Mile2 C)PEH-Certified Penetration Ethical Hacker
To protect an information system you need to be able to see that system through the eyes of the attacker. Discover how to use assessments to make powerful changes in an information system’s security. Additionally, learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack.
Module 0 – Course Introduction
Module 1 – introduction to Ethical Hacking
Module 2 – Linux Fundamentals
Module 3 – Protocols
Module 4 – Cryptography
Module 5 – Password Cracking
Module 6 – Malware
Module 7 – Security Devices
Module 8 – Information Gathering -Passive Reconnaissance
Module 9 – Social Engineering
Module 10 – Active Reconnaissance
Module 11 – Vulnerabilities Assessment
Module 12 – Network Attacks
Module 13 – Hacking Servers
Module 14 – Hacking Web Technologies
Module 15 – Hacking Wireless Technologies
Module 16 – Maintaining Access and Covering Tracks
Upcoming Mile2 C)PEH-Certified Penetration Ethical Hacker Classes
Course Name - Start Date, Start Time | End Date | Start Time (PT) | End Time (PT) | Add to Cart |
---|---|---|---|---|
Mile2 C)PEH-Certified Penetration Ethical Hacker - 10/2/2023, 6:00 AM | 10/6/2023 | 6:00 AM | 2:00 PM | |
Mile2 C)PEH-Certified Penetration Ethical Hacker - 12/11/2023, 6:00 AM | 12/15/2023 | 6:00 AM | 2:00 PM |