Certified Hacker Analyst (CHA)

CERTIFICATION 


Do you need to see our Exam and Training Schedule?









This certification is intended for people interested in getting started in the cybersecurity industry by providing a diversity of knowledge and practical skills required and desired in the cybersecurity field. 


WHO SHOULD TAKE THE CHA?


Hacker / Analysts are the Swiss Army Knife of the security industry. It’s an ideal role for anyone who wants to start in security. Beginners can use these skills towards finding a security niche or a specialty to focus on. Those who like the role can master the skill set to become highly paid consultants capable of analyzing and diagnosing the security of highly complex infrastructures and development projects.


COURSE OVERVIEW

The course is based on three areas: 

Network Security - includes lessons in System Tools and Techniques, Hacking Network Protocols, and Hacking Network Services. 

Security Analysis - includes lessons in Hacking Malware, Attack Analysis, and Counter Forensics. 

Hacking - includes lessons in Hacking Email, Hacking Websites, and Hacking Passwords. 

The curriculum is available off of our website based on the “Security Essentials” series which is sold through Amazon: 

http://isecom.org/store.html

http://hackerhighschool.org/books.html 

Previews of the material are available as part of the Hacker Highschool curriculum available here:

http://hackerhighschool.org/lessons.html


EXAM OVERVIEW

The exam is 100 questions, multiple choice, best answer and based on the body of knowledge available in the security essentials series. The greatest focus of the questions is on practical use and not on memorization. Therefore the successful student will be able to explain how, when, and why to use a particular security tactic, strategy, tool, or process. For example, questions are like this: 

The practice of email spoofing is used for which reasons: 

a. To send assure that phishing emails can get through SPAM filters. 

b. To fake the origin or sender of the email. 

c. To send fake news to an email recipient. 

d. To connect to unknown people with email over the Internet. 

e. To create multiple connections to an email server in a Denial of Service attack. 


Which are the main challenges to secure authentication for Access Control to a system? 

a. Assuring the integrity and the origin of the connection. 

b. Assuring the origin of the connection and the identity of the person connecting. 

c. Assuring the confidentiality of the connection and identity of the person connecting. 

d. Assuring the availability and the integrity of the connection. 

e. Assuring the stability of the system and the connection.


CERTIFICATION REQUIREMENTS

This certification is open and requires no training courses. Anyone can register for this certification. It is recommended however that the student has become familiar with the body of knowledge available whether through self-study or a training course to successfully pass the exam.