We are happy to advise you!
Contact
Certified Professional Ethical Hacker (CPEH) – Outline
Detailed Course Outline
- Module 0 – Course Introduction
- Module 1 – Introduction to Ethical Hacking
- Module 2 – Linux Fundamentals
- Module 3 – Protocols
- Module 4 – Cryptography
- Module 5 – Password Cracking
- Module 6 – Malware
- Module 7 – Security Devices
- Module 8 – Information Gathering – Passive Reconnaissance
- Module 9 – Social Engineering
- Module 10 – Active Reconnaissance
- Module 11 – Vulnerability Assessment
- Module 12 – Network Attacks
- Module 13 – Hacking Servers
- Module 14 – Hacking Web Technologies
- Module 15 – Hacking Wireless Technologies
- Module 16 – Maintaining Access and Covering Tracks