Solved

ethical hacking

Posted on 2012-03-21
2
462 Views
Last Modified: 2012-03-21
I'm thinking about getting certified as an ethical hacker, and found a website at http://www.eccouncil.org
that claims to get me certified, but for about $2000!
anybody have other, less expensive ways to get certified? I'm out of a job at the moment and $2000 is a bit steep.
0
Comment
Question by:JeffBeall
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 41

Accepted Solution

by:
Adam Brown earned 500 total points
ID: 37748965
That's a full C|EH course with a dedicated teacher and practice labs, so it's going to be expensive. You can look at the CBTs that are available to see if they will help you out CBT Nuggets has one available here: https://secure.cbtnuggets.com/it-training-videos/series/ec-council-certified-ethical-hacker-v7. Those are usually cheaper than attending an online course or live class, but still fairly expensive. There are also a number of books you can get that will teach the things you need to pass the certification. Realistically, though, the C|EH isn't really an in-demand certification. It's good to have if you're in the IT Security Industry, but it alone won't get you a job. For the most part, the cert teaches you good information about existing vulnerabilities, but it's more theory than anything. Most IT Security companies look for the CISSP or SANS certifications, since those are very difficult, high-prestige certifications that require a lot of knowledge and a good bit of experience.
0
 
LVL 1

Author Closing Comment

by:JeffBeall
ID: 37749010
Thank you, that was very helpful
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question