Skip to content
Computers

Mile 2 CPEH Exam Review


Class
Joel Vargas
Access code required
Enroll

Prontuario Clase 67.5 hrs.

/files/4223330/Prontuario_Mile2_CPEH_Exam_Review.pdf

Este curso está dirigido a preparar al estudiante para repasar, aclarar preguntas, a tomar exámenes de práctica con el objetivo de tomar y aprobar el examen Certified Professional Ethical Hacker (CPEH). Además, se demostrarán estrategia de estudios y técnicas efectivas para tomar el examen en un ambiente alineado con el ambiente de una administración de un examen real a través de un centro de examinación Pearson Vue. Este curso está dirigido a la obtención del examen requerido para la certificación CPEH de Mile2.

Here is the class outline:

1. Reflexion: Hacker Etico

Jul 6

El Perfil que necesita toda empresa digital

2. Honor Code

Jul 6

Leer Cuidadosamente las premisas

3. Tutoriales

Jul 6

Como Manejar las plataformas que estamos utilizando al momento

4. Presentaciones

Jul 6

5. Videos Explicativos Laboratorios

Jul 6

6. Malwares

Jul 8

The term malware is a contraction of malicious software. Put simply, malware is any piece of software that was written with the intent of damaging devices, stealing data, and generally causing a mess.

7. Hacking Web Technologies

Jul 9

Is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

8. Social Engineering

Jul 14

Is the psychological manipulation of people into performing actions or divulging confidential information.

9. Hacking Wireless Network

Jul 20

Is a set of two or more devices connected with each other via radio waves within a limited space range. The devices in a wireless network have the freedom to be in motion, but be in connection with the network and share data with other devices in the network.

10. Vulnerability Assessment

Jul 22

Is a thorough evaluation of existing and potential threats, weaknesses and, indeed, vulnerabilities in your organization’s systems and networks.

11. Maintining Access and Covering Tracks

Jul 22

Its goal is to erase the digital signs left out by the pen tester during the earlier stages of the test. These digital signs, in essence, prove the pen tester’s presence in the targeted computer system.

Back to top