Certified Professional Ethical Hacker (CPEH)
Lesmethode
E-learning
Short description
This is the foundational course of Mile2’s line of penetration testing courses. It covers industry knowledge and skills in Vulnerability assesments.
Expanded description
The Certified Professional Ethical Hacker, vendor neutral, certification course is the foundational training to mile2’s line of penetration testing courses. The C)PEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the C)PEH student is able to understand how malware and destructive viruses function. In addition, the C)PEH course helps students lea…

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
Lesmethode
E-learning
Short description
This is the foundational course of Mile2’s line of penetration testing courses. It covers industry knowledge and skills in Vulnerability assesments.
Expanded description
The Certified Professional Ethical Hacker, vendor neutral, certification course is the foundational training to mile2’s line of penetration testing courses. The C)PEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the C)PEH student is able to understand how malware and destructive viruses function. In addition, the C)PEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack. The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combatagainst hackers and/or viruses, etc.
Contents:
- C)PTC Online Video
- C)PTC Electronic Book (Workbook/Lab guide)
- C)PTC Exam
- 2 weeks Cyber Range access (Request login from Mile 2 when it suits you)
Prerequisites
A student needs to meet the following prequisites in order to fully benefit from the course:
- 12 months of IT security experience
- 12 months of Networking Experience
Who should attend
This course was designed for the benefit of the following organization roles:
- Information System Owners
- Security Officers; Ethical Hackers
- Information Owners; Penetration Testers
- System Owner and Managers
- Cyber Security Engineers
Course outcome
Students who complete this course will be able to asses their company’s security posture and implement network security controls.
Course outline:
- Module 1: Security Fundamentals
- Module 2: Access Controls
- Module 3: Protocols
- Module 4: Cryptography
- Module 5: Why Vulnerability Assessments?
- Module 6: Vulnerability Tools of the Trade
- Module 7: Output Analysis and Reports
- Module 8: Reconnaissance, Enumeration & Scanning
- Module 9: Gaining Access
- Module 10: Maintaining Access
- Module 11: Covering Tracks
- Module 12: Malware
- Module 13: Buffer Overflows
- Module 14: Password Cracking
- Appendix 1: Economics and Law
- Appendix 2: Vulnerability Types
- Appendix 3: Assessing Web Servers
- Appendix 4: Assessing Remote & VPN Services
- Appendix 5: Denial of Services
Lab outline:
- Lab 1: Introduction
- Lab 2: Linux Fundamentals
- Lab 3: Information Gathering
- Lab 4: Enumeration
- Lab 5:Finding Vulnerabilities
- Lab 6: Network Attacks
- Lab 7: Windows Hacking
- Lab 8: Linux Hacking
- Lab 9: Advanced Vulnerability and Exploitation Techniques
- Lab 10: Hacking Web Applications and Databases
- Appendix 1: Input Manipulation
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
