Extraido de http://www.ethicalhacker.net
The latest version of the Certified Ethical Hacker (CEH) Courseware is due to be released and presented for the first time at Hacker Halted USA 2008 in June. Many small details of CEH Version 6 have been peppered on the Internet, as well as snippets of teaser copy on EC-Council’s own web site.
“With a total of 28 new and never seen before modules, covering the latest concepts, featuring more real life cases, and showcasing the latest hacking and security tools, the Certified Ethical Hacker (Version 6) will be the most advanced course ever.”
So I requested an interview with EC-Council to see if we could get confirmation as well as clarification. The questions are compiled from my own list as well as some others that were suggested by readers of The Ethical Hacker Network (EH-Net). EC-Council replied in a very timely manner with answers from both Haja Mohideen, co-founder of EC-Council, and Chuck Swanson, the instructor scheduled to teach the very first v6 offering of the course.
Here are the extended bios provided by the interviewees themselves:
Haja Mohideen is the co-founder of EC-Council. He is the creator of popular certification programs such as CEH, CHFI, ECSA/LPT. More than 17 years experience specializing in the development, support and project management of PC software and hardware in distributed computing environment. Excellent communication, interpersonal and organizational skills. A professional with a proven record of success and excelling in the ever-changing field of computer technology. Haja has delivered security training to top fortune 500 companies and government organizations like Fedex, Deutsch Bank, US embassy, Pfizer etc.
Chuck Swanson has consulted and trained in Italy, Greece, Ireland, Netherlands, Japan, Korea, Hawaii and throughout the United States. He specializes in Systems Management Server, Exchange, ethical hacking, computer forensics, and clustering, providing services to customers such as the Department of Defense (US and other countries) and various nuclear plants on the east coast. He is an author, subject matter expert, and speaker/presenter for Microsoft, Element K and EC-Council. Chuck won a National Cable Ace award as Host of the syndicated computer TV show, “Point-N-Click”, which aired for 9 years on Time Warner Cable. He also appears frequently on local TV and the WFBL radio show, “Technology Geeks”, as a computer expert. He has attained the following certification: MCT, MCSE: Security, MCSE+Internet, MCITP: Exchange, MCTS: Exchange, CEH, CHFI, ECSA, LPT, MCNI, MCNE, CTT+, Security+.
1. Thanks for joining us Mr. Swanson. Can you tell us a little about yourself?
2. How were you chosen by EC-Council to be the first instructor to teach CEH v6 at Hacker Halted USA 2008?
3. Thanks to you as well Mr. Mohideen for giving us some of your time. Could you briefly explain the differences between v5 and v6 of CEH?
4. When will v5 officially retire?
5. Did EC-Council simply add new modules or also update the already existing ones?
6. Can you provide a list of the module names separated by which are required and which are optional/self-study?
7. Depending on the provider of the training, the CEH course can run either 4 or 5 days. Many of our readers report that with v5, the instructor couldn’t cover everything in the courseware. Now that v6 has 20 additional modules, is the instructor-led course going to be longer than 1 week?
8. With the plethora of tools and techniques offered in CEHv6, how many are given hands-on treatment in the instructor-led course? As a percentage, how much of the course is dedicated to hands-on lab time and how much to lecture time?
9. I have the CEH credential myself. I and many others have expressed that the CEH curriculum contains too many tools that are either outdated or not used regularly by professional penetration testers. Haja, does v6 of CEH address this concern?
10. Can you expand on EC-Council’s philosophy behind the certification path from CEH to ECSA. What is the main focus of each and how does it apply to real world security job roles.
Thank you both for joining us, and we hope you will make yourselves just as readily available for follow-up questions as you did in providing this set of answers. Our readers may find it irresistible in asking Mr. Swanson his thoughts after instructing the first ever course using v6 of the CEH courseware.
Donald C. Donzal
Extraído de http://unlugarsinfin.blogspot.es