Certified Professional Ethical Hacker (CPEH)

Module 01 – Security Fundamentals 51m
Security Fundamentals
Module 02 – Access Controls 33m
Access Controls
Module 03 – Protocols 36m
Protocols
Module 04 – Cryptography 52m
Cryptography
Module 05 – Why Vulnerability Assessments? 36m
Why Vulnerability Assessments?
Module 06 – Vulnerability Tools of the Trade 10m
Vulnerability Tools of the Trade
Module 07 – Output Analysis and Reports 13m
Output Analysis and Reports
Module 08 – Reconnaissance, Enumeration and Scanning 51m
Reconnaissance, Enumeration and Scanning
Module 09 – Gaining Access 31m
Maintaining Access
Module 10 – Maintaining Access 17m
Maintaining Access
Module 11 – Covering Tracks 18m
Covering Tracks
Module 12 – Malware 28m
Malware
Module 13 – Buffer Overflows 22m
Buffer Overflows
Module 14 – Password Cracking 33m
Password Cracking
Total Duration: 3hrs 39m

Leave Comment