Certified Professional Ethical Hacking C)PEH Certification
What you'll learn
- Foot printing
- Network scanning
- Enumeration
- Packet sniffing
- Social Engineering
- DoS/DDoS
- Session hijacking
- Webserver and web application attacks and countermeasures
- SQL injection attacks
- Wireless encryption
- Cloud computing threats
- Cryptography ciphers
- Penetration testing
Requirements
- The course requires the students to have at least two years of IT security experience along with a strong working knowledge of TCP/IP.
Description
The Certified Professional Ethical Hacking training course is a generalized training course for the information security professionals. This training course provides the students with an overview of the tools, techniques and skills required to become a successful and effective ethical hacker. The goal of this course is to help the candidates master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation.
This course covers all the tools and techniques in an encyclopedic approach that are fundamental to understand the domain of ethical hacking and implement the knowledge gained to secure the IT infrastructure and conduct effective penetration testing.
This course is not an EC-Council course or related to any of their certifications. If you want an EC-Council course we recommend you contact them directly or search Udemy for courses related to their exams.
The Certified Professional Ethical Hacking training course is a generalized training course for the information security professionals. This training course provides the students with an overview of the tools, techniques and skills required to become a successful and effective ethical hacker. The goal of this course is to help the candidates master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation.
This course covers all the tools and techniques in an encyclopedic approach that are fundamental to understand the domain of ethical hacking and implement the knowledge gained to secure the IT infrastructure and conduct effective penetration testing.
This course is not an EC-Council course or related to any of their certifications. If you want an EC-Council course we recommend you contact them directly or search Udemy for courses related to their exams.
Who this course is for:
- Security officers
- Auditors
- Security professionals
- Site administrators
- Individuals concerned about the integrity of the network infrastructure
Instructor
At Stone River eLearning, technology is all we teach. If you're interested in IT, programming, development or design - we have it covered.
Check out our huge catalog of courses and join the over 1.3M students currently taking Stone River eLearning courses. We currently offer 1000+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month. A subscription option is available for those with a real passion for learning.