CPEH - Certified Professional Ethical Hacker
8/17/2020 - 10/5/2020


COURSE COST: $2895.00

COURSE TIMES: 9:00am - 5:00pm

Printable version of this course
Register for this course


The Certified Professional Ethical Hacker 5 - day vendor neutral certification course is the foundational training to course to penetration testing courses.

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessment. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack.

The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to asses your company’s security posture, help implement controls to better secure your company’snetwork infrastructure and how to combat against hackers and/or viruses, etc.


Course accredited with the NSA-CNSS (CNSSI-4013 National Information Assurance Training Standard for System Administrators) and is on FBI’s Tier 1 cyber security training requirement.

Who Should Attend
* Information System Owners
* Security Officers
* Ethical Hackers
* Information Owners
* Penetration Testers
* System Owner and Managers
* Cyber Security Engineers


* 12 months of IT security experience
* 12 months of Network

Student Materials: * Student Workbook
* Student Lab guide
* Exam Prep Guide

40 CPE Credits


Course will run as a live-virtual class unless a minimum enrollment is reached.

The Certified Professional Ethical Hacker exam is taken on-line Assessment and Certification System (“MACS”). The C)PEH exam will take 2 hours and consist of 100 multiple choice questions.
Exam Cost: $ 400 USD.

E-Book Cost: $ 350 USD.


Module 1 - Security Fundamentals
Module 2 - Access Controls
Module 3 - Protocols
Module 4 -Cryptography
Module 5 - Why Vulnerability Assessments?
Module 6 - Vulnerability Tools of the Trade
Module 7 - Output Analysis and Reports
Module 8 - Reconnaissance, Enumeration
Module 9 - Gaining Access
Module 10 - Maintaining Access
Module 11 - Covering Tracks
Module 12 - Malware

Module 13 - Buffer Overflows
Module 14 - Password Cracking
Appendix 1 - Economics and Law
Appendix 2 - Vulnerability Types
Appendix 3 - Assessing Web Servers
Appendix 4 - Assessing Remote & VPN Services
Appendix 5 - Denial of Services

What you will learn
Performing in-depth labs with industry standard tools.
Learning the penetration testing methodology through conceptual theories and real-world practices.
Equipping you with the knowledge about what hackers look for when trying to hack into your network
Assessing for the cause of testing your company’s security posture to help better secure the infrastructure against intrusion

Upon Completion
Have knowledge to perform ethical hacking for vulnerability assessments.
Have knowledge to accurately report on their findings.
Be ready to sit for the C)PEH Exam

Class Format Options
Instructor-led: Traditional classroom setting
Live-virtual Training: Connect remotely to the class being taught live.