Close

Certified Professional Ethical Hacker

C)PEH Certified Professional Ethical Hacker Badge

To protect an information system you need to be able to see that system through the eyes of the attacker. The Certified Professional Ethical Hacker certification course is the foundational training to Mile2’s line of penetration testing courses because it teaches you to think like a hacker.  Therefore, you can set up dynamic defenses to prevent intrusion. 

 

First, you will learn the value of vulnerability assessments.  Then, you will discover how to use those assessments to make powerful changes in an information system’s security.  Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. 

Increase Earnings Mile2 Cyber Security Certification

Annual Salary Potential

The C)PEH is a part of these Role-Based Career Paths

Ethical hacking Career Path Mile2 Cyber Security Certification

Intrusion Prevention Specialist

Think Like a Hacker

Level 200 - C)SP
Level 300 - C)PEH
Level 350 - C)PTE
Level 400 - C)PTC
Ethical hacking Career Path Mile2 Cyber Security Certification

Cyber Threat Analyst

Think Like a Hacker

Level 200 - C)VA
Level 300 - C)PEH
Level 350 - C)TIA
Level 400 - C)CSA
Ethical hacking Career Path Mile2 Cyber Security Certification

Application Security Engineer

Build secure applications from the ground up.

Level 200 - C)SP
Level 300 - C)PEH
Level 350 - C)PTE
Level 400 - C)CSWAE

Key Course Information

Live Class Duration: 5 Days

Language: English

Class Formats:
*  Instructor-led

*  Self-Study

*  Live Virtual Training

Suggested Prior Knowledge:

*  12 months of IT security experience

or

*  12 months of Networking experience

Applicable Exams:

*  Mile2 C)PEH

CPEs:  40

Who Should Attend

* IS Security Owners
* Security Officers
* Ethical Hackers
* Information Owners
* Penetration Testers
* System Owners and Managers
* Cyber Security Engineers

Modules

  • Module 0 – Course Introduction 
  • Module 1 – Introduction to Ethical Hacking
  • Module 2 – Linux Fundamentals
  • Module 3 – Protocols
  • Module 4 – Cryptography
  • Module 5 – Password Cracking
  • Module 6 – Malware
  • Module 7 – Security Devices
  • Module 8 – Information Gathering – Passive Reconnaissance
  • Module 9 – Social Engineering
  • Module 10 – Active Reconnaissance
  • Module 11 – Vulnerability Assessment
  • Module 12 – Network Attacks
  • Module 13 – Hacking Servers
  • Module 14 – Hacking Web Technologies
  • Module 15 –  Hacking Wireless Technologies
  • Module 16 – Maintaining Access and Covering Tracks

Labs

  • Module 1 – Introduction to the C)PEH Setup
  • Module 2 – Linux Fundamentals
  • Module 3 – Understanding Protocols
  • Module 4 – Cryptography
  • Module 5 – Password Cracking
  • Module 6 – Malware
  • Module 7 – Information Gathering
  • Module 8 – Information Gathering – Active Reconnaissance
  • Module 9 – Vulnerability Assessment
  • Module 10 – Network Sniffing/IDS
  • Module 11 – Windows Hacking
  • Module 12 – Attacking Databases
  • Module 13 – Attacking Web Applications
  • Module 14 – Backdoors

Accreditations

Upon Completion

Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam.

Re-Certification Requirements

All  Mile2 certifications will be awarded a 3-year expiration date.

There are two requirements to maintain Mile2 certification: 

1)  Pass the most current version of the exam for your respective existing certification

2)  Earn 20 CEUs (Continuing Education Units) per year. You may submit your CEUs in your Mile2 inbox. These CEUs must fall under “Qualify Continuing Educational Activities).

Visit our certification renewal page for more information.

Exam Information

The Certified Professional Ethical Hacker exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions.


Purchase Options:

Course FAQ's

Do I have to purchase a course to buy a certification exam?

NO.  You do not have to purchase a course to purchase a certification exam.  

Do all Mile2 courses map to a role-based career path?

All of our courses can be taken independently.  In order to help guide our students on their cybersecurity career journey we have developed the Mile2 Certification Roadmap.

This helpful resource maps specific courses to Role-based career tracks.

How to I Access My Exam?

1. Go to mile2.com/my-account

2. Select the "Courses" tab
3. Choose the course name that matches the exam you want to take

4. In the course materials, scroll to the bottom of the page to find the certifiation exam.
5.  See this helpful video:

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!