Duration: 5 days‏

Class Format Options:
Instructor-led classroom or
Live Online Training‏


Registrese Aquí



The Certified Professional Ethical Hacker course is the introductory training to mile2’s line of penetration testing courses and certifications. The course training helps students gain a valuable skillset in penetration testing by understand the importance of vulnerability assessments and ethical hacking through:

  1. Learning the knowledge and skills behind a vulnerability assessment.

  2. Preparation to apply this knowledge and exercise these skills in the interest of others.

  3. Understand the importance of a Vulnerability Assessment and how it can help you prevent serious break-ins to your organization.

This is accomplished by:

  • Performing in-depth labs with industry standard tools.
  • Learning the penetration testing methodology through conceptual theories and real-world practices.
  • Equipping you with the knowledge about what hackers look for when trying to hack into your network.
  • Assessing for the cause of testing your company’s security posture to help better secure the infrastructure against intrusion.


Students will:

  • Have knowledge to perform ethical hacking for vulnerability assessments.
  • Have knowledge to accurately report on their findings.
  • Be ready to sit for the C)PEH exam.


This is an intensive, hands-on class. And as such, our focus will be on the ethical hacking model of penetration testing. Students will work through mile2's intensive proprietary labs in our cyber range learning structured attacks and counter controls in both Windows and Linux systems. These labs will provide students with the experience necessary to perform ethical hacking on their own business and to recommend solutions to vulnerabilities found.



Also available as:
Attend live classes from anywhere in the world!

  •  Our Live Online classes make use of industry standard meeting and collaboration technologies.  Students use simple web based tools to view slides, the instructors desktop, and videos all while holding live audio (and chat) discussions with the instructor.
  • During lab time, each remote student has a dedicated high spec remote PC. Students have full desktop access as if they were sitting in-front a PC in the actual computer lab.
  • The instructor monitors each student’s PC as they perform the labs remotely. The instructor can access the remote student’s system to demonstrate and assist in the event questions arise.
  • Public and private text chat allows for increased interactivity between students and instructor during class in a way that prevents interruptions to other students.



Module 1: Security Fundamentals
Module 2: Access Controls
Module 3: Protocols
Module 4: Cryptography
Module 5: Why Vulnerability Assessments
Module 6: Vulnerability Tools of the Trade
Module 7: Output Analysis and Reports
Module 8: Reconnaissance, Enumeration and Scanning
Module 9: Gaining Access
Module 10: Maintaining Access
Module 11: Covering Tracks
Module 12: Malware
Module 13: Buffer Overflows
Module 14: Password Cracking
Appendix 1: Economics and Law
Appendix 2: Vulnerabilities Types
Appendix 3: Assessing Web Servers
Appendix 4: Assessing Remote & VPN Services
Review and Exam

Instructor: José L. Quiñones has 15+ years of experience in the IT field and holds a Bachelors in Science in Electronic Engineering Technology, holds various professional certifications in systems administration area such as: MCP, MCSA, MCT and RHCSA, but also in the IT security field such as: CEH, CEI, GCIH and GPEN. Mainly workes in the Health and Education industries as IT Director for a Medical School, but also works as an independent consultant in IT infrastructure and security architecture. Jose has design courses and workshops in Networking, Windows, Linux, Virtualization, Ethical Hacking and Incident Handling; and teaches certification programs for professional educational companies.


  Call Us Today!
(787) 998 0602
(787) 998 0720
Email: info@iatpr.com

Choose your best option:
• Classroom Training
• Online Training
• Onsite Training


*Some rules and restrictions may apply, please call.