Course Name: Certified Professional Ethical Hacker which covers C|EH - Certified Ethical Hacker
Course Title: Certified Penetration Testing Engineer
Duration: 5 days
Class Format Options:
- Instructor-led classroom
- Live Online Training
- CBT - Pre-recorded Videos
- A minimum of 12 months experience in networking technologies
- Sound knowledge of TCP/IP
- Knowledge of Microsoft packages
- Network+, Microsoft, or Security+ are helpful
- Some basic Knowledge of Linux is helpful
Student Materials Provided:
- Student Workbook
- Student Lab Guide
- Software/Tools (2 DVDs)
C)PEH Certification Exam covers:
- C)PEH Exam™
- CEH - Certified Ethical Hacker exam objectives
- C)VA - Certified Vulnerabiltiy Assessor
- C)PEH - Certifed Professional Ethical Hacker (Covers C|EH)
- C)PTE - Certified Pen Testing Engineer™ (Covers C|EH)
- C)PTC - Certified Pen Testing Consultant™
The C)PEH is built upon proven hands-on ethical hacking methodologies as utilized by C|EH standards. the C)PEH is a fundamentals hacking course and should you want to "up grade" to penetration testing methodologies, then you should consider mile2's C)PTE - Certified Penetration Testing Engineer which also covers C)PEH/CEH.
The C)PEH certification training, which covers the entry level Cerified Ethical Hacker, presents information on the latest vulnerabilities and defenses. This class also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. We go far beyond simply teaching you to “Hack”. Our course is developed based on principles and methods used by malicious hackers, but its focus is a proven road map towards professional penetration testing and securing information assets.
Please look at the road official road map which follows C)VA --> C)PEH/C|EH --> C)PTE --> C)PTC.
C)PEH students will be able to confidently undertake the C)PEH examination and/or the Certified Ethical Hacker examination (312-50). Students will enjoy an in-depth course that is regularly updated to maintain and incorporate the ever changing cyber security environment through the C)PTE. the C)PTE, which is the up-grade course offers up-to-date proprietary laboratories that have been researched and developed by leading cyber security professionals from around the world.
Benefits of C)PEH Course:
Certified Professional Ethical Hacker graduates would have obtained real world security knowledge that will enable them to recognize vulnerabilities, expose system weaknesses and help safeguard against threats. Graduates will learn the art of Ethical Hacking, but with a professional edge towards the Penetration Testing found in the up-grade course, C)PTE. In addition, the student will be able to under go the C|EH exam.
Objective of Laboratory Scenarios:
This is an intensive hands-on class; rather than spend too much time installing many tools like the C|EH, our focus will be on the ethical hacker model towards penetration testing (Please consider the C)PTE which covers both the C|EH and the Pen Testing model). The latest Pen Testing Tools and methods will be taught in the C)PTE. in the C)PTE then Kali Linix will be utilized on Microsoft Windows 7 and Server 2008. The coure will be using many different tools from GUI to command line. As the student works through mile2's intensive proprietary labs in our cyber range, structured attacks and counter controls will be covered in both Windows and Linux systems.
Mile2 trainers keep abreast of their expertise by practicing what they teach. Because we believe that an equal emphasis on theoretical and real world experience is essential for effective knowledge transfer to you, the student.
Certified Professonal Ethical Hacker that covers Certified Ethical Hacker Topics:
Module 1: Security Fundamentals
Module 2: Access Controls
Module 3: Protocols
Module 4: Network Attack and Defense
Module 5: Cryptography
Module 6: Economics and Law
Module 7: Reconnaissance
Module 8: Scanning and Enumeration
Module 9: Gaining Access/Exploitation
Module 10: Maintaining Access
Module 11: Covering Your Tracks
Module 12: Malware
Module 13: Buffer Overflows
Module 14: Password Cracking Attacks
Module 15: Denial of Service
Module 16: Attacking Web Technologies and Databases
Module 17: Attacking Wireless Devices