Not logged in? Join one of the bigest Law Forums on the Internet! Join Now!   Latest blog post: Research Law Professors Before Choosing Law Schools

Advertisments:




Sponsor Links:

Discount Legal Forms
Discounted Legal Texts


Where Can I Find An Ethical Hacking Contract?

Defamation Law Discussion Forum

Where Can I Find An Ethical Hacking Contract?

Postby Dridan » Sat Jan 18, 2014 9:49 am

I am looking for a contract for Ethical Hacking. Anyone know anywhere?
Dridan
 
Posts: 6
Joined: Tue Jan 07, 2014 8:33 am
Top

Where Can I Find An Ethical Hacking Contract?

Postby Chayyim » Sat Feb 08, 2014 2:08 pm

Here's how you can get certification as a Certified Ethical Hacker; getting certified will probably lead to contracts. I don?t normallly just cut & paste for my answers, but this was educational for me(I?d never heard of the term "ethical hacker" before) and I thought some others might be interested as well.   Copied from http://www.eccouncil.org/CEH.htm: If you want to stop hackers from invading your network, first you?ve got to invade their minds. Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes. The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organization depend on technology increasingly, information assets have evolved into critical components of survival. If hacking involves creativity and thinking ?out-of-the-box?, then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organizations have adequately protected their information assets, they must adopt the approach of ?defense in depth?. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure. The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target. The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. To achieve the Certified Ethical Hacker Certification, you must pass the CEH exam 312-50: Ethical Hacking and Countermeasures(312-50) Course Outline v5 Click here to view CEH certification path Click here to view CEH certification FAQ Click here to view CEH exam FAQ Click here to download CEH brochure(7.2mb PDF document) Click here to visit EC-Council Roll of Honor page Take the CEH Assessment Exam(Ask your ATC for password) WARNING: Students are warned against attending CEH training at unauthorized training centers. Only those who attend CEH training at EC-Council ATCs are eligible for CEH certification. Also you will be required to show proof of official CEH training attendance when you apply for EC-Council?s LPT certification and Master of Security Science(MSS) degree program. Please e-mail us at [email protected] to check the authorized validity of a training center. Sources: http://www.eccouncil.org/CEH.htm polymath 84 months ago Please sign in to give a compliment. Please verify your account to give a compliment. Please sign in to send a message. Please verify your account to send a message.
Chayyim
 
Posts: 9
Joined: Thu Jan 09, 2014 6:16 am
Top

Where Can I Find An Ethical Hacking Contract?

Postby Kueng » Tue Feb 18, 2014 8:18 pm

I don?t normallly just cut & paste for my answers, but this was educational for me(I?d never heard of the term "ethical hacker" before) and I thought some others might be interested as well.   Copied from http://www.eccouncil.org/CEH.htm: If you want to stop hackers from invading your network, first you?ve got to invade their minds. Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes. The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organization depend on technology increasingly, information assets have evolved into critical components of survival. If hacking involves creativity and thinking ?out-of-the-box?, then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organizations have adequately protected their information assets, they must adopt the approach of ?defense in depth?. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure. The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target. The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. To achieve the Certified Ethical Hacker Certification, you must pass the CEH exam 312-50: Ethical Hacking and Countermeasures(312-50) Course Outline v5 Click here to view CEH certification path Click here to view CEH certification FAQ Click here to view CEH exam FAQ Click here to download CEH brochure(7.2mb PDF document) Click here to visit EC-Council Roll of Honor page Take the CEH Assessment Exam(Ask your ATC for password) WARNING: Students are warned against attending CEH training at unauthorized training centers. Only those who attend CEH training at EC-Council ATCs are eligible for CEH certification. Also you will be required to show proof of official CEH training attendance when you apply for EC-Council?s LPT certification and Master of Security Science(MSS) degree program. Please e-mail us at [email protected] to check the authorized validity of a training center.
Kueng
 
Posts: 11
Joined: Mon Jan 13, 2014 4:23 am
Top

Where Can I Find An Ethical Hacking Contract?

Postby Gillean » Fri Feb 21, 2014 2:16 am

Generally, that's not what it's reffered to in the corporate world. You might have more luck searching for a "Security Consultant" job.  Basically the same thing.  Sources: me nobodyUknow 84 months ago Please sign in to give a compliment. Please verify your account to give a compliment. Please sign in to send a message. Please verify your account to send a message.
Gillean
 
Posts: 5
Joined: Sun Feb 16, 2014 2:20 pm
Top

Where Can I Find An Ethical Hacking Contract?

Postby Lucky » Thu Mar 06, 2014 8:20 am

newbie875090 said: 1 I'm not looking for the job, I already have one of those. I'm looking for an example contract to use. 83 months ago
Lucky
 
Posts: 5
Joined: Mon Jan 20, 2014 12:29 pm
Top

Where Can I Find An Ethical Hacking Contract?

Postby Tristyn » Sun Mar 09, 2014 9:05 am

I'm not looking for the job, I already have one of those. I'm looking for an example contract to use.
Tristyn
 
Posts: 10
Joined: Tue Dec 31, 2013 10:59 am
Top


Return to Defamation Law

 


  • Related topics
    Replies
    Views
    Last post