3 Reasons why you should consider becoming a Certified Ethical Hacker (CEH)

Posted on

ceh

 

A common saying among cybersecurity professionals’ is that: There are two kinds of organizations in the world, those that know they have been hacked, and those that have been hacked and they don’t know it yet.

In the 2015 annual Kenya cyber security report, Serianu consulting firm, observed that 7 out of 10 companies are at risk of cyber-attack. Moreover, these companies are not prepared to handle such situations.

It is through this report that Certified Ethical Hackers (CEH) – also known as a white hat hackers – are hired to explore security weaknesses that are inherent in all computer systems, documenting their findings and offering recommendations to organisations on ways security systems can be improved before malicious hackers (black hats) take advantage.

CEH are skilled ICT professional who understand and know how to look for weaknesses and vulnerabilities in target systems, and are hired to use their expertise to lawfully break into computer systems.

Here are three reasons why investing in a career as a CEH is a wise move.

  1. Number of cyber security attacks is on the rise.

With the increase in technology adoption, organisations and individuals are experiencing attacks targeting mobile phones, operating systems, web-based applications, industrial systems and devices, connected to networks. An ethical hacker is then best placed to assess the level of risk exposure and advise on the necessary action to take so as to prevent an attack.

Kenya has seen a rise in the implementation of e-services in private and public sectors, which has significantly increased the number of threats organisations face. Additional risks have emerged from the introduction of the undersea internet cables as well as the automation of banking services.

  1. Increase in Cyber security Jobs

According to Forbes magazine, the cyber security sector is expected to grow to more than $ 170 billion by the year 2020, making it the fastest growing employment segments in Information Technology.

On August 18, 2017, Central Bank of Kenya (CBK) issued a Guidance Note identifying and mitigating cyber risks. The Guidance Note targets institutions’ licensed under the Banking Act, set to develop and implement programs that mitigate cyber security risks.

Amongst the requirements of the Guidance Note, institutions are required to conduct threat and vulnerability assessment tests, reporting to the board of the respective organisations and CBK on their findings annually.

  1. Cyber security affects all job roles in an organisation

Companies have to take extra steps to secure sensitive data in each department. This exercise cuts across all departments in the organisation, whether the employees are working within the corporate network or traveling with mobile devices containing company data.

To learners with the necessary skills to handle these new trends, Strathmore University, through @iLabAfrica Research and Innovation Centre, is offering a Certified Ethical Hacker certification which is globally recognised and endorsed by the United States Department of Defense in its mandate DoD 8570.

The program consists of 18 modules that cover over 270 attack tools and techniques used globally by hackers to break into systems. Learners are given the practical techniques which mimic the environment found in a live production computer network.

This course is of significant benefit to anyone concerned with the integrity of their computer network infrastructure such as security officers, auditors, system administrators and security consultants. To get more information, contact Richard on rotolo@strathmore.edu.

Richard Otolo is the IT Security manager at @iLabAfrica

 

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s