The new CEH v10
(Certified Ethical Hacker)
The first Ethical Hacking Certification was launched in 2002.
The world had not known of such a program or certification, and obviously, it
was met with suspicion. The word hacker did not go down well with organizations
and authorities around the world.
This being the situation, the course still found its momentum
through the need for cybersecurity in an ever-growing Industry.
For example, the MIRAI botnet that took place in October 2016. Due to the latest technological advancements, we need to be more ready than ever. It is important to analyze the vulnerabilities and weaknesses of networks, systems, etc.
For example, the MIRAI botnet that took place in October 2016. Due to the latest technological advancements, we need to be more ready than ever. It is important to analyze the vulnerabilities and weaknesses of networks, systems, etc.
·
Listed as one of the baseline certifications on the US DOD 8570 directive.
·
The examination achieved the NC017024 credential.
·
CEH is sought after by many fortune 500
multinationals.
·
It is now a standard in education among the best
graduate and post-graduate programs.
With leapfrogs in technology come new problems that need to be
solved. It is almost as if by simplifying/solving a problem with technology, we
only create another problem. It is much easier for hackers today to attack a
system or network if proper protective measures are not taken.
In this regard, today we have the CEH v10- the latest version
which will help ethical hackers in combating present day attackers.These
attackers have improvised and developed new tools to hack into networks,
systems, etc.
It is important to analyze the various possible vulnerabilities
and weaknesses through vulnerability analysis. These vulnerabilities and
weaknesses are used to gain access to confidential information.
There are 5 key highlights of the CEH v10
1) It has added a whole new module on the security of IoT devices. IoT has emerged as a potent threat
vector, one with possible vulnerabilities and weaknesses. The MIRAI attack is a
prime example of this; it was the largest denial of service attack using an IoT
botnet.
·
A Study conducted by AT&T revealed a 458%
increase in vulnerability scans of IoT devices.
The new IoT module has an in-depth study of the factors that
affect IoT security. CEH v10 emphasizes the importance of security in this
vulnerable area. It provides comprehensive guidelines for testing, deploying
and managing IoT devices.
2) The old module on vulnerability analysis from CEH v9 has been
re-engineered. Vulnerability analysis is
a critical element of an ethical hacking life-cycle and the cyber kill chain.
·
CEH v10 will give candidates a far deeper
understanding of the application of vulnerability analysis. This new version
allows the application of vulnerability analysis in a real-world environment.
·
The module covers the vulnerability of management
life cycle. It explains various approaches and tools used to perform the
vulnerability assessment. It also discusses tools and techniques used by an
attacker to perform vulnerability analysis on the systems.
Vulnerability analysis scans the networks for known security
weaknesses. It plays a major role in providing security to the organization's
resources and infrastructure.
The attack vectors could attack through various threat
vectors.
3) The new version adds focus to emerging attack vectors on the cloud, AI, and machine
learning.
·
CEH v10 provides new insights into cloud computing
threats and cloud computing attacks. It discusses cloud computing security and
necessary tools. There are key lessons to be learned that every ethical hacker
must follow.
Usage of Artificial Intelligence and Machine Learning in cyber
security helps in identifying new exploits and weaknesses. It reduces the
pressure on security professionals alerting them as and when an action needs to
be performed.
AI is a huge step in protecting networks against attacks. AV and
perimeter mechanisms alone cannot detect these attacks.
4) Certified ethical hacker v10 program has a complete malware analysis process included in its core
body of knowledge. Malware is another major problem, which needs to be
addressed. It can cause serious damage to intellectual property, and also lead
to financial losses.
·
This new module illustrates the process of reverse
engineering a piece of malware. This helps in determining the origin,
functionality and potential impact.
The module covers critical knowledge and skills. This allows the
Ethical hacker in identifying the indicators of compromise, the exploited
vulnerability, the skill level of the intruder.
With the CEH v10 certification, the ethical hacker can tell if a malware introduction was to an external gatecrasher or an insider. All the trainee modules and techniques have been updated, lab environments available stimulate real-time environment.
With the CEH v10 certification, the ethical hacker can tell if a malware introduction was to an external gatecrasher or an insider. All the trainee modules and techniques have been updated, lab environments available stimulate real-time environment.
What more, it is even in 100% compliance with the
newer NICE 2.0 framework.
5) The launch of STORM is
an exciting addition to the CEH v10; it is a mobile security toolkit.
·
STORM is a fully loaded Pen-Test platform; it comes
equipped with a custom ISO. This ISO comes with today’s common hacking tools.
STORM is loaded onto a portable raspberry pi based touch-screen
device. It adds on with a resource center, which is an LMS based platform. On
this platform, learners can have access to the most up-to-date ISO. Adding on
to this, one also experiences the latest tools and demos.
The CEH/Practical credential
There is a manpower challenge that Chief Information Security
Officers (CISO) are facing. It is important to differentiate between those with
the knowledge and those who actually have the skill to perform the functions.
The practical confirms that you have the skill to perform the functions.
The practical confirms that you have the skill to perform the functions.
The CEH practical is a practical exam built according to the
given specifications of subject matter experts. It is a 6-hour long examination
and those who have the CEH
credential can appear on it.
The CEH practical-
·
Examines the candidate’s skill in identifying, and
managing the vulnerabilities and weaknesses.
·
Requires the candidates to apply the Ethical Hacking
techniques in 20 real-life situations. Threat Vector identification, network
scanning, operating system detection, etc.
·
Mimics a real corporate network.
It is an exam that has been designed as a practical hands-on
activity. It will test the skills of the ethical hacker and goes beyond having
theoretical knowledge. It allows organizations to train, test and deploy the
available workforce.
No comments:
Post a Comment