Certified Ethical Hacker (CEH) v13
About This Course
In a report published by HRM Asia which can be found on https://hrmasia.com/is-ethical-hacking-the-next-big-thing-in-the-talent-market/
Ethical hackers – commonly known as white hat hackers – help to identify threats and vulnerabilities in IT systems to prevent any potential breaches or attacks by their malicious counterparts. Simply put, they utilise their hacking skills for a good cause by using them to bypass IT systems of organisations to test out their security defences.
As cyberattacks become more prevalent, sophisticated, and large-scale, there has never been a greater demand for ethical hackers to help prevent them and build a safer cyber world for everyone.
Organisations are starting to place more emphasis and investment on cyber security by hiring more ethical hackers and even organising bounty challenges to identify and develop potential young ethical hackers.
In another publication from CNA News Asia, https://www.channelnewsasia.com/singapore/ethical-hackers-frontline-keeping-your-home-safe-cyber-attacks-1023216
In today's digital landscape, organizations face an escalating threat from cyberattacks, underscoring the critical need for robust cybersecurity measures. Ethical hackers, or "white hat" hackers, play a pivotal role in this defense by proactively identifying and mitigating vulnerabilities within IT systems.
Conclusion
Integrating ethical hacking training into workforce development is imperative for enhancing organizational resilience against cyber threats. By cultivating a pool of skilled professionals adept at identifying and mitigating vulnerabilities, organizations can better protect their digital assets and maintain trust in an increasingly interconnected world.
What You'll Learn
LO2: Conduct penetration testing and execute exploitation techniques such as malware deployment, web application attacks, sniffing, and privilege escalation to assess security loopholes, and propose countermeasures aligned with industry practices.
LO3: Evaluate vulnerabilities in wireless, mobile, IoT, cloud, and cryptographic systems, and develop a vulnerability assessment report with actionable remediation strategies to safeguard emerging technology platforms against advanced threats.
Entry Requirements
Knowledge and Skills
a. Able to operate using computer functions with minimum Computer Literacy Level 2 based on ICAS Computer Skills Assessment Framework
b. Minimum 3 GCE ‘O’ Levels Passes including English or WPL Level 5 (Average of Reading, Listening, Speaking & Writing Scores)
Attitude
a. Positive Learning Attitude
b. Enthusiastic Learner
Experience
a. Minimum of 1 year of working experience.
Target Year Group : 18-65 years old