Home > Course Catalog > Choose By Topics > Cybersecurity > CPEH: Certified Professional Ethical Hacker Training Course
About this Cybersecurity Training Course:
The Certified Professional Ethical Hacker Cybersecurity Training Course is the foundational training for the line of penetration testing Cybersecurity Training Courses.
The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessment. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH Cybersecurity Training Course helps students learn how to implement counter response and preventative measures when it comes to a network hack.
The CPEH Cybersecurity Training Course provides in-depth Labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equips the candidate to asses your companys security posture, help implement controls to better secure your companies network infrastructure and how to combat against hackers and/or viruses, etc.
Start Date | Delivery Format | Days | Time | Status | Price | Enroll |
---|---|---|---|---|---|---|
Coming Soon | Live Virtual Led | 5 | 10:00 am | Enrolling Now | $2,995 | |
Coming Soon | Live Virtual Led | 5 | 10:00 am | Enrolling Now | $2,995 |
Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam.
Module 1 – Security Fundamentals
Module 2 Access Controls
Module 3 – Protocols
Module 4 -Cryptography
Module 5 – Why Vulnerability Assessments
Module 6 – Vulnerability Tools of the Trade
Module 7 – Output Analysis and Reports
Module 8 – Reconnaissance, Enumeration and Scanning
Module 9 – Gaining Access
Module 10 – Maintaining Access
Module 11 – Covering Tracks
Module 12 – Malware
Module 13 – Buffer Overflows
Module 14 – Password Cracking
Appendix 1 – Economics and Law
Appendix 2 – Vulnerability Types
Appendix 3 – Assessing Web Servers
Appendix 4 – Assessing Remote & VPN Services