Search
Certification: Certified Ethical Hacker

Certification: Certified Ethical Hacker

The phrase "ethical hacker" can seem like an oxymoron. Transform it into a bona fide credential, Certified Ethical Hacker (CEH), and you compound the dissonance. Can a hacker -- a geek who disrupts computer systems -- really be ethical and certified, too?

In fact, the idea isn't as ludicrous as it sounds. Ethical hacking has roots in the corporate world -- specifically, IBM -- so anyone who questions this concept's seriousness should think again.

An ethical hacker works to identify vulnerabilities in computer systems so they can be made less susceptible to criminal hackers' malicious attacks. Without breaking laws or stealing data, ethical hackers uncover weaknesses by attacking IT systems using the same under-the-radar techniques criminal hackers employ.

"It's really like being a bodyguard," says Jay Bavisi, president of the International Council of E-Commerce Consultants, also known as the EC-Council, the organization behind the CEH credential.

Think Like a Hacker

While the first use of the term appears to date from a 1995 Computerworld interview with an IBM technologist, ethical hacking has been around since the early days of computing, according to an IBM Systems Journal article by Charles C. Palmer.

"Just as in sports or warfare, knowledge of the skills and techniques of your opponent is vital to your success," writes Palmer, who worked with IBM Global Services to start IBM's ethical hacking practice. "Ethical hackers have to know the techniques of the criminal hackers, how their activities might be detected and how to stop them.

Far from being reformed hackers with criminal histories, ethical hackers, in fact, pledge not to break the law or steal information. "The Certified Ethical Hacker certification is designed to help people to determine who is trustworthy and who is not," says Craig Bogdon, senior network engineer at Sage InfoSec, who earned the CEH credential.

Beat Hackers at Their Own Game

The CEH certification was established as a vendor-neutral credential to train IT professionals in hackers' thinking and techniques. Techies can then use that knowledge to uncover vulnerabilities in their employers' or clients' systems.

Before beginning their training, though, CEH candidates, who are expected to have two years of information security-related experience, must sign an agreement stating they will not use the skills they learn for illegal or malicious attacks.

According to Bavisi, the credential is most appropriate for information technology managers, system administrators, network administrators and other IT workers involved in security.

CEH training is typically an intense, five-day course that emphasizes the creative, ever-changing ways hackers gain access to IT systems. "Labs take students through real-world scenarios, which require them to use creativity and demonstrate the ability to solve unusual problems," says Steven DeFino, a course instructor at New Horizons Computer Learning Centers in Salt Lake City.

CEH courses are offered at EC-Council-authorized training centers around the world. Topics covered include:

  • Perimeter defenses.
  • Hacking tools.
  • Session hijacking.
  • Password cracking.
  • Firewall evasion.
  • Intrusion detection.

The Ethical Edge

Techies have varied reasons for pursuing the CEH certification. For Steven Whittekiend, an IT manager for Washington City, Utah, who took the course at New Horizons, learning about security flaws will help with "peace of mind as we expand our IT services and store more sensitive data for remote access."

Bogdon says he continues to use the tools and techniques he learned during his CEH training when performing security audits of clients' networks. He characterizes the credential as an "in-the-trenches view of information security," with the emphasis on learning how to break into computer systems in the manner of hackers.

With so many commodity certifications in IT, the CEH credential is one that allows techies to stand out.

"The CEH has a certain marketing cachet," Bogdon says. "It tends to get people's attention and prompt them to ask questions." Such interest gives Bogdon an opening to explain to potential clients how ethical hackers and his company's network security audit services can help protect their IT assets.

Latest Jobs

Castle Aura Enterprise
Posted: 10/25/2014
Eugene, OR, 97401
Brady's Landing
Posted: 10/25/2014
Houston, TX, 77012
BlueSkyClarity
Posted: 10/25/2014
Burlington, MA, 01803
Greystar Management
Posted: 10/25/2014
Redwood City, CA, 94062
FBC
Posted: 10/25/2014
Broward County, FL, 33321

Want more personalized results?  Update Your Profile

 
 
 

Monster Communities

Teaching Community
Where teachers meet and learn.
ArtBistro
Create and connect.
Excelle
Networking for the career-minded woman.
Nursing Link
Where nurses call the shots.
More Monster Communities

Monster Partners

Scholarships
Scholarships, financial aid and more ways to pay for school.
Education.org
Find top campus and online degree programs.
Military.com
Military portal for the US Army, Navy, Air Force, Marine Corps and Coast Guard.
Financial Aid
Scholarships & financial aid.
Staffing for Government Jobs
Staffing and hiring solutions for federal government agency jobs.
More Monster Partners

Job Hunt Strategy

Six Ways to Make a Recruiter Hate You
If you want to blow your chances with recruiters -- and, by extension, with the companies they work for -- here are six perfect ways to do so.

Resumes & Cover Letters

Rev Up Your Resume to Relocate
Hoping to relocate? Get the ball rolling on landing the right job in the right location with these expert resume and cover letter tips.

Interviewing

100 Potential Interview Questions
Interview questions can run the gamut. You probably won't face all 100 of these, but you should still be prepared to answer at least some of them.

Salary & Benefits

10 Questions to Ask When Negotiating Salary
Most of us aren't natural negotiators, but asking these 10 questions during salary negotiations can help you get everything you deserve.

Employee Sourcing

Alt text
November Monster Employment Index Grows 13% Year-Over-Year, Tenth Consecutive Month of Positive Annual Growth.

For Seekers

Campus and Online Degrees
Advance your career and earn more with an online degree.
Free Salary Wizard
What are you worth? Find out and negotiate a better salary.
Research Careers
Get information on jobs and career paths to help guide your choices
Questions & Answers
Find answers to all your career related questions -- powered by Yahoo! Answers
Resume Distribution Service
Our distribution service puts your resume right in the hands of recruiters.
Resume Writing Services
Our experts will craft a keyword-rich resume that stands out in the crowd.
More Career Resources

For Employers

Career Ad Network
Target your job posting to more candidates on thousands of websites.
Hire Right Background Checks
Explore our background check packages to improve the quality of your hires.
Hiring Home Page
Find the best candidates for your business with Monster hiring solutions.
Job Postings
Find the right solution for your hiring needs. Starting at $99.
Power Resume Search
Monster's new search technology precisely matches people with your jobs.
Resource Center
Find staffing insights, labor trends, HR best practices and more.
Target Post
Connect with skilled, hourly and administrative candidates for only $99.

Social Media

Jobs on Twitter
Find jobs in your area and industry.
Monster Careers
Tune into our career advice and discussions tackling a wide range of topics and industries.
Monster Corporate & PR
Stay up-to-date on the latest news. Get the 'Who', 'What', 'When', and 'Why' on all things Monster related.
Monster Customer Service
Got a Monster question? We've got the answer. Whether you're a job seeker or employer, we can help you find the answers you need.
Monster for Employers
Find advice on hiring.
Follow Us
Check out our many pages and stay connected with the latest industry news, events, career advice and job openings.

Other Links

Monster Company Profiles
Explore companies and get information to guide your career decisions.
Compare Salaries
See how your pay stacks up to others in your field.
iPhone Application
Download the Monster app for iPhone and iPod touch.
Monster Job Seeker Blog
Monster Job Seeker Blog.
Monster Thinking Blog
Monster's Recruitment Trends Blog.
Jobs & Career Resources
Search Jobs:
For Employers: Post Jobs | Search Resumes | Advertise
About Monster | Work for Monster | Advertise with Us | AdChoices | Partner with Us | Investor Relations | Social Media
Terms of Use | Privacy Center | Accessibility Center | Help | Security | Contact Us | Sitemap | Mobile
©2014 Monster - All Rights Reserved U.S. Patents No. 5,832,497; 7,599,930 B1; 7,827,125 and 7,836,060 MWW - Looking for Monster Cable? - V: 2014.4.65.72-223
eTrustLogo