Description
Course Outline
Module 0 – Course Introduction
Module 1 – Introduction to Ethical Hacking
Module 2 – Linux Fundamentals
Module 3 – Protocols
Module 4 – Cryptography
Module 5 – Password Cracking
Module 6 – Malware
Module 7 – Security Devices
Module 8 – Information Gathering – Passive Reconnaissance
Module 9 – Social Engineering
Module 10 – Active Reconnaissance
Module 11 – Vulnerability Assessment
Module 12 – Network Attacks
Module 13 – Hacking Servers
Module 14 – Hacking Web Technologies
Module 15 – Hacking Wireless Technologies
Module 16 – Maintaining Access and Covering Tracks
Lab Outline
Lab 1 – Intro to C_PEH Setup
Lab 2 – Linux Fundamentals
Lab 3 – Understanding Protocols
Lab 4 – Cryptography Lab
Lab 5 – Password Cracking
Lab 6 – Malware
Lab 7 – Information Gathering
Lab 8 – Vulnerability Assessment
Lab 9 – Network Sniffing / IDS
Lab 10 – Windows Hacking
Lab 11 – Attacking Databases
Lab 12 – Attacking Web Applications
Lab 13 – Backdoors
Who Should Attend?
Information System Owners
Security Officers
Ethical Hackers
Information Owners
Penetration Testers
System Owner and Managers
Cyber Security Engineers
Upon Completion
Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam.