Where the Certified Ethical Hacker designation differs from most other security certifications is that it can be used both offensively and defensively. By training on the tools and the techniques the hacker uses, a Certified Ethical Hacker should be able to not only test an organization's defenses against those techniques, but also defend against attacks more effectively.
Of course, that is all theory. In practice, I've found that security professionals need to be able to think like a hacker. They need to look at their systems critically and figure out where the holes are. While it's not possible to eliminate all the holes, the most obvious issues can absolutely be resolved by using ethical hacking techniques and attack tools.
Suffice it to say, I'm a big fan of testing networks, systems and applications. For more information as to why I feel that way, check out a piece I recently wrote on my Security Incite blog about why enterprise penetration testing is important.
Related Q&A from Mike Rothman, Contributor
In the world of security certifications, what is the GISP and how alike is it to the CISSP? In this security management expert response, learn about ...continue reading
Depending on your enterprise, it may or may not be necessary to utilize a QSA. In this security management expert response, learn how to determine ...continue reading
When developing software securely, what role does gap analysis play? In this security management expert response, learn how to implement gap analysis...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.