Certified Professional Ethical Hacker (CPEH) Certified Training - CPD Certified
Course
Online
Description
-
Type
Course
-
Level
Advanced
-
Methodology
Online
-
Class hours
8h
-
Duration
Flexible
-
Start date
Different dates available
The Official Mile2® cybersecurity certification named Certified Professional Ethical Hacker (CPEH) is for the people who want to be a certified professional ethical hacker. The Certified Professional Ethical Hacker (CPEH) Certified Training course covers everything that you need to know about being a certified professional ethical hacker.
Throughout the course, you will learn the security fundamentals including CIA triad, Security definitions, TCI/IP basics, Malware, Network devices and sniffers, Wireless standards and database basics. You will also learn how to control access that covers the access control definition, categories of access control, physical access controls and devices, and logical access controls through Middleware, Operating System and Hardware. The course also discusses different types of protocols including OSI Model, TCI/IP, UND, ARP, DNS, etc. Apart from these, the course also teaches you about the cryptography, vulnerability assessments, and vulnerability tools of the trade, output analysis and reports.
Finally, the course covers the topics such as reconnaissance, enumeration and scanning, gaining access, maintaining access, including tracks, malware, buffer overflows, and password cracking.
Important information
Price for Emagister users:
Facilities
Location
Start date
Start date
About this course
There is no experience or previous qualifications required for enrolment on this course. It is available to all students of all academic backgrounds.
On receiving your request an academic officer from the course will call you to explain everything about the course, including how you can sign up, payment options and enrollment periods.
Reviews
Subjects
- Access Control
- Access
- Security
- Hacker
- Trade
- IP
- Cryptography
- Ethical Hacker
- Protocols
- Vulnerability
Teachers and trainers (1)
Adams Academy
Instructor
Course programme
COURSE CURRICULUM
Security Fundamentals
Security Fundamentals
Access Controls
Access Controls
Protocols
Protocols
Cryptography
Cryptography
Why Vulnerability Assessments?
Why Vulnerability Assessments?
Vulnerability Tools of the Trade
Vulnerability Tools of the Trade
Output Analysis and Reports
Output Analysis and Reports
Reconnaisance, Enumeration and Scanning
Reconnaisance, Enumeration and Scanning
Gaining Access
Gaining Access
Maintaining Access
Maintaining Access
Covering Tracks
Covering Tracks
Malware
Malware
Buffer Overflows
Buffer Overflows
Password Cracking
Password Cracking
Certified Professional Ethical Hacker (CPEH) Certified Training - CPD Certified