Overview of CEH – CEH Explain

Overview of CEH – CEH Explain
Overview of CEH – CEH Explain

EC-Countil Certifitations

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and information security skills. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) certification, and as well as many others certification schemes, that are offered in over 87 countries globally.

Figure 1 EC-CounFil CertifiFations Skill Matrix

EC-Council mission is to validate information security professionals having necessary skills and knowledge required in a specialized information security domain that helps them avert a cyber-war, should the need ever arise”. EC- Council is committed to withholding the highest level of impartiality and objectivity in its practices, decision making, and authority in all matters related to certification.

EC-Council Certification Tracks

Figure 2 CisFo CertifiFations TraFk

How does CEH certification help

The purpose of the CEH credential is to:

N  Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.

N  Inform the public that credentialed individuals meet or exceed the minimum standards.

N Reinforce ethical hacking as a unique and self-regulating profession.

About the CEH Exam

N Number of Questions: 125

N Test Duration: 4 Hours

N Test Format: Multiple Choice

N Test Delivery: ECC EXAM, VUE

N Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but lawfully and legitimately to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

N Background               04%
N Analysis/Assessments 13%
N Security                   25%
N Tools/Systems/Programs 32%
N Procedures/Methodology 20%
N Regulation/Policy04%
N Ethics              02%

Prerequisites

All the three programs, CEH, CHFI, and ECSA, require the candidate to have two years of work experience in the Information Security domain and should be able to provide proof of the same as validated through the application process unless the candidate attends official training.

Total
0
Shares
Related Posts