SBN

Certified Ethical Hacker (CEH) Study Resources

What is the Certified Ethical Hacker Certification?

The Certified Ethical Hacker certification, or CEH, is one of the most popular certifications used to prove a person’s cybersecurity knowledge and expertise. An Ethical Hacker should be able to think, act and use the same tools a malicious hacker. However, rather than use their abilities to cause damage, they highlight IT infrastructure weaknesses and vulnerabilities in a legal way.

The CEH certification indicates that an IT professional has the requisite knowledge and skills in order to carry out these types of tasks. The primary target audience for this type of cert is security officers, IT auditors and network administrators who have direct oversight of a network structure.

The exam consists of 125 multiple choice questions, and candidates have up to 4 hours to complete it. In order to officially register for the exam, the candidate must have attended an official training course or have at least two years of direct work experience in the field of information security.

What are the best books to help prep for the CEH?

You may be wondering what resources are available to help prepare you for the CEH exam? Two of the best books are The CEH V9: Certified Ethical Hacker Version 9 Study Guide and The CEH Certified Ethical Hacker All-in-One Exam Guide.

  1. The CEH V9: Certified Ethical Hacker Version 9 Study Guide

This book contains topics on areas such as the fundamentals of cryptography, the detailed mechanics behind launching Trojan horse and footprinting attacks, understanding how covert channels work and more. It includes two comprehensive practice exams to prepare you for the real thing. There is also a detailed glossary of all the requisite terminology needed in order to pass the CEH exam.

This book also comes with a study website that contains even (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Ravi Das (writer/revisions editor). Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/urPIf5UAbFM/

Secure Guardrails