EC-Council Launches Its Latest Innovation, a State-of-the-Art, Fully Automated Cyber Attack Range as Part of the Certified Ethical Hacker Version 8 Training Program

The world’s first completely hands-on ethical hacking program with a fully integrated state-of-the-art cyber-attack range will be available in 450 locations in 97 countries around the world on the 20th of May.

  • Share on TwitterShare on FacebookShare on Google+Share on LinkedInEmail a friend

CEH V8 is ANSI accredited

It’s not about what you know, but rather about what you can do with what you know

Albuquerque, NM (PRWEB) April 19, 2013

EC-Council’s Certified Ethical Hacker (CEH) course has long been the standard-setting certification in the information security industry, and its new incarnation, CEHV8, is now an ANSI 17024 accredited professional certification. The CEH training program has been widely used by the Pentagon to train its computer network defense service professionals as part of the Department of Defense Directive 8570 and has also been widely used by major defense communities around the world.

The latest version of this program addresses the current realities of the information security industry by “Providing the antidotes to the latest cyber security threats while showcasing some advanced hacking techniques. CEH Version 8’s release marks a major shift in the program. As virtualization technology advances, so does our ability to delivery performance-based training programs,” said Steven Graham, Vice President North America of EC-Council. Mr. Graham continued “By leveraging advanced designs in automation, we are able to give a completely sandboxed cyber-attack platform to every student in the program. It’s not just about lectures and isolated labs anymore, every student can launch attacks, obliterate networks, and practice the most advanced hacking techniques in multiple fully-patched Windows server, Desktop, and Linux environments.” This is best described by the words of EC-Council’s president, Jay Bavisi who said, “It’s not about what you know, but rather about what you can do with what you know.”

Part of the challenge for the world’s organizations as they fight cyber security threats are the ever-advancing capabilities of the enemy. For example, according to McAfee’s Q4 2012 report, the number of mobile malware samples discovered by McAfee Labs in 2012 was 44 times the number found in 2011, meaning that 95 percent of all mobile malware samples appeared in the last year alone. This dramatic shift to mobile hacking makes some long-standing methods of security information somewhat obsolete. CEH v8 has been designed with this and other changes in mind, covering the latest development in mobile and web technologies including Andriod OS 4.1 and Apps, iOS 6 and Apps, BlackBerry 7 OS, Windows Phone 8 and HTML 5.

CEHV8 comes with some remarkable updates, not just to the content, but to the content delivery systems and tools, making it an invaluable tool for organizations ranging from Fortune 500 companies to the world’s governments, preparing the next generation of cyber warriors to protect their networks like never before. Students can expect a strong focus on advanced hacking concepts, mobile platforms, tablet computer hacking techniques, and real time case studies. 100% of the concepts presented in the CEH V8 course are reinforced by hands-on exercises in EC-Councils newest cyber range. Students utilizing EC-Councils subscription-based range service will be able to practice these critical skills at any time, from anywhere in the world with an active Internet connection, further developing their skills as professionals. “Cyber professionals need to be equipped with the tools and the hands-on experience necessary to actively defend their networks. In the kinetic world, sharp shooters call it “rounds down range” - the simple fact being that what you learn in a classroom must be reinforced in an actual cyber range with real machines. Things don’t always go as planned and a true professional has to assimilate their knowledge and apply it effectively when their performance matters, and that led us to innovate a solution that can be used globally,” said Jay Bavisi, president of EC –Council.

Information regarding Certified Ethical Hacker, (CEH), please visit http://www.eccouncil.org/Certification/certified-ethical-hacker-v8. In conjunction with the launch, EC-Council has prepared a complimentary First Look session for cyber professionals to test drive the program. Details below:

CEHv8 First Look (Open to the public)
Date: May 8th, 2013
Time: New York 10am / Singapore 10pm / London 3pm / Dubai 6pm / India 7.30pm / Singapore 10pm / Korea 11pm
Duration: 2 hours
Trainer: Haja Mohideen, EC-Council Co-founder and Vice President, Technology
Click to Register

About EC-Council
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. EC Council is the owner and developer of the world-famous E-Council Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Tester (LPT) programs, and various others offered in over 60 countries around the globe. These certifications are recognized worldwide and have received endorsements from various government agencies including the US Federal Government via the Montgomery GI Bill, and the US Government National Security Agency (NSA) and the Committee on National Security Systems (CNSS) certifying EC-Council’s Certified Ethical Hacker (C|EH), Network Security Administrator (ENSA), Computer Hacking Forensics Investigator (C|HFI), Disaster Recovery Professional (EDRP), Certified Security Analyst (ECSA) and License Penetration Tester (LPT) program for meeting the 4011, 4012, 4013A, 4014, 4015 and 4016 training standards for information security professionals and most recently EC-Council has received accreditation from the American National Standards Institute (ANSI). For more information about EC-Council, please visit http://www.eccouncil.org.


Contact

Follow us on: Contact's Facebook Contact's Twitter