The [ourse_title] is designed for them who is interested to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. By learning form this course you will be able to understand how malware and destructive viruses function. You will learn how to implement counter response and take preventive measures in case of an attack on the network.
With this Certified Professional Ethical Hacker (CPEH) you will get to know detail about becoming a certified professional ethical hacker. You will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaisance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking.
The course will equip you to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc.
How is this qualification is delivered?
Our courses are taught entirely online, meaning you can access the materials wherever, whenever, at a pace that suits you, without formal deadlines or teaching schedules.
These can be accessed through any device with an internet connection. Our e-learning platform is optimised for use on mobile, tablet, laptops and desktop computers.
How is the course assessed?
Our Certified Professional Ethical Hacker (CPEH) will ensure that you’re fully prepared for the exam. Successful completion of the exam – provided by the authorised awarding body – is a prerequisite to obtaining your qualification.
However, you will be able to obtain a course completion certificate from St. Paul’s College upon completion of the course.
Course Curriculum
Security Fundamentals | |||
Security Fundamentals | FREE | 00:51:00 | |
Access Controls | |||
Access Controls | 00:33:00 | ||
Protocols | |||
Protocols | 00:36:00 | ||
Cryptography | |||
Cryptography | 00:52:00 | ||
Why Vulnerability Assessments? | |||
Why Vulnerability Assessments? | 00:36:00 | ||
Vulnerability Tools of the Trade | |||
Vulnerability Tools of the Trade | 00:10:00 | ||
Output Analysis and Reports | |||
Output Analysis and Reports | 00:13:00 | ||
Reconnaisance, Enumeration and Scanning | |||
Reconnaisance, Enumeration and Scanning | 00:51:00 | ||
Gaining Access | |||
Gaining Access | 00:31:00 | ||
Maintaining Access | |||
Maintaining Access | 00:17:00 | ||
Covering Tracks | |||
Covering Tracks | 00:18:00 | ||
Malware | |||
Malware | 00:28:00 | ||
Buffer Overflows | |||
Buffer Overflows | 00:22:00 | ||
Password Cracking | |||
Password Cracking | 00:33:00 | ||
Mock Exam | |||
Mock Exam – Certified Professional Ethical Hacker (CPEH) | 00:20:00 | ||
Final Exam | |||
Final Exam – Certified Professional Ethical Hacker (CPEH) | 00:20:00 |
Course Reviews
No Reviews found for this course.