C)CSSM: Certified Cybersecurity Systems Manager

The Certified Professional Ethical Hacker, C)PEH, course prepares students to assess the security posture of a company by performing penetration testing using up-to-date hacking tools and techniques. Ethical hacking is a legal and authorized attempt to locate and exploit vulnerabilities in a system, with the goal of strengthening its defenses.

This course introduces students to the five phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, and covering tracks. By the end of the course, students will be able to use the same techniques as malicious hackers, but in a lawful and constructive manner to identify weaknesses and report them responsibly.

Course objectives:                 
Upon completion, the Certified Professional Ethical Hacker candidate will be able to:

  • Understand the foundational principles of ethical hacking
  • Use reconnaissance techniques to gather information
  • Perform vulnerability scanning and enumeration
  • Exploit known vulnerabilities and gain access to systems
  • Maintain access and cover tracks like a professional hacker
  • Prepare a full penetration test report
  • Take the Mile2 CPEH certification exam (included)

The CPEH exam is taken online through Mile2’s Learning Management System and is accessible via your Mile2.com account. A minimum grade of 80% is required for certification.

Who should attend:  

  • IT Security Professionals
  • Network Administrators
  • Penetration Testers
  • Cybersecurity Analysts
  • Anyone pursuing a career in ethical hacking or penetration testing

 

Prerequisites:
1 year of IT security experience or equivalent knowledge. Completion of Mile2 C)SP or foundational cybersecurity training is recommended.

Course outline:

Module 1 - Introduction to Ethical Hacking
Module 2 - Networking Refresher and Tools of the Trade
Module 3 - Reconnaissance and Footprinting
Module 4 - Scanning and Enumeration
Module 5 - System Hacking and Exploitation
Module 6 - Malware and Rootkits
Module 7 - Sniffers, Session Hijacking, and Denial of Service
Module 8 - Web Server, Web Application, and Database Attacks
Module 9 - Wireless Network Hacking
Module 10 - Mobile Device and Cloud Hacking
Module 11 - Cryptography and Password Cracking
Module 12 - Penetration Testing Methodology and Reporting