Mile 2 CPEH Exam Review
Class
Prontuario Clase 67.5 hrs.
/files/4223330/Prontuario_Mile2_CPEH_Exam_Review.pdf
Este curso está dirigido a preparar al estudiante para repasar, aclarar preguntas, a tomar exámenes de práctica con el objetivo de tomar y aprobar el examen Certified Professional Ethical Hacker (CPEH). Además, se demostrarán estrategia de estudios y técnicas efectivas para tomar el examen en un ambiente alineado con el ambiente de una administración de un examen real a través de un centro de examinación Pearson Vue. Este curso está dirigido a la obtención del examen requerido para la certificación CPEH de Mile2.
Here is the class outline:
1. Reflexion: Hacker Etico
Jul 6
El Perfil que necesita toda empresa digital |
2. Honor Code
Jul 6
Leer Cuidadosamente las premisas |
3. Tutoriales
Jul 6
Como Manejar las plataformas que estamos utilizando al momento |
4. Presentaciones
Jul 6
|
5. Videos Explicativos Laboratorios
Jul 6
|
6. Malwares
Jul 8
The term malware is a contraction of malicious software. Put simply, malware is any piece of software that was written with the intent of damaging devices, stealing data, and generally causing a mess. |
7. Hacking Web Technologies
Jul 9
Is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. |
8. Social Engineering
Jul 14
Is the psychological manipulation of people into performing actions or divulging confidential information. |
9. Hacking Wireless Network
Jul 20
Is a set of two or more devices connected with each other via radio waves within a limited space range. The devices in a wireless network have the freedom to be in motion, but be in connection with the network and share data with other devices in the network. |
10. Vulnerability Assessment
Jul 22
Is a thorough evaluation of existing and potential threats, weaknesses and, indeed, vulnerabilities in your organization’s systems and networks. |
11. Maintining Access and Covering Tracks
Jul 22
Its goal is to erase the digital signs left out by the pen tester during the earlier stages of the test. These digital signs, in essence, prove the pen tester’s presence in the targeted computer system. |