Mile2 Certified Professional Ethical Hacker (C)PEH)
-
I feel this course is easy to do because of the easy study material and amazing support service. I will definitely recommend this to others.
← | →
Course
Online
Enhance your career with this course!
-
Type
Course
-
Level
Intermediate
-
Methodology
Online
-
Class hours
40h
-
Duration
12 Months
-
Start date
Different dates available
-
Online campus
Yes
-
Delivery of study materials
Yes
-
Support service
Yes
-
Virtual classes
Yes
Hudson have partnered with Mile2 as an Authorized Training Center to offer the Certified Professional Ethical Hacker (CPEH) course. Mile2 designs, develops, and delivers Information Security training and Information Assurance services that meet military, government, private sector and institutional specifications. In doing so, Mile2 has become the de facto standard for a number organizations and militaries worldwide.
Facilities
Location
Start date
Start date
About this course
The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack.
The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc.
Information System Owners
Security Officers
Ethical Hackers
Penetration Testers
System Owner and Managers
Cyber Security Engineers
This is an online course with 24/7 access. You can do it from any where in the world, any time of the day providing you have an internet connection and a device such as a laptop, PC, or Mac. No apps are required to access the courses. You simply do it from your browser. For the best user experience, we recommend Google Chrome.
This is an online, self-paced course, meaning you do it in your own home, in your own time, at your own pace. Each lesson is pre-recorded allowing you to pause, fast-forward, skip sections, or go back to another lesson if you need to. Aside from the written notes and mock exam, the lessons are multi-media based, which means video and audio are used to teach the lessons. Most courses are also interactive, prompting the learner to participate. This involves answering on-screen questions at the end of each course through the practice exam.
Reviews
-
I feel this course is easy to do because of the easy study material and amazing support service. I will definitely recommend this to others.
← | →
Course rating
Recommended
Centre rating
ASHLEY CONNOR- IEMA
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
- Hacker
- Access
- Security
- Fundamentals
- Access controls
- Protocols
- Cryptography
- Assessments
- Vulnerability
- Tools
- Reconnaissance
- Enumeration
Course programme
Course areas covered
- Module 1 – Security Fundamentals
- Module 2 – Access Controls
- Module 3 – Protocols
- Module 4 -Cryptography
- Module 5 – Why Vulnerability Assessments?
- Module 6 – Vulnerability Tools of the Trade
- Module 7 – Output Analysis and Reports
- Module 8 – Reconnaissance, Enumeration & Scanning
- Module 9 – Gaining Access
- Module 10 – Maintaining Access
- Module 11 – Covering Tracks
- Module 12 – Malware
- Module 13 – Buffer Overflows
- Module 14 – Password Cracking
- Appendix 1 – Economics and Law
- Appendix 2 – Vulnerability Types
- Appendix 3 – Assessing Web Servers
- Appendix 4 – Assessing Remote & VPN Services
- Appendix 5 – Denial of Services
Additional information
Mile2 Certified Professional Ethical Hacker (C)PEH)