C)PEH: Certified Professional Ethical Hacker

To protect an information system you need to be able to see that system through the eyes of the attacker. The Certified Professional Ethical Hacker certification course is the foundational training to Mile2's line of penetration testing courses because it teaches you to think like a hacker. Therefore, you can set up dynamic defenses to prevent intrusion.

First, you will learn the value of vulnerability assessments. Then, you will discover how to use those assessments to make powerful changes in an information system's security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack.

Key takeaways:

           
Upon completion, the Certified Professional Ethical Hacker candidate will be able to:

  • Understand the foundational principles of ethical hacking
  • Use reconnaissance techniques to gather information
  • Perform vulnerability scanning and enumeration
  • Exploit known vulnerabilities and gain access to systems
  • Maintain access and cover tracks like a professional hacker
  • Prepare a full penetration test report
  • Take the Mile2 CPEH certification exam (included)

Prerequisites


1 year of IT security experience or equivalent knowledge. Completion of Mile2 C)SP or foundational cybersecurity training is recommended.

Target audience

  • IT Security Professionals
  • Network Administrators
  • Penetration Testers
  • Cybersecurity Analysts
  • Anyone pursuing a career in ethical hacking or penetration testing

 

 

Modules:

  • Module 1 - Introduction to Ethical Hacking
  • Module 2 - Networking Refresher and Tools of the Trade
  • Module 3 - Reconnaissance and Footprinting
  • Module 4 - Scanning and Enumeration
  • Module 5 - System Hacking and Exploitation
  • Module 6 - Malware and Rootkits
  • Module 7 - Sniffers, Session Hijacking, and Denial of Service
  • Module 8 - Web Server, Web Application, and Database Attacks
  • Module 9 - Wireless Network Hacking
  • Module 10 - Mobile Device and Cloud Hacking
  • Module 11 - Cryptography and Password Cracking
  • Module 12 - Penetration Testing Methodology and Reporting
  • Module 13 – Hacking Servers
  • Module 14 – Hacking Web Technologies
  • Module 15 – Hacking Wireless Networks
  • Module 16 – Maintaining Access and Covering Tracks

Detailed outline:

Module 1 – Introduction to Ethical Hacking

  1. What and Why?
  2. Differences
  3. Security Definitions
  4. Risk Management
  5. Methodologies

Module 2 – Linux Fundamentals

  1. Core Concepts
  2. The shell and other items you need to know
  3. Managing users
  4. Basic Commands

Module 3 – Protocols

  1. Network Models
  2. Protocols & Services

Module 4 – Cryptography

  1. Understanding Cryptography
  2. Symmetric Encryption
  3. Asymmetric Encryption
  4. Hashing
  5. Cryptography in Use
  6. Crypto Attacks 

Module 5 – Password Cracking 

  1. What and Why
  2. Attacks and Tools of the Trade
  3. Countermeasures 

Module 6 – Malware 

  1. DOS & DDOS
  2. Viruses & Backdoors
  3. Trojans and Backdoors
  4. Ransomeware

Module 7 – Security Devices

  1. Basic Security Elements
  2. Security Appliances

Module 8 – Information Gathering 

  1. What are we looking for?
  2. Where/How do we find this information?
  3. Are there tools to help?

Module 9 – Social Engineering

  1. Social Engineering Types
  2. Phishing Scams

Module 10 – Reconnaissance

  1. What are we looking for?
  2. Port Scanning
  3. Are there tools to help?
  4. Banner Grabbing
  5. Enumeration

Module 11 – Vulnerability Assessment

  1. What is a Vulnerability Assessment
  2. Tools of the Trade
  3. Testing Internal and External Systems

Module 12 - Network Attacks

  1. Sniffing Techniques
  2. Hijacking

Module 13 – Hacking Servers

  1. Servers, What are they good for?
  2. What is an Exploit?
  3. Tools of the Trade

Module 14 – Hacking Web Technologies

  1. OWASP Top 10
  2. SQL Injection
  3. XSS

Module 15 – Hacking Wireless Networks

  1. Wireless Technologies
  2. Mobile and IoT Technologies
  3. Various Tools Used
  4. Hacking Techniques
  5. Countermeasures

Module 16 – Maintaining Access and Covering Tracks

  1. Maintaining Access
  2. Covering Tracks

 

Upon completion:

Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam.

Exam information:

The Certified Professional Ethical Hacker exam is taken online through Mile2’s Learning Management System and is accessible on you Mile2.com account.  The exam will take approximately 2 hours and consist of 100 multiple choice questions.  

A minimum grade of 70% is required for certification.

Exam is included in the course fee!

Re-certification requirements:

All Mile2 certifications will be awarded a 3-year expiration date.

There are two requirements to maintain Mile2 certification:

  1. Pass the most current version of the exam for your respective existing certification
  2. Earn and submit 20 CEUs per year in your Mile2 account.   

FAQ

1. Hva koster kurset?
Prisen er 35 000 NOK (eksamen er inkludert).

2. Hvor lenge varer kurset?
Kurset går over 5 dager.

3. Hvordan foregår kurset?

  • Format: Tilbys både fysisk i klasserom og som live virtuelt kurs.

  • Opplegg: Kombinasjon av teori, demoer og omfattende hands-on labs i kontrollert labmiljø.

4. Hvem passer dette kurset for?
Kurset passer for:

  • Penetration testers / ethical hackers

  • IS Security Owners / Security Officers

  • System- og nettverksadministratorer

  • Forensics- og incident response team

  • Konsulenter og medarbeidere med ansvar for sikkerhetstesting

5. Hvilke forkunnskaper bør jeg ha?
Anbefalt forkunnskap/erfaring:

  • Mile2’s C)ISP eller tilsvarende grunnleggende kurs

  • Minst 12 måneders erfaring innen IT

  • Minst 12 måneders erfaring med nettverksteknologi

  • Grunnleggende kjennskap til Linux, nettverk og scripting

6. Hva lærer jeg i kurset?
Etter kurset vil du kunne:

  • Utføre rekognosering, scanning og sårbarhetsvurdering

  • Angripe systemer, tjenester og applikasjoner (servere, web, DB, trådløst, mobil, cloud)

  • Analysere og utnytte malware- og nettverksangrep

  • Gjennomføre penetration-testing metodisk og skrive profesjonelle rapporter

  • Opprettholde tilgang og skjule spor samt implementere mottiltak

7. Er dette kurset praktisk?
Ja — tungt fokus på laboratories og praktiske øvelser. Typiske labs dekker:

  • Nettverkssniffing / IDS-analyse

  • Windows- og Linux-hacking

  • Webapplikasjonsangrep (OWASP)

  • Trådløse angrep, password cracking, exploit-kjøring og backdoors

  • Full-skala øvelser og rapportskriving

8. Hva slags materiell får jeg?
Du får Mile2 offisielt kursmateriell, digitale ressurser, lab-tilgang og øvingsoppgaver. Instruktørstøtte under kurset.

9. Hvordan er eksamen?

  • Eksamen tas online via Mile2’s Learning Management System (MACS).

  • Format: Ca. 2 timer, 100 multiple-choice spørsmål.

  • Bestått: Minimum 70 % riktige svar.

  • Eksamen er inkludert i kursprisen.

10. Hvor lenge varer sertifiseringen og hvordan fornyer jeg den?

  • Sertifiseringen er gyldig i 3 år.

  • For å opprettholde sertifiseringen må du:

    1. Bestå gjeldende versjon av eksamen ved re-sertifisering.

    2. Opparbeide og registrere 20 CEUs per år i din Mile2-konto.

11. Tips for å forberede seg best mulig

  • Øv praktisk i labmiljø: scanning, exploit-workflows, web/hacking-tools.

  • Frisk opp Linux-ferdigheter, grunnleggende scripting og nettverkskunnskap.

  • Lær verktøyene: Nmap, Metasploit, Burp/ZAP, Wireshark, hcxdumptool mv.

  • Les gjennom kursets lab-guider før kursstart for å utnytte labtiden maksimalt.

Andre relevante kurs

5 dager
Classroom Virtual
5 dager
Classroom Virtual
4 dager
Classroom Virtual