CEH: Certified Ethical Hacker
Featured Course:BS-IT: CyberSecurity (Kaplan University) | Highlights: Advanced Information Security Training, Ethical Hacking, Prep for Hot IT Certifications from CompTIA, EC-Council, (ISC)2, GIAC and. COURSE DETAILS
“To beat a hacker, you need to think like one!”EC-Council
Certified Ethical Hackers use the knowledge and tools of malicious attackers to uncover vulnerabilities in an organization’s computer systems. Upon assessing the target system’s security posture, a CEH performs the indicated preventive, corrective and protective measures to safeguard the system before an actual breach can occur. CEH certification is vendor-neutral, so certified ethical hackers can protect a wide range of systems, regardless of make.
The CEH certificate is EC-Council’s most popular and sought-after credential. Typical job titles for CEH-certified professionals include penetration tester, network security specialist, ethical hacker, security consultant, site administrator and auditor. Beyond the significant corporate job opportunities, becoming CEH certified opens the door to lucrative security positions in the government IT sector, as the CEH is endorsed and used by the National Security Agency (NSA), the Committee on National Security Systems (CNSS) and the Department of Defense (DoD) as a benchmark to clear personnel and contractors with privileged access to sensitive information.
Universities, colleges and private computer schools offer courses and degrees featuring CEH certification prep and training programs that align with EC-Council’s Certified Ethical Hacker curriculum. Compare some of the top-rated CEH training programs in the U.S. and online below.
Skills Measured by the Certified Ethical Hacker Exam
Here are some of the key skills and knowledge areas covered in the CEH exam. Certified Ethical Hackers.
- possess a strong background knowledge of networking, telecommunications, web and computer systems.
- understand the current security protocols for popular operating environments, e.g. Linux, Windows Mac OS.
- “hack” into an organization’s network/systems – with its permission – to assess weaknesses and vulnerabilities.
- undertake preventive, corrective and protective countermeasures to safeguard systems against malicious attack.
- have the ability to identify and crack multiple types of passwords, and effectively counter password attacks.
- comprehend the terminology, stages, classes, phases and methodologies of ethical hacking.
- can cover their tracks and erase digital evidence of networks and system intrusions.
- understand cryptography encryption techniques, and private/public key infrastructure.
- adhere to a code of ethics governing professional conduct the appropriateness of hacking.
- understand common cyber attacks, e.g. social engineering, phishing, identity theft, URL obfuscation, trojans, dumpster diving, insider attacks, etc. and can undertake the appropriate evasion techniques and countermeasures.
Download the CEH Certification Exam Blueprint for a complete list of Certified Ethical Hacker exam objectives.
Certified Ethical Hacker Exam
- CEH: Certified Ethical Hacker | Exam code 312-50