Page 62 - Cyber Defense eMagazine - December 2017
P. 62

FEE POLICY

               CEH  penetration  testing  certification  requires  an  $80  annual  membership  fee.  This

               makes the certificate holders eligible to the following benefits:


                   •  Continued support from the EC-Council community.

                   •  One free certification voucher.
                   •  Exclusive discounts on EC-Council events, certification programs and materials.


               WHY BECOME AN ETHICAL HACKER?


               The terms penetration testing and ethical hacking are often interchangeable; however,
               there  is  a  difference.  The  former  is  a  more  narrow  term  for  the  process  of  finding

               vulnerabilities in a target IT system. Penetration testers should be skilled in a specific

               area  (for  example,  network  penetration  testing)  and  are  not  required  to  possess  any
               formal  proficiency  credentials.  Ethical  hacking,  in  its  turn,  can  be  called  advanced

               penetration  testing.  It  encompasses  application  and  network  penetration  testing,
               together  with  DDoS  testing  and  social  engineering.  Ethical  hackers  should  possess

               CEH certification, while penetration testers are not required to have any certificates.


               It pays to be a certified ethical hacker for several reasons:


                   •  To get better salary. According to the InfoSec Institute, the average payout to a
                       Certified Ethical Hacker in US is $71,331 per year (non-certified pentesters are

                       paid $50,000 a year on average) and reaches $132,322.

                   •  To  be  highly  valued  on  the  professional  market.  Customers  consider  CEH
                       certification among the key factors in their hiring decisions.

                   •  To discover more career opportunities. A certified ethical hacker is not limited
                       to  penetration  testing  and  may  take  on  the  roles  of  a  security  engineer,

                       application  security  manager,  IT  security  administrator,  information  security

                       consultant, security compliance engineer and network security analyst.








                   62    Cyber Defense eMagazine – December 2017 Edition
                         Copyright © 2017, Cyber Defense Magazine,  All rights reserved worldwide.
   57   58   59   60   61   62   63   64   65   66   67