ADD ANYTHING HERE OR JUST REMOVE IT…
IAT
  • IAT
  • Cursos & Certificaciones
  • Partners
  • Programas
  • Contáctanos
0 items / $0.00
Menu
IAT
0 items / $0.00
-17%
Haz click para agrandar
Curso en Vivo en Línea: Cisco Certified Network Associate 200-301 CCNA® (Pago a plazos) $1,140.00
Regresar a Productos
Curso CompTIA Network+ (Especial Cliente Destacado) $997.00 $397.00

Certified Professional Ethical Hacker Pago Único

$1,195.00 $997.00

Annual Salary Potential   $80,077 AVG/year

— O —

Share:
  • Descripción
Descripción

To protect an information system you need to be able to see that system through the eyes of the attacker. The Certified Professional Ethical Hacker certification course is the foundational training to Mile2’s line of penetration testing courses because it teaches you to think like a hacker. Therefore, you can

First, you will learn the value of vulnerability assessments. Then, you will discover how to use those assessments to make powerful changes in an information system’s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack.

Key Course Information

Language: English

Class Formats:

Self-Study

Includes:

  • Course Video
  • E-Book
  • E-Prep Guide
  • E-Lab Guide
  • Exam Simulator
  • 2 weeks Cyber Range
  • 1 Year Courseware Access
  • 1 Year Exam Voucher

Suggested Prerequisites:

(any one of the following)

– Mile2’s C)SP

– 12 months of IT Experience

– 12 Months of Networking Experience

Modules/Lessons

Module 1 -Introduction to Ethical Hacking

Module 2 -Linux Fundamentals

Module 3 -Protocols

Module 4 -Cryptography

Module 5 -Password Cracking

Module 6 -Malware

Module 7 -Security Devices

Module 8 -Information Gathering -Passive Reconnaissance

Module 9 -Social Engineering

Module 10 -Active Reconnaissance

Module 11 -Vulnerability Assessment

Module 12 -Network Attacks

Module 13 -Hacking Servers

Module 14 – Hacking Web Technologies

Module 15 – 16: See Detailed Outline Below

Hands-On Labs

Lab 1 – Intro to C)PEH Setup

Lab 2 – Linux Fundamentals

Lab 3 – Understanding

Protocols

Lab 4 – Cryptography Lab

Lab 5 – Password Cracking

Lab 6 – Malware

Lab 7 – Information Gathering

Lab 8 – Information Gathering – Active Reconnaissance

Lab 9 – Vulnerability

Assessment

Lab 10 – Network Sniffing/IDS

Lab 11  – Windows Hacking

Lab 12 – Attacking Databases

Lab 13 – Attacking Web

Applications

Lab 14 – Backdoors

Upon Completion

Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam.

Who Should Attend

IS Security Owners
– Security Officers
– Ethical Hackers
– Information Owners
– Penetration Testers
– System Owners and Managers
– Cyber Security Engineers

Accreditations

Exam Information

The Certified Professional Ethical Hacker exam is taken online through Mile2’s Learning Management System and is accessible on you Mile2.com account.  The exam will take approximately 2 hours and consist of 100 multiple choice questions.

A minimum grade of 70% is required for certification.

Re-Certification Requirements

All Mile2 certifications will be awarded a 3-year expiration date.

There are two requirements to maintain Mile2 certification:
1) Pass the most current version of the exam for your respective existing certification
2) Earn and submit 20 CEUs per year in your Mile2 account.

Course FAQ’s

Question:  Do I have to purchase a course to buy a certification exam?

Answer: No

Question: Do all Mile2 courses map to a role-based career path?

Answer: Yes.  You can find the career path and other courses associated with it at info@iatpr.com

Question:  Are all courses available as self-study courses?

Answer: Yes.  There is however 1 exception.  The Red Team vs Blue Team course is only available as a live class.

Question:  Are Mile2 courses transferable/shareable?

Answer: No.  The course materials, videos, and exams are not meant to be shared or transferred.

Course and Certification Learning Options

Detailed Outline:

Module 1 – Introduction to Ethical Hacking

  1. What and Why?
  2. Differences
  3. Security Definitions
  4. Risk Management
  5. Methodologies

Module 2 – Linux Fundamentals

  1. Core Concepts
  2. The shell and other items you need to know
  3. Managing users
  4. Basic Commands

Module 3 – Protocols

  1. Network Models
  2. Protocols & Services

Module 4 – Cryptography

  1. Understanding Cryptography
  2. Symmetric Encryption
  3. Asymmetric Encryption
  4. Hashing
  5. Cryptography in Use
  6. Crypto Attacks

Module 5 – Password Cracking

  1. What and Why
  2. Attacks and Tools of the Trade
  3. Countermeasures

Module 6 – Malware

  1. DOS & DDOS
  2. Viruses & Backdoors
  3. Trojans and Backdoors
  4. Ransomeware

Module 7 – Security Devices

  1. Basic Security Elements
  2. Security Appliances

Module 8 – Information Gathering

  1. What are we looking for?
  2. Where/How do we find this information?
  3. Are there tools to help?

Module 9 – Social Engineering

  1. Social Engineering Types
  2. Phishing Scams

Module 10 – Reconnaissance

  1. What are we looking for?
  2. Port Scanning
  3. Are there tools to help?
  4. Banner Grabbing
  5. Enumeration

Module 11 – Vulnerability Assessment

  1. What is a Vulnerability Assessment
  2. Tools of the Trade
  3. Testing Internal and External Systems

Module 12 - Network Attacks

  1. Sniffing Techniques
  2. Hijacking

Module 13 – Hacking Servers

  1. Servers, What are they good for?
  2. What is an Exploit?
  3. Tools of the Trade

Module 14 – Hacking Web Technologies

  1. OWASP Top 10
  2. SQL Injection
  3. XSS

Module 15 – Hacking Wireless Networks

  1. Wireless Technologies
  2. Mobile and IoT Technologies
  3. Various Tools Used
  4. Hacking Techniques
  5. Countermeasures

Module 16 – Maintaining Access and Covering Tracks

  1. Maintaining Access
  2. Covering Tracks

Detailed Labs Outline:

Lab 1 – Intro to C)PEH Setup

  1. Recording Ips and Logging into VMs
  2. Joining the Domain

Lab 2 - Linux Fundamentals

  1. Command Line Tips and Tricks
  2. Linux Networking for Beginners
  3. Using FTP during a Pentest

Lab 3 – Understanding Protocols

  1. Analyze http session

Lab 4 - Cryptography Lab

  1. Hashing Data of all Sorts
  2. The Basics of Cryptographic Algorithms

Lab 5 – Password Cracking Lab 6 - Malware

  1. Creating a virus
  2. Beast Trojan

Lab 7 – Information Gathering

  1. Google Queries
  2. Searching Pastebin
  3. Maltego
  4. People Search Using the Spokeo Online Tool
  5. Recon with Chrome
  6. Nslookup

Lab 8 – Information Gathering – Active Reconnaissance

  1. Scanning with Nmap
  2. Scanning with Hping
  3. Banner Grabbing
  4. Enumerating a local System with Hyena
  5. SMTP Enumeration
  6. Ad Enumeration

Lab 9 – Vulnerability Assessment

  1. Vulnerability Assessment with Nessus
  2. Vulnerability Assessment with Saint

Lab 10 – Network Sniffing/IDS

  1. Sniffing Passwords with Wireshark
  2. Performing MtM with Cain
  3. Performing MtM with sslstrip

Lab 11 - Windows Hacking

  1. Attack Windows 7 with Client-Side Exploit
  2. Windows 2012 Reverse TCP Exploit
  3. Cracking with John the Ripper

Lab 12 – Attacking Databases

  1. Attacking MySQL Database
  2. Manual SQL Injection

Lab 13 – Attacking Web Applications

  1. Attacking with XSS
  2. Attacking with CSRF

Lab 13 - Backdoors

  1. Setting up a Backdoor
®️ Copyright 2022 by Institute Advanced Technology, LLC. Todos los derechos reservados. This site is not a part of the Facebook website or Facebook Inc. Additionally, This site is NOT endorsed by Facebook in any way. FACEBOOK is a trademark of FACEBOOK, Inc.
  • IAT
  • Cursos & Certificaciones
  • Partners
  • Programas
  • Contáctanos
Mi Carrito
cerrar
Usamos cookies para ofrecerle una mejor experiencia. Saber más
Estoy de acuerdo
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Siempre activado
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDuraciónDescripción
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
GUARDAR Y ACEPTAR