{"id":84134,"date":"2025-12-03T06:43:04","date_gmt":"2025-12-03T06:43:04","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84134"},"modified":"2026-01-07T11:05:39","modified_gmt":"2026-01-07T11:05:39","slug":"from-system-admin-to-security-specialist-with-ceh","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/","title":{"rendered":"From System Admin to Security Specialist with CEH: Interview with Saif Qusous"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84134\" class=\"elementor elementor-84134\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-39be778 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"39be778\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6e5f3c4\" data-id=\"6e5f3c4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a94ebc elementor-widget elementor-widget-text-editor\" data-id=\"9a94ebc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW238639018 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238639018 BCX8\">With demand for cybersecurity jobs on the rise, many IT professionals are\u00a0<\/span><span class=\"NormalTextRun SCXW238639018 BCX8\">seeking<\/span><span class=\"NormalTextRun SCXW238639018 BCX8\">\u00a0to transition into information security roles. However, transitioning to a cybersecurity specialization\u00a0<\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW238639018 BCX8\"><span class=\"TextRun SCXW238639018 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238639018 BCX8\">can be<\/span><\/span><\/span><span class=\"TextRun SCXW238639018 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238639018 BCX8\">\u00a0challenging without structured guidance. To understand\u00a0<\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW238639018 BCX8\"><span class=\"TextRun SCXW238639018 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238639018 BCX8\">how\u00a0<\/span><\/span><\/span><span class=\"TextRun SCXW238639018 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238639018 BCX8\">the<\/span><\/span><span class=\"TextRun SCXW238639018 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238639018 BCX8\">\u00a0<a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\">CEH<\/a>\u00a0<\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW238639018 BCX8\"><span class=\"TextRun SCXW238639018 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238639018 BCX8\">certification <\/span><\/span><\/span><span class=\"TextRun SCXW238639018 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238639018 BCX8\">enabl<\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW238639018 BCX8\"><span class=\"TextRun SCXW238639018 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238639018 BCX8\">es<\/span><\/span><\/span><span class=\"TextRun SCXW238639018 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW238639018 BCX8\"> professionals to confidently transition into security-focused roles and excel in them, EC-Council reached out to Saif <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW238639018 BCX8\">Qusous<\/span><span class=\"NormalTextRun SCXW238639018 BCX8\">, a certified ethical hacker and information security specialist in the FinServ industry. In this interview, Saif reveals how CEH helped him transition from IT to cybersecurity. He <\/span><span class=\"NormalTextRun SCXW238639018 BCX8\">states<\/span><span class=\"NormalTextRun SCXW238639018 BCX8\">\u00a0that CEH significantly enhances real-world skills by strengthening professionals\u2019\u00a0<\/span><span class=\"NormalTextRun SCXW238639018 BCX8\">understanding of threats<\/span><span class=\"NormalTextRun SCXW238639018 BCX8\">, defensive capabilities, and practical ethical hacking techniques. Combined with AI-driven automation and analysis, CEH-certified professionals gain deeper visibility into attacks, improved accuracy in assessments, and greater efficiency across all phases of ethical hacking.<\/span><\/span><span class=\"EOP SCXW238639018 BCX8\" data-ccp-props=\"{&quot;335559738&quot;:120,&quot;335559739&quot;:160}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7a3e8e4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7a3e8e4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-06794a9\" data-id=\"06794a9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dab2bd4 elementor-widget elementor-widget-text-editor\" data-id=\"dab2bd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>What motivated you to pursue the Certified Ethical Hacker (CEH) certification?<\/strong><\/p><p>My passion for cybersecurity and my expectations in the field motivated me to pursue the CEH certification. The CEH course not only met those expectations but exceeded them. It gave me exactly the kind of structured, practical, and valuable learning experience I was looking for.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b544ba elementor-widget elementor-widget-text-editor\" data-id=\"0b544ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>How did the CEH certification contribute to your career goals and other aspects of your professional growth?<\/strong><\/p><p>One of the most essential benefits of CEH was gaining access to a community of cybersecurity engineers. The practical experience, hands-on labs, and the depth of knowledge I gained significantly expanded my skills and confidence in cybersecurity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c015c62 elementor-widget elementor-widget-text-editor\" data-id=\"c015c62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Did CEH help you get higher pay, promotion, or the job you wanted? <\/strong><\/p><p>Yes. I was initially an infrastructure engineer, and CEH enabled me to make a complete career shift. I have always been drawn to a career in information security, and today I serve as an Information Security Specialist at Ciaro Amman Bank. This transition occurred as a result of the CEH program.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba09dc elementor-widget elementor-widget-text-editor\" data-id=\"2ba09dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>What aspects of the CEH program were most valuable to you, and how did they contribute to your professional development? <\/strong><\/p><p>The red-team and blue-team modules were extremely valuable. Although I had limited experience before, CEH opened my eyes to professional tools, realistic labs, and virtual machines that allowed me to practice effectively.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-93499cf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"93499cf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-401a31f\" data-id=\"401a31f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-86dc72a elementor-widget elementor-widget-image\" data-id=\"86dc72a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"79\" height=\"59\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/bxs-quote-alt-left.svg\" class=\"attachment-large size-large wp-image-78602\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-aa2ef2d\" data-id=\"aa2ef2d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-5991a4e elementor-widget elementor-widget-text-editor\" data-id=\"5991a4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These skills directly enable me to defend my organization and apply cybersecurity methods in real-world environments. CEH strengthened my practical expertise and supported my current role.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19c845d elementor-widget elementor-widget-text-editor\" data-id=\"19c845d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>In your experience, how widely recognized and respected is CEH in the cybersecurity industry and within your organization?<\/strong><\/p><p>CEH is highly respected in the industry. In the organization where I currently work, the CEH certification is required prerequisite for joining the cybersecurity department.<\/p><p>I personally respect CEH because of its detailed modules, step-by-step explanations, and the depth it provides. You don\u2019t need to constantly search for answers elsewhere; the course covers everything from A to Z. I strongly recommend it to my colleagues and other professionals.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72ee146 elementor-widget elementor-widget-text-editor\" data-id=\"72ee146\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Have you completed other cybersecurity courses? How does CEH differ in skills, knowledge, career opportunities, and overall value? <\/strong><\/p><p>Yes, I have completed approximately 13 <a href=\"https:\/\/www.eccouncil.org\/train-certify\/\">cybersecurity certifications<\/a> and plan to pursue additional ones. However, CEH was my first certification, and it was the one that truly opened my eyes. It gave me strong foundational knowledge, \u2014whether I was working as an IT, technical, or infrastructure engineer.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5c87d66 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5c87d66\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-70d4c2b\" data-id=\"70d4c2b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6708069 elementor-widget elementor-widget-image\" data-id=\"6708069\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"79\" height=\"59\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/bxs-quote-alt-left.svg\" class=\"attachment-large size-large wp-image-78602\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ef692bf\" data-id=\"ef692bf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-3955776 elementor-widget elementor-widget-text-editor\" data-id=\"3955776\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>CEH taught me how to protect servers, routers, and entire environments. It provided tremendous value for both my career and my personal growth.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19fd839 elementor-widget elementor-widget-text-editor\" data-id=\"19fd839\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Have you completed Security+? How does CEH differ from Security+ and other certifications? <\/strong><\/p><p>Yes, I have completed Security+. However, CEH is one of the most essential certifications for any IT or cybersecurity professional. It builds the core foundation needed to speak confidently about cybersecurity.<\/p><p>If you want to be a speaker, researcher, or industry contributor, CEH provides you with the tools, historical context, major attack case studies, impacts, reasons, and remediation strategies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-bb65153\" data-id=\"bb65153\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-82acd24 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"82acd24\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bbea890\" data-id=\"bbea890\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed9c23a elementor-widget elementor-widget-image\" data-id=\"ed9c23a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"79\" height=\"59\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/bxs-quote-alt-left.svg\" class=\"attachment-large size-large wp-image-78602\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6b69187\" data-id=\"6b69187\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-fec80af elementor-widget elementor-widget-text-editor\" data-id=\"fec80af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Mastering CEH provides a broader perspective \u2014and if you are an instructor, it enables you to deliver real value to your audience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69492bf elementor-widget elementor-widget-text-editor\" data-id=\"69492bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Do you think IT professionals should pursue the CEH certification, and why is it important today? <\/strong><\/p><p>Yes, absolutely. I was a perfect example of someone who benefited from CEH as an IT professional. I was a system administrator working with Windows servers, when I completed CEH in 2022, and it completely changed how I understood real-world attacks. The certification taught me how to defend Active Directory, identify DNS poisoning attempts, and recognize various other types of threats that I later encountered in real-world environments.<\/p><p>My awareness, skills, and ability to secure Windows systems against both insider and external attacks expanded significantly. Earning CEH while still a System Administrator was one of the best decisions I ever made.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c790faa elementor-widget elementor-widget-text-editor\" data-id=\"c790faa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Tell us about your journey as a cybersecurity professional.<\/strong><\/p><p>My journey began with certifications. Even 10 years ago, I dreamed of working in cybersecurity. Recently, I completed a boot camp with the Central Bank of Jordan, and it was a turning point in my career. The boot camp included certifications such as CEH, CCT, CHFI, NDE, DFE, EHE, and more.<\/p><p>I am very glad to have attended that boot camp and proud of completing these certifications and the training provided by EC-Council.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6bdc3b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6bdc3b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b3e5783\" data-id=\"b3e5783\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6c1c736 elementor-widget elementor-widget-image\" data-id=\"6c1c736\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"79\" height=\"59\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/bxs-quote-alt-left.svg\" class=\"attachment-large size-large wp-image-78602\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-46f2753\" data-id=\"46f2753\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd6bdfc elementor-widget elementor-widget-text-editor\" data-id=\"cd6bdfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Today, I work as an Information Security Specialist, and I genuinely feel this is the field where I belong. I am passionate about cybersecurity and excited to continue learning and expanding my knowledge in this field.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1884892 elementor-widget elementor-widget-text-editor\" data-id=\"1884892\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>I still have three more EC-Council certifications planned, including CND, CCT, and CFI. In summary, I have found my purpose in cybersecurity, and I am deeply passionate about this field.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31b0c1c elementor-widget elementor-widget-text-editor\" data-id=\"31b0c1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>How has the integration of AI tools enhanced your ethical hacking skills and real-world efficiency? <\/strong><\/p><p>AI now plays a significant role in almost every task. Instead of doing everything manually, you can ask AI to generate scripts, analyze data, automate tasks, or simulate attacks. AI has both positive and negative aspects. On one hand, it can help security professionals automate tasks, strengthen detection, and accelerate defensive strategies. On the other hand, it can also be used by threat actors to improve attack accuracy and success rates. In <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-ethical-hacking\/\">ethical hacking<\/a>, AI is now essential for both offense and defense, and it must be considered in modern cybersecurity strategies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb66818 elementor-widget elementor-widget-text-editor\" data-id=\"eb66818\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Can you share an experience where AI played a crucial role in one of the five phases of ethical hacking?<\/strong><\/p><p>From my experience, AI can support every <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/learn-the-5-phases-of-ethical-hacking\/\">phase of ethical hacking<\/a>.<\/p><p>For example:<\/p><ul><li>Reconnaissance\/Footprinting: AI can generate tools or gather detailed information about companies or banks quickly.<\/li><li>Scanning: AI can identify open ports, services, vulnerabilities, and misconfigurations far faster than manual scanning.<\/li><li>Gaining Access: With CEH v13 integrating AI, ethical hackers can create AI-driven tools that automate exploitation.<\/li><li>Persistence: AI can help generate scripts to maintain persistence efficiently.<\/li><li>Covering Tracks: AI can assist in clearing logs or hiding activity in a more automated way.<\/li><\/ul><p>AI is extremely powerful. It is \u2014capable of assisting with both beneficial and detrimental tasks. It cannot distinguish intentions, which makes it essential for cybersecurity professionals to understand how to defend against AI-driven attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-894fa48 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"894fa48\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-289b24b\" data-id=\"289b24b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5977e5f elementor-widget elementor-widget-text-editor\" data-id=\"5977e5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Conclusion<\/h2><p>CEH remains a highly valuable certification for IT and cybersecurity professionals, especially as AI reshapes modern attack and defense techniques. <span data-teams=\"true\">With the integration of AI in CEH v13<\/span> professionals can enhance their organization&#8217;s security posture, expedite threat detection, and remain prepared for evolving cyber risks. CEH remains a decisive step toward career advancement.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fcd31f tags-cloud elementor-widget elementor-widget-heading\" data-id=\"8fcd31f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About the Interviewee<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b85bb8d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b85bb8d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ba8d9b1\" data-id=\"ba8d9b1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82d0bf0 elementor-widget elementor-widget-image\" data-id=\"82d0bf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/elementor\/thumbs\/saif-qusous-rhakvuy0xdkcfzi37l4irooayfc1c23m6wbsbqxepk.jpg\" title=\"saif-qusous.jpg\" alt=\"saif-qusous.jpg\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e647ea elementor-widget elementor-widget-heading\" data-id=\"6e647ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.linkedin.com\/in\/saif-qusous-baa8b9193\/\" target=\"_blank\">Saif Qusous <\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da13986 elementor-widget elementor-widget-text-editor\" data-id=\"da13986\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Senior IT Security Officer, AJIB<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-441355e\" data-id=\"441355e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-400189b elementor-widget elementor-widget-text-editor\" data-id=\"400189b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.linkedin.com\/in\/saif-qusous-baa8b9193\/\">Saif Qusous<\/a> is an accomplished Information and Cyber Security professional with expertise in enterprise security technologies, as well as defensive and offensive security practices. Committed to continuous learning and excellence, he recently completed a comprehensive boot camp with the Central Bank of Jordan, earning multiple industry-recognized certifications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>With demand for cybersecurity jobs on the rise, many IT professionals are\u00a0seeking\u00a0to transition into information security roles. However, transitioning to a cybersecurity specialization\u00a0can be\u00a0challenging without structured guidance. To understand\u00a0how\u00a0the\u00a0CEH\u00a0certification enables professionals to confidently transition into security-focused roles and excel in them, EC-Council reached out to Saif Qusous, a certified ethical hacker and information security specialist&hellip;<\/p>\n","protected":false},"author":33,"featured_media":84135,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12083],"tags":[],"class_list":{"0":"post-84134","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethical-hacking"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>From System Admin to Security Specialist with CEH | EC-Council<\/title>\n<meta name=\"description\" content=\"Discover how Saif Qusous transitioned from system administrator to security specialist with the CEH certification. Read his inspiring journey and explore CEH career benefits.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From System Admin to Security Specialist with CEH | EC-Council\" \/>\n<meta property=\"og:description\" content=\"Discover how Saif Qusous transitioned from system administrator to security specialist with the CEH certification. Read his inspiring journey and explore CEH career benefits.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-03T06:43:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-07T11:05:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"From System Admin to Security Specialist with CEH | EC-Council\" \/>\n<meta name=\"twitter:description\" content=\"Discover how Saif Qusous transitioned from system administrator to security specialist with the CEH certification. Read his inspiring journey and explore CEH career benefits.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Social.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/from-system-admin-to-security-specialist-with-ceh\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/from-system-admin-to-security-specialist-with-ceh\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"From System Admin to Security Specialist with CEH: Interview with Saif Qusous\",\"datePublished\":\"2025-12-03T06:43:04+00:00\",\"dateModified\":\"2026-01-07T11:05:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/from-system-admin-to-security-specialist-with-ceh\\\/\"},\"wordCount\":1281,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/from-system-admin-to-security-specialist-with-ceh\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/feature-image.jpg\",\"articleSection\":[\"Ethical Hacking\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/from-system-admin-to-security-specialist-with-ceh\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/from-system-admin-to-security-specialist-with-ceh\\\/\",\"name\":\"From System Admin to Security Specialist with CEH | EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/from-system-admin-to-security-specialist-with-ceh\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/from-system-admin-to-security-specialist-with-ceh\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/feature-image.jpg\",\"datePublished\":\"2025-12-03T06:43:04+00:00\",\"dateModified\":\"2026-01-07T11:05:39+00:00\",\"description\":\"Discover how Saif Qusous transitioned from system administrator to security specialist with the CEH certification. Read his inspiring journey and explore CEH career benefits.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/from-system-admin-to-security-specialist-with-ceh\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/from-system-admin-to-security-specialist-with-ceh\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/from-system-admin-to-security-specialist-with-ceh\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/feature-image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/feature-image.jpg\",\"width\":800,\"height\":800,\"caption\":\"From System Admin to Security Specialist with CEH\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/from-system-admin-to-security-specialist-with-ceh\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ethical Hacking\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"From System Admin to Security Specialist with CEH: Interview with Saif Qusous\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"From System Admin to Security Specialist with CEH | EC-Council","description":"Discover how Saif Qusous transitioned from system administrator to security specialist with the CEH certification. Read his inspiring journey and explore CEH career benefits.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/","og_locale":"en_US","og_type":"article","og_title":"From System Admin to Security Specialist with CEH | EC-Council","og_description":"Discover how Saif Qusous transitioned from system administrator to security specialist with the CEH certification. Read his inspiring journey and explore CEH career benefits.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-12-03T06:43:04+00:00","article_modified_time":"2026-01-07T11:05:39+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Social.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"From System Admin to Security Specialist with CEH | EC-Council","twitter_description":"Discover how Saif Qusous transitioned from system administrator to security specialist with the CEH certification. Read his inspiring journey and explore CEH career benefits.","twitter_image":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Social.jpg","twitter_misc":{"Written by":"EC-Council","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"From System Admin to Security Specialist with CEH: Interview with Saif Qusous","datePublished":"2025-12-03T06:43:04+00:00","dateModified":"2026-01-07T11:05:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/"},"wordCount":1281,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/feature-image.jpg","articleSection":["Ethical Hacking"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/","name":"From System Admin to Security Specialist with CEH | EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/feature-image.jpg","datePublished":"2025-12-03T06:43:04+00:00","dateModified":"2026-01-07T11:05:39+00:00","description":"Discover how Saif Qusous transitioned from system administrator to security specialist with the CEH certification. Read his inspiring journey and explore CEH career benefits.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/feature-image.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/feature-image.jpg","width":800,"height":800,"caption":"From System Admin to Security Specialist with CEH"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/from-system-admin-to-security-specialist-with-ceh\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Ethical Hacking","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/"},{"@type":"ListItem","position":4,"name":"From System Admin to Security Specialist with CEH: Interview with Saif Qusous"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84134"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84134\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84135"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}