Certified Professional Ethical Hacker

Transcription

Certified Professional EthicalHacker,663,6629Description:To protect an information system you need to be able to see that systemthrough the eyes of the attacker. The Certified Professional Ethical Hackercertification course is the foundational training to Mile2's line of penetrationtesting courses because it teaches you to think like a hacker. Therefore, you canFirst, you will learn the value of vulnerability assessments. Then, you will discover how to use thoseassessments to make powerful changes in an information system's security. Additionally, you will learnhow malware and destructive viruses function and how to implement counter response and preventativemeasures when it comes to a network hack.Annual Salary Potential 80,077 AVG/yearKey Course InformationLive Class Duration: 5 DaysCEUs: 40Language: EnglishClass Formats Available:Instructor LedSelf-StudyLive Virtual TrainingSuggested Prerequisites:(any one of the following)- Mile2’s C)SP- 12 months of IT Experience- 12 Months of Networking ExperienceModules/LessonsModule 1 -Introduction to EthicalHackingModule 2 -Linux FundamentalsModule 3 -ProtocolsModule 4 -CryptographyModule 5 -Password CrackingModule 6 -MalwareModule 7 -Security DevicesModule 8 -Information Gathering-Passive ReconnaissanceModule 9 -Social EngineeringModule 10 -ActiveReconnaissanceModule 11 -VulnerabilityAssessmentModule 12 -Network AttacksModule 13 -Hacking ServersModule 14 - Hacking WebTechnologiesModule 15 – 16: See DetailedOutline BelowHands-On LabsLab 1 – Intro to C)PEH SetupLab 2 - Linux FundamentalsLab 3 – UnderstandingProtocolsLab 4 - Cryptography LabLab 5 – Password CrackingLab 6 - MalwareLab 7 – Information GatheringLab 8 – Information Gathering –Active ReconnaissanceLab 9 – VulnerabilityAssessmentLab 10 – Network Sniffing/IDSLab 11 - Windows HackingLab 12 – Attacking DatabasesLab 13 – Attacking WebApplicationsLab 14 - Backdoorspg. 1www.mile2.com10213 Wilsky Blvd, Tampa, FL 33625813-920-6779

Certified Professional EthicalHackerUpon CompletionUpon completion, the CertifiedProfessional Ethical Hackercandidate will be able tocompetently take the C)PEH exam.Who Should Attend IS Security OwnersSecurity OfficersEthical HackersInformation OwnersPenetration TestersSystem Owners andManagersCyber Security EngineersExam InformationThe Certified Professional EthicalHacker exam is taken onlinethrough Mile2’s LearningManagement System and isaccessible on you Mile2.comaccount. The exam will takeapproximately 2 hours and consistof 100 multiple choice questions.A minimum grade of 70% isrequired for certification.Re-CertificationRequirementsAll Mile2 certifications will beawarded a 3-year expiration date.AccreditationsThere are two requirements tomaintain Mile2 certification:1) Pass the most currentversion of the exam for yourrespective existingcertification2) Earn and submit 20 CEUs peryear in your Mile2 account.Course FAQ’sQuestion: Do I have to purchase acourse to buy a certificationexam?Answer: NoQuestion: Do all Mile2 coursesmap to a role-based career path?Answer: Yes. You can findthe career path and other coursesassociated with it atwww.mile2.com.Question: Are all coursesavailable as self-study courses?Answer: Yes. There ishowever 1 exception. The RedTeam vs Blue Team course is onlyavailable as a live class.Question: Are Mile2 coursestransferable/shareable?Answer: No. The coursematerials, videos, and exams arenot meant to be shared ortransferred.Course and Certification Learning Optionspg. 2www.mile2.com10213 Wilsky Blvd, Tampa, FL 33625813-920-6779

Certified Professional EthicalHackerDetailed Outline:Course IntroductionModule 1 – Introduction to Ethical Hackinga.b.c.d.e.What and Why?DifferencesSecurity DefinitionsRisk ManagementMethodologiesModule 2 – Linux Fundamentalsa.b.c.d.Core ConceptsThe shell and other items you need to knowManaging usersBasic CommandsModule 3 – Protocolsa. Network Modelsb. Protocols & ServicesModule 4 – Cryptographya.b.c.d.e.f.Understanding CryptographySymmetric EncryptionAsymmetric EncryptionHashingCryptography in UseCrypto AttacksModule 5 – Password Crackinga. What and Whyb. Attacks and Tools of the Tradec. CountermeasuresModule 6 – Malwarea. DOS & DDOSb. Viruses & Backdoorspg. 3www.mile2.com10213 Wilsky Blvd, Tampa, FL 33625813-920-6779

Certified Professional EthicalHackerc. Trojans and Backdoorsd. RansomewareModule 7 – Security Devicesa. Basic Security Elementsb. Security AppliancesModule 8 – Information Gatheringa. What are we looking for?b. Where/How do we find this information?c. Are there tools to help?Module 9 – Social Engineeringa. Social Engineering Typesb. Phishing ScamsModule 10 – Reconnaissancea.b.c.d.e.What are we looking for?Port ScanningAre there tools to help?Banner GrabbingEnumerationModule 11 – Vulnerability Assessmenta. What is a Vulnerability Assessmentb. Tools of the Tradec. Testing Internal and External SystemsModule 12 - Network Attacksa. Sniffing Techniquesb. HijackingModule 13 – Hacking Serversa. Servers, What are they good for?b. What is an Exploit?c. Tools of the Tradepg. 4www.mile2.com10213 Wilsky Blvd, Tampa, FL 33625813-920-6779

Certified Professional EthicalHackerModule 14 – Hacking Web Technologiesa. OWASP Top 10b. SQL Injectionc. XSSModule 15 – Hacking Wireless Networksa.b.c.d.e.Wireless TechnologiesMobile and IoT TechnologiesVarious Tools UsedHacking TechniquesCountermeasuresModule 16 – Maintaining Access and Covering Tracksa. Maintaining Accessb. Covering TracksDetailed Labs Outline:Lab 1 – Intro to C)PEH Setupa. Recording Ips and Logging into VMsb. Joining the DomainLab 2 - Linux Fundamentalsa. Command Line Tips and Tricksb. Linux Networking for Beginnersc. Using FTP during a PentestLab 3 – Understanding Protocolsa. Analyze http sessionLab 4 - Cryptography Laba. Hashing Data of all Sortsb. The Basics of Cryptographic AlgorithmsLab 5 – Password CrackingLab 6 - Malwarea. Creating a virusb. Beast Trojanpg. 5www.mile2.com10213 Wilsky Blvd, Tampa, FL 33625813-920-6779

Certified Professional EthicalHackerLab 7 – Information Gatheringa.b.c.d.e.f.Google QueriesSearching PastebinMaltegoPeople Search Using the Spokeo Online ToolRecon with ChromeNslookupLab 8 – Information Gathering – Active Reconnaissancea.b.c.d.e.f.Scanning with NmapScanning with HpingBanner GrabbingEnumerating a local System with HyenaSMTP EnumerationAd EnumerationLab 9 – Vulnerability Assessmenta. Vulnerability Assessment with Nessusb. Vulnerability Assessment with SaintLab 10 – Network Sniffing/IDSa. Sniffing Passwords with Wiresharkb. Performing MtM with Cainc. Performing MtM with sslstripLab 11 - Windows Hackinga. Attack Windows 7 with Client-Side Exploitb. Windows 2012 Reverse TCP Exploitc. Cracking with John the RipperLab 12 – Attacking Databasesa. Attacking MySQL Databaseb. Manual SQL InjectionLab 13 – Attacking Web Applicationsa. Attacking with XSSb. Attacking with CSRFLab 13 - Backdoorsa. Setting up a Backdoorpg. 6www.mile2.com10213 Wilsky Blvd, Tampa, FL 33625813-920-6779

Certified Professional Ethical Hacker ,663,6629 . Annual Salary Potential 80,077 AVG/year To protect an information system you need to be able to see that system through the eyes of the attacker. The Certified Professional Ethical Hacker certification course is