Page 42 - Mousumi: Unbelievable Transformation
P. 42

certifications.  In  order  to  gather  certifications,  one  must  start  off  with  the
                             foundations  level  certifications,  such  as  CCNA  and  CompTIA  security+
                             certifications. Finally, the last step to become an ethical hacker is to take up the
                             highly  recognized  Certified  Ethical  Hacker  Examination  (CEH);  CEH
                             certification  is  provided  by  the  EC-  council.  This  renowned  council  trains  its
                             candidates  to  protect  the  company's  network  by  using  the  same  tools  and
                             methods that a hacker would use. Moreover, CEH examination is scheduled for
                             4 hours. With 125 number of questions and if the candidate becomes successful
                             in cracking this exam, he/she will be a Certified Ethical Hacker.




























                             Skills Required
                             Holding a degree and certificates will not only help out to pursue this career, one
                             must  possess  some  skill  sets  to  approach  one's  steps  to  this  field.  First  and
                             foremost  is  that,  an  ethical  hacker  must  have  the  knowledge  of  different
                             operating systems like Linux, Windows and Macintosh, for penetration testing,
                             creating  exploits  and  for  Bug  hunting  programming  is  required.  Hence,  the
                             knowledge  of  programming  languages,  for  instance,  C++,  HTML,  PHP  and
                             python is also compulsory to be in this sector. Basic knowledge of networking IP
                             protocols and routing protocols is necessary, as networking is the foundation of
                             the  cyber  world.  Secondly,  for  the  security  of  databases,  one  must  be  well
                             equipped  in  the  knowledge  of  SQL  and  DBMS,  as  an  ethical  hacker.
                             Cryptography is used to secure information and is very useful in converting data
                             from a readable format to a non-readable one and vice versa. An ethical hacker
                             should  be  proficient  in  network  security  control  measures,  such  as:  intrusion
                             detection and intrusion prevention techniques.


                             ♦♦Career Mantra♦♦                                 Page 41
   37   38   39   40   41   42   43   44   45   46   47