ethical Hacker vendor-neutral certification course is the foundational training to Mile2’s line of penetration testing courses.
Accreditations & Acknowledgements
- Accredited by the NSA CNSS 4011-4016
- Mapped to NIST / Homeland Security NICCS’s Cyber Security Workforce Framework
- Approved on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Exam Information:
- The Certified Professional Ethical Hacker exam is taken online through our Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The Certified Professional Ethical Hacker (CPEH) exam will take 2 hours and consist of 100 multiple-choice questions. The cost is $500 USD and must be purchased from ENO WIRELESS
Student Materials:
- Student Workbook
- Student Prep Guide
- Student Lab Guide
- CPEs: 40
Duration: 5 days
RESOURCES
- Certified Professional Ethical Hacker Training (CPEH) – https://www.wiley.com/
- Certified Professional Ethical Hacker Training (CPEH) – https://www.packtpub.com/
- Certified Professional Ethical Hacker Training (CPEH) – https://store.logicaloperations.com/
- Certified Professional Ethical Hacker (CPEH) – https://us.artechhouse.com/
- Certified Professional Ethical Hacker (CPEH) – https://www.amazon.com/
RELATED COURSES
- Certified Penetration Testing Engineer Training (CPTE)
- Certified Disaster Recovery Engineer Training (CDRE)
- Certified Network Forensics Examiner Training (CNFE)
- Certified Penetration Testing Consultant Training (CPTC)
- Certified Secure Web Application Engineer Training (CSWAE)
CUSTOMIZE It
- We can adapt this Certified Professional Ethical Hacker (CPEH) course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Certified Professional Ethical Hacker (CPEH) course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Certified Professional Ethical Hacker (CPEH) Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Certified Professional Ethical Hacker (CPEH) course in manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this Certified Professional Ethical Hacker (CPEH) course:
- Information System Owners
- Security Officers
- Ethical Hackers
- Information Owners
- Penetration Testers
- System Owner and Managers
- Cyber Security Engineers
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this Certified Professional Ethical Hacker (CPEH) course are:
- 12 months of IT security experience
- 12 months of Networking Experience
Certified Professional Ethical Hacker Training (CPEH) - OBJECTIVES
Upon completing this Certified Professional Ethical Hacker (CPEH) course, learners will be able to meet these objectives:
- Upon completion, the Certified Professional Ethical Hacker (CPEH) Workshop candidate will be able to competently take the CPEH exam.
Certified Professional Ethical Hacker Training (CPEH) - COURSE SYLLABUS
Course Introduction
- Module 1 – Introduction to Ethical Hacking
- Module 2 – Linux Fundamentals
- Module 3 – Protocols
- Module 4 – Cryptography
- Module 5 – Password Cracking
- Module 6 – Malware
- Module 7 – Security Devices
- Module 8 – Information Gathering – Passive Reconnaissance
- Module 9 – Social Engineering
- Module 10 – Active Reconnaissance
- Module 11 – Vulnerability Assessment
- Module 12 – Network Attacks
- Module 13 – Hacking Servers
- Module 14 – Hacking Web Technologies
- Module 15 – Hacking Wireless Technologies
- Module 16 – Maintaining Access and Covering Tracks
Lab Outline
- Lab 1 – Intro to C_PEH Setup
- Lab 2 – Linux Fundamentals
- Lab 3 – Understanding Protocols
- Lab 4 – Cryptography Lab
- Lab 5 – Password Cracking
- Lab 6 – Malware
- Lab 7 – Information Gathering
- Lab 8 – Vulnerability Assessment
- Lab 9 – Network Sniffing / IDS
- Lab 10 – Windows Hacking
- Lab 11 – Attacking Databases
- Lab 12 – Attacking Web Applications
- Lab 13 – Backdoors
Certified Professional Ethical Hacker Training (CPEH) Course Wrap-Up
Whether you are looking for general information or have a specific question, we want to help.
Request More Information