PRZOOM - /newswire/ -
Albuquerque, NM, United States, 2008/07/28 - EC-Council announces the availability of the all-new Version 6 of the Certified Ethical Hacker (C|EH) program, revealing the salient features of the C|EH v6.
The all-new C|EH v6 Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The C|EH certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A certified skilled professional will be able to understand how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. EC-Council boasts a pool of C|EH from many Fortune 500 companies as well as various IT giants, conglomerates and government agencies around the world like the US Air Force, British Telecom, United Nations, Singapore Police Force, Reserve Bank of India, Bell Canada and many others.
• Total of 67 modules, showcasing the latest concepts, hacking tools and techniques;
• Revamped lab exercises with new addition of Robo demo tools;
• Real-life cases and new addition on case studies;
• Introducing 38 additional new modules with tons of tools for reference.
The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system themselves, while staying within legal limits. This philosophy stems from the proven practice of catching a thief, by thinking like a thief. As technology advances and organizations depend on technology increasingly, information assets have evolved into critical components of survival.
It is well reported that networks and IT infrastructures globally are constantly being breached and exploited, and new vulnerabilities are discovered every other day. Insider threats and malicious hacking are most often the cause of major breaches. Hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and erases their tracks within minutes. If hacking involves creativity and thinking ‘out-of-the-box’, then periodic vulnerability testing and security audits will not be enough to ensure the security proofing of an organization. To ensure that organizations have adequately protected their information assets, they must adopt the approach of ‘defense in depth’. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure.
Jay Bavisi, President of EC-Council said , “To catch a hacker, you have to think like one. The C|EH certification equips your network administrators with the technical know how, and the understanding of how possible breaches may occur.”
For more information, kindly check with your nearest authorized training centers around the world. Get yourself updated with the latest version of the C|EH.