Course Code: 2395

CPEH - Certified Professional Ethical Hacker

Class Dates:
12/10/2018
3/4/2019
Length:
5 Days
Cost:
$2895.00
Class Time:
Technology:
Security
Delivery:
Virtual Instructor-Led Training, Instructor-Led Training

Overview

  • Course Overview
  • The Certified Professional Ethical Hacker 5 - day vendor neutral certification course is the foundational training to course to penetration testing courses.

    The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessment. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack.

    The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to asses your company’s security posture, help implement controls to better secure your company’snetwork infrastructure and how to combat against hackers and/or viruses, etc.

  • Audience
  • Course accredited with the NSA-CNSS (CNSSI-4013 National Information Assurance Training Standard for System Administrators) and is on FBI’s Tier 1 cyber security training requirement.



    Who Should Attend
    * Information System Owners
    * Security Officers
    * Ethical Hackers
    * Information Owners
    * Penetration Testers
    * System Owner and Managers
    * Cyber Security Engineers

Prerequisites

  • Prerequisites:

    * 12 months of IT security experience
    * 12 months of Network

    Student Materials: * Student Workbook
    * Student Lab guide
    * Exam Prep Guide



    40 CPE Credits

  • Recommended Courses:

Course Details

  • Outline
  • Module 1 - Security Fundamentals
  • Module 2 - Access Controls
  • Module 3 - Protocols
  • Module 4 -Cryptography
  • Module 5 - Why Vulnerability Assessments?
  • Module 6 - Vulnerability Tools of the Trade
  • Module 7 - Output Analysis and Reports
  • Module 8 - Reconnaissance, Enumeration
  • Module 9 - Gaining Access
  • Module 10 - Maintaining Access
  • Module 11 - Covering Tracks
  • Module 12 - Malware
  • .
  • Module 13 - Buffer Overflows
  • Module 14 - Password Cracking
  • Appendix 1 - Economics and Law
  • Appendix 2 - Vulnerability Types
  • Appendix 3 - Assessing Web Servers
  • Appendix 4 - Assessing Remote & VPN Services
  • Appendix 5 - Denial of Services
  • What you will learn
  • Performing in-depth labs with industry standard tools.
  • Learning the penetration testing methodology through conceptual theories and real-world practices.
  • Equipping you with the knowledge about what hackers look for when trying to hack into your network
  • Assessing for the cause of testing your company’s security posture to help better secure the infrastructure against intrusion
  • Upon Completion
  • Have knowledge to perform ethical hacking for vulnerability assessments.
  • Have knowledge to accurately report on their findings.
  • Be ready to sit for the C)PEH Exam
  • Class Format Options
  • Instructor-led: Traditional classroom setting
  • Live-virtual Training: Connect remotely to the class being taught live.