Certified Professional Ethical Hacker (CPEH)
The Certified Professional Ethical Hacker (CPEH) course teaches you to view IT systems through the eyes of an attacker. You learn how to identify vulnerabilities, understand exploits and apply effective countermeasures. This hands-on course is the foundation for penetration testing and ethical hacking in modern network environments.
Prepares for this certification
This course prepares you for the official CPEH certification from Mile2.
Description
The CPEH course is the foundational training in Mile2’s penetration testing track. You will learn the value of vulnerability assessments and how to use them to strengthen the security of information systems. You also gain insight into how malware, viruses and other attack techniques work and how to implement countermeasure and recovery strategies. The course combines theory with extensive hands-on labs using tools and techniques commonly employed by real attackers.
Objectives
After completing this course, you will be able to:
- Think and operate like an ethical hacker in a controlled environment
- Identify vulnerabilities and misconfigurations in systems and networks
- Plan and perform vulnerability assessments and interpret the results
- Apply core Linux and networking concepts in ethical hacking engagements
- Understand cryptographic techniques and common crypto attacks
- Analyze and mitigate password attacks, malware and backdoors
- Gather information using passive and active reconnaissance techniques
- Recognize and help prevent social engineering attacks
- Test servers, web technologies, wireless networks and IoT environments
- Maintain access and properly document findings within a penetration test
Target Audience
This course is ideal for:
- IS Security Owners
- Security Officers
- Ethical Hackers
- Information Owners
- Penetration Testers
- System Owners and Managers
- Cyber Security Engineers
- IT professionals transitioning into offensive security roles
List of Subjects
- Module 1 – Introduction to Ethical Hacking
- What and Why?
- Differences
- Security Definitions
- Risk Management
- Methodologies
- Module 2 – Linux Fundamentals
- Core Concepts
- The shell and other items you need to know
- Managing users
- Basic Commands
- Module 3 – Protocols
- Network Models
- Protocols & Services
- Module 4 – Cryptography
- Understanding Cryptography
- Symmetric Encryption
- Asymmetric Encryption
- Hashing
- Cryptography in Use
- Crypto Attacks
- Module 5 – Password Cracking
- What and Why
- Attacks and Tools of the Trade
- Countermeasures
- Module 6 – Malware
- DOS & DDOS
- Viruses & Backdoors
- Trojans and Backdoors
- Ransomware
- Module 7 – Security Devices
- Basic Security Elements
- Security Appliances
- Module 8 – Information Gathering
- What are we looking for?
- Where/How do we find this information?
- Are there tools to help?
- Module 9 – Social Engineering
- Social Engineering Types
- Phishing Scams
- Module 10 – Reconnaissance
- What are we looking for?
- Port Scanning
- Are there tools to help?
- Banner Grabbing
- Enumeration
- Module 11 – Vulnerability Assessment
- What is a Vulnerability Assessment
- Tools of the Trade
- Testing Internal and External Systems
- Module 12 – Network Attacks
- Sniffing Techniques
- Hijacking
- Module 13 – Hacking Servers
- Servers, What are they good for?
- What is an Exploit?
- Tools of the Trade
- Module 14 – Hacking Web Technologies
- OWASP Top 10
- SQL Injection
- XSS
- Module 15 – Hacking Wireless Networks
- Wireless Technologies
- Mobile and IoT Technologies
- Various Tools Used
- Hacking Techniques
- Countermeasures
- Module 16 – Maintaining Access and Covering Tracks
- Maintaining Access
- Covering Tracks
Prerequisites
No formal prerequisites are required, but the following are recommended (any one of):
- Mile2’s CSP
- 12 months of IT experience
- 12 months of networking experience
Course Materials
You will receive:
- Student Guide (comprehensive course book)
- Hands-on lab workbook with step-by-step exercises
- Practice questions and answers to prepare for the exam
- Reference materials and tool overviews
- Access to digital course materials via the Mile2 Learning Platform

