Certified Ethical Hacker (CEH)
GPTKB entity
Statements (60)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Certification
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:Cybersecurity_Analysts
gptkb:Certified_Information_Systems_Security_Professional_(CISSP) |
gptkbp:appointed_by |
EC-Council
|
gptkbp:associated_with |
gptkb:software
job opportunities cybersecurity career advancement cybersecurity threats professional development security assessments security audits security best practices security policies security training system administration network administration vulnerability assessment security consulting IT management cybersecurity frameworks cybersecurity policies information security cybersecurity certifications cybersecurity practices security frameworks security incidents cybersecurity risks cybersecurity strategies forensics security auditing cyber threat intelligence cybersecurity tools penetration testing tools network defense ethical hacking tools |
gptkbp:certification |
intermediate
|
gptkbp:created |
gptkb:2003
|
gptkbp:duration |
4 hours
|
gptkbp:effective_date |
3 years
continuing education |
gptkbp:focuses_on |
ethical hacking
|
https://www.w3.org/2000/01/rdf-schema#label |
Certified Ethical Hacker (CEH)
|
gptkbp:language |
English
|
gptkbp:requires |
gptkb:none
|
gptkbp:skills |
risk management
incident response network security social engineering malware analysis penetration testing system security web application security |
gptkbp:subject |
multiple choice
312-50 |
gptkbp:target_audience |
IT professionals
|
gptkbp:training |
online
in-person |
gptkbp:visitors |
125
|