The Certified Professional Ethical Hacker (CPEH) course teaches you to view IT systems through the eyes of an attacker. You learn how to identify vulnerabilities, understand exploits and apply effective countermeasures. This hands-on course is the foundation for penetration testing and ethical hacking in modern network environments.
The CPEH course is the foundational training in Mile2’s penetration testing track. You will learn the value of vulnerability assessments and how to use them to strengthen the security of information systems. You also gain insight into how malware, viruses and other attack techniques work and how to implement countermeasure and recovery strategies. The course combines theory with extensive hands-on labs using tools and techniques commonly employed by real attackers.
Objectives
After completing this course, you will be able to:
Think and operate like an ethical hacker in a controlled environment
Identify vulnerabilities and misconfigurations in systems and networks
Plan and perform vulnerability assessments and interpret the results
Apply core Linux and networking concepts in ethical hacking engagements
Understand cryptographic techniques and common crypto attacks
Analyze and mitigate password attacks, malware and backdoors
Gather information using passive and active reconnaissance techniques
Recognize and help prevent social engineering attacks
Test servers, web technologies, wireless networks and IoT environments
Maintain access and properly document findings within a penetration test
Target Audience
This course is ideal for:
IS Security Owners
Security Officers
Ethical Hackers
Information Owners
Penetration Testers
System Owners and Managers
Cyber Security Engineers
IT professionals transitioning into offensive security roles
List of Subjects
Module 1 – Introduction to Ethical Hacking
What and Why?
Differences
Security Definitions
Risk Management
Methodologies
Module 2 – Linux Fundamentals
Core Concepts
The shell and other items you need to know
Managing users
Basic Commands
Module 3 – Protocols
Network Models
Protocols & Services
Module 4 – Cryptography
Understanding Cryptography
Symmetric Encryption
Asymmetric Encryption
Hashing
Cryptography in Use
Crypto Attacks
Module 5 – Password Cracking
What and Why
Attacks and Tools of the Trade
Countermeasures
Module 6 – Malware
DOS & DDOS
Viruses & Backdoors
Trojans and Backdoors
Ransomware
Module 7 – Security Devices
Basic Security Elements
Security Appliances
Module 8 – Information Gathering
What are we looking for?
Where/How do we find this information?
Are there tools to help?
Module 9 – Social Engineering
Social Engineering Types
Phishing Scams
Module 10 – Reconnaissance
What are we looking for?
Port Scanning
Are there tools to help?
Banner Grabbing
Enumeration
Module 11 – Vulnerability Assessment
What is a Vulnerability Assessment
Tools of the Trade
Testing Internal and External Systems
Module 12 – Network Attacks
Sniffing Techniques
Hijacking
Module 13 – Hacking Servers
Servers, What are they good for?
What is an Exploit?
Tools of the Trade
Module 14 – Hacking Web Technologies
OWASP Top 10
SQL Injection
XSS
Module 15 – Hacking Wireless Networks
Wireless Technologies
Mobile and IoT Technologies
Various Tools Used
Hacking Techniques
Countermeasures
Module 16 – Maintaining Access and Covering Tracks
Maintaining Access
Covering Tracks
Prerequisites
No formal prerequisites are required, but the following are recommended (any one of):
Mile2’s CSP
12 months of IT experience
12 months of networking experience
Course Materials
You will receive:
Student Guide (comprehensive course book)
Hands-on lab workbook with step-by-step exercises
Practice questions and answers to prepare for the exam
Reference materials and tool overviews
Access to digital course materials via the Mile2 Learning Platform
Not satisfied? You will get your money back without questions, without explanation. We want you to be always satisfied. Read more about money back guarantee.
Always certification guarantee via LAI CertProtect
If an employee leaves your organization within 6 months of a training, you can register another employee for the same training free of charge. This way you protect your investment! Read more about LAI CertProtect.
Always the best teachers
LAI has experienced and certified teachers who understand the art of explaining difficult topics in a fun and understandable way. Our teachers are still active in the professional field as consultants on a daily basis.
Always comprehensive advice
Courses and certifications can be complicated. Let our certification experts create a training program for your employees free of charge.
What our students tell us:
{
Excellent trainer and training center, everyone's are very nice and kind and perfect professionals!
5
Tihomir Shirov
CNSys PLC
{
Wonderful treatment, kind hosts and the perfect place to gain knowledge.
5
Boyko Kolev
CNSys PLC
{
One of the best trainings I ever had - If not the best! Hans did a really good job at presenting everything in a timely fashion. Really enjoyed it! Can´t recommend any suggestions for improvements, Hans and the LAI Team did a really good job!
Very good training and highly recommended, good handout material.
5
Harry Willemsen
Senior Technical Consultant
Ingram Micro
LAI in numbers
30.000+
students
9.8
customer satisfaction
100%
money back guarantee
1987
more than 35 years of experience
Questions about this course
If you have any questions about this training, please contact us via [email protected], +31 10 2042220 or via the “get in touch” form below. After we have processed your registration, you will receive a registration confirmation and an invoice that can be paid by bank transfer or credit card.