Certification: CPEH Certified Professional Ethical Hacker

Category
IT Administration
Level
Advanced
Lessons
28
Duration
7h 14m 02s
Last Updated: 2018-10-19
This path covers everything you need to know about becoming a certified professional ethical hacker. participants will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, how to gain access and maintain access, how to cover tracks, malware, buffer overflows, and password cracking. This path will fully prepare you to take the CEH exam.

Career Path: Professional roles include Ethical Hackers, Security Consultants, IT Management, and Chief Security Officers.
The Professional Ethical Hacker certification is the beginning of penetration testing. It shows that you hold a valuable skill set in penetration testing by understanding the importance of vulnerability assessments and how it can help you prevent serious organizations break-ins.

Certification Exam Details:
Learn more about this certification exam.
Category
IT Administration
Level
Advanced
Lessons
28
Duration
7h 14m 02s
Certified Professional Ethical Hacker Module 01 - Security Fundamentals
Security Fundamentals
2 lessons51m 22sCompleted 0 / 2
Certified Professional Ethical Hacker Module 02 - Access Controls
Certified Professional Ethical Hacker Module 03 - Protocols
Certified Professional Ethical Hacker Module 04 - Cryptography
Certified Professional Ethical Hacker Module 05 - Why Vulnerability Assessments?
Certified Professional Ethical Hacker Module 06 - Vulnerability Tools of the Trade
Certified Professional Ethical Hacker Module 07 - Output Analysis and Reports
Certified Professional Ethical Hacker Module 08 - Reconnaisance, Enumerate and Scan
Certified Professional Ethical Hacker Module 09 - Gaining Access
Certified Professional Ethical Hacker Module 10 - Maintaining Access
Certified Professional Ethical Hacker Module 11 - Covering Tracks
Certified Professional Ethical Hacker Module 12 - Malware
Certified Professional Ethical Hacker Module 13 - Buffer Overflows
Certified Professional Ethical Hacker Module 14 - Password Cracking
Tracy Preston
I’ve been in network and information assurance in both the corporate and government agencies since 1995. I have secret military clearance and have earned over 20 industry-recognized certifications that include CISSP, C)ISSO, C)PTE, C)DFE, ISO 27001, MCSE, CCNP, CEH, CHFI, Comptia A+, Network+, and Security+. I’m an expert in Cyber security and Cisco Networking, as well as the ISO 27001 & 8570 DOD standards. I’m a mile2® Master instructor and curriculum developer.
Tracy PrestonInstructor and Curriculum Developer
Other Courses by Tracy Preston