Ethical hacking is a field in which certified ethical hackers are used by an organization to infiltrate their electronic and computer security systems in order to find and correct flaws, discrepancies, loopholes and vulnerabilities. Certified Ethical Hackers (CEH) use the same tools and techniques as hackers to identify and correct system weaknesses and vulnerabilities. The duration of the course will vary according to the institute to which you apply. However, it is usually one to six months long. The eligibility criteria for joining any certification course in ethical hacking are the basic prior knowledge of networking (TCP/IP) concepts, database programming and server-side programming (PHP or JSP or ASP.net). The digitization of communication and database systems may be increasing the scope for being a certified ethical hacker, particularly when seen in comparison to the past few decades.
After completing a certification course in ethical hacking, a certified ethical hacker can work in any number of organizations like banks, hotels, airlines, telecom companies, Information Technology Enabled Services (ITES) companies, outsourcing units, retail chains, Internet companies, e-commerce ventures, police departments or government agencies. The need for cyber and system security is present in all these fields and hence ethical hackers.
A certification course in ethical hacking involves the study of a large number of topics. The division of topics to be studied depends upon the individual institutes. Topics studied under ethical hacking include introduction to ethical hacking, virus and worms, Linux hacking, physical security, session hijacking, footprinting, legality and ethics. Other subjects might include Google hacking, scanning, enumeration, networking and basics, system hacking, Windows hacking, hacking Web servers, Trojans and backdoors, proxy servers, phishing, social engineering, sniffers, denial of service attack, LDAP enumeration, penetration testing and vulnerability assessment.
Other courses you might be able to take include cryptography tools, wireless network hacking and countermeasures, buffer overflows, reverse engineering, hacking database servers, computer forensics and incident handling, steganography, hacking routers and firewalls, password cracking tools, Web application vulnerabilities and SQL injection vulnerabilities. Another subject that could be covered is evading IDS, firewalls and detecting honey pot. A course could also include subjects such as privacy on the Internet, creating security policies, exploit writing, botnets, covering tracks and patch management. Depending upon the size, nature and affiliations of the institute, you may be able to complete an internship near the end of the course. However, this is completely subject to the individual institution.
There are several institutions that provide certification courses in ethical hacking. Some of these institutions include the following:
Programmes are subject to change, it is advisable to check directly with a school for current programme availability.
“Ankit Fadia Certified Ethical Hacker,” Ankit Fadia, http://www.ankitfadia.in/courses.html
“Certified Professional Hacker NxG,” Institute of Information Security, http://www.iisecurity.in/courses/cphnxg.html
“Ethical Hacking (Advance Level),” Indian School of Ethical Hacking, http://www.isoeh.com/ethical-hacking.html
“Information Security & Training Course,” Appin Technology Lab, http://www.appinonline.com/training.html
“IT Security Training Course Description,” K-Secure, http://www.ksecure.net/it-security-training.htm