About This Course
This Official Mile2® cyber security certification training course covers everything you need to know about becoming a certified professional ethical hacker.
Students will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking.
Our Promise to You
By the end of this course, you will have learned about cyber security and how to become an ethical hacker.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about how to be a professional ethical hacker.
Course Curriculum
Section 1 - Security Fundamentals | |||
Security Fundamentals | 00:00:00 | ||
Section 2 - Access Controls | |||
Access Controls | 00:00:00 | ||
Section 3 - Protocols | |||
Protocols | 00:00:00 | ||
Section 4 - Cryptography | |||
Cryptography | 00:00:00 | ||
Section 5 - Why Vulnerability Assessments? | |||
Why Vulnerability Assessments? | 00:00:00 | ||
Section 6 - Vulnerability Tools Of The Trade | |||
Vulnerability Tools Of The Trade | 00:00:00 | ||
Section 7 - Output Analysis And Reports | |||
Output Analysis And Reports | 00:00:00 | ||
Section 8 - Reconnaissance, Enumeration And Scanning | |||
Reconnaissance, Enumeration And Scanning | 00:00:00 | ||
Section 9 - Gaining Access | |||
Gaining Access | 00:00:00 | ||
Section 10 - Maintaining Access | |||
Maintaining Access | 00:00:00 | ||
Section 11 - Covering Tracks | |||
Covering Tracks | 00:00:00 | ||
Section 12 - Malware | |||
Malware | 00:00:00 | ||
Section 13 - Buffer Overflows | |||
Buffer Overflows | 00:00:00 | ||
Section 14 - Password Cracking | |||
Password Cracking | 00:00:00 | ||
Downloadable Materials | 00:00:00 |