Description
Who Should Attend?
Information System Owners
Security Officers
Ethical Hackers
Information Owners
Penetration Testers
System Owner and Managers
Cyber Security Engineers
Course Outline
Module 0 – Course Introduction
Module 1 – Introduction to Ethical Hacking
Module 2 – Linux Fundamentals
Module 3 – Protocols
Module 4 – Cryptography
Module 5 – Password Cracking
Module 6 – Malware
Module 7 – Security Devices
Module 8 – Information Gathering – Passive Reconnaissance
Module 9 – Social Engineering
Module 10 – Active Reconnaissance
Module 11 – Vulnerability Assessment
Module 12 – Network Attacks
Module 13 – Hacking Servers
Module 14 – Hacking Web Technologies
Module 15 – Hacking Wireless Technologies
Module 16 – Maintaining Access and Covering Tracks
Lab Outline
Lab 1 – Intro to C_PEH Setup
Lab 2 – Linux Fundamentals
Lab 3 – Understanding Protocols
Lab 4 – Cryptography Lab
Lab 5 – Password Cracking
Lab 6 – Malware
Lab 7 – Information Gathering
Lab 8 – Vulnerability Assessment
Lab 9 – Network Sniffing / IDS
Lab 10 – Windows Hacking
Lab 11 – Attacking Databases
Lab 12 – Attacking Web Applications
Lab 13 – Backdoors
Upon Completion
Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam.