user@ctrlaltinfiltrate:~$ viewing “Road to CEH Masters Certification”

Road to CEH Masters Certification

The journey to obtaining the Certified Ethical Hacker (CEH) Master certification is a challenging but rewarding path that opens doors to advanced cybersecurity roles and professional recognition. This blog post will guide you through my steps and strategies on my path to achieve the CEH Master certification. From understanding the prerequisites and core concepts to preparing for the practical exam, I will do a weekly recap of my studies on my path to success. The main purpose of this blog if for me to teach others as I have always been a believer in that saying that the best way to learn is to teach as well as when someone is teaching two people are learning.

 

So, what does the road to CEH Master look like, and how can you navigate it successfully? Let’s embark on this journey together.

 

 

Week 1 (24/05/24 to 26/05/24)

This week was all about getting started and understand what way I can best use my time to not only learn the content but how to best practice it.

I have decided to break my sessions up into four chunks:

  1. Writing the headings of my upcoming lesson from the “Certified Ethical Hacker (CEH) Version 12 Textbook”.
  2. Go through the video content and make notes on the way through.
  3. Add the notes under the lesson headings and flesh out the notes.
  4. Complete the recommended labs for the content.

The first module that I undertook was “Footprinting and Reconnaissance”.

This was quite interesting as it focused on OSINT as well as specifically going into tools that make the task of searching for the information much easier. Something that I found quite interesting but also extremely useful is Google advance search operators. While a huge amount can be found online my readings specifically delved  into 10 main ones for OSINT, these are:

  • cache:
  • intitle:
  • info:
  • inurl:
  • location:
  • allintitle:
  • allinurl:
  • site:
  • link:

This will not only better myself when performing OSINT it will also make me more efficient when searching through google when studying or researching.

Something that I learned is that there are numerous free tools online that can be used for footprinting some include Netcraft, exploit-db, archive.org and apps such as HTTrack and eMailTrackerPro. These tools all provided a number of ways to perform OSINT on a potential target.

Something that I will most definitely need to come back to and revise before my exam is getting my Kali Linux Raspberry Pi up and running again so I can test the tools Proton, theHarvester , Recon-ng, and Trace

route(Linux) so I am able to reinforce my knowledge using these tools and so I am able to successfully use them in the practical exam if required.

My future plan is to do a module a day (roughly 20) and then at a weekly interval create and schedule posts that delve into what interests me in each topic, what I learned most about each topic and what I need to work on in each topic.

 

Any feedback on how I write my blogs to how website runs will be great so I can improve my ways.

Thank you for reading!

 

About the Author

Thomas Charlesworth

Thomas Charlesworth

Ethical Hacker & AI Engineer

I blend offensive security with custom LLM tooling to empower teams with private, lightning-fast insights. Certified in A+, Network+, Security+, PenTest+—next up, CEH.

Leave a Reply

Your email address will not be published. Required fields are marked *