Talk:Certified Ethical Hacker

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Computer Security / Computing   
WikiProject icon This article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
 ???  This article has not yet received a rating on the project's quality scale.
 ???  This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
WikiProject Education (Rated Start-class, Low-importance)
WikiProject icon This article is within the scope of WikiProject Education, a collaborative effort to improve the coverage of education and education-related topics on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Low  This article has been rated as Low-importance on the project's importance scale.

You Mention That Hacking is a Felony[edit]

According to the Wikipedia article on "hacking", "A hacker is often someone who creates and modifies computer software or computer hardware, including computer programming, administration, and security-related items. A hacker is also someone who modifies electronics, for example, ham radio transceivers, printers or even home sprinkler systems to get extra functionality or performance." Since when is this a felony? Even when you're talking about hackers in the field of security, not every hacker is out to commit a "felony". Perhaps "illegal hacking" should be used in this context?

Just trying to avoid any misconceptions of the term or, for that matter, two Wikipedia articles going against each other.

I fixed that. Felony is pointlessly specific and inaccurate in this context. Jclemens (talk) 05:04, 7 June 2008 (UTC)
I would also add that different places have different laws - both in the sense that some forms of computer misuse may or may not be legal in other locations, and in the sense that many jurisdictions lack a separate category of crimes called "felony". Bobrayner (talk) 19:38, 6 January 2010 (UTC)


Hi all. I have started this page. It is actually my first page (and quite possibly my first edit as well). Enjoy! Jeremys779 01:27, 22 January 2006 (UTC)

Also, I don't know how to get it into a category, but I took that code from another certification page, so what else do I have to do? Jeremys779 01:36, 22 January 2006 (UTC)


Article was lacking with a proper definition of CEH so I have updated it.Digitalfunda 09:28, 12 October 2006 (UTC)

Investigation and MSS degree[edit]

The investigation information does not provide any sources. I am going to remove it.

The MSS information would be better suited for a page on the EC-Council, instead of a page dedicated to the CEH certification. Any thoughts? I am going to remove it as well if no one is going to object. Jeremys779 03:36, 25 October 2006 (UTC)

Version 7[edit]

Version 7 has landed - there's going to be a large 'launch' training even mid March at, I believe, 22 training locations around the world. This is sort of a sneak preview of the training before it's available on mass. Suggest this to be added to the article. —Preceding unsigned comment added by (talk) 23:45, 3 February 2011 (UTC)

Possible Copyright Violation[edit]

The entire text of this article seems to be directly copied from [1] —Preceding unsigned comment added by (talk) 05:11, August 30, 2007 (UTC)

Good grief I hope that no one copyrighted the mess I just edited. Jclemens (talk) 05:04, 7 June 2008 (UTC)


Ok, I fixed a bunch of the errors, grammar, puffery, and outright tomfoolery in this article. Some of the facts and whatnot I can't help at the moment, but I may later. Feel free to update anything you know needs updating. Jclemens (talk) 05:04, 7 June 2008 (UTC)


I believe ECouncil has a Certification that is equal to the CEH, and is the same exam but provides a different name for companies who don't want to employ a "Hacker". Anyone have any idea what it was? Sephiroth storm (talk) 18:34, 22 August 2008 (UTC)

Is penetration testing at the request of the owner illegal in Germany[edit]

The following sentence needs to be clarified and referenced:

Illegal hacking (i.e.; gaining unauthorized access to computer systems) is a crime in most countries, but penetration testing done by request of the owner of the targeted system(s) or network(s) is not, except in Germany.

Rsduhamel (talk) 20:40, 23 July 2009 (UTC)

I'll see what I can find out. Sephiroth storm (talk) 00:26, 24 July 2009 (UTC)
It is just nonsense. Companies as well as government bodies conduct pentests all the time in germany. About 4-3 companies do nothing besides security tests (i.e. they don't sell any products and do not install stuff for people). The person who buys the test needs to check if he is actually authorized to allow a third party to check everything he wants to be checked, and the testers need to proof that they didn't overlook any evidence to the contrary. For example, a simple error in IP-addresses should be noted if WHOIS points to someone who has nothing to do with the organisation. As long as everyone does their homework, pentests are legal in germany. (talk) 10:20, 23 April 2010 (UTC)

I believe that the paragraph is referring to THIS which is a very vague law. But which potentially does ban internal penetration tests, as the tools used would be illegal, even if used on one's own network. —Preceding unsigned comment added by (talk) 18:33, 19 May 2010 (UTC)

You need to have a "malicious intent" to be subject to prosecution by 202c. 202c mentions that it is applied when someone takes steps to prepare a felony ("punishable offense"). This is not the case if a test/hack/pentest etc. is properly prepared. (talk) 13:11, 28 December 2010 (UTC)
I am not a lawyer and I claim to have no knowledge whatsoever of German law. That having been said, if the owner of a system or a network hires me to test his network for vulnerabilities, clearly that means I'm authorized--I have the knowledge and consent of the owner of the property, who hired me to perform this task for him. Therefore laws against unauthorized access would not apply. Or am I misunderstanding something fundamental here? — Preceding unsigned comment added by (talk) 01:14, 1 September 2015 (UTC)

White hat and black hat[edit]

I'm concerned that these tired old tropes are still being used in the lede; and, worse, the article's telling readers that the skills used by the good guys and bad guys are identical - but that only the good guys sit this exam. That's just silly. bobrayner (talk) 19:19, 27 May 2015 (UTC)