Threat Report 1706163590
Threat Report 1706163590
Threat Report 1706163590
DETECTION & MITIGATION TECHNIQUES 26. About Certified Ethical Hacker (C|EH)........................32
13. The Human Element: 67% Warn of a Shortage of 27. The Impact of C|EH on Cybersecurity
Skilled Cloud Security Personnel.....................................18 Careers.....................................................................................36
Cybersecurity threats and the challenge of finding skilled professionals to defend networks are
major concerns and fears for many organizations. As of 2023, there is a global shortage of skilled
cybersecurity professionals to fill critical organizational roles.1 Adversaries and threat actors are
aware of this threat. They will find ways to continue penetrating networks and retrieving
information critical to national security or sensitive and classified information for financial gains.
External threats are a concern; however, many attacks come from internal sources. Some attacks
are intentional, while others are due to a lack of training and awareness. Due to the high volume
of threats and attacks, in 2021, US President Joe Biden signed an Executive Order on
Cybersecurity to modernize cybersecurity defenses.2 In 2022, President Biden signed the
Strengthening American Cybersecurity Act. 3 This law established (1) an interagency council to
standardize federal reporting of cybersecurity threats, (2) a task force on ransomware attacks,
and (3) a pilot program to identify information systems vulnerable to such attacks. The focus is to
strengthen the federal cyber workforce and foster collaboration across all levels of government,
specifically to “improve collaboration, share security tools, procedures, and information more
easily.” For each organization, the responsibility of maintaining secure networks while protecting
sensitive information is of the highest priority, and proper planning and assessments are essential
to reduce the risks of attacks. This EC-Council Threat Report 2023 includes research data
regarding cyber threats and concerns about artificial intelligence (AI) It provides different
methods for detection and mitigation from experienced IT and cybersecurity professionals.
1
EC-Council C|EH Threat Report 2024
Our special thanks to the Certified Ethical Hacker Advisory Board
of Members who actively contributed to this Report:
2
EC-Council C|EH Threat Report 2024
Threat Report Leader Editor:
Cassandra Pristas is the Lead Cybersecurity Instructor with
EC-Council. She has over 24 years of experience in the IT and
security industry. She has worked in many industry roles, including
cyber analyst, systems administration, networking, information
assurance, knowledge management, and SharePoint. Her experience
includes working for large DoD companies, Jacobs Technology,
Harris and General Dynamics, and serving in the United States Naval
Reserves information warfare community. She has managed and led
Cassandra Pristas
cyber professionals working with cyber protection teams and has
Leader Cybersecurity experience teaching a cybersecurity curriculum to cyber
Instructor-EC-Council professionals for all branches of the military. She is a lieutenant
Information Professional Officer commander assigned to the Navy Reserve Southcom Headquarters
in Miami, Florida, and the Navy Information Operations Center in
United States Navy Reserves
Pensacola, Florida. She has several master’s degrees, including the
Adjunct Professor
MSA, MS, MSIT, and MSC, and several IT industry certifications, and
5 Master’s Degrees
she is currently pursuing her PhD. She is an adjunct professor at the
Several IT Certifications University of West Florida, teaching intelligence analysis courses.
Pursuing PhD in Education Cassandra has published several articles for the CHIPS Department
of the Navy’s Information Technology Magazine.
3
EC-Council C|EH Threat Report 2024
2 Key Report Findings
Layered Defense:
Education’s Edge:
Zeroing In on Zero-Day:
AI Readiness:
Today's threats are emerging with new tactics, tools, and methodologies. EC-Council's
threat report provides insight into factors important to cybersecurity professionals
and relevant to what is happening in the industry. Threats are real, and hackers are
finding ways to penetrate networks and cause disruption among organizations. Our
adversaries will continue to attack our networks and gather intelligence regarding our
national security. In 2023, hackers from China breached the email accounts of several
prominent US government employees in the State Department and the Department of
Commerce through a vulnerability in Microsoft’s email systems. 4 In early 2023, it was
discovered that a North Korean hacking group had conducted an espionage campaign
between August and November 2022, targeting the medical research, healthcare, and
chemical engineering industries.5 The threats and attacks are endless; however, the
industry must also prepare for artificial intelligence to continue its evolution into the
cyber world, creating more attacks and more work through automation and simple
computations of an algorithm. The shortage of skilled cybersecurity professionals,
increased attacks, and the use of artificial intelligence are raising doubts and fear in
many organizations and cybersecurity professionals.
cybersecurity
professionals
5
EC-Council C|EH Threat Report 2024
Threat Landscape 2024
AI ENABLED
THREAT ACTORS
CYBERSECURITY
DEFENDERS
Artificial intelligence (AI) has been around for over sixty years. It is changing how
people live, organizations and educational systems operate and conduct business.
According to the Council of Europe, “AI consists of a set of sciences, theories, and
techniques that aim to imitate the cognitive abilities of a human being.” 6 AI is still in
the beginning stages; however, organizations need to be made more aware of AI’s
capabilities, limitations, and future direction.
6
EC-Council C|EH Threat Report 2024
4 How Attackers Exploit AI
Survey participants were asked about the potential risks associated with AI in cyber
attacks.
80 77.02%
69.72% 68.26% 68.06%
70
60 55.40%
50.83%
50 42.45%
36.51%
40 31.74%
30
20
10
0
7
EC-Council C|EH Threat Report 2024
DRAFT
The DRAFT
automated DRAFT
creation DRAFT DRAFT
of sophisticated DRAFT
attacks using DRAFT
AI is one of the DRAFT
top risks, DRAFT
mainly
due to its mysterious nature and capabilities. As of today, there is no direct
DRAFT DRAFT
accountability DRAFT
for creating DRAFT attacks,
sophisticated DRAFT nor DRAFT DRAFT
are there DRAFT
real legal DRAFT
ramifications
to creating the attacks. Artificial intelligence sees no ethical concerns and removes the
DRAFT
human DRAFT
element DRAFT
of doing DRAFT
business DRAFT attacks.
and performing DRAFT DRAFT DRAFT DRAFT
The same concept applies to autonomous and self-learning malware. Companies need
DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT
help to counteract malware that not only human attackers create but also AI. Moving
forward, the concept of AI learning to create malware on its own and without any
DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT
oversight can be highly alarming to cybersecurity professionals. Current tools that
monitor and block malware attacks are more vulnerable to those created by AI. As the
DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT
attacks become more sophisticated with various methodologies, algorithms, and
exponential amounts of data, this concern can be overwhelming to counteract. Society
DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT
and organizations are excited about using AI; however, creating self-learning malware
can lead to more threats and attacks formulated by AI.
DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT
The use of automated phishing and social engineering is another concern about the
application
DRAFT of AI. Phishing
DRAFT DRAFTand social
DRAFT engineering
DRAFT are standard
DRAFT day-to-day
DRAFT threats
DRAFT for
DRAFT
organizations across the globe. Individuals will be increasingly targeted through
DRAFT
emails, DRAFT DRAFT
telemarketing calls, and DRAFT DRAFT
social media. DRAFT
According DRAFT
to Baker DRAFT
(2023), DRAFT
at IdentityIQ,
AI can enable scammers to create highly realistic voice and speech synthesis via
DRAFT
cloning DRAFT
scams, DRAFT
automate DRAFT
phishing DRAFT
campaigns, DRAFT
create DRAFT
fake videos, DRAFT DRAFT
and manipulate social
media platforms. 7 These attack strategies make it more challenging to differentiate
DRAFT
what DRAFT
is real and DRAFT
what is not. DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT
68% of respondents stated that AI’s ability to automate vulnerability exploitation with
DRAFT
phishing andDRAFT DRAFT DRAFT
social engineering DRAFT
is considered DRAFT
high risk DRAFT DRAFT
to an organization. DRAFT
According to
the Council of Europe, "automation remains far from human intelligence in the strict
DRAFT
sense, whichDRAFT DRAFT
makes the DRAFT
name open DRAFT
to criticism DRAFT
by some DRAFT
” 8 TheDRAFT
experts. Council ofDRAFT
Europe further notes, “The ultimate stage of their research (a “strong” AI, i.e., the
DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT
ability to contextualize very different specialized problems autonomously) is not
comparable to current achievements (“weak” or “moderate” AIs, extremely efficient in
DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT
their training fields).” 9 However, in the future, there is no way to determine the
limitations of using AI as more data is produced and shared on the internet.
DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT DRAFT
Cyber attacks are evolving and becoming more prevalent around the world.
Organizations cannot handle the number of attacks today, especially with the shortage
of skilled cybersecurity professionals. If organizations have the right number of
security professionals trained and prepared to help counter those attacks, they will be
better off. However, as simple as this sounds, it takes work. In cybersecurity, “the lack
of security skills in the IT industry is partly due to professionals working long hours and
requiring patience, resources, knowledge, and experience.” 10
However, on the positive side, AI can provide benefits to address the needs of the
cyber workforce shortage. Smith (2018) notes that using AI and automation can
relieve some of the pressures that IT and cybersecurity professionals face. Some
examples include "automating the longwinded and repetitive tasks that fill the
workflows of IT teams, such as testing, basis threat analysis, and data deception
tactics.” 11 Using AI to help automate specific tasks can be an advantage in reducing the
amount of time and resources for cyber professionals.
During a recent survey, respondents were asked how AI/machine learning can
help an organization's cybersecurity posture. Here are some of the findings:
9
EC-Council C|EH Threat Report 2024
80
66.99% 66.89%
70
61.93%
60
51.12%
50 44.11% 43.82%
40.80% 39.24% 38.95%
40
30 26.39%
19.77%
20
10
Regarding the use and application of AI in defending against AI-powered cyber attacks,
18% of the respondents are confident that it could help an organization. In comparison,
49% feel somewhat confident, and 27% are neutral. A mere 6% express doubts about
AI's capability to defend against AI-generated cyber attacks.
5.84%
18.01%
10
EC-Council C|EH Threat Report 2024
7 A Shift in the Winds: 83% Note Tangible
Alterations in Attack Methodologies
Amidst AI Revolution
16.45%
Yes No
83.55%
11
EC-Council C|EH Threat Report 2024
How AI Report Findings Can Be Helpful for a Cybersecurity Professional
The threat report indicates that AI's future can benefit many organizations by helping
them defend against internal and external threats. The use of AI can assist IT and
security professionals with threat detection. Cyber professionals handle and process
significant data between monitoring and processing. AI can assist with filtering and
evaluating what is normal and what is an anomaly.
AI can help the cyber workforce to automate, monitor, and analyze unusual behaviors
and patterns within a network. Automating redundant, time-consuming tasks can
work like a force multiplier when scanning data, using pattern recognition, or
identifying IoCs the human eye can miss in larger datasets. In addition to automating
tasks with AI, machine learning is also important. AI’s ability to learn from previous
attacks on a network can be advantageous to learning and identifying new patterns
quickly and proficiently. AI can assist security professionals with developing new
countermeasures to attacks. AI will only increase, yet no one knows how it will impact
companies, our military and how our adversaries will use it against us in the future.
Although the use of AI has the potential to provide many great benefits, there are
concerns about the capabilities of using AI. Rapid technological advances are making it
difficult for security professionals to keep up. The need for more skilled cybersecurity
professionals adds to the threats and vulnerabilities. At the same time, educational
institutions need help teaching and developing current cybersecurity curricula to
prepare students for the workforce.
12
EC-Council C|EH Threat Report 2024
8 AI Readiness: 66% Admit Being
iII-Prepared for AI Cyber Onslaughts
One of the challenges is for students to take theory and apply practical, real-world
knowledge and skillsets. Trying to do more with fewer people is creating burnout
among security professionals. Addressing a lack of training and education on the job
creates potential vulnerabilities for a company, as it takes skilled professionals from
their roles to train others. When there are not enough people in an organization to
learn and apply very specialized skill sets, organizations often struggle with having IT
professionals step into the roles of security professionals without the proper training
or credentials, which is not feasible when they are trying to protect critical
infrastructures.
2.92%
13.92%
17.23% Neutral
Somewhat prepared
Very prepared
17.23%
While the need for skilled and trained cyber professionals is on the rise, organizations
must also face risks from specific targeting, lack of trust from the public, and the
manipulation of biased data that can influence national security. Additional risk
elements include threats that AI can pose to our democracy for elections, the
healthcare system, and public safety concerns. AI can impact social media through
psychological exploitations of society while increasing data breaches and identity theft
through creating and manipulating deepfake videos.12 Research indicates that with the
prevalence of AI, the following attack vectors will become the hardest to defend.
13
EC-Council C|EH Threat Report 2024
9 Zeroing in on Zero-Day: 68% Stated that
These Exploits are Utmost Challenges
14.59%
Autonomously discovering new zero-day vulnerabilities
in software systems
39.45%
Process of weaponizing zero-day vulnerabilities for
18.56% cyber attacks
Automating the distribution of zero-day exploits to
exploit unsuspecting targets
Predicting the occurrence of zero-day vulnerabilities
26.85%
before they are discovered
Other
Today, hackers and cybercriminals can collect a great deal of information from various
sources and manipulate this data to target specific individuals or organizations, known
as spear phishing. AI-enhanced social engineering will allow attackers to create more
sophisticated, automated scams.
Respondents indicate that 56% of deepfake attacks will become more prevalent and
harder to defend.
14
EC-Council C|EH Threat Report 2024
Top 3 attack vectors that will become
the hardest to defend against:
80
68.18%
70
59.45%
60 56.13%
53.04% 51.16%
50
40.88%
40
31.27% 28.84%
30
20.11%
17.46%
20
10
Participants from the study reveal that many organizations experienced various attack
vectors in the last 12 months. They include phishing at 86%, malware and ransomware
at 56%, social engineering at 69%, malicious insiders at 23%, and security
misconfigurations at 61%. Phishing remains the most common attack vector
companies encounter.
15
EC-Council C|EH Threat Report 2024
100
86.39%
80
69.11%
60.83%
56.57%
60 51.60%
47.69%
44.26%
40
24.50% 23.31% 22.25%
20 13.49%
In addition to the top five attack vectors, 56% of the surveyed security professionals
cited security misconfigurations among the most severe security vulnerabilities. In
contrast, 45% answered vulnerable and outdated components, and 42% cited
authentication and session management issues.
16
EC-Council C|EH Threat Report 2024
60
53.73%
50 44.62%
42.13% 40.71%
38.93%
40
28.40%
30
20 16.33%
14.32%
11.60%
9.23%
10
17
EC-Council C|EH Threat Report 2024
Detection & Mitigation Techniques
One way to resolve some of the major concerns and issues is to hire employees with
updated certifications like the Certified Ethical Hacker (C|EH) and
Certified Penetration Testing Professional (C|PENT). These two certifications provide
the necessary skills to think and plan like a hacker. These certifications also prepare
professionals with the latest tools, attack methodologies, and concepts that hackers
use to target organizations all around the worldworldwide. Professionals who handle
incident reporting will benefit from the Certified Incident Handler (E|CIH),
Certified Threat Intelligence (C|TIA), and Certified SOC Analyst (C|SA). Many other
industry certifications help build the foundation of security knowledge and concepts
while providing professionals with a proactive cybersecurity approach that enables
organizations to identify gaps and issues proactively. EC-Council provides several
options for those who want to focus on a Cybersecurity Career Track.
66.75%
80
70
48.52%
60
41.78%
40.36%
37.28%
50
33.96%
30.89%
30.65%
30.65%
26.63%
26.63%
40
21.89%
21.78%
21.30%
20.95%
30
20
10
0
70
61.07% 60.36% 60.36%
56.80%
60
47.93%
50 45.33%
37.87% 36.45%
40
30
20.36%
20
10
0
On average, 22% of the surveyed professionals detect less than 2 vulnerabilities during
a 30-day period, while 26% of the respondents detect between 2 to 5 vulnerabilities
during a 30-day period.
24.52% 21.51%
<2
2-5
6.62% 6-10
25.96%
11-15
21.39%
More than 15
21
EC-Council C|EH Threat Report 2024
16 Response Times: 62% Claimed Taking More
than 2 Hours to Respond to an Issue
Once a threat is detected, response times are critical. The longer a breach is left
unaddressed, the more opportunity hackers will have to damage the network or target,
exfiltrate sensitive information, and set up contingency plans for the organization’s
countermeasures. Data shows that many organizations need to develop and improve
response times when a threat is detected.
5.27%
6.3
5%
2 to 4 hours
17.87%
16.04% More than 20 hours
17.55% 4 to 10 hours
In a recent survey, 819 professionals were asked about the number of attacks they
encountered in the last 12 months, and 24% stated that 0-10% of attacks were
resolved in under 60 minutes by the host organization.
17.88%
23.84%
0%-10%
18.13% 31%-50%
11%-30%
21.05%
More than 70%
19.10%
51%-70%
22
EC-Council C|EH Threat Report 2024
18 Cloud Attack Dynamics: 67% Confirmed
That the Exploitation of Weak or Stolen
Credentials Is a Top Cloud Attack Tactic
Participants were asked about the top five tactics, techniques, and procedures
commonly employed in cloud-based attacks. These respondents identify the
exploitation of weak or stolen credentials (67%), misconfigured cloud storage breaches
(65%), account hijacking and unauthorized access (59%), and insecure application
deployments in the cloud (56%) most often.
23
EC-Council C|EH Threat Report 2024
80
67.31% 65.99%
70
59.04%
60 55.57% 54.49% 53.41%
48.50%
50 42.75%
40 31.02%
30 21.92%
20
10
0
Exploitation of Weak or Stolen Credentials Cloud Phising and Social Engineering Attacks
Misconfigured Cloud Storage Breaches Unauthorized Data Exfiltration from Cloud
Account Hijacking and Unauthorized Access Dos attacks on cloud services
Insecure Application Deployments in the Cloud VM Hopping and Lateral Movement in Cloud Networks
API Abuse and Exploitation Malicious insider Activities in the Cloud
24
EC-Council C|EH Threat Report 2024
Organizations worldwide have adopted some form of cloud-based technology to help
alleviate the workload and shortage of IT and security professionals. Cloud-based
technologies are a great tool to save money and resources, but security needs to be at
the forefront of using cloud technologies. IT and security professionals were asked
about the top 5 countermeasures or security practices regularly employed to mitigate
the risks associated with cloud TTPs. 80% respond that multi-factor authentication
(MFA) is one way, while 60% state that access control and permission management are
another. Data encryption (56%) strong password policies, and regular account changes
(55%) are important to safeguarding cloud technologies.
100
80.29%
80
59.61% 56.57% 56.11%
60 53.77% 51.34%
46.96%
40.63% 38.32%
40
17.40%
20
Participants were asked what measures they believe should be taken to mitigate the
risks of AI in cyber attacks.
80
71.14% 70.18%
70
60
50 44.91%
42.99% 40.96%
39.28% 39.16%
40 34.73%
32.46%
30
18.56%
20
10
27
EC-Council C|EH Threat Report 2024
Mitigation
22 Education's Edge: 82% Champion Regular
Training for Incident Response
The mitigation process requires careful planning and evaluation of the threats and
incidents in an organization. Participants were asked what the best ways are to
enhance incident response capabilities to minimize the impact of a successful attack.
82% state that regular training and cyber drills are beneficial. Many threats and attacks
typically occur because of employees. Some attacks are intentional, while others are
due to a lack of awareness and training.
100
81.75%
80 73.97% 71.90% 71.17%
65.33%
60.58%
60 54.38%
44.89% 44.65% 42.58%
40
20
Conduct regular training and cyber drills Regularly review and update incident response plans
Implement real-time monitoring Conduct post-incident analysis
Establish an incident response team Implement forensic readiness
Develop an incident reponse plan Collaborate with external partners
Improve threat intelligence Establish communication channels
28
EC-Council C|EH Threat Report 2024
23 Evolving Adversaries: 42% Predict AI’s
Adaptability in Attack Patterns to Avoid
Detection Algorithms
7.76%
15.96%
42.24%
33.04%
29
EC-Council C|EH Threat Report 2024
24 Summary: The Latest Best Practices by
Ethical Hackers
Ethical hackers' recent best practices are ensuring they can handle threats. Regular
training and cyber drills with real-time and consistent monitoring and establishing
incident response teams and plans while improving threat intelligence are the top best
practices to help deter attacks. Over 60% of participants feel that regular review and
update of incident response plans is essential, and 54% state that performing
post-incident analysis will help with behavior analysis and a better understanding of
future attacks.
30
EC-Council C|EH Threat Report 2024
25 Conclusion
The EC-Council Threat Report for 2024 concludes that the top five attack vectors of
phishing, malware and ransomware, social engineering, malicious insiders, and security
misconfigurations will be an ongoing issue and concern. These attack vectors will
continue to evolve as AI becomes more prevalent. The adoption and use of AI and ML
will continue to revolutionize the field of cybersecurity and how organizations detect,
respond to, and prevent attacks. Staying on top of the threats and having skilled
professionals who understand and think like a hacker while performing penetration
tests within their organizations is a start. Organizations need to not only focus on their
adversaries but also be aware of attacks that come from insider threats.
Internal threats are a significant concern for the cyber threat landscape. A person
inside knows more about the company and has direct access to the resources
compared to those external threats. According to the Office of the Director of National
Intelligence (ODNI), “Malicious insiders can inflict incalculable damage.” 16
Lord states,
“Over the past century, a trusted insider with ulterior motives perpetrated the most
damaging US counterintelligence failures.” 17 Building a solid cyber workforce is
essential to ensure organizations meet the demands of attacks, becoming more
sophisticated to detect and defend. Recruiting and maintaining high-performing cyber
professionals amidst the cybersecurity talent gap will remain an ongoing challenge,
with over 3.4 million roles that need to be filled. 18 A recent CSIS survey of IT
decision-makers across eight countries found that 82 percent of employers report a
shortage of cybersecurity skills, and 71 percent believe this talent gap causes direct
and measurable damage to their organizations. Not having the right personnel will
result in unsecured systems, increased vulnerabilities, software and hardware
misconfigurations, and the inability to respond to attacks quickly.19
Over 60% of the respondents identify their organizations’ leadership plan to address
cyber threats, data protection, and cloud security as their top 3 challenges.
The threat report indicates that the top cybersecurity challenges organizational
leadership plans to address shortly include the following: cyber threats and attacks at
70%, data protection and privacy at 67%, cloud security at 63%,
31
EC-Council C|EH Threat Report 2024
and security awareness and regulatory training at 59% of the responses. While
organizations know the threat vectors, it takes careful planning and long-term vision to
address the potential threats and attacks. Nothing is a one-stop deterrent, but
applying a comprehensive approach to every vulnerability will prepare IT and
cybersecurity personnel to secure their networks and resources more effectively.
80
69.70% 67.46%
70 63.31%
58.58%
60 52.90%
50.41%
50 41.07%
36.80%
40 31.01%
28.76%
30
20
10
0
EC-Council’s Certified Ethical Hacker (C|EH) is the world’s leading ethical hacking
credential that equips cybersecurity professionals with the knowledge, skills, and
abilities to protect organizations against cyber attacks.
32
EC-Council C|EH Threat Report 2024
The C|EH is the world’s only cybersecurity certification program incorporating a
unique 4 phase learning framework of “Learn, Certify, Engage, and Compete.”
This unique learning framework covers every aspect from training to certification and
hones learners’ skills by exposing them to ethical hacking engagements in EC-Council’s
live cyber range environment. Candidates then get to prove their mettle through a
series of Global Ethical Hacking Competitions designed to keep their skills up to date
years after the certification. One of the most sought-after certifications globally, the
C|EH prepares candidates for various lucrative cybersecurity roles with top Fortune
500 Companies and even in government sectors over 18 years.
• 5 Days of Training C|EH Knowledge Exam • Conduct A Real-World • New Challenges Every
Ethical Hacking Month
• 20 Modules • 125 Multiple-Choice
Assignment
Questions • 4 Hour Competition
• Over 220 hands-on-labs
• 4 Hours • Apply The 5 Phases
with compilation flags • Compete With Your
• (ANAB) ANSI 17024 - Reconnaissance Peers All over The World
• Over 3,500 Hacking Tools
Accredited - Scanning • Hack Your Way to the
• Learn how to hack multiple
operating systems C|EH Practical Exam - Gaining Access
Top of the leaderboard
• 6 Hours Practical Exam • Gain Recognition
• (Windows 11, Windows - Maintaining Access
Servers, Linux, Ubuntu, • 20 Scenario Based • Challenges
- Covering Your Tracks
Android) Questions
• Prove Your Skills And
Abilities
33
EC-Council C|EH Threat Report 2024
Mid-Level Information Security
Auditor
20
JOB ROLES
Cybersecurity Auditor
MAPPED WITH C|EH
Security Administrator
IT Security Administrator
Solution Architect
Cybersecurity Consultant
According to Talent.com, the average annual pay for a Certified Ethical Hacker in the
United States is $125,000 annually.
Acreditations, Recognitions
& Endorsements
U.S.
Department
of Defense
KOMLEK
35
EC-Council C|EH Threat Report 2024
27 The Impact of C|EH on Cybersecurity Careers
“Is the Certified Ethical Hacker (C|EH) worth it?” This is a question that countless
aspiring cybersecurity professionals have asked, and we bring you information backed
by real data collected from thousands of cybersecurity professionals who have
successfully pursued the C|EH. Each has trained for the C|EH and applied the
newfound skills acquired through the C|EH certification to their jobs as cyber
professionals. These cybersecurity professionals have undertaken a career
development journey similar to yours. They are now working in the industry, including
many that have successfully gained employment in top government agencies or
Fortune 500 companies.
Key takeaways from C|EH Hall of Fame Report 2023
Here are some highlights of what the surveyed respondents said:
of hiring managers prefer candidates with C|EH for jobs that require
92% ethical hacking skills.
C|EH
“C|EH has helped me to work on outstanding compared to my C|EH develops a “think outside
mobile devices and AppSec - Pen peers. Cybersecurity skillset the box” approach that you
testing and reverse engineering.” cannot get from other skills.
38
EC-Council C|EH Threat Report 2024
28 About EC-Council
EC-Council’s sole purpose is to build and refine the cybersecurity profession globally.
We help individuals, organizations, educators, and governments address global
workforce problems by developing and curating world-class cybersecurity education
programs and their corresponding certifications. We also provide cybersecurity
services to some of the largest businesses globally. Trusted by 7 of the Fortune 10, 47
of the Fortune 100, the Department of Defense, the Intelligence Community, NATO,
and over 2,000 of the best universities, colleges, and training companies, our programs
have increased through over 140 countries. They have set the bar in cybersecurity
education. Best known for the Certified Ethical Hacker programs, we are dedicated to
equipping over 230,000 information-age soldiers with the knowledge, skills, and
abilities required to fight and win against the black hat adversaries.
Founded in 2001, EC-Council employs over 400 individuals worldwide, with ten global
offices in the USA, UK, Malaysia, Singapore, India, and Indonesia. Its US offices are in
Albuquerque, NM, and Tampa, FL.
39
EC-Council C|EH Threat Report 2024
29 References:
1. Poremba, S. (2023). The cybersecurity talent shortage: the outlook for 2023.
https://www.cybersecuritydive.com/news/cybrsecurity-talent-gap-worker-shortage/639724/
10. Smith, G. (2018). The intelligent solution: automation, the skills shortage and
cyber-security https://www.sciencedirect.com/science/article/abs/pii/S1361372318300733
12. Sample, I. (2020). What are deepfakes-and how you can spot them? The Guadian.
https://www.theguardian.com/technology/2020/jan/13/what-are-deepfakes-and-how-can-yo
u-spot-them
13. Cybersecurity & Infrastructure Security Agency (n.d). Defining insider threats.
40
EC-Council C|EH Threat Report 2024
https://www.cisa.gov/topics/physical-security/insider-threat-mitigation/defining-insider-threats
16. Office of Director of National Intelligence (2016). Protect your organization from the inside
out: Government best practices.
https://www.dni.gov/files/NCSC/documents/products/Govt_Best_Practices_Guide_Insider_Thre
at.pdf
17. Lord, N. (2023). Digital Guardian. What is an insider threat? An insider threat definition.
https://www.digitalguardian.com/blog/what-insider-threat-insider-threat-definition
18. Poremba, S. (2023). The cybersecurity talent shortage: the outlook for 2023.
https://www.cybersecuritydive.com/news/cybersecurity-talent-gap-worker-shortage/639724/
19. CSIS, Hacking the Skills Shortage (Santa Clara, CA: McAfee, July 2016),
https://www.mcafee.com/enterprise/en-us/assets/reports/ rp-hacking-skills-shortage.pdf.
Our Special Thanks to the
Certified Ethical Hacker
Advisory Board Members
America
IMEA
Europe
Carter Tan
Solutions Architect Ensign
InfoSecurity
44
EC-Council C|EH Threat Report 2024
www.eccouncil.org