Disclosure: when you buy through links on our site, we may earn an affiliate commission.

Certified Professional Ethical Hacker (CPEH)

Latest Edition
3.8
3.8/5
(5 reviews)
70 students
Created by

9.0

CourseMarks Score®

10.0

Freshness

7.0

Feedback

9.5

Content

Platform: Udemy
Video: 14h 16m
Language: English
Next start: On Demand

Table of contents

Description

This is the updated version of the course (Updated Aug 2020)
The Certified Professional Ethical Hacker (CPEH) is a vendor-neutral certification offered by Mile2 for the students willing to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. In doing so, the CPEH students are able to understand how malware and destructive viruses function. In addition to this, the CPEH course helps students learn how to implement counter response and take preventive measures in case of an attack on the network.
This preparatory course for the Certified Professional Ethical Hacker (CPEH) certification covers the complete curriculum required to clear the certification exam. The topics covered in this course are security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. 
Exam Information   
The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands-on labs emulate real-world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc. Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam.

You will learn

✓ Learn the fundamentals of network security
✓ Implement access controls
✓ Understand the network security protocols
✓ Learn cryptography and its uses
✓ Conduct effective vulnerability assessments
✓ Learn how to cover tracks
✓ Understand the functioning of malware
✓ Crack passwords

Requirements

• The candidates opting for this course are recommended to have a minimum of one year of experience in the field of information technology especially networking.

This course is for

• Information System Owners
• Security Officers
• Ethical Hackers
• Information Owners
• Penetration Testers
• System Owner and Managers
• Cyber Security Engineers
Certification Trainers for Over 20 Years
Hi, we’re new to Udemy but we’ve been producing and selling high quality online training for over 20 years. Over a million students have taken our training through our corporate, government and education partners. Our content was developed for institutions that require the absolute highest standards in teaching quality. We’re now bringing our content to consumers like you. Don’t settle for anything less than the best quality content available. 
Browse all courses by on Coursemarks.
Platform: Udemy
Video: 14h 16m
Language: English
Next start: On Demand

Students are also interested in