Why Running Cybersecurity Training Without Labs Is Not Enough

What should the core component of a cybersecurity training be? And if you’re a training company deciding to offer cybersecurity training, why would you choose to go with EC-Council’s Certified Ethical Hacker (CEH) v9?

This is what I asked Jay Bavisi, President & CEO of EC-Council, during part two of the interview with him. Missed part one?

The TL;DR answer to the first question is that you need hands-on training (not just powerpoint slides). The answer to the second one is that CEH is a cutting edge and powerful training program for information security professionals.

CEH – The Essential Hands-on Cybersecurity Training

Training on cybersecurity is a very challenging area. Unlike other areas of competences, training someone in cybersecurity cannot be done by only setting up a classroom course using powerpoint slides and case studies. Information security professionals need a strong level of hands-on skills to deal with threats that may (and usually will) happen. They need to know exactly what a compromise looks like and exactly what to do with it. Armed forces have access to a shooting range, so they can hone their skills to improve. Similarly, information security professionals need access to a ‘cyber range’.

Cybersecurity professionals need to know exactly what a compromise looks like and what to do with it.

The hands on elements will equip information security professionals with the ability to practice with tools, to deal with various exploits and to apply counter components. All of it iscritical to their success.
Therefore, EC-Council portfolio includes iLabs which is a web portal that enables the participant to launch an entire range of target practice and access tools remotely with one simple click.

Why Offer CEH v9 training?

CEH v9, released in Q4 2015, deals with the latest vulnerabilities that have been exploited and reported. By taking this training, infosec professionals will keep up with the latest vulnerabilities and the biggest threats to the infosecurity community such as Shellshock/Bashdoor. They are made aware of how the exploitation works and the countermeasures which need to be applied.

And they will be needed, now or in the future.

There is also a tremendous amount of focus on mobility and cloud technologies. It provides very useful and practical training regardless of the latest platform. The lab guide is provided to participants and helps them with with the above, step by step.

The Most Trusted Cybersecurity Training

CEH v9 is a globally recognized cyber security training. It receives recognitions and endorsements from many government organizations including the American National Standards Institute (ANSI), Committee on National Security Systems (CNSS), the US Department of Defence (DoD) and 100% mapped to the “Protect and Defend” Workforce Framework of The National Initiative for Cybersecurity Education (NICE).

Want to learn more about CEH v9?

Want to get started to host CEH training courses? Order training materials through our catalog.

About ITpreneurs and EC-Council

ITpreneurs has formed a partnership with EC-Council to provide a diverse portfolio of IT Security training and certifications in the Middle East (Kingdom of Saudi Arabia, United Arab Emirates, Kuwait, Oman, Bahrain, Qatar, Lebanon, Jordan) and Turkey. EC Council (International Council of E-Commerce Consultants) is one of the world’s largest certification bodies for information security professionals and e-business. ITpreneurs partners can provide unique offerings to help their clients in these countries to manage the emerging challenges posed by cyber security related threats.

Connie Tai
Connie Tai is head of products and solutions marketing at ITpreneurs, and engages with training and consulting companies to understand how they can best leverage ITpreneurs portfolio and capabilities. To share any feedback or ideas, please write to her at connie.tai@itpreneurs.com.