Training Series Overview
This Official Mile2® cyber security certification training series covers everything you need to know about becoming a certified professional ethical hacker. Students will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaisance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking.
This series will fully prepare you to take the CEH exam. For a brief overview of the concepts covered in the exam, visit our Ethical Hacker series page.
New! Add-on Practice Labs: This course series offers optional hands on practice-labs available for purchase. Try out your new skills today!
Career Path: Professional roles include, but are not limited to Ethical Hackers, Security Consultants, IT Management, and Chief Security Officers.
Official Mile2® CPEH Training Series Taught By: Tracy Preston
The Professional Ethical Hacker certification is the beginning of penetration testing. It shows that you hold a valuable skill-set in penetration testing by understanding the importance of vulnerability assessments and how it can help you prevent serious break-ins to your organization.
Certification Exam Details:
Certified Professional Ethical Hacker: Learn More about this certification exam.
Does this training qualify for college credits?
Yes! This course series, as an elective title, does qualify for 1-3 college credits to be applied towards a degree program offered at American Business and Technology University.
Available CEUs for Course Series Completion: 10
Students can earn up to 10 CEUs for fully completing this course series. This information will be displayed on the certificate of completion.
- Course 01 – Security Fundamentals
- Course 02 – Access Controls
- Course 03 – Protocols
- Course 04 – Cryptography
- Course 05 – Why Vulnerability Assessments?
- Course 06 – Vulnerability Tools of the Trade
- Course 07 – Output Analysis and Reports
- Course 08 – Reconnaisance, Enumeration and Scanning
- Course 09 – Gaining Access
- Course 10 – Maintaining Access
- Course 11 – Covering Tracks
- Course 12 – Malware
- Course 13 – Buffer Overflows
- Course 14 – Password Cracking