This fall, EC-Council is launching CEHv12, version 12 of its renowned Certified Ethical Hacker program. This new course teaches students how to understand the latest hacking tools, techniques and methodologies used by cybercriminals and It security professionals to legally attack an organization. The main goal is to counter and defend against cybercrime attacks.
Since 2003, Ec-Council (ECC) has trained and certified over 200,000 IT security professionals. Many of their certifications have worldwide recognition, including endorsements from major organizations such as the National Security Agency (NSA), the Committee on National Security Systems (CNSS), and the American National Standards Institute (ANSI).
CEHv12, change of approach and increased content
EC-Council has created a new, more enriched program. This new course not only prepares students for the certification exam, but also provides them with the opportunity to face the reality of the market.
CEHv12, a different approach
It is structured around four phases: Learn, Certify, Engage and Compete
It is a complete training with unlimited access to course materials, videos & access to the exam. It is also possible to add learning features to gain expertise and practical experience. Three bundles (CEH, CEHPro and CEHElite) are available, adapting to the learning needs of each individual.
More diverse content
- More tools,
- More labs,
- Regularly proposed CTF allowing to test one’s abilities,
- Global competitions to challenge yourself…
Some examples of new challenges
Malware: A multinational company was hit by a malware. It crippled their services and managed to infect a large number of customers using their software. The incident response team managed to extract some of the code. The goal: to identify the encryption algorithms used & to identify any traces of command and control servers in order to assist law enforcement.
Application hardening: A financial institution suffered an intrusion in which cybercriminals were able to inject code into a web application, exposing sensitive customer data. The goal: perform a series of manual and automated tests on the web application to identify weaknesses and recommend solutions to the application security team.