Showing posts with label CEH training. Show all posts
Showing posts with label CEH training. Show all posts

Friday, 16 October 2015

Top 5 FAQs about CEH v 9

 By Sarah Morgan

EC-Council recently launched version 9 of their flagship Certified Ethical Hacker certification. This course contains the latest content in the field of ethical hacking and IT security. It will continue to develop the skills of IT professionals to protect businesses, reacting to and preventing cyber-attacks. But what’s different? What do you need to know about it? Here are the top 5 FAQs to explain all you need to know about CEH v9.

Q: How has the CEH v9 curriculum changed?

A: Largely, the structure of the course has remained the same. There are now 18 modules rather than 20. The two modules “Trojans and Backdoors”, and “Viruses and Worms” have been condensed into one module known as “Malware Threats”. Also, the modules “Buffer Overflows” and “Penetration Testing” have been removed. However, the majority of the content has been relocated to other areas of the course including the “System Hacking” and “Hacking Mobile Devices” modules.

There has also been changes to some of the content itself. Most notably, the inclusion of a Cloud Computing module. It applies general areas of security like service hijacking and penetration testing and covers cloud specific security and tools like CloudPassage Halo. This is a great addition as it reflects the current trend, with cloud technology now crucial to many businesses.

Q: Can I apply CEH v9 content to my business and my role? 

A: The skills you’ll learn will be the very latest available. The principle of the CEH course is to improve your skills and abilities in a practical environment and will prove its value most, in real-world situations in your workplace. However, it’s almost impossible to stay in front of hackers or predict what they’ll do next. But, you’ll have the most current skills in the industry, which’ll be invaluable when facing new types of cyber-attacks. 

If you’re not yet an ethical hacker, but looking to make the step forward in your career, having these up-to-date skills, and the certification to demonstrate it, will put you in the best possible position to boost your career.

Image courtesy of EC-Council

Q: Isn’t this knowledge harmful? Why make it so readily available?

A: EC-Council ensure that social responsibilities are fulfilled before they allow someone onto any CEH course. All candidates must have a minimum of two years IT security related experience before they can sit a CEH course. Plus, all candidates are required to sign an ethics agreement, which states they will respect the knowledge they learn and not misuse it in any way. Every CEH candidate must also agree that they will only use what they have learned for lawful actions. These processes and requirements make the course and the knowledge within, as safe as possible.

Q: I have CEH v 8, do I need to update it for it to be relevant? 

A: CEH v 8 is currently still available for you to sit but this won’t be the case for too much longer. If you already have version 8 or even version 7, your skills and knowledge will still be relevant and your experience is of course vital in helping you stay current.

In such an ever-changing industry though, it doesn’t take long for your skills to become out-dated. CEH v 9, with its additions of new attack vectors and addressing new vulnerabilities will be perfect when you want to update your skills. I would recommend getting your skills updated as and when you can, to ensure your skills don’t become out-dated. 

Q: Am I the right candidate to sit CEH v 9?

A: CEH v 9 has prerequisites much like previous versions. To meet these prerequisites you must have at least two years IT experience with a strong working knowledge of TCP/IP, Windows Server (NT, 2000, 2003, 2008, 2012) and a basic familiarity with Linux and/or Unix. 

If you’re looking to become an ethical hacker, it’s a great job choice for the future and the new CEH will stand you in good stead. Businesses of all sizes, are realising the value ethical hackers bring to a business. This is leading to the current trend of businesses recruiting more and more ethical hackers. CEH v 9 is the most current edition of the popular certification, covering more attack vectors than ever and updated for the most modern technologies. If you want the latest in ethical hacking knowledge and skills, CEH v 9 will provide exactly that.

About the Author:        
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

Wednesday, 3 June 2015

The 5 best CEH certification books 2015

By Sarah Morgan

Cyber-attacks are now ranked amongst the top 10 global threats to your business, a survey from Aon Solutions revealed this week. It’s no surprise – security breaches can cripple your business infrastructure, leak private customer data and destroy your organisation’s reputation.

The IT security field is expected to grow 37% by 2022 and many security professionals are now taking the offensive and building their white hat hacking skills with EC-Council’s CEH certification.

The CEH v8 certification is an advanced certification, and to conquer it you’ll need to prove your expert white hat hacking knowledge. To help you do just that, here are our 5 best CEH certification books for 2015…

CEH: Certified Ethical Hacker Version 8 Study Guide – 14 Oct 2014
ISBN-13: 978-1118647677

Sybex’s Certified Ethical Hacker Version 8 Study Guide is perhaps the most popular preparation tool for the CEH certification.

The guide boasts a concise, easy-to-follow approach to the certification that covers all exam objectives with examples and hands-on exercises.

You’ll study everything you need to pass the CEH exam – including cryptography, footprinting, trojans and covert channels. Also included is a companion website, stuffed with study tools like practice exams, chapter review questions and electronic flashcards.

The guide is useable in both classroom and self-study scenarios. Plus, an average user score of 4.2/5 stars across Amazon (28 reviews) ranks this as one of the most sought-after books on our list.

Available in:

CEH Certified Ethical Hacker Bundle, Second Edition (All-In-One) – 1 Oct 2014
ISBN-13: 978-0071835572

A popular CEH revision guide from Matt Walker - a man with so many certifications after his name he makes the alphabet feel insecure.
Billed as a money-saving self-study bundle, this comprehensive package includes massive amounts of content:

  • CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition
  • CEH Certified Ethical Hacker Practice Exams, Second Edition
  • CEH Quick Review Guide

The All-in-One exam guide is your primary asset for CEH certification success. Inside, you’ll find complete coverage of all CEH exam objectives and topics.

Reviewers cite a desire for a greater focus on policy questions. Despite this it retains an impressive 4.1/5 star review average on Amazon (14 reviews)

Available in:

Certified Ethical Hacker (CEH) Cert Guide15 Dec 2013
ISBN-13: 978-0789751270

Authored by certification expert Michael Gregg and published by Pearson IT certification, this chunky 640 page CEH certification guide is certainly comprehensive.

As well as a companion to the CEH certification’s v8 topics, you’ll also focus on building your own study guide, complete with test preparation routines and review questions. A CD featuring two complete practice exams is also bundled with this certification guide.

Finally, you’ll get preparation hints and exam tips from leading security consultant, Michael Gregg.

Available in:

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy – 1 Aug 2013
ISBN-13: 978-0124116443

Though not a CEH certification guide, this introductory book provides any aspiring ethical hacker with a solid foundation of ethical hacking knowledge – crucial for passing the CEH exam.

You’ll study the same hacking tools commonly found within the CEH certification, and learn how to use them to conduct real life penetration tests.

This book begins with the basics and guides you towards more advanced subjects such as post exploitation and access maintenance. This is an ideal book for anyone with an interest in penetration testing - especially useful for those starting down the path to their CEH certification.

Available in:

Official CEH CoursewareEC-Council

As well as study guides, you also have the option to simply purchase EC-Council’s official CEH courseware. This is everything you’ll need to pass your CEH exam - included in the official bundle is:

  • Three official EC-Council CEH books (lab manual and two courseware manuals with slides)
  • 6 DVDs

The labs showcased in the courseware are tested against the latest operating systems with all up-to-date patches and hot-fixes applied.

Plus, the 6 DVDs contain over 20GBs of guides on how to use the latest hacking and security tools alongside more than 1,000 minutes of videos demonstrating hacking techniques.

Purchase the official CEH courseware from EC-Council store.

Related articles:

About the Author:        
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

Friday, 6 March 2015

Frequently Asked Questions about EC-Council’s CEH certification

By Sarah Morgan

With the recent spate of high profile hacks targeting the biggest and wealthiest, you might not be surprised to learn that EC-Council’s Certified Ethical Hacker cert is experiencing a boost in popularity.

As malicious hacking and cybertheft become increasingly prevalent in our lives, the CEH will continue to gain in importance. A lack of information security knowledge and investment is often to blame for data and system breaches – it’s clear that organisations need professionals with advanced security skills.

In response to this growing need, more and more professionals are looking to the CEH as a way of gaining new security skills and securing a rewarding career as an Ethical Hacker.

There’s a lot to learn about this popular cert - let’s take a look at the most frequently asked questions about EC-Council’s CEH certification.

Q. What actually is an Ethical Hacker?

A. Ethical hackers attempt to penetrate a computer system or network with the aim of finding security vulnerabilities that could otherwise remain undetected. However, unlike malicious hackers, ethical hackers are given permission to undertake these controlled attacks.

Without these harmless penetration tests, security holes could remain unseen, leaving the organisation in a position that a malicious hacker could exploit.

pat138241 /

Become an Ethical Hacker and you’ll learn to use the same techniques and tools as a cybercriminal. However, instead of exploiting these vulnerabilities, as an Ethical Hacker you’ll document security holes and provide actionable advice on how they can be fixed.

Q. How much does an ethical hacker earn?

Ethical hackers earn an average advertised salary of £55,000 according to data from ITJobsWatch.

Q. Why should I get the CEH cert?

A. The CEH is a brilliant introduction into the world of Ethical Hacking. You’ll finish your certification with an in demand set of skills covering Intrusion Detection, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Plus, if you need to break into the field of ethical hacking or penetration testing, the CEH will put you ahead of other uncertified job applicants (assuming you similar experience).

It’s a benchmark certification for ethical hackers - “CEH is the original standard,” says Albert Whale, president and chief security officer at IT Security, Inc.

Q. Is the CEH necessary to get a job in Ethical Hacking?

A. The CEH is the most well-known certification in Ethical Hacking, but it’s not an absolute requirement. At their most basic, certifications are simply a supplement to real-world experience - without this you will only get so far.

This certification will help you break into the Ethical Hacking profession, but you’re not guaranteed a career. You’ll get great skills and a renowned certification, but you’ll still need experience to back it all up.

Q. What prerequisites do I need to take an EC-Council course?

A. This cert sits in the sweet spot between entry level qualifications like CompTIA’s Security+ and advanced certs like the CISSP.

Before attending a CEH training course you should ideally possess at least two years IT experience, a good knowledge of TCP/IP, Windows Server and a basic familiarity with Linux and/or Unix.

Q. Will I be taught by a real hacker?

A. At EC-Council’s accredited training centres you’ll be trained by experienced security professionals. You won’t be taught by a 17-year-old reformed hacker – EC-Council adheres to a strict code of ethics and employs experienced instructors with a clean reputation.

Q. Isn’t it irresponsible to teach people how to hack?

A. The more we know about how the ‘bad guys’ operate, the more secure our systems, data and networks will be. Whilst the knowledge you’ll gain on a CEH course has the potential to be misused, many would argue this far outweighs the benefits of teaching thousands of IT professionals how to better protect their businesses.

To help highlight responsibility, EC-Council requires all of their students to sign an agreement, agreeing to respect the knowledge and not misuse it. You’ll also be required to agree to abide by all legal laws of the land in the use of your new knowledge and skills.

Q. How is the exam structured?

A. To achieve your CEH v8 certification you’ll need to pass exam 315-50 at a Prometric or Pearson VUE test centre. This exam is a 125 question, multiple choice paper covering the 19 CEH domains. To gain your CEH cert, you’ll need to score at least 70%.

Take a look at EC-Council’s site for more information on your CEH exam.

Q. What is the current version of the CEH certification?

A. Released in 2013, CEH v8 is the current version of the certification and introduced new modules in Social engineering and IPv6. CEH v7 retired on October 31st 2013 – you will no longer be able to take this exam.

Q. Do I have to recertify my CEH?

A. As of January 1st 2009, all EC-Council certifications will be valid for three years. However, to maintain your certification you will be required to achieve 120 credits (per certification) during the three years after you certify.

These credits can be gained in the following ways:

  • Attending conferences
  • Writing research papers
  • Reading material on realated subjects
  • Attending webinars

Qualifying activities must have been completed during the three year window after you achieve your certification.

More information on EC-Council’s recertification policy can be found here.

Q. What is EC-Council Aspen?

A. Aspen is a gateway to portals, products and services provided by EC-Council for its registered members.

As a member you’ll be able to place orders on products and courseware, view your certification(s) continuing education scheme and maintain your certs with EC-Council.

Access Aspen here.

Related Articles:

About the Author:        
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

Wednesday, 22 October 2014

5 incredible jobs for a Certified Ethical Hacker


EC-Council’s Certified Ethical Hacker certification opens doors for IT security professionals. Take on the CEH and you’ll get comprehensive ethical hacking and network security training – you’ll learn to think (and hack) like a hacker.

And like most certifications, the CEH is only a stepping stone to your dream career. The experience you’ll get from becoming a CEH can be applied across a huge variety of job roles. Let’s take a look at some of the most impressive ones:

1. Penetration Tester 

Average advertised salary - £55,000*

Just like malicious hackers, penetration testers attack IT systems to locate security flaws. But, unlike hackers, penetration testers are White Hats - their aim is to protect systems, not exploit them.

The only difference between penetration testing and hacking is whether you have the system owner’s permission. If you want the thrill of hacking and enjoy the challenge of breaking into networks, penetration testing could be an incredibly rewarding career for you.

"pssst, what's Frank's password?"
If you can find a vulnerability during your simulated real-life cyber-attack, then you’ve earned your wages.

You’ll establish the viability of attack vectors (also known as an ‘attack-surface’), research known vulnerabilities within the client’s hardware and software stacks and identify weaknesses using common hacking tools.

And you might even find yourself using social engineering to legally con client’s employees, e.g. trying to solicit employee passwords from other employees.

2. Forensics Analyst

Average advertised salary - £42,500*

This ultra-modern role involves analysing the way in which intruders breach IT infrastructure. You’ll be assessing the full extent of any malicious breaches in order to identify additional systems / networks that have been compromised.

Investigating the minute traces left by complex Black Hat attacks requires an IT expert proficient in cutting edge forensic and reverse engineering skills. You’ll need to think and act like a hacker in order to identify the ways they breached your client’s system. 

You'll be using a hacker's malware as evidence for his crimes
Image courtesy of Stephen Miles
To be a successful forensic expert you’ll need to master prevention / detection, hacker exploit techniques and reverse engineering of malware.

Perhaps most importantly, you’ll need to stay at the cutting edge of attack methodologies. Hackers won’t get complacent, so neither can you. If you can keep your security knowledge and skills up-to-date, you’ll find success as a Forensics expert.

And whilst many job postings advertise the CEH certification as a desired qualification, EC-Council also offers a specific digital forensics course. It’s called the Computer Hackings Forensics Investigator (CHFI) and will teach you everything you need to know about investigating, recovering and tracking cybercrime.

3. Internet / Network Security Administrator

Average advertised salary - £47,500*

Internet security administrators are responsible for protecting vulnerable computer systems and networks against attack. Also known as security specialists, the security administrator handles all aspects of information security.

You’ll be the go-to professional for all aspects of an organisation’s information security. As well as teaching your colleagues about computer security, you’ll check for security violations, research and install protection software and defend/take action against cyber-attacks.

If the breach is serious, you may even find yourself providing evidence of cyber-attacks to prosecute individuals for breaching security.

You’ll have a great deal of responsibility and as a result, you’ll need good communication skills and the ability to react exceptionally fast to security problems. You might even be expected to work on-call in case of emergencies. 

Pictured above: a visual metaphor for network security.
sidewinder123 / MorgueFile

4. Application Security Architect

Average advertised salary - £65,000*

Application security architects work with development and computer architecture teams to create security applications.

You’ll likely find yourself testing programs for security weaknesses and performing vulnerability scans. You’ll be responsible for creating effective security applications and will work closely with software development teams, providing security guidance and expertise.

To succeed in this role you’ll need great problem solving skills and the ability to anticipate vulnerabilities in new software. And, as with most security roles, you’ll also need a deep understanding and appreciation of emerging cyber security risks.

5. Computer Network Defense Analyst

Average advertised salary - £40,000**

Computer network defence analysts work with cutting edge cyber-security technologies to provide expert opinions on current and emerging network security threats.

Get it? Program...
DogertonSkillhause / MorgueFile
You’ll create security threat analysis reports and briefs that describe the risks of potential threats and the risks these threats may pose to your organisation networks.

Tasks could include:
  • Analysing network traffic to identify anomalous activity
  • Determining appropriate response to anomalous network activity
  • Studying identified malicious activity to determine weaknesses exploited
  • Examine network topologies to understand data flows through the network
  • Provide daily summaries and news, events and activities and distinguish these incidents and events from benign activities.

Secure your dream security job

The CEH certification is great for any information security professional. Secure it (in only 5 days?) and prove you can defend your organisation from malicious attacks; you’ll be well on your way to your dream job.

*data from
*data from

About the Author:       
Sarah writes for Firebrand Training on a number of IT related topics. This includes exams, training, certification trends, project management, certification, careers advice and the industry itself. Sarah has 11 years of experience in the IT industry. 

Friday, 17 August 2012

EC-Council launch CEHv7 Core Concepts

EC-Council launched its latest online resource today, the CEHv7 Core Concepts which available free for CEH students. Click HERE to find out more on what CEHv7 Core Concepts is and how to access them. EC-Council states that “Core Concepts make CEHv7 an even more powerful training and certification proposition!”

In order for students to receive their digital copy of CEHv7 Core Concepts, they must complete the EC-Council Online Course Evaluation ( and opt “YES” when asked if they want to receive CEHv7 Core Concepts.

Wednesday, 15 August 2012

WikiLeaks back online & Assange granted Asylum in Ecuador

The whistleblowing website had been down for almost two weeks after a huge 10GBps DDOS (distributed denial-of-service) attack. WikiLeaks tweeted that the attack was over 10GBps with a bandwidth so huge; it was only possible to filter out with specialised hardware. 

They added :“Whoever is running it controls thousands of machines or is able to simulate them”. The attack happened moments after WikiLeaks published its Global Intelligence Files, which mentioned the use of the TrapWire surveillance software in the US public sectors. 
Julian Assange - WikiLeaks Leader
The site was able to come back online after signing up for the CloudFlare services. The attack also hit its donations infrastructure; Fund for Network Neutrality. 

The WikiLeaks leader, Julian Assange has been granted asylum by Ecuador's President, Rafael Correa. He officially requested political asylum in June 19 and is currently staying in Ecuador's London embassy. He faces arrest as soon as he leaves the embassy making it complicated to leave the country. 

Mr Patiño stated that "For Mr Assange to leave England, he should have a safe pass from the British (government). Will that be possible? That's an issue we have to take into account"

Thursday, 9 August 2012

$17,000 Ethical Hacking Scholarship

A full scholarship is being offered by EC-Council University for its MSS (Master of Security Science) Program. The program prepares students for leadership positions in the cyber security industry offers detailed instructions in ethical hacking, disaster recovery, digital forensics, network, security organizational structure and behaviour and communication.

The scholarship offers $17,000 and covers tuition and fees for the MSS program.

For more information on the Ethical Hacking Scholarship go to Applicants must send all necessary material before September 1, 2012. The winner will be announced before the 1st of October 2012. Apply here:

Cyber war: The youth who defend us

The usual misconception is that the only form of cybercrime is from organised gangs and teenage hackers all looking to empty your credit cards. But Britain is facing an increase in cyber crime and digital threats from much more dangerous sources.

Each day cyber criminals, enemy states and terrorists are engineering new viruses to bring down our economy, our national defences and our energy supply at just a click of a button. The shadow defence secretary stated that the “arms race of the 21st century” is cyber security. Britain, as mentioned in a previous post, is one of the main targets of cybercrime and needs a new type of army to defend it. But with a 57% decline of pupils taking IT at A-level from 2001 and 2009, where will the UK find them? 78,000 jobs in Britain will be created by the IT industry in the next four years and “over 90% of IT employers have reported difficulty in recruiting for cyber security positions”.

Cyber Security Challenge UK
The Cyber Security Challenge UK was set up as a competition in 2010 to encourage the UK to get rid of the digital skills gap. It attracted over 4000 applications and the winners received credit from the biggest security companies in the country with internships, placement opportunities and an Apple iPad 3.

19 year old Lucy Robson who won the challenge is currently one of recruits defending our country. She is being trained by the Ministry of Defence’s former research arm; Qinetiq, as part of a placement. She stated that “it was apparent that I was the only female there”. There is a large gap between males and females in the IT industry also mentioned in a previous post.

Just 8% of women entered the competition; Lucy Robson added that “it’s never put me off and I’m not sure why there aren’t more female applicants because it is such an interesting job”.

It is estimated that the total cost to the British economy through cybercrime is £27 billion a year (BBC).

Why do you think their is such a large gap between males and females in the IT industry?

Tuesday, 10 January 2012

Certified Ethical Hacking: A Moral Job That Pays

Security threats have reached scary levels of sophistication. Internet crimes are becoming ever so problematic for companies all over the world. Businesses are looking for someone to prevent the malicious hackers breaching their customers’ confidential data, with the potential to steal billions of private data. That’s the job of a Certified Ethical Hacker.

Certified Ethical Hackers are IT Professionals who attempt to penetrate the company’s systems, just like a hacker would, to find the loopholes in the security systems in place. A CEH will conduct a Vulnerability Assessment (VA) to find out the shortcomings in the technology.

The average salary of a Certified Ethical Hacker in the UK is £42,750. As a CEH, job opportunities include working for private companies, or even the government. With the likes of Adidas, Sony and Nintendo’s security being compromised last year, more and more companies are taking their security very seriously, and looking for better ways to combat breaches of their data.

Wednesday, 6 October 2010

65% of Internet Users Fall Victim to Cybercrime

Coinciding with the release of Norton AntiVirus 2011 and Norton Internet Security 2011, Symantec has published "The Norton Cybercrime Report: The Human Impact."

It claims that 65% of the world's internet users have already fallen victim to cybercrimes (including computer viruses, online credit card fraud and identity theft). The top four countries to fall victim were: 83% in China,
76% Brazil and India and 73% in the USA.

Though it appears that this crimewave can't be attributed to complacency: only 3% of web users don’t think that it will happen to them. But a pessimistic 80% do not expect cybercriminals to be brought to justice.

It's interesting to see
web user's emotions following a cybercrime taking place. Victims’ strongest reactions are feeling angry (58%), annoyed (51%) and cheated (40%).

Tuesday, 6 July 2010

Firebrand Training Recommended by Men's Health Magazine

This month's issue of Men's Health magazine focuses on how anyone can grab themselves a £100k salary.

The UK's best selling men's magazine points out that "becoming a digital 007 puts five zeroes on your pay packet." It is, of course, referring to the role of Ethical Hacker. It continues: "A government survey found that 90% of ethical hacking recuiters had difficulty filling jobs."

And how does the magazine recommend you gain this dream job?

"To get started, try a five-day intro with the Ethical Hacker Certification course from This gives you the basics of servers and viruses, the foundation for a career in virtual derring-do."

To read the full article, head to the Firebrand Training Press Room.

Tuesday, 15 June 2010

The Importance of Penetration Testing

The latest edition of Certification Magazine looks at the importance of - and developments in - penetration testing.

The use of networks is rife in our everyday work and leisure. This means that our personal - and valuable - data is heading off in all different directions. It is now more apparant than ever that this data needs to be safeguarded for the benefit of all of us.

These technological developments have led to the increased importance of the role of the penetration tester.
Certification Magazine describes this person as: "a kind of digital spy, deliberately hacking into companies’ networks to identify weaknesses and fix them, preferably before an actual breach occurs."

Billy Austin, chief security officer for Saint Corp, explains: “You’ve got to switch your white hat into a black hat.

“What we have to do is become more offensive-type minded people. It’s crucial to have the characteristics or mindset of understanding what the attacker’s moves are going to be, and what those processes and procedures and all the different routes that someone can take [are].”

The importance of the role shouldn't detract from how interesting it is too. Whether the individual is attempting to hack into their own systems or piecing together the evidence at a hacking 'crime' scene, it rarely proves to be dull.

Firebrand is Europe's number one provider of IT security training, check out our Security Centre or call us on 080 80 800 888 to learn more.

Monday, 15 March 2010

Report reveals companies are not protected against hackers

The Independent Oracle Users Group's (IOUG) latest security report found that data breeches increased by 50% in 2009, yet only 28% of companies are adding funding to their data security budgets.

It was also highlighted that there are issues regarding the management of privileged access, a lack of encryption, and an over-reliance on manual / ad hoc approaches to database security.

With the outsourcing of database administration increasing by 40% over the year, organisations have been unintentionally taking on more risk. EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

Firebrand Training
won EC-Council's Training Company of the Year award, and we provide the following EC-Council certifications/courses:

Thursday, 11 March 2010

EC-Council CEH in The Washington Times

We blogged on Monday 1 March that the U.S. Department of Defense had announced official approval of the EC-Council Certified Ethical Hacker (CEH) certification program.

This story has since been picked up by The Washington Times. The article explains that the certification: "
tests a computer defender's understanding of the mindset, tools and techniques of enemy hackers."

Visit the Firebrand Training website to find out more about the
Certified Ethical Hacker qualification. If you wish to book yourself onto this course phone one of our enrolment consultants on 080 80 800 888.

Firebrand Training won EC-Council's Training Company of the Year award, and we provide the following EC-Council certifications/courses: