skip to content
Certified Professional Ethical Hacker (CPEH) Preview this item
ClosePreview this item
Checking...

Certified Professional Ethical Hacker (CPEH)

Author: Integrity Training,; Stone River eLearning,
Publisher: [Place of publication not identified] : Stone River eLearning, 2018.
Edition/Format:   eVideo : Clipart/images/graphics : EnglishView all editions and formats
Summary:
"The Certified Professional Ethical Hacker (CPEH) is a vendor-neutral certification offered by Mile2 for the students willing to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. In doing so, the CPEH students are able to understand how malware and destructive viruses function. In addition to this, the CPEH course helps students learn how to  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Clipart/images/graphics, Internet resource, Videorecording
Document Type: Internet Resource, Computer File, Visual material
All Authors / Contributors: Integrity Training,; Stone River eLearning,
OCLC Number: 1044741284
Notes: Title from resource description page (Safari, viewed July 13, 2018).
Description: 1 online resource (1 streaming video file (7 hr., 31 min., 52 sec.)) : digital, sound, color
Responsibility: Integrity Training.

Abstract:

"The Certified Professional Ethical Hacker (CPEH) is a vendor-neutral certification offered by Mile2 for the students willing to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. In doing so, the CPEH students are able to understand how malware and destructive viruses function. In addition to this, the CPEH course helps students learn how to implement counter response and take preventive measures in case of an attack on the network. This preparatory course for the Certified Professional Ethical Hacker (CPEH) certification covers the complete curriculum required to clear the certification exam. The topics covered in this course are security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking."--Resource description page.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1044741284> # Certified Professional Ethical Hacker (CPEH)
    a schema:Movie, schema:CreativeWork, schema:VideoObject ;
    library:oclcnum "1044741284" ;
    rdfs:comment "Unknown 'gen' value: cig" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/5342145388#Topic/penetration_testing_computer_security> ; # Penetration testing (Computer security)
    schema:about <http://experiment.worldcat.org/entity/work/data/5342145388#Topic/hacking> ; # Hacking
    schema:about <http://experiment.worldcat.org/entity/work/data/5342145388#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/5342145388#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:datePublished "2018" ;
    schema:description ""The Certified Professional Ethical Hacker (CPEH) is a vendor-neutral certification offered by Mile2 for the students willing to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. In doing so, the CPEH students are able to understand how malware and destructive viruses function. In addition to this, the CPEH course helps students learn how to implement counter response and take preventive measures in case of an attack on the network. This preparatory course for the Certified Professional Ethical Hacker (CPEH) certification covers the complete curriculum required to clear the certification exam. The topics covered in this course are security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking."--Resource description page."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/5342145388#Organization/integrity_training> ; # Integrity Training,
    schema:exampleOfWork <http://worldcat.org/entity/work/id/5342145388> ;
    schema:inLanguage "en" ;
    schema:name "Certified Professional Ethical Hacker (CPEH)"@en ;
    schema:productID "1044741284" ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/5342145388#Organization/stone_river_elearning> ; # Stone River eLearning,
    schema:url <https://www.safaribooksonline.com/library/view/-/300000006A0224/?ar> ;
    schema:url <https://login.library.sheridanc.on.ca/login?url=http://proquestcombo.safaribooksonline.com/?uiCode=sheridan&xmlId=300000006A0224> ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=300000006a0224> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1044741284> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/5342145388#Organization/stone_river_elearning> # Stone River eLearning,
    a schema:Organization ;
    schema:name "Stone River eLearning," ;
    .

<http://experiment.worldcat.org/entity/work/data/5342145388#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5342145388#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5342145388#Topic/penetration_testing_computer_security> # Penetration testing (Computer security)
    a schema:Intangible ;
    schema:name "Penetration testing (Computer security)"@en ;
    .

<https://www.safaribooksonline.com/library/view/-/300000006A0224/?ar>
    rdfs:comment "from Safari" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.