Security Basics mailing list archives

Re: CEH Course - Your thoughts?


From: Robert Hudock <rhudock () gmail com>
Date: Fri, 22 Aug 2008 11:58:47 -0400

J5,

The test is really easy, you likely do not need a course.  Get the
review guide and practice questions (print-ables versions from a vendor
whose address is found on the EU Council website).  I would recommend
taking a course taught by instructors taught at BlackHat.  In
particular, I would recommend the combat hacking class by SensePost and
Chris Eagle's Reverse Engineering course.

You do not need the course to qualify to take the test -- if you can
meet some basic requirements.

Regards, Robert



On Thu, 2008-08-21 at 16:54 -0400, J5 wrote:
I will be rounding up my first year as a security analyst soon and my
company has offered to send me to a CEH course taught by Dan Garfield
and it is held by IT Training Solutions.  This is the new v6 course.

I feel very comfortable with locating vulnerabilities on the network
and exploitation methodologies.  I do penetration testing on my job,
but it is a very small part of my daily activities. I see many tools
listed in the description that I just haven't had the time to go hands
on with.... and some I use extensively.

I would like to ask anyone who has attended one of these 5 day courses
to reply with their experiences.  I am looking for a lab based
environment to experiment with tools I haven't had the opportunity to
use.  I am already ingrained with CIA, AAA & management aspects of
infosec as well as the 'anatomy of an attack.'  I want to get to the
nitty gritty and not have the same vague overview I get all the time.
I really want to spend a solid week focusing on improving my toolkit.

Do you feel like this course would be beneficial to me or should I
hold off for something else.  (SANS, Foundstone, etc)
-- 
Robert J. Hudock, Esq., CISSP
Associate, Epstein Becker and Green, PC.
Washington, DC Office
1227 25th Street, NW
Suite 700
Washington, DC 20037-1156
Phone: 202/861-1893
Fax: 202/861-3513

rhudock () ebglaw com 
rhudock () gmail com
www.ediscovery.us.com (e-discovery blog)
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.5 (GNU/Linux)
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=KCTq
-----END PGP PUBLIC KEY BLOCK-----

Attachment: signature.asc
Description: This is a digitally signed message part


Current thread: