Just as doctors must probe their patients to uncover hidden maladies or diseases, so too must companies probe their networks, systems, applications, and web assets to uncover weaknesses subject to possible hacking. The practice is called Penetration Testing, or pen testing for short. As with all issues relating to security, there are optimal ways of conducting pen tests and less than ideal ways.
Training for the newest Certified Ethical Hacker (CEHv11) certification is now available on the ITProTV platform. This course, among the first to market, is designed to provide a foundational knowledge-base and skill set for professionals to become an asset to their current organizations as a security analyst, or to become an effective member of a security team involved in offensive security testing and vulnerability assessments.
The folks over at EC-Council have released their latest iteration of the Certified Ethical Hacker exam, this being the 11th version in the series, and they have done their best to make this the most thorough version to date. What does that mean? I’m glad you asked.