Maxtrain.com - [email protected] - 513-322-8888 - 866-595-6863
To protect an information system you need to be able to see that system through the eyes of the attacker. The Certified Professional Ethical Hacker certification course is the foundational training to Mile2’s line of penetration testing courses because it teaches you to think like a hacker.
First, you will learn the value of vulnerability assessments. Then, you will discover how to use those assessments to make powerful changes in an information system’s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack.
The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc.
The CPEH certification training is a 5 day instructor led course
Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The Certified Professional Ethical Hacker exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple-choice questions. A minimum grade of 70% is required for certification.
Mile2 is Accredited by the NSA-CNSS, Approved on Homelands Security NICCS Framework, and is on the FBI’s Tier 1-3 Certification Training Chart.
a. Recording Ips and Logging into VMs b. Joining the Domain
a. Command Line Tips and Tricks b. Linux Networking for Beginners c. Using FTP during a Pentest
a. Analyze http session
a. Hashing Data of all Sorts b. The Basics of Cryptographic Algorithms
a. Creating a virus b. Beast Trojan
a. Google Queries b. Searching Pastebin c. Maltego d. People Search Using the Spokeo Online Tool e. Recon with Chrome f. Nslookup
a. Scanning with Nmap b. Scanning with Hping c. Banner Grabbing d. Enumerating a local System with Hyena e. SMTP Enumeration f. Ad Enumeration
a. Vulnerability Assessment with Nessus b. Vulnerability Assessment with Saint
a. Sniffing Passwords with Wireshark b. Performing MtM with Cain c. Performing MtM with sslstrip
a. Attack Windows 7 with Client-Side Exploit b. Windows 2012 Reverse TCP Exploit c. Cracking with John the Ripper
a. Attacking MySQL Database b. Manual SQL Injection
a. Attacking with XSS b. Attacking with CSRF
Lab 13 - Backdoors
a. Setting up a Backdoor
5 Days Course