C)PEH: Certified Penetration Ethical Hacker
At Course Completion
Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam.
Audience Profile
Information System Owners
Security Officers
Ethical Hackers
Information Owners
Penetration Testers
System Owner and Managers
Cyber Security Engineers
Prerequisites
12 months of IT security experience
12 months of Networking Experience
Outline
Module 1 - Security Fundamentals
Module 2 – Access Controls
Module 3 - Protocols
Module 4 -Cryptography
Module 5 - Why Vulnerability Assessments?
Module 6 - Vulnerability Tools of the Trade
Module 7 - Output Analysis and Reports
Module 8 - Reconnaissance, Enumeration & Scanning
Module 9 - Gaining Access
Module 10 - Maintaining Access
Module 11 - Covering Tracks
Module 12 - Malware
Module 13 - Buffer Overflows
Module 14 - Password Cracking
Appendix 1 - Economics and Law
Appendix 2 - Vulnerability Types
Appendix 3 - Assessing Web Servers
Appendix 4 - Assessing Remote & VPN Services
Appendix 5 - Denial of Services
Sorry! It looks like we haven’t updated our dates for the class you selected yet. There’s a quick way to find out. Contact us at 502.265.3057 or email info@training4it.com
Request a Date