Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ Microsoft AZ-900
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Personal Transformation Life Purpose Meditation CBT Emotional Intelligence
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Vue JS
Google Flutter Android Development iOS Development React Native Swift Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
Microsoft Power BI SQL Tableau Business Analysis Data Modeling Business Intelligence MySQL Data Analysis Blockchain
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Business Plan Startup Online Business Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

Certified Professional Ethical Hacker (CPEH) Part 1 of 2

Updated Aug 2020
Rating: 4.6 out of 54.6 (3 ratings)
33 students
Created by Integrity Training, Stone River eLearning
Last updated 12/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Learn the fundamentals of network security
  • Implement access controls
  • Understand the network security protocols
  • Learn cryptography and its uses
  • Conduct effective vulnerability assessments
  • Learn how to cover tracks
  • Understand the functioning of malware
  • Crack passwords

Requirements

  • The candidates opting for this course are recommended to have a minimum of one year of experience in the field of information technology especially networking.

Description

This is the updated version of the course (Updated Aug 2020)

The Certified Professional Ethical Hacker (CPEH) is a vendor-neutral certification offered by Mile2 for the students willing to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. In doing so, the CPEH students are able to understand how malware and destructive viruses function. In addition to this, the CPEH course helps students learn how to implement counter response and take preventive measures in case of an attack on the network.

This preparatory course for the Certified Professional Ethical Hacker (CPEH) certification covers the complete curriculum required to clear the certification exam. The topics covered in this course are security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. 

Exam Information   

The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands-on labs emulate real-world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc. Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam.

Who this course is for:

  • Information System Owners
  • Security Officers
  • Ethical Hackers
  • Information Owners
  • Penetration Testers
  • System Owner and Managers
  • Cyber Security Engineers

Course content

69 sections • 677 lectures • 13h 41m total length

  • Preview02:38
  • Course Overview
    01:50
  • Course Prerequisites
    01:54

  • Introduction to Ethical Hacking
    00:11
  • Where are We?
    00:12
  • Overview
    00:12
  • Quiz 1
    5 questions

  • What is Ethical Hacking?
    00:48
  • What is Ethical Hacking? Cont...
    00:39
  • Why Ethical Hacking?
    00:20
  • Downfalls
    00:28

  • Items we Cover
    00:24
  • What is a Penetration Test?
    00:42
  • White Hat/Red Team
    01:16
  • Red Team/Security Researcher
    01:17
  • Differences
    00:19
  • Task Differences
    00:14
  • Hacker vs. Ethical Hacker
    00:33

  • Types of Hackers
    01:15
  • CIA Triad in Detail
    00:47
  • Security Definitions
    01:18
  • Exploit and Vulnerability Lifecycle
    01:03
  • Zero Day Anyone?
    00:39
  • Risk Assessment
    01:13
  • Mile2 Glossary of Terms
    00:20

  • Preview01:18
  • Preview01:07
  • Preview00:41
  • Preview00:54
  • Preview00:44
  • Preview00:28
  • Preview01:04
  • Preview00:35
  • Preview01:01
  • Preview00:38
  • Preview01:02
  • Preview01:17
  • Reference Documents
    02:12
  • NIST SP 800-39 Risk Context
    00:19
  • Purpose of Risk Management
    01:00

  • Options
    00:25
  • Ethical Hacking Methodologies
    00:51
  • Penetration Testing Methodologies
    00:46
  • OSSTMM
    01:29
  • OSSTMM - The Trifecta
    00:29
  • OSSTMM Combining Trifecta and 4PP
    01:10
  • NIST SP-800-115
    01:01
  • NIST SP-800-115 Cont...
    01:36
  • ISSAF Four Phases
    00:26
  • ISSAF Diagram
    01:14
  • PTES
    00:54
  • Methodology for Penetration Testing
    03:39
  • So Which One?
    00:50
  • Not Just Tools
    00:16
  • Module 1 Review
    00:05

  • Linux Fundamentals
    00:40
  • Where are We?
    00:18
  • Overview
    00:30
  • Quiz 2
    5 questions

  • What is Linux?
    01:20
  • Linus + Minix = Linux
    00:30
  • GNU
    00:34
  • Linux GUI Desktops
    00:33
  • Top 10 Latest GUI Releases
    00:39
  • Distributions
    01:12
  • Resources
    00:37

  • Shell
    00:35
  • Linux Shell
    02:32
  • Linux Bash Shell
    00:37
  • File System Structure
    00:51
  • File System Structure Cont...
    01:46
  • Mounting Drives with Linux
    00:43
  • File System Structure Cont...
    02:42
  • Tarballs and Zips
    01:33
  • Compiling Programs in Linux
    01:14
  • Iptables
    01:03
  • Iptables Cont...
    01:06
  • IP Forwarding
    00:45

Instructors

Integrity Training
Certification Trainers for Over 20 Years
Integrity Training
  • 4.2 Instructor Rating
  • 10,221 Reviews
  • 81,052 Students
  • 152 Courses

Hi, we're new to Udemy but we've been producing and selling high quality online training for over 20 years. Over a million students have taken our training through our corporate, government and education partners. Our content was developed for institutions that require the absolute highest standards in teaching quality. We're now bringing our content to consumers like you. Don't settle for anything less than the best quality content available. 

Stone River eLearning
500,000+ Happy Udemy Students
Stone River eLearning
  • 4.2 Instructor Rating
  • 53,793 Reviews
  • 677,764 Students
  • 308 Courses

At Stone River eLearning, technology is all we teach. If you're interested in IT, programming, development or design - we have it covered. 

Check out our huge catalog of courses and join the over 1,200,000+ students currently taking Stone River eLearning courses. We currently offer 800+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month. A subscription option is available for those with a real passion for learning.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.