PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
Opinion: Emerging ethical hacker certification may be off-course

This article is part of the Information Security magazine issue of October 2003
"I'm a Certified Ethical Hacker." I feel a bit silly saying that, because the CEH isn't as esteemed as the CISSP or CCNA. Earning the "ethical hacker" moniker is kind of like wearing a t-shirt that says, "I'm a hacker." You either are or you aren't; neither the t-shirt nor the certification is going to make you a hacker. Even worse, the training I received seemed hardly adequate even for this lowly credential, and the certification exam barely stressed my knowledge and understanding. My expectations were high when I signed up for Intense School's Professional Hacking course. Based on the brochure, I anticipated six days of continuous exercises in which my classmates and I would scrutinize networks, devise attacks, circumvent security measures and penetrate targets. The challenge, I assumed, would be progressively harder exercises. This, I thought, would prepare me for the International Council of Electronic Commerce Consultants' "Ethical Hacking and Countermeasures" exam. My instructor was Clint Dupuis, best known for his ...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
Defending the rock: Prudential's security culture and change control management
Cover story: Prudential's ingrained security culture and change control management makes it a security program worth emulating.
-
Ten ways to prevent insider security threats
From your CEO to your mail clerk, insiders can do more damage than outside attackers. Learn how to develop and mitigate a system against insider security threats.
-
Insider threat management: Can your sysadmins be trusted?
Administrative privileges are worrisome in the hands of any single person, but insider threat management doesn't have to be as long as you don't put all your eggs in one basket.
-
Security survey results: Six information security myths dispelled
A rose is a rose is a rose, but Information Security magazine and SearchSecurity surveys bust six security myths, proving infosec is maturing as a profession and a practice.
Columns in this issue
-
Proactive security: Make offense your best defense
Information Security editorial director Andrew Briney outlines three measures that will help enterprises turn their reactive security into proactive security.
-
Frank Abagnale preaches the dangers of hacking
A penitent Frank Abagnale Jr. shuns white-collar crime and fraud, and helps others understand how to guard against the dangers of hacking.
-
Controlling Linux root privilege in a Linux environment
If your enterprise has multiple sysadmins, giving them separate accounts is advisable. Su and Sudo can aid in keeping Linux root privilege rooted in safety.
-
Opinion: Emerging ethical hacker certification may be off-course
Scott Sidel thinks the ethical hacker certification isn't all it's cracked up to be; breaking systems and fixing them is the best approach to learn the ways of the infosec pro.