Getting Certified as an Ethical Hacker
What you'll learn
- Assess technical vulnerabilities for the potential for exploitation
- Apply a code of ethics to testing situations
- Perform technical vulnerability assessments
- Determine appropriate remediations for vulnerabilities
- Operate tools and utilities used in security testing
- Describe a basic penetration testing methodology
- Compare differences between testing methodologies that exist
- Identify appropriate testing tools
- Assess a testing request to identify the scope and remain within that scope
Requirements
- Experience with TCP/IP networking
- Be able to launch applications on a computer system and operate them
- Familiarity with command line systems
- Understanding of basic computer architectural components -- processor, memory, disk
Description
This course is not associated with EC-Council in any way. Any content herein is explicitly my own based on publicly available information about the exam contents.
Do you need to earn your Certified Ethical Hacker (CEH v10) certification? If so, you've come to the right place.
Hi, my name is Ric Messier, and I’m an information security (IS) expert with decades of professional experience as a programmer, system administrator, network engineer, security engineering manager, VoIP engineer, and consultant. I’m also an adjunct instructor at Harvard University and a best-selling tech book author who has personally trained thousands to pass various IS certification exams including CEH.
The CEH is an entry point to part of the broad world of information security. This course covers the range of topics that are covered in the CEH certification. This includes:
the importance of ethics
basic testing methodology
wireless networks
social engineering attacks
web application testing
The importance of ethical hacking isn't in the breaking, it's in the fixing. To that end, you will need to understand remediations, like good software development practices, remediating web application vulnerabilities as well as policies and standards that should govern all information security practices within an organization.
The CEH is a very dense exam. It covers a very broad range of material. This course will be a good resource for you to understand not only the material but the breadth of the material. As EC-Council expects you to have two years of experience before you can even register to take the exam, I don't expect this course alone will be enough for you to pass the test. Hands-on experience will help a lot. While this course is an excellent way to start preparing for the exam, I will also mention other resources you can use to set yourself up for success.
There is a lot to learn, so let's get started!
Certified Ethical Hacker and CEH are registered trademarks with EC-Council. Their use here is not an indication that any of the material here is authorized or endorsed by EC-Council.
Who this course is for:
- IT or IS professionals looking to obtain their CEH certification
- IT professionals looking to expand their careers into security
- Students who want a better understanding of information security components
Instructor
Ric Messier is an author, consultant, and educator who holds CCSP, GCIH, GSEC, CEH, and CISSP certifications, and has published several books on information security and digital forensics. With decades of experience in information technology and information security, Ric has held the varied roles of programmer, system administrator, network engineer, security engineering manager, VoIP engineer, consultant, and professor. He is currently a Senior Information Security Consultant with FireEye Mandiant.