Loading...
  • Think, Analyze, Maintain
    Effective Solutions
  • Succeed with us!
    The World can be yours
  • Let us coperate!
    Advance your business!

MILE2 - CPEH

The C)PEH is built upon proven hands-on Penetration Testing methodologies as utilized by our international group of vulnerability consultants. Mile2 trainers keep abreast of their expertise by practicing what they teach. Because we believe that an equal emphasis on theoretical and real world experience is essential for effective knowledge transfer to you, the student. The C)PEH training presents information on the latest vulnerabilities and defenses. This class also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. We go far beyond simply teaching you to "Hack" -- the norm with the classes that have been available until now. Our course is developed based on principles and methods used by malicious hackers, but its focus is professional penetration testing and securing information assets.

Upon Completion:

C)PEH students will be able to confidently undertake the C)PEH examination or the Certified Ethical Hacker examination (312-50). Students will enjoy an in-depth course that is regularly updated to maintain and incorporate the ever changing cyber security environment. This course offers up-to-date proprietary laboratories that have been researched and developed by leading cyber security professionals from around the world.

Benefits of C)PEH Course:

Certified Professional Ethical Hacker graduates would have obtained real world security knowledge that will enable them to recognize vulnerabilities, expose system weaknesses and help safeguard against threats. Graduates will learn the art of Ethical Hacking, but with a professional edge -Penetration Testing.

Objective of Laboratory Scenarios:

This is an intensive hands-on class; rather than spend too much time installing 300 tools, our focus will be on the Pen Testing model. The latest Pen Testing Tools and methods will be taught. Laboratories change frequently as new methods are found. We will be using many different tools from GUI to command line. As we work through structured attacks, we cover tools for both Windows and Linux systems.

Certified Penetration Testing Ethical Hacker Topics:

]Module 1: Security Fundamentals

]Module 2: Access Controls

]Module 3: Protocols

]Module 4: Network Attack and Defense

]Module 5: Cryptography

]Module 6: Economics and Law

]Module 7: Reconnaissance

]Module 8: Scanning and Enumeration

]Module 9: Gaining Access/Exploitation

]Module 10: Maintaining Access

]Module 11: Covering Your Tracks

]Module 12: Malware

]Module 13: Buffer Overflows

]Module 14: Password Cracking Attacks

]Module 15: Denial of Service

]Module 16: Attacking Web Technologies and Databases

]Module 17: Attacking Wireless Devices

@ Register Now
}