Certificate In Certified Professional Ethical Hacker Online Course

Learn Effective Counter Response And Preventive Measures

Certificate In Certified Professional Ethical Hacker Online Course

NOW ONLY

AU$99

Save AU$500 (83%)
OFF RRP AU$599
Get Info Pack

Learn Effective Counter Response And Preventive Measures

The Certified Professional Ethical Hacker (CPEH) is a vendor-neutral certification offered by Mile2 for the students willing to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. In doing so, the CPEH students are able to understand how malware and destructive viruses function. In addition to this, the CPEH course helps students learn how to implement counter response and take preventive measures in case of an attack on the network.

This preparatory course for the Certified Professional Ethical Hacker (CPEH) certification covers the complete curriculum required to clear the certification exam. The topics covered in this course are security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking.

Course Fast Facts:

  1. Learn the fundamentals of Certified Professional Ethical Hacker
  2. Comprehensive 14 module Accredited Certified Professional Ethical Hacker Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading Certified Professional Ethical Hacker experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Module 01 - Security Fundamentals

  • Security Fundamentals
  • Malware
  • Firewalls

Module 02 - Access Controls

  • Access Controls Part1
  • Access Controls Part2

Module 03 - Protocols

  • Protocols Part1
  • Protocols Part2

Module 04 - Cryptography

  • Cryptography Part1
  • Cryptography Part2
  • Cryptography Part3
  • Cryptography Part4

Module 05 - Why Vulnerability Assessments?

  • Why Vulnerability Assessments? Part1
  • Why Vulnerability Assessments? Part2

Module 06 - Vulnerability Tools of the Trade

  • Vulnerability Tools of the Trade

Module 07 - Output Analysis and Reports

  • Output Analysis and Reports

Module 08 - Reconnaissance, Enumeration and Scanning

  • Reconnaissance, Enumeration and Scanning Part1
  • Reconnaissance, Enumeration and Scanning Part2
  • Reconnaissance, Enumeration and Scanning Part3

Module 09 - Gaining Access

  • Gaining Access Part 1
  • Gaining Access Part 2

Module 10 - Maintaining Access

  • Maintaining Access

Module 11 - Covering Tracks

  • Covering Tracks

Module 12 - Malware

  • Malware Part 1
  • Malware Part 2

Module 13 - Buffer Overflows

  • Buffer Overflows Part 1
  • Buffer Overflows Part 2

Module 14 - Password Cracking

  • Password Cracking Part 1
  • Password Cracking Part 2

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

About this Course

Learn Effective Counter Response And Preventive Measures

The Certified Professional Ethical Hacker (CPEH) is a vendor-neutral certification offered by Mile2 for the students willing to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. In doing so, the CPEH students are able to understand how malware and destructive viruses function. In addition to this, the CPEH course helps students learn how to implement counter response and take preventive measures in case of an attack on the network.

This preparatory course for the Certified Professional Ethical Hacker (CPEH) certification covers the complete curriculum required to clear the certification exam. The topics covered in this course are security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking.

Course Fast Facts:

  1. Learn the fundamentals of Certified Professional Ethical Hacker
  2. Comprehensive 14 module Accredited Certified Professional Ethical Hacker Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading Certified Professional Ethical Hacker experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Module 01 - Security Fundamentals

  • Security Fundamentals
  • Malware
  • Firewalls

Module 02 - Access Controls

  • Access Controls Part1
  • Access Controls Part2

Module 03 - Protocols

  • Protocols Part1
  • Protocols Part2

Module 04 - Cryptography

  • Cryptography Part1
  • Cryptography Part2
  • Cryptography Part3
  • Cryptography Part4

Module 05 - Why Vulnerability Assessments?

  • Why Vulnerability Assessments? Part1
  • Why Vulnerability Assessments? Part2

Module 06 - Vulnerability Tools of the Trade

  • Vulnerability Tools of the Trade

Module 07 - Output Analysis and Reports

  • Output Analysis and Reports

Module 08 - Reconnaissance, Enumeration and Scanning

  • Reconnaissance, Enumeration and Scanning Part1
  • Reconnaissance, Enumeration and Scanning Part2
  • Reconnaissance, Enumeration and Scanning Part3

Module 09 - Gaining Access

  • Gaining Access Part 1
  • Gaining Access Part 2

Module 10 - Maintaining Access

  • Maintaining Access

Module 11 - Covering Tracks

  • Covering Tracks

Module 12 - Malware

  • Malware Part 1
  • Malware Part 2

Module 13 - Buffer Overflows

  • Buffer Overflows Part 1
  • Buffer Overflows Part 2

Module 14 - Password Cracking

  • Password Cracking Part 1
  • Password Cracking Part 2

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

We provide a 7 Day Money Back Refund on all Courses

Now Only AU$99 Save AU$500 (83%)
OFF RRP AU$599
Delivery Method Online
Get Info Pack

Special Offer

 

Receive The Personal Success Training Program FREE, When You Purchase This Course - Limited Time Remaining!  (Value $600)

 

The Personal Success Training Program Helps You Stay Focused To Achieve Your Goals!
Benefits:
  • How to layout a Success Plan.
  • Get where you want to be in life.
  • How to unclutter your mind to succeed.
  • Achieve your dreams using your imagination.
  • How to have faith in yourself.
Features:
  • 12 month online access,  24/7 anywhere.
  • Complement your individual course purchase.
  • Internationally recognized by the IAOTS.
  • Thousands of positive reviews.
  • Limited Time Offer - Ends Soon.
 

Share this course

Course Summary

Course ID No.: 009SRCPEH
Delivery Mode: Online
Course Access: Unlimited lifetime
Tutor Support: Yes
Time required: Study at your own pace
Course Duration: 7.5 Hours
Assessments: Yes
Qualification: Certificate of Completion

Popular Courses and Bundles

Get a FREE Career Planner