C)PEH – Certified Professional Ethical Hacker

No Events on The List at This Time

C)PEH - Certified Professional Ethical Hacker

CPEH large

Original Price =  £2500 + VAT

Offer Price = £1499 + VAT

Please not there are limited seats and advertised cost is only valid until offer is valid , so don't delay pick up phone and speak with one of our advisers  or email us.

The Certified Professional Ethical Hacker vendor-neutral certification course is the foundational training to Mile2’s line of penetration testing courses.

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack.

Exam Information

The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands-on labs emulate real-world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc. Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam.

Accreditations & Acknowledgements

Accreditation And Certifications

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Key Data

Course Title: Certified Professional Ethical Hacker

Duration: 5 Days

Language: English

Class Format Options:

  • Instructor-led classroom
  • Live Online Training

Prerequisites:

  • 12 months of IT security experience
  • 12 months of Networking Experience

Student Materials:

  • Student Workbook
  • Student Lab guide
  • Exam Prep Guide
  • CPEs: 40

Who Should Attend?

  • Information System Owners
  • Security Officers
  • Ethical Hackers
  • Information Owners
  • Penetration Testers
  • System Owner and Managers
  • Cyber Security Engineers

Course Outline

  • Module 1 - Security Fundamentals
  • Module 2 – Access Controls
  • Module 3 - Protocols
  • Module 4 - Cryptography
  • Module 5 - Why Vulnerability Assessments
  • Module 6 - Vulnerability Tools of the Trade
  • Module 7 - Output Analysis and Reports
  • Module 8 - Reconnaissance, Enumeration & Scanning
  • Module 9 - Gaining Access
  • Module 10 - Maintaining Access
  • Module 11 - Covering Tracks
  • Module 12 - Malware
  • Module 13 - Buffer Overflows
  • Module 14 - Password Cracking

Lab Outline

  • Lab 1 – Introduction
  • Lab 2 – Linux Fundamentals
  • Lab 3 - Information Gathering
  • Lab 4 - Enumeration
  • Lab 5 - Finding Vulnerabilities
  • Lab 6 - Network Attacks
  • Lab 7 - Windows Hacking
  • Lab 8 - Linux Hacking
  • Lab 9 - Advanced Vulnerability & Exploitation
  • Lab 10 - Hacking Web Applications & Databases
  • Lab 11 - Appendix

X
X