Certified ethical hacker
![]() | This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
This article needs additional citations for verification. (January 2016) |
Certified Ethical Hacker (CEH) is a qualification obtained in assessing the security of computer systems, using penetration testing techniques. The code for the CEH exam is 312-50, and the certification is in Version 9 as of late 2015.[citation needed][1][2]
Penetration tests are employed by an organization which trusts certified ethical hakcers to attempt to penetrate networks and/or computer systems with the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries; however, penetration testing done by request of the owner of the victim system(s) or network(s) is not.[citation needed]
The EC-Council offers another certification, known as Certified Network Defense Architect (CNDA). This certification is designed for United States Government agencies and is available only to members of selected agencies. Besides the name, the content of the course is exactly the same. The exam code for CNDA is 312-99.[3]
Controversy
Some computer security professionals have objected to the term "ethical hacker" as a "contradiction in terms".[4] Part of the controversy may arise from the older, less stigmatized, definition of hacker, which has since become synonymous with the computer criminal. According to the EC-Council, there has been an increase of careers where CEH and other ethical hacking certifications are preferred or required.[5][6][7][8] The US government accepts this association and requires CEH accreditation for some jobs, per DoD 8570.01-M guidelines.[9]
References
- ^ "Certified Ethical Hacking v9 (CEH v9) Certification and Training Course". www.mercury.co.in. Retrieved 2016-01-28.
- ^ "Ethical Hacking, Undergraduate Program, Abertay University". www.abertay.ac.uk. Retrieved 2016-03-28.
- ^ "Certified Network Defense Architect - EC-Council". eccouncil.org.
- ^ D'Ottavi, Alberto (February 3, 2003). "Interview: Father of the Firewall". Retrieved June 6, 2008.
- ^ http://hotjobs.yahoo.com/career-articles-6_unusual_high_paying_careers-600
- ^ "Certification - CEH,CHFI, ECSA, LPT, ENSA, ECSP, ECVP, EDRP, CNDA, ECIH, ECSS". eccouncil.org.
- ^ "Despite Economy, IT Security Salaries Are On The Rise". Dark Reading.
- ^ "How to Become a Certified Ethical Hacker". esecurityplanet.com.
- ^ "DoD Approved 8570 Baseline Certifications". disa.mil.
Further reading
- Walker, Matt; CEH Certified Ethical Hacker All-In-One Exam Guide, The McGraw-Hill Companies, 2011. ISBN 978-0-07-177229-7
- Oriyano, Sean-Philip; CEH: Certified Ethical Hacker Version 8 Study Guide, Sybex Publishing, 2014. ISBN 978-1-118-64767-7
- Gregg, Michael; Certified Ethical Hacker Exam Prep, Que Publishing, 2006. ISBN 978-0-7897-3531-7
- DeFino, Steven; Greenblatt, Larry; Official Certified Ethical Hacker Review Guide: for Version 7.1 (EC-Council Certified Ethical Hacker (Ceh)), Delmar Cengage Learning, March 2, 2012. ISBN 978-1-1332-8291-4