The Certified Professional Ethical Hacker course is the introductory training to mile2’s line of penetration testing courses and certifications. The course training helps students gain a valuable skillset in penetration testing by understand the importance of vulnerability assessments and ethical hacking through:
Learning the knowledge and skills behind a vulnerability assessment.
Preparation to apply this knowledge and exercise these skills in the interest of others.
Understand the importance of a Vulnerability Assessment and how it can help you prevent serious break-ins to your organization.
This is accomplished by:
Performing in-depth labs with industry standard tools.
Learning the penetration testing methodology through conceptual theories and real-world practices.
Equipping you with the knowledge about what hackers look for when trying to hack into your network.
Assessing for the cause of testing your company’s security posture to help better secure the infrastructure against intrusion.
Have knowledge to perform ethical hacking for vulnerability assessments.
Have knowledge to accurately report on their findings.
Be ready to sit for the C)PEH exam.
This is an intensive, hands-on class. And as such, our focus will be on the ethical hacking model of penetration testing. Students will work through mile2’s intensive proprietary labs in our cyber range learning structured attacks and counter controls in both Windows and Linux systems. These labs will provide students with the experience necessary to perform ethical hacking on their own business and to recommend solutions to vulnerabilities found.
Also available as:
LIVE VIRTUAL TRAINING
Attend live classes from anywhere in the world!
Our Live Online classes make use of industry standard meeting and collaboration technologies. Students use simple web based tools to view slides, the instructors desktop, and videos all while holding live audio (and chat) discussions with the instructor.
During lab time, each remote student has a dedicated high spec remote PC. Students have full desktop access as if they were sitting in-front a PC in the actual computer lab.
The instructor monitors each student’s PC as they perform the labs remotely. The instructor can access the remote student’s system to demonstrate and assist in the event questions arise.
Public and private text chat allows for increased interactivity between students and instructor during class in a way that prevents interruptions to other students.
Module 1: Security Fundamentals
Module 2: Access Controls
Module 3: Protocols
Module 4: Cryptography
Module 5: Why Vulnerability Assessments
Module 6: Vulnerability Tools of the Trade
Module 7: Output Analysis and Reports
Module 8: Reconnaissance, Enumeration and Scanning
Module 9: Gaining Access
Module 10: Maintaining Access
Module 11: Covering Tracks
Module 12: Malware
Module 13: Buffer Overflows
Module 14: Password Cracking
Appendix 1: Economics and Law
Appendix 2: Vulnerabilities Types
Appendix 3: Assessing Web Servers
Appendix 4: Assessing Remote & VPN Services
Review and Exam
Our Courses Includes*:
Refer a friend Get 5% off*
Call Us Today!
(787) 998 0602
(787) 998 0720
Choose your best option:
• Classroom Training
• Online Training
• Live Virtual Training