Ethical Hacking

Get insights from 928 questions on Ethical Hacking, answered by students, alumni, and experts. You may also ask and answer any question you like about Ethical Hacking

Follow Ask Question
928

Questions

0

Discussions

6

Active Users

808

Followers

New answer posted

8 years ago

0 Follower 43 Views

Shiksha Ask & Answer
Sanjay KewatI have good knowledge of engg related quest.

Beginner-Level 5

If you want to become an ethical hacker you have to be perfect in programming languages and also have good knowledge of computer software and programms, website and app development.

New answer posted

8 years ago

0 Follower 58 Views

A
Anubhav Lal

Contributor-Level 6

Ethical hacking is a part of cyber security domain. For professional training programs on cyber security, you can refer to https://andyinfosec.com You can choose regular classroom or virtual mode as per your preference at the time of admission.

New answer posted

8 years ago

0 Follower 32 Views

S
shashwat shivam

Beginner-Level 3

You can continue with opting CS branch. It also provide you to have your career in this field. Further, you have to do some hacking training.

New question posted

8 years ago

1 Follower 38 Views

New answer posted

8 years ago

0 Follower 368 Views

Shiksha Ask & Answer
Aara Kapur

Contributor-Level 7

Yes, you can do.
I would love to share the criteria for CEH certification.
PHP
Programming dialects
C+ or C#
Java
Linux
Database
PC Network
But make sure, do the course from the right institute. http://www.koenig-solutions.com/

New answer posted

8 years ago

0 Follower 159 Views

Shiksha Ask & Answer
Aara Kapur

Contributor-Level 7

The CEH certification is EC-Council's most mainstream and looked for after qualification. Run of the mill work titles for CEH-Certified experts incorporate entrance analyser, organize security pro, moral programmer, security advisor, site chairman and inspector. Past the noteworthy corporate openings for work, getting to be CEH affirmed opens the way to lucrative security positions in the administration IT segment, as the CEH is embraced and utilized by the National Security Agency (NSA), the Committee on National Security Systems (CNSS) and the Department of Defense (DoD) as a benchmark to clear faculty and contractual workers with sp
...more

New question posted

8 years ago

0 Follower 39 Views

New question posted

8 years ago

0 Follower 39 Views

New question posted

8 years ago

1 Follower 54 Views

Get authentic answers from experts, students and alumni that you won't find anywhere else

Sign Up on Shiksha

On Shiksha, get access to

  • 65k Colleges
  • 1.2k Exams
  • 688k Reviews
  • 1800k Answers

Share Your College Life Experience

×
×

This website uses Cookies and related technologies for the site to function correctly and securely, improve & personalise your browsing experience, analyse traffic, and support our marketing efforts and serve the Core Purpose. By continuing to browse the site, you agree to Privacy Policy and Cookie Policy.