Oreilly - Certified Professional Ethical Hacker (CPEH) - 300000006A0224
Oreilly - Certified Professional Ethical Hacker (CPEH)
by Integrity Training | Publisher: Stone River eLearning | Release Date: May 2018 | ISBN: 300000006A0224


The Certified Professional Ethical Hacker (CPEH) is a vendor-neutral certification offered by Mile2 for the students willing to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. In doing so, the CPEH students are able to understand how malware and destructive viruses function. In addition to this, the CPEH course helps students learn how to implement counter response and take preventive measures in case of an attack on the network. This preparatory course for the Certified Professional Ethical Hacker (CPEH) certification covers the complete curriculum required to clear the certification exam. The topics covered in this course are security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. NOTE Mile2 is: ACCREDITED by the NSA CNSS 4011-4016 MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
  1. Module 01 - Security Fundamentals
    • Security Fundamentals 00:19:46
    • Malware 00:14:44
    • Firewalls 00:16:53
  2. Module 02 - Access Controls
    • Access Controls Part1 00:14:12
    • Access Controls Part2 00:18:58
  3. Module 03 - Protocols
    • Protocols Part1 00:17:40
    • Protocols Part2 00:18:23
  4. Module 04 - Cryptography
    • Cryptography Part1 00:17:51
    • Cryptography Part2 00:16:32
    • Cryptography Part3 00:17:45
    • Cryptography Part4 00:17:45
  5. Module 05 - Why Vulnerability Assessments?
    • Why Vulnerability Assessments? Part1 00:19:14
    • Why Vulnerability Assessments? Part2 00:16:57
  6. Module 06 - Vulnerability Tools of the Trade
    • Vulnerability Tools of the Trade 00:10:13
  7. Module 07 - Output Analysis and Reports
    • Output Analysis and Reports 00:13:15
  8. Module 08 - Reconnaissance, Enumeration and Scanning
    • Reconnaissance, Enumeration and Scanning Part1 00:18:59
    • Reconnaissance, Enumeration and Scanning Part2 00:16:27
    • Reconnaissance, Enumeration and Scanning Part3 00:16:01
  9. Module 09 - Gaining Access
    • Gaining Access Part 1 00:15:34
    • Gaining Access Part 2 00:15:28
  10. Module 10 - Maintaining Access
    • Maintaining Access 00:17:17
  11. Module 11 - Covering Tracks
    • Covering Tracks 00:18:01
  12. Module 12 - Malware
    • Malware Part 1 00:15:02
    • Malware Part 2 00:13:27
  13. Module 13 - Buffer Overflows
    • Buffer Overflows Part 1 00:09:10
    • Buffer Overflows Part 2 00:12:59
  14. Module 14 - Password Cracking
    • Password Cracking Part 1 00:13:15
    • Password Cracking Part 2 00:20:04
  15. Oreilly - Certified Professional Ethical Hacker (CPEH)

    300000006A0224.Certified.Professional.Ethical.Hacker.CPEH.part1.OR.rar

    300000006A0224.Certified.Professional.Ethical.Hacker.CPEH.part2.OR.rar

    300000006A0224.Certified.Professional.Ethical.Hacker.CPEH.part3.OR.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss