Certified Ethical Hacker
Posted 16 January 2007 - 10:06 AM
Does anyone know where I can find study guides for the Ethical Hacker Certificate? Thanks in advance.
Posted 16 January 2007 - 10:51 PM
CompTIA Network+ Certified
CompTIA Security+ Certified
SAP Business One TB1000 (Logistics) Certified
SAP Business One TB1100 (Accounting) Certified
SAP Business One TB1200 (Implementation & Support) Certified
Accpac Certified Consultant
"Success is not final, failure is not fatal: it is the courage to continue that counts."
Posted 13 March 2007 - 08:28 PM
Posted 26 March 2007 - 12:15 PM
Anyways, a lot of companies don't know how someone with CEH would "fit in" or why the cert is important. It would be YOUR job to explain it to them. Typically, if you say "Ethical Hacking and Countermeasures" and explain it as a more advanced Security+ course, you can swing it and suddenly everyone's enamored with the cert. It's not entirely accurate, but it's pretty close as CEH does build heavily on what you may or may not have learned in Sec+.
Anywho, thanks gburrows for that link. THe more practice tests the better.
Edited by Guse, 26 March 2007 - 12:16 PM.
MCTS: Vista Configuration
MCITP: Server Administrator on Server 2008
MCTS: Windows Server 2008 Application Infrastructure
Certified Ethical Hacking and Countermeasures (CEHv5 certified)
CompTIA Security+ Certified
(ISC)2 Systems Security Certified Practitioner (SSCP)
Posted 19 April 2007 - 07:31 PM
This may be of interest to myself in the future after completing school...I currenlty work part time at a communications company who have several lines of business (including internet service). Regardless of where I end up after graduating, my eventual goal is to get Sec +. Now I've got another goal beyond that.
Posted 19 April 2007 - 09:33 PM
Sr. Technical Support Specialist
CompTIA A+ Certified
former IT Administrator
Posted 28 April 2007 - 01:30 AM
1. What makes the Ethical Hacking and Countermeasures course different from other courses in the market?
The Ethical Hacking and Countermeasures course prepares candidates for the CEH exam offered by EC-Council. The course focuses on hacking techniques and technology from an offensive perspective. The course is regularly updated to reflect latest developments in the domain, including new hacking techniques, exploits, automated programs as well as defensive recommendations as outlined by experts in the field. The CEH body of knowledge represents detailed contributions from security experts, academicians, industry practitioners and the security community at large.
2. What is "Hacking techniques and technology"?
Hacking techniques represent ways and means by which computer programs can be made to behave in ways they are not meant to. These techniques extend beyond the technology domain and can be applied to test security policies and procedures.
Hacking technology is used to refer to those tools and automated programs that can be used by perpetrators against an organization to incur critical damage. As technology advances, the skill required to execute a hack is much lesser as pre-compiled programs are available to effect havoc with simple point and click.
3. Aren't tools meant for script kiddies?
Does it matter if an elite hacker writes a buffer overflow or a script kiddy runs a tool if the target system gets compromised anyway? The point of emphasis here is that the enemy may be intellectually great or small, but he requires just one port of entry to wreck damage while the organization has the entire perimeter to guard with limited time and resources.
4. Do reformed hackers teach your course?
EC-Council places great emphasis on the quality of its instructors. A 17 year old will not be teaching security to professionals at our accredited training centers. Certainly, experience is the greatest teacher. However, EC-Council adheres to a code of ethics and encourages security professionals with significant years of teaching exposure in the industry and security related experience to handle its security related courses.
5. Isn't this knowledge harmful? Why do you make it available so easily to the public?
EC-Council fulfills its social responsibility by ensuring that only persons with a minimum of two years of security related experience are eligible for the course. In addition all candidates are required to sign an agreement where they agree to respect the knowledge acquired and not misuse it in any way. The candidate also agrees to abide by all legal laws of the land in the use of thus acquired knowledge. Besides the CEH exam is a tough one to pass as students must have in-depth knowledge.
6. What can I take back to my organization if I certify as a CEH?
EC-Council believes in giving back to the security community as it has partaken of it. When you are a certified ethical hacker, you are more than a security auditor or a vulnerability tester or a penetration tester alone. You are exposed to security checklists that will help you audit the organization's information assets, tools which will check for vulnerabilities that can be exploited and above all a methodology to assess the security posture of your organization by doing a penetration test against it. In short, the knowledge you will acquire has practical value to make your work place a more secure and efficient one.
7. It is all too technical. Do you reflect real-world business issues?
The value of CEH lies in its practical value. Over 22 domains, students are exposed to the business risks involved and the potential damage that can result due to negligence. Candidates are able to make an evaluated opinion regarding the acceptable risk an organization can face should it choose to address a security concern.
8. What is the employment value of CEH?
CEH is primarily targeted at security professionals who want to acquire a well rounded body of knowledge to have better opportunities in this field. Acquiring a CEH means the candidate has a minimum baseline knowledge of security threats, risks and countermeasures. Organizations can rest assured that they have a candidate who is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester. The candidate is assured of having both business and technical knowledge.
9. Where does CEH stand when compared to other educational offerings in the field of information security?
Consider this. A security defense course educates regarding proper configuration, firewalls, or rather preemptive security. CEH takes the alternative approach - defense in depth by attacking the systems. This is in sharp contrast to courses that teach defensive tactics alone. CEH imparts offensive tactics supplemented with defensive countermeasures. This ensures that the CEH professional can have a holistic security perspective of the organization.
10. I would like to provide professional service as a CEH professional. What can I expect to be paid per assignment?
The remuneration per assignment will vary with specifics of the client environment. However, on an average you can expect to be paid around $15,000 to $ 45,000 per assignment.
This Information from E-council site. Original Source Link Click Here
Hopes this information will help for you.
Edited by kahawala, 28 April 2007 - 06:02 AM.
0 user(s) are reading this topic
members, guests, anonymous users