SBN

The CEH v10 Update: What you Need to Know

Introduction

In an attempt to meet the growing demand for new skills and security knowledge, EC-Council, the body responsible for compiling the CEH v10 certification, recently updated the Certified Ethical Hacker certification.

The refresh is one of many since CEH’s launch in 2003, and it means that candidates can expect a slightly different exam from CEH v9, which was launched in 2015. The certification now has over 18 modules that students need to learn and understand, and the global trend of cloud computing and remote hosted solutions means that those technologies are now more prominent in the exam.

The EC-Council advises that candidates check the exam blueprint and objectives prior to registering for the exam. Certified Ethical Hacker training courses can also help ensure candidates are prepared with the most up-to-date material needed to pass their CEH v10 exam.

Overview of CEH v10 Changes

CEH v10 focuses on making candidates more aggressive in their defence of networks. This offensive, proactive stance is a better way of defending network data against cybercriminals.

New modules that have been added include items such as:

  • IoT security: The proliferation of cheap, inexpensive internet-connected devices has opened up a proverbial can of worms for security experts as hackers are able to hijack many of these simple devices. CEH v10 explores this new class of network device and the potential vulnerabilities that they present.
  • More material: Expanded information on items such as threat and vulnerability assessments are included in CEH v10, giving this aspect of the course a welcome upgrade over CEH v9.
  • New business tool focus: Buzzwords like AI, cloud computing and machine learning are featured in the updated v10 of the CEH. Businesses are likely to use these tools, and intruders are likely trying to exploit them.
  • Practical exercises: CEH (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Graeme Messina. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/FEE4sLymt0g/