• LOGIN
  • No products in the basket.

Login

The [ourse_title] is designed for them who is interested to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. By learning form this course you will be able to understand how malware and destructive viruses function. You will learn how to implement counter response and take preventive measures in case of an attack on the network.

With this Certified Professional Ethical Hacker (CPEH) you will get to know detail about becoming a certified professional ethical hacker. You will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaisance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking.

The course will equip you to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc.

How is this qualification is delivered?

Our courses are taught entirely online, meaning you can access the materials wherever, whenever, at a pace that suits you, without formal deadlines or teaching schedules.

These can be accessed through any device with an internet connection. Our e-learning platform is optimised for use on mobile, tablet, laptops and desktop computers.

Certification:

Enhance your profile with a CPD-accredited certificate, available for an additional cost after course completion.

Course Curriculum

Security Fundamentals
Security Fundamentals FREE 00:51:00
Access Controls
Access Controls 00:33:00
Protocols
Protocols 00:36:00
Cryptography
Cryptography 00:52:00
Why Vulnerability Assessments?
Why Vulnerability Assessments? 00:36:00
Vulnerability Tools of the Trade
Vulnerability Tools of the Trade 00:10:00
Output Analysis and Reports
Output Analysis and Reports 00:13:00
Reconnaisance, Enumeration and Scanning
Reconnaisance, Enumeration and Scanning 00:51:00
Gaining Access
Gaining Access 00:31:00
Maintaining Access
Maintaining Access 00:17:00
Covering Tracks
Covering Tracks 00:18:00
Malware
Malware 00:28:00
Buffer Overflows
Buffer Overflows 00:22:00
Password Cracking
Password Cracking 00:33:00
Mock Exam
Mock Exam – Certified Professional Ethical Hacker (CPEH) 00:20:00
Final Exam
Final Exam – Certified Professional Ethical Hacker (CPEH) 00:20:00

Course Reviews

4.9

4.9
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE OR ALL COURSES FOR £69.99
  • £24.99
  • 1 year
  • Course Certificate
  • Number of Units14
  • Number of Quizzes2
  • 7 hours, 51 minutes
8 STUDENTS ENROLLED