Skip to content

Professional Ethical Hacker Training


Stone River eLearning

Summary

Price
£12 inc VAT
Study method
Online
Duration
8 hours · Self-paced
Qualification
No formal qualification

Overview

The CPEH*Certified Professional Ethical Hacker is a vendor-neutral certification offered by Mile2 for the students willing to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. In doing so, the CPEH* students are able to understand how malware and destructive viruses function. In addition to this, the CPEH* course helps students learn how to implement counter response and take preventive measures in case of an attack on the network.

This preparatory course for the Certified Professional Ethical Hacker (CPEH*) certification covers the complete curriculum required to clear the certification exam. The topics covered in this course are security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking.

Exam Information

The CPEH* course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands-on labs emulate real-world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc. Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH* exam.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

What You'll Learn

  • Learn the fundamentals of network security
  • Implement access controls
  • Understand the network security protocols
  • Learn cryptography and its uses
  • Conduct effective vulnerability assessments
  • Learn how to cover tracks
  • Understand the functioning of malware
  • Crack passwords

Description

Course Content

Module 01 - Security Fundamentals (51:21)
Security Fundamentals (19:45)
Malware (14:43)
Firewalls (16:53)
Module 01- Quiz (5 questions)

Module 02 - Access Controls (33:10)
Access Controls Part1 (14:12)
Access Controls Part2 (18:58)
Module 02 - Quiz (5 questions)

Module 03 - Protocols (36:03)
Protocols Part1 (17:40)
Protocols Part2 (18:23)
Module 03 - Quiz (5 questions)

Module 04 - Cryptography (01:09:53)
Cryptography Part1 (17:51)
Cryptography Part2 (16:32)
Cryptography Part3 (17:45)
Cryptography Part4 (17:45)
Module 04 - Quiz (5 questions)

Module 05 - Why Vulnerability Assessments? (36:11)
Why Vulnerability Assessments? Part1 (19:14)
Why Vulnerability Assessments? Part2 (16:57)
Module 05 - Quiz (5 questions)

Module 06 - Vulnerability Tools of the Trade (10:13)
Vulnerability Tools of the Trade (10:13)
Module 06 - Quiz (5 questions)

Module 07 - Output Analysis and Reports (13:15)
Output Analysis and Reports (13:15)
Module 07 - Quiz (5 questions)

Module 08 - Reconnaissance, Enumeration and Scanning (51:26)
Reconnaissance, Enumeration and Scanning Part1 (18:58)
Reconnaissance, Enumeration and Scanning Part2 (16:27)
Reconnaissance, Enumeration and Scanning Part3 (16:01)
Module 08 - Quiz (5 questions)

Module 09 - Gaining Access (31:01)
Gaining Access Part 1 (15:33)
Gaining Access Part 2 (15:28)
Module 09 - Quiz (5 questions)

Module 10 - Maintaining Access (17:16)
Maintaining Access (17:16)
Module 10 - Quiz (5 questions)

Module 11 - Covering Tracks (18:00)
Covering Tracks (18:00)
Module 11 - Quiz (5 questions)

Module 12 - Malware (28:27)
Malware Part 1 (15:01)
Malware Part 2 (13:26)
Module 12 - Quiz (5 questions)

Module 13 - Buffer Overflows (22:09)
Buffer Overflows Part 1 (09:10)
Buffer Overflows Part 2 (12:59)
Module 13 - Quiz (5 questions)

Module 14 - Password Cracking (33:18)
Password Cracking Part 1 (13:15)
Password Cracking Part 2 (20:03)
Module 14 - Quiz (5 questions)

Who is this course for?

  • Information System Owners
  • Security Officers
  • Ethical Hackers
  • Information Owners
  • Penetration Testers
  • System Owner and Managers
  • Cyber Security Engineers

Requirements

The candidates opting for this course are recommended to have a minimum of one year of experience in the field of information technology especially networking.

Career path

Cyber Security Officer

Questions and answers


No questions or answers found containing ''.


Steven asked:

Do you get a certificate to say you have completed this course?

Answer:

Yes, you get a "Certificate of Completion " for all the courses you take on our site.

This was helpful. Thank you for your feedback.
Sean asked:

Will I just receive a certificate stating I have completed this course? will that then be justifiable in taking the CEH exam?

Answer:

This preparatory course for the Certified Professional Ethical Hacker (CPEH*) certification covers the complete curriculum required to clear the certification exam. Please contact Mile2 for more details. We would recommend to practice more sample questions for better success.

This was helpful. Thank you for your feedback.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.