Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Certified Professional Ethical Hacker
Description
Certified Penetration Ethical Hacker Training Description:
Welcome to the Certified Penetration Ethical Hacker course. This course is designed to provide in-depth knowledge and practical skills in the field of ethical hacking. It is suitable for professionals with at least 2 years of networking and IT security experience. Participants will gain expertise in ethical hacking and network forensics, making them well-equipped to investigate, secure, and defend information systems.
The Certified Penetration Ethical Hacker course provides foundational training in ethical hacking and penetration testing. It will empower you to think like an ethical hacker and enhance the security of information systems. You’ll learn valuable skills for vulnerability assessments and gain insights into malware, viruses, and effective countermeasures for network security. This course features hands-on labs that replicate real-world ethical hacking scenarios, allowing you to assess and fortify your organization’s security posture.
Certified Penetration Ethical Hacker Key Results:
Upon Completion, Students Will:
- Possess the knowledge and skills to perform network forensic examinations.
- Be proficient in accurately reporting their findings.
- Be fully prepared to sit for the C)NFE Exam.
Certified Penetration Ethical Hacker Prerequisites:
Before enrolling in this course, participants should meet the following prerequisites:
- Minimum of 12 months of IT security experience
- Minimum of 12 months of networking experience
Certified Penetration Ethical Hacker Audience:
This course is ideal for a wide range of professionals, including:
- Ethical Hackers
- Information Security Officers
- System Owners and Managers
- Penetration Testers
- Cyber Security Engineers
- IS Security Owners
- Information Owners
Certified Penetration Ethical Hacker Training Exam Information:
- The Certified Network Forensics Examiner (C)NFE exam is conveniently taken online through Mile2’s Assessment and Certification System (“MACS”) accessible via your mile2.com account.
- The exam consists of 100 multiple-choice questions and typically takes approximately 2 hours to complete.
- A minimum passing grade of 70% is required for certification.
Certified Penetration Ethical Hacker Training Course Outline:
- Introduction to Ethical Hacking
- Linux Fundamentals
- Protocols
- Cryptography
- Password Cracking
- Malware
- Security Devices
- Information Gathering
- Social Engineering
- Reconnaissance
- Vulnerability Assessment
- Network Attacks
- Hacking Servers
- Hacking Web Technologies
- Hacking Wireless Networks
- Maintaining Access and Covering Tracks
Detailed Labs Outline:
- Lab 1: Introduction to C)PEH Setup
- Lab 2: Linux Fundamentals
- Lab 3: Understanding Protocols
- Lab 4: Cryptography Lab
- Lab 5: Password Cracking
- Lab 6: Malware
- Lab 7: Information Gathering
- Lab 8: Information Gathering – Active Reconnaissance
- Lab 9: Vulnerability Assessment
- Lab 10: Network Sniffing/IDS
- Lab 11: Windows Hacking
- Lab 12: Attacking Databases
- Lab 13: Attacking Web Applications
- Lab 14: Backdoors
Prepare to embark on a successful career as a Certified Penetration Ethical Hacker. Master the mindset of an ethical hacker, learn to safeguard information systems, and become a formidable defender against cyber threats.
Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The Certified Professional Ethical Hacker exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple-choice questions. A minimum grade of 70% is required for certification.
Mile2 is Accredited by the NSA-CNSS, Approved on Homelands Security NICCS Framework, and is on the FBI’s Tier 1-3 Certification Training Chart.
Outline
Module 1 – Introduction to Ethical Hacking
- What and Why?
- Differences
- Security Definitions
- Risk Management
- Methodologies
Module 2 – Linux Fundamentals
- Core Concepts
- The shell and other items you need to know
- Managing users
- Basic Commands
Module 3 – Protocols
- Network Models
- Protocols & Services
Module 4 – Cryptography
- Understanding Cryptography
- Symmetric Encryption
- Asymmetric Encryption
- Hashing
- Cryptography in Use
- Crypto Attacks
Module 5 – Password Cracking
- What and Why
- Attacks and Tools of the Trade
- Countermeasures
Module 6 – Malware
- DOS & DDOS
- Viruses & Backdoors
- Trojans and Backdoors
- Ransomeware
Module 7 – Security Devices
- Basic Security Elements
- Security Appliances
Module 8 – Information Gathering
- What are we looking for?
- Where/How do we find this information?
- Are there tools to help?
Module 9 – Social Engineering
- Social Engineering Types
- Phishing Scams
Module 10 – Reconnaissance
- What are we looking for?
- Port Scanning
- Are there tools to help?
- Banner Grabbing
- Enumeration
Module 11 – Vulnerability Assessment
- What is a Vulnerability Assessment
- Tools of the Trade
- Testing Internal and External Systems
Module 12 – Network Attacks
- Sniffing Techniques
- Hijacking
Module 13 – Hacking Servers
- Servers, What are they good for?
- What is an Exploit?
- Tools of the Trade
Module 14 – Hacking Web Technologies
- OWASP Top 10
- SQL Injection
- XSS
Module 15 – Hacking Wireless Networks
- Wireless Technologies
- Mobile and IoT Technologies
- Various Tools Used
- Hacking Techniques
- Countermeasures
Module 16 – Maintaining Access and Covering Tracks
- Maintaining Access
- Covering Tracks
Detailed Labs Outline:
Lab 1 – Intro to C)PEH Setup
a. Recording Ips and Logging into VMs
b. Joining the Domain
Lab 2 – Linux Fundamentals
a. Command Line Tips and Tricks
b. Linux Networking for Beginners
c. Using FTP during a Pentest
Lab 3 – Understanding Protocols
a. Analyze http session
Lab 4 – Cryptography Lab
a. Hashing Data of all Sorts
b. The Basics of Cryptographic Algorithms
Lab 5 – Password Cracking
Lab 6 – Malware
a. Creating a virus
b. Beast Trojan
Lab 7 – Information Gathering
a. Google Queries
b. Searching Pastebin
c. Maltego
d. People Search Using the Spokeo Online Tool
e. Recon with Chrome
f. Nslookup
Lab 8 – Information Gathering – Active Reconnaissance
a. Scanning with Nmap
b. Scanning with Hping
c. Banner Grabbing
d. Enumerating a local System with Hyena
e. SMTP Enumeration
f. Ad Enumeration
Lab 9 – Vulnerability Assessment
a. Vulnerability Assessment with Nessus
b. Vulnerability Assessment with Saint
Lab 10 – Network Sniffing/IDS
a. Sniffing Passwords with Wireshark
b. Performing MtM with Cain
c. Performing MtM with sslstrip
Lab 11 – Windows Hacking
a. Attack Windows 7 with Client-Side Exploit
b. Windows 2012 Reverse TCP Exploit
c. Cracking with John the Ripper
Lab 12 – Attacking Databases
a. Attacking MySQL Database
b. Manual SQL Injection
Lab 13 – Attacking Web Applications
a. Attacking with XSS
b. Attacking with CSRF
Lab 13 – Backdoors
a. Setting up a Backdoor
PreRequisites
- 12 months of IT security experience
- 12 months of Networking Experience
Audience
- IS Security Owners
- Security Officers
- Ethical Hackers
- Information Owners
- Penetration Testers
- System Owners and Managers
- Cyber Security Engineers
|
$3250.00
|
5 Days Course |

