To protect an information system you need to be able to see that system through the eyes of the attacker. The Certified Professional Ethical Hacker certification course is the foundational training to Mile2’s line of penetration testing courses because it teaches you to think like a hacker. Therefore, you can
First, you will learn the value of vulnerability assessments. Then, you will discover how to use those assessments to make powerful changes in an information system’s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack.
Key Course Information
Language: English
Class Formats:
Self-Study
Includes:
- Course Video
- E-Book
- E-Prep Guide
- E-Lab Guide
- Exam Simulator
- 2 weeks Cyber Range
- 1 Year Courseware Access
- 1 Year Exam Voucher
Suggested Prerequisites:
(any one of the following)
– Mile2’s C)SP
– 12 months of IT Experience
– 12 Months of Networking Experience
Modules/Lessons
Module 1 -Introduction to Ethical Hacking
Module 2 -Linux Fundamentals
Module 3 -Protocols
Module 4 -Cryptography
Module 5 -Password Cracking
Module 6 -Malware
Module 7 -Security Devices
Module 8 -Information Gathering -Passive Reconnaissance
Module 9 -Social Engineering
Module 10 -Active Reconnaissance
Module 11 -Vulnerability Assessment
Module 12 -Network Attacks
Module 13 -Hacking Servers
Module 14 – Hacking Web Technologies
Module 15 – 16: See Detailed Outline Below
Hands-On Labs
Lab 1 – Intro to C)PEH Setup
Lab 2 – Linux Fundamentals
Lab 3 – Understanding
Protocols
Lab 4 – Cryptography Lab
Lab 5 – Password Cracking
Lab 6 – Malware
Lab 7 – Information Gathering
Lab 8 – Information Gathering – Active Reconnaissance
Lab 9 – Vulnerability
Assessment
Lab 10 – Network Sniffing/IDS
Lab 11 – Windows Hacking
Lab 12 – Attacking Databases
Lab 13 – Attacking Web
Applications
Lab 14 – Backdoors
Upon Completion
Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam.
Who Should Attend
IS Security Owners
– Security Officers
– Ethical Hackers
– Information Owners
– Penetration Testers
– System Owners and Managers
– Cyber Security Engineers
Accreditations

Exam Information
The Certified Professional Ethical Hacker exam is taken online through Mile2’s Learning Management System and is accessible on you Mile2.com account. The exam will take approximately 2 hours and consist of 100 multiple choice questions.
A minimum grade of 70% is required for certification.
Re-Certification Requirements
All Mile2 certifications will be awarded a 3-year expiration date.
There are two requirements to maintain Mile2 certification:
1) Pass the most current version of the exam for your respective existing certification
2) Earn and submit 20 CEUs per year in your Mile2 account.
Course FAQ’s
Question: Do I have to purchase a course to buy a certification exam?
Answer: No
Question: Do all Mile2 courses map to a role-based career path?
Answer: Yes. You can find the career path and other courses associated with it at info@iatpr.com
Question: Are all courses available as self-study courses?
Answer: Yes. There is however 1 exception. The Red Team vs Blue Team course is only available as a live class.
Question: Are Mile2 courses transferable/shareable?
Answer: No. The course materials, videos, and exams are not meant to be shared or transferred.
Course and Certification Learning Options

Detailed Outline:
- What and Why?
- Differences
- Security Definitions
- Risk Management
- Methodologies
- Core Concepts
- The shell and other items you need to know
- Managing users
- Basic Commands
- Network Models
- Protocols & Services
- Understanding Cryptography
- Symmetric Encryption
- Asymmetric Encryption
- Hashing
- Cryptography in Use
- Crypto Attacks
- What and Why
- Attacks and Tools of the Trade
- Countermeasures
- DOS & DDOS
- Viruses & Backdoors
- Trojans and Backdoors
- Ransomeware
- Basic Security Elements
- Security Appliances
- What are we looking for?
- Where/How do we find this information?
- Are there tools to help?
- Social Engineering Types
- Phishing Scams
- What are we looking for?
- Port Scanning
- Are there tools to help?
- Banner Grabbing
- Enumeration
- What is a Vulnerability Assessment
- Tools of the Trade
- Testing Internal and External Systems
- Sniffing Techniques
- Hijacking
- Servers, What are they good for?
- What is an Exploit?
- Tools of the Trade
- OWASP Top 10
- SQL Injection
- XSS
- Wireless Technologies
- Mobile and IoT Technologies
- Various Tools Used
- Hacking Techniques
- Countermeasures
- Maintaining Access
- Covering Tracks
Detailed Labs Outline:
- Recording Ips and Logging into VMs
- Joining the Domain
- Command Line Tips and Tricks
- Linux Networking for Beginners
- Using FTP during a Pentest
- Analyze http session
- Hashing Data of all Sorts
- The Basics of Cryptographic Algorithms
- Creating a virus
- Beast Trojan
- Google Queries
- Searching Pastebin
- Maltego
- People Search Using the Spokeo Online Tool
- Recon with Chrome
- Nslookup
- Scanning with Nmap
- Scanning with Hping
- Banner Grabbing
- Enumerating a local System with Hyena
- SMTP Enumeration
- Ad Enumeration
- Vulnerability Assessment with Nessus
- Vulnerability Assessment with Saint
- Sniffing Passwords with Wireshark
- Performing MtM with Cain
- Performing MtM with sslstrip
- Attack Windows 7 with Client-Side Exploit
- Windows 2012 Reverse TCP Exploit
- Cracking with John the Ripper
- Attacking MySQL Database
- Manual SQL Injection
- Attacking with XSS
- Attacking with CSRF
- Setting up a Backdoor
