Soft University White Crest and Text Log

Ethical Hacking

Certification Program

To protect an information system you need to be able to see that system through the eyes of
the attacker. The Ethical Hacking Certification Program will teach students to set up dynamic defenses to prevent intrusion. Student will learn the value of vulnerability assessments and how they are used to make powerful changes in an information system’s security. Additionally, students will learn how malware and destructive viruses function and how to implements counter response and preventive measures when it comes to a network hack.

Certification Included: Certified Professional Ethical Hacker (CPEH)

Estimated Duration: 3 Months

SOFTwarfare University's certification programs provide a flexible training schedule with on-demand lectures and hands on live labs.  This provides an environment where students can comprehend, experience, engage and ultimately master the subject matter.


This program includes the following:

  • Instructor Led OnDemand Video Training

  • Hands-On Practice Labs

  • Certification Preparation

  • Exam Simulator

  • Exam Vouchers

Certified Professional Ethical Hacker


The Certified Professional Ethical Hacker (CPEH) certification addresses all issues related to securing networks and information from hackers. The CPEH credential validates an Information Technology Security Professional as an ethical hacker or penetration tester. Ethical hacking training strengthens the capabilities of a person to safeguard companies and organizations against vulnerabilities and threats in mobile devices, operating systems, and networks and prevent illegal intrusion of hackers. Participants will have to understand perimeter defenses and then be led into scanning and attacking their own networks; no real network is harmed. Students will then learn how intruders escalate privileges and the steps that can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Typing on a Computer

Ready to take the next step?