Articles

Ethical Hacking Blogs

Checkout our recent ethical hacking blogs & articles to learn the basics of ethical hacking. It will guide you to start your career in ethical hacking.

How Steganography Can Hide Information In Cybersecurity
A Guide to Steganography: Meaning, Types, Tools, & Techniques

A Guide to Steganography: Meaning, Types, Tools, & Techniques | David Tidmarsh |Ethical Hacking From invisible ink to highly complex algorithms, steganography is all around us. Steganography is a fascinating and often misunderstood technique of concealing information, and it has experienced a revival in the digital world. This article discusses everything you need to know…

Read article
ryan
From a Law Enforcement Officer to Deputy Information Security Manager in the State of Florida.

From a Law Enforcement Officer to Deputy Information Security Manager in the State of Florida. https://youtu.be/zbV73jKMxzYRyan R. May Company: State of FloridaJob Title: Information Security ManagerCountry: United States In an exclusive interview with EC-Council, Ryan May, a security engineer-turned-Deputy Information Security Manager who attributes his rapid rise in an industry where competition is fierce. Discover…

Read article
robert-dennis.jpg
From an IT Admin to a CIO: My Story, Rodney Dennis

From an IT Admin to a CIO: My Story, Rodney Dennis https://youtu.be/_ZPOxtwjoeYRodney Dennis Company: Chief Information Officer Job Title: GS Construction Inc. Country: United States In an exclusive interview with EC-Council, we met with Robert Dennis, who attributes a huge part of his success as a CIO to the Certified Ethical Hacker program. Don’t miss…

Read article
shidarion-clark.jpg
Former National Guard Member Fast-Tracks Career as Director of Information Security

Former National Guard Member Fast-Tracks Career as Director of Information Security https://youtu.be/N8BL2m0OJxgShidarion Clark Company: Lannan Technologies Job Title: Information Security Manager Country: United States Follow the story of Shidarion Clark, a former National Guard member who credits the CEH certification for helping him quickly rise through the ranks in cybersecurity.”I honestly didn’t see myself as…

Read article
Thaniel
From Technology Sales to Cyber Warfare Operator with the US Air Force

From Technology Sales to Cyber Warfare Operator with the US Air Force https://youtu.be/I7WK9tvAshUThaniel Langley Company: DSS, Inc.Title: Senior Cyber Security EngineerCountry: United States In an exclusive interview with EC-Council, Thaniel Langley, an Air Force veteran shares his inspiring story. From his time in technology sales to his current role as a cyber warfare operator, with…

Read article
Sindhuja Shivkumar
Comeback Queen of Cybersecurity: Mom Returns to the Cybersecurity Industry After 6-Year Maternity Gap – Thanks to the CEH

Comeback Queen of Cybersecurity: Mom Returns to the Cybersecurity Industry After 6-Year Maternity Gap – Thanks to the CEH https://youtu.be/W_F2SkkzmkESindhuja Shivkumar Company: DocuSign Job Title: Security Technical Program Manager Consultant In this interview, we learn about the journey of Sindhuja Shivkumar, who afaced multiple challenges after a six-year maternity break and found it challenging to…

Read article
An-illustration-of-a-hand-grabbing-money-inside-a-computer-representing-system-hacking
What is System Hacking? Definition, Types and Processes

What Is System Hacking in Ethical Hacking? Definition, Types, and Processes Explained | David Tidmarsh |Ethical Hacking In the popular imagination, the term “hacking” is synonymous with system hacking, a growing concern in cybersecurity. While malicious actors try to break into a computer system, their ethical hacker counterparts work with companies to stop these attackers…

Read article