img

Certified Professional Ethical Hacker (CPEH)


Course Description:

A Certified Professional Ethical Hacker (CPEH)™ is someone who's hired by a company to check their computer systems and networks for weaknesses. They do this by using the same techniques as hackers, but with permission, to find and fix security problems. Unauthorized hacking is illegal, but when it's done with permission, it's called penetration testing, which is okay. The CPEH™ certification is a training program that teaches people how to be ethical hackers. It covers a lot of important stuff about hacking and keeping networks safe. The training includes learning about the latest tools and tricks used by hackers. It's designed by experts and includes modern tools and techniques that hackers use. When someone gets certified as a CPEH™, it means they're recognized as someone who knows how to protect computer systems from hackers. They learn to find and fix vulnerabilities in things like mobile devices, computer operating systems, and Wi-Fi networks. The training also teaches abou


$ 800.00 $ 565.00

Browse Certifications Info

Certification Overview

A Certified Professional Ethical Hacker (CPEH)™ is someone who's hired by a company to check their computer systems and networks for weaknesses. They do this by using the same techniques as hackers, but with permission, to find and fix security problems. Unauthorized hacking is illegal, but when it's done with permission, it's called penetration testing, which is okay. The CPEH™ certification is a training program that teaches people how to be ethical hackers. It covers a lot of important stuff about hacking and keeping networks safe. The training includes learning about the latest tools and tricks used by hackers. It's designed by experts and includes modern tools and techniques that hackers use. When someone gets certified as a CPEH™, it means they're recognized as someone who knows how to protect computer systems from hackers. They learn to find and fix vulnerabilities in things like mobile devices, computer operating systems, and Wi-Fi networks. The training also teaches about things like how hackers try to trick people into giving them access to systems, how to detect when someone is trying to break in, and how to stop attacks like viruses and DDoS (Distributed Denial of Service) attacks. Overall, the training helps people understand how hackers think and how to defend against them.

E-Course Duration:

Exam Information

  • The test has 100 questions with multiple choices, and you need to get at least 70 of them right to pass.

  • The exams are done online and supervised. You just need a webcam and a good internet connection, and you can take the exams from anywhere, anytime.

  • The test lasts for 2 hours, which is the same as 120 minutes.

  • During the exam with ProctorU, you can't use any outside information. They'll give you more details about what you're allowed to have, like your ID.

  • If you don't pass the exam the second time, you have to wait for at least fourteen days before trying again for the third time or any time after that. You can take the exam as many times as you need to.

  • The Certified Professional Ethical Hacker (CPEH)™ Certificate doesn't expire; it's valid forever.

  • CPEH™ is a trademark of GIPMC.

  • N/A

  • Remember: You don't need any specific qualifications to get the Certified Professional Ethical Hacker (CPEH)™ Certification. However, we suggest taking the E-Course because many of the exam questions come from it.

Course Outline

Module Information - 1

    • Introduction to Hacking
    • Linux Basics
    • Information Gathering Techniques
    • Target Enumeration and Port Scanning Techniques
    • Vulnerability Assessment
    • Network Sniffing

Module Information - 2

    • Remote Exploitation
    • Client-Side Exploitation
    • Post exploitation
    • Windows Exploit Development Basics
    • Wireless Hacking
    • Hackers Methodology
    • Social Engineering Hacking

Module Information - 3

    • Password Hacking
    • Wireless Networks
    • Web Hacking
    • Hacking Web Applications
    • Hack Attack
    • Aftermath
    • Predicting the Future of Hacking

Target Audience

  • Security Officers
  • Auditors
  • Security Professionals
  • Site Administrators
  • Ethical Hackers
Subscribe

Join Our Newsletter Now

Subscribe to GIPMC mailing list to receive update on new Certifications, Special Offers and Discount Information.