
Available October 1st
Description
TARGETED JOB TITLES
- Ethical Hackers
- System Administrators
- Network Administrators & Engineers
- Web-managers
- IT Auditors
- Security Professionals
PERSONA SEARCH FILTERS
- LEVEL 1: A+ certified, tech supportÂ
- LEVEL 2: Network+/CCNA certified, network support or network admin
- LEVEL 3: Security+, CISSP, or TICSA, security support, info security
IMPORTANT SKILLS
- Unix/Linux commands and distributions
- Programming–maybe C, LISP, Perl, or Java
- Database, SQLÂ
COURSE DESCRIPTION
KWT’s Certified Ethical Hacker (C|EH v10) course is a trusted and respected ethical hacking training program that all information security professional should take advantage of and is a sought after hiring skill by Fortune 500s, industry leaders and government agencies alike.
This course gives you the tools you need to change the game by giving you hack preventing tactics. Instead of reacting to attacks that have already occurred, CEH training teaches you to think like a dangerous hacker. This allows you to analyze existing security controls and procedures in the same way that attackers analyze targets. You will learn to look for undetected weaknesses and exploitable strengths so you can PREVENT attacks.Â
Â
The U.S. Bureau of Labor Statistics (BLS) projects cybersecurity job growth at a rate of 28% for the decade ending in 2026. This is far greater than job growth of 7% projected for all professions combined.Â
A quick search on LinkedIn (August 2019) shows 4,832 current jobs in the United States alone that require the C|EH. These job titles include:Â
- Senior Penetration Tester – $121,000 average salary
- Security Consultant – $82,939 average salary
- SOC Tier 2 Analyst – $70,000 average salary
- Cybersecurity Response Manager – $76,915 average salary
- Auditor – $78,000 average salary
- Network Security Operations – $48,036 average salaryÂ
- Vulnerability Tester – $71,660 average salary
- Ethical Hacker – $94,300 average salary
Â
WHAT PARTICIPANTS CAN EXPECT TO LEARN
Qualification for a CEH involves mastering:
- Penetration testing
- Footprinting and reconnaissance
- Social engineering
The course of study covers:Â
- Creating Trojan horses
- Backdoors
- Viruses
- Worms
- Denial of Service (DoS) attacks
- SQL injection
- Buffer overflow
- Session hijacking
- System hacking
You’ll discover how to:
- Hijack Web servers and Web applications
- Scan and sniff networks
- Crack wireless encryption
- Evade IDSs, firewalls, and honeypots
Â
THE EXAM
The 312-50 exam lasts four hours, comprises 125 multiple-choice questions, and tests CEH candidates on the following 18 areas:
Â
- Introduction to ethical hacking
- Footprinting and reconnaissance
- Scanning networks
- Enumeration
- System hacking
- Malware threats
- Sniffing
- Social engineering
- Denial of Service
- Session hijacking
- Hacking web servers
- Hacking web applications
- SQL injection
- Hacking wireless networks
- Hacking mobile platforms
- Evading IDS, firewalls, and honeypots
- Cloud computing
- Cryptography
MESSAGING
To stop a hacker, one needs to think like one and this is what ethical hacking is all about. Ethical hackers perform security tasks like hackers; however it is to protect the computers and networks of an organization. They have the permission to hack organization’s network in order to perform tests that keep it safe from illegal hacking. Ethical hackers help in improving the security of systems in organizations.