top of page

Certified Professional Ethical Hacker

Duration

Instructor led or Self-Paced

About the Course

For protecting a system, one must think like an attacker who can exploit the system from multiple points. To develop this view point, the Mile2's Certified Professional Ethical Hacker (CPEH) is the foundational training course for new entrants in the field of cyber security. This course is also a part of the Learning path specialisation for Penetration testing track. The student will learn step-wise the basic concepts on performing assessments on information system and understanding the results and utilising this knowledge to further secure and strengthen the information systems and overall information security.


We also provide Cloud Virtual Labs to students for easy connection to our range of virtual machines hosted on a dedicated environment for practising 24X7

Learning Mode

Online / Offline / Self Study

Who should attend?

  • Students

  • IS security owners

  • Ethical Hackers

  • Information owners

  • Penetration Testers

  • System Owners

  • Managers

  • Cyber Security engineers

  • Security officers

Modules / Lessons

Module - 1: Introduction to ethical hacking

Module - 2: Linux Fundamentals

Module - 3: Protocols

Module - 4: Cryptography

Module - 5: Password cracking

Module - 6: Malware

Module - 7: Security devices

Module - 8: Information Gathering - Passive Reconnaissance

Module - 9: Social Engineering

Module - 10: Active Reconnaissance

Module - 11: Vulnerability Assessment

Module - 12: Network Attacks

Module - 13: Hacking Servers

Module - 14: Hacking Web technologies

Module - 15: Hacking wireless technologies

Module - 16: Maintaining access and covering tracks


Hands-On Labs

Lab - 1: Intro to C)PEH setup

Lab - 2: Linux Fundamentals

Lab - 3: Understanding protocols

Lab - 4: Cryptography lab

Lab - 5: Password Cracking

Lab - 6: Malware

Lab - 7: Information gathering

Lab - 8: Information gathering - Active reconnaissance

Lab - 9: Vulnerability assessment

Lab - 10: Network sniffing/IDS

Lab - 11: Windows hacking

Lab - 12: Attacking Databases

Lab - 13: Attacking web applications

Lab - 14: Backdoors

bottom of page