0% found this document useful (0 votes)
181 views

CPEH Web Outline

The Certified Professional Ethical Hacker certification course teaches students how to assess the security of information systems by thinking like an attacker. Over the course of 5 days and 40 hours, students will learn skills like vulnerability assessment, password cracking, social engineering, reconnaissance techniques and more. They will have access to over a dozen hands-on labs to practice these skills. Upon completing the course, students are eligible to take the CPEH certification exam, which consists of 100 multiple choice questions. Maintaining the certification requires passing the exam every 3 years and earning continuing education credits.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
181 views

CPEH Web Outline

The Certified Professional Ethical Hacker certification course teaches students how to assess the security of information systems by thinking like an attacker. Over the course of 5 days and 40 hours, students will learn skills like vulnerability assessment, password cracking, social engineering, reconnaissance techniques and more. They will have access to over a dozen hands-on labs to practice these skills. Upon completing the course, students are eligible to take the CPEH certification exam, which consists of 100 multiple choice questions. Maintaining the certification requires passing the exam every 3 years and earning continuing education credits.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Certified Professional Ethical

Hacker
,663,6629
Description:
To protect an information system you need to be able to see that system
through the eyes of the attacker. The Certified Professional Ethical Hacker
certification course is the foundational training to Mile2's line of penetration
testing courses because it teaches you to think like a hacker. Therefore, you can
set upyou
First, dynamic defenses
will learn toofprevent
the value intrusion.
vulnerability assessments. Then, you will discover how to use those
assessments to make powerful changes in an information system's security. Additionally, you will learn
how malware and destructive viruses function and how to implement counter response and preventative
measures when it comes to a network hack.

Annual Salary Potential $80,077 AVG/year

Key Course Information Modules/Lessons Hands-On Labs


Live Class Duration: 5 Days Module 1 -Introduction to Ethical
CEUs: 40 Hacking Lab 1 – Intro to C)PEH Setup
Language: English Module 2 -Linux Fundamentals Lab 2 - Linux Fundamentals
Class Formats Available: Module 3 -Protocols Lab 3 – Understanding
Module 4 -Cryptography Protocols
Instructor Led Lab 4 - Cryptography Lab
Module 5 -Password Cracking
Module 6 -Malware Lab 5 – Password Cracking
Self-Study
Lab 6 - Malware
Module 7 -Security Devices
Live Virtual Training Lab 7 – Information Gathering
Module 8 -Information Gathering
Lab 8 – Information Gathering –
Suggested Prerequisites: -Passive Reconnaissance
Active Reconnaissance
(any one of the following) Module 9 -Social Engineering Lab 9 – Vulnerability
Module 10 -Active Assessment
- Mile2’s C)SP Reconnaissance Lab 10 – Network Sniffing/IDS
Module 11 -Vulnerability Lab 11 - Windows Hacking
- 12 months of IT Experience
Assessment Lab 12 – Attacking Databases
- 12 Months of Networking Experience Module 12 -Network Attacks Lab 13 – Attacking Web
Module 13 -Hacking Servers Applications
Module 14 - Hacking Web Lab 14 - Backdoors
Technologies
Module 15 – 16: See Detailed
Outline Below

pg. 1
www.mile2.com 10213 Wilsky Blvd, Tampa, FL 33625 813-920-6779
Certified Professional Ethical
Hacker

Upon Completion Exam Information Course FAQ’s


Upon completion, the Certified The Certified Professional Ethical
Professional Ethical Hacker Hacker exam is taken online
Question: Do I have to purchase a
candidate will be able to through Mile2’s Learning
course to buy a certification
competently take the C)PEH exam. Management System and is
exam?
accessible on you Mile2.com
account. The exam will take Answer: No
Who Should Attend approximately 2 hours and consist
Question: Do all Mile2 courses
of 100 multiple choice questions.
• IS Security Owners map to a role-based career path?
• Security Officers A minimum grade of 70% is
required for certification. Answer: Yes. You can find
• Ethical Hackers
the career path and other courses
• Information Owners
associated with it at
• Penetration Testers
www.mile2.com.
• System Owners and Re-Certification
Managers Question: Are all courses
• Cyber Security Engineers Requirements
available as self-study courses?
All Mile2 certifications will be
Answer: Yes. There is
awarded a 3-year expiration date.
however 1 exception. The Red
Accreditations There are two requirements to
Team vs Blue Team course is only
available as a live class.
maintain Mile2 certification:
Question: Are Mile2 courses
1) Pass the most current transferable/shareable?
version of the exam for your
respective existing Answer: No. The course
certification materials, videos, and exams are
2) Earn and submit 20 CEUs per not meant to be shared or
year in your Mile2 account. transferred.

Course and Certification Learning Options

pg. 2
www.mile2.com 10213 Wilsky Blvd, Tampa, FL 33625 813-920-6779
Certified Professional Ethical
Hacker

Detailed Outline:
Course Introduction

Module 1 – Introduction to Ethical Hacking

a. What and Why?


b. Differences
c. Security Definitions
d. Risk Management
e. Methodologies

Module 2 – Linux Fundamentals

a. Core Concepts
b. The shell and other items you need to know
c. Managing users
d. Basic Commands

Module 3 – Protocols

a. Network Models
b. Protocols & Services

Module 4 – Cryptography

a. Understanding Cryptography
b. Symmetric Encryption
c. Asymmetric Encryption
d. Hashing
e. Cryptography in Use
f. Crypto Attacks

Module 5 – Password Cracking

a. What and Why


b. Attacks and Tools of the Trade
c. Countermeasures

Module 6 – Malware

a. DOS & DDOS


b. Viruses & Backdoors

pg. 3
www.mile2.com 10213 Wilsky Blvd, Tampa, FL 33625 813-920-6779
Certified Professional Ethical
Hacker

c. Trojans and Backdoors


d. Ransomeware

Module 7 – Security Devices

a. Basic Security Elements


b. Security Appliances

Module 8 – Information Gathering

a. What are we looking for?


b. Where/How do we find this information?
c. Are there tools to help?

Module 9 – Social Engineering

a. Social Engineering Types


b. Phishing Scams

Module 10 – Reconnaissance

a. What are we looking for?


b. Port Scanning
c. Are there tools to help?
d. Banner Grabbing
e. Enumeration

Module 11 – Vulnerability Assessment

a. What is a Vulnerability Assessment


b. Tools of the Trade
c. Testing Internal and External Systems

Module 12 - Network Attacks

a. Sniffing Techniques
b. Hijacking

Module 13 – Hacking Servers

a. Servers, What are they good for?


b. What is an Exploit?
c. Tools of the Trade

pg. 4
www.mile2.com 10213 Wilsky Blvd, Tampa, FL 33625 813-920-6779
Certified Professional Ethical
Hacker

Module 14 – Hacking Web Technologies

a. OWASP Top 10
b. SQL Injection
c. XSS

Module 15 – Hacking Wireless Networks

a. Wireless Technologies
b. Mobile and IoT Technologies
c. Various Tools Used
d. Hacking Techniques
e. Countermeasures

Module 16 – Maintaining Access and Covering Tracks

a. Maintaining Access
b. Covering Tracks

Detailed Labs Outline:


Lab 1 – Intro to C)PEH Setup
a. Recording Ips and Logging into VMs
b. Joining the Domain
Lab 2 - Linux Fundamentals
a. Command Line Tips and Tricks
b. Linux Networking for Beginners
c. Using FTP during a Pentest
Lab 3 – Understanding Protocols
a. Analyze http session
Lab 4 - Cryptography Lab
a. Hashing Data of all Sorts
b. The Basics of Cryptographic Algorithms
Lab 5 – Password Cracking
Lab 6 - Malware
a. Creating a virus
b. Beast Trojan

pg. 5
www.mile2.com 10213 Wilsky Blvd, Tampa, FL 33625 813-920-6779
Certified Professional Ethical
Hacker

Lab 7 – Information Gathering


a. Google Queries
b. Searching Pastebin
c. Maltego
d. People Search Using the Spokeo Online Tool
e. Recon with Chrome
f. Nslookup
Lab 8 – Information Gathering – Active Reconnaissance
a. Scanning with Nmap
b. Scanning with Hping
c. Banner Grabbing
d. Enumerating a local System with Hyena
e. SMTP Enumeration
f. Ad Enumeration
Lab 9 – Vulnerability Assessment
a. Vulnerability Assessment with Nessus
b. Vulnerability Assessment with Saint
Lab 10 – Network Sniffing/IDS
a. Sniffing Passwords with Wireshark
b. Performing MtM with Cain
c. Performing MtM with sslstrip
Lab 11 - Windows Hacking
a. Attack Windows 7 with Client-Side Exploit
b. Windows 2012 Reverse TCP Exploit
c. Cracking with John the Ripper
Lab 12 – Attacking Databases
a. Attacking MySQL Database
b. Manual SQL Injection
Lab 13 – Attacking Web Applications
a. Attacking with XSS
b. Attacking with CSRF
Lab 13 - Backdoors
a. Setting up a Backdoor

pg. 6
www.mile2.com 10213 Wilsky Blvd, Tampa, FL 33625 813-920-6779

You might also like