Corporate Courses

C)PEH: Certified Professional Ethical Hacker

Course Outline

First, you will learn the value of vulnerability assessments. Then, you will discover how to use those assessments to make powerful changes in an information system’s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack.

Location

Online

Prerequisites

  • Mile2’s SP
  • 12 months of IT Experience
  • 12 Months of Networking Experience

Course Content

Module 1 – Introduction to Ethical Hacking
Module 2 – Linux Fundamentals
Module 3 – Protocols
Module 4 – Cryptography
Module 5 – Password Cracking
Module 6 – Malware
Module 7 – Security Devices
Module 8 – Information Gathering, Passive Reconnaissance
Module 9 – Social Engineering
Module 10 – Active Reconnaissance
Module 11 – Vulnerability Assessment
Module 12 – Network Attacks
Module 13 – Hacking Servers
Module 14 – Hacking Web Technologies

Enquire Now!