CINXE.COM
Cybersecurity Exchange | Cybersecurity Courses, Training & Certification | EC-Council
<!DOCTYPE html> <!--[if !(IE 6) | !(IE 7) | !(IE 8) ]><!--> <html lang="en-US" class="no-js"> <!--<![endif]--> <head> <meta charset="UTF-8" /> <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=1"> <link rel="profile" href="https://gmpg.org/xfn/11" /> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style> <!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v23.9) - https://yoast.com/wordpress/plugins/seo/ --> <title>Cybersecurity Exchange | Cybersecurity Courses, Training & Certification | EC-Council</title> <meta name="description" content="Gain exclusive access to cybersecurity news, articles, press releases, research, surveys, expert insights and all other things related to information security." /> <link rel="canonical" href="https://www.eccouncil.org/cybersecurity-exchange/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="website" /> <meta property="og:title" content="Cybersecurity Exchange | Cybersecurity Courses, Training & Certification | EC-Council" /> <meta property="og:description" content="Gain exclusive access to cybersecurity news, articles, press releases, research, surveys, expert insights and all other things related to information security." /> <meta property="og:url" content="https://www.eccouncil.org/cybersecurity-exchange/" /> <meta property="og:site_name" content="Cybersecurity Exchange" /> <meta property="article:modified_time" content="2024-06-19T16:35:05+00:00" /> <meta name="twitter:card" content="summary_large_image" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebPage","@id":"https://www.eccouncil.org/cybersecurity-exchange/","url":"https://www.eccouncil.org/cybersecurity-exchange/","name":"Cybersecurity Exchange | Cybersecurity Courses, Training & Certification | EC-Council","isPartOf":{"@id":"https://eccouncil.org/cybersecurity-exchange/#website"},"about":{"@id":"https://eccouncil.org/cybersecurity-exchange/#organization"},"datePublished":"2022-03-14T05:12:42+00:00","dateModified":"2024-06-19T16:35:05+00:00","description":"Gain exclusive access to cybersecurity news, articles, press releases, research, surveys, expert insights and all other things related to information security.","breadcrumb":{"@id":"https://www.eccouncil.org/cybersecurity-exchange/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://www.eccouncil.org/cybersecurity-exchange/"]}]},{"@type":"BreadcrumbList","@id":"https://www.eccouncil.org/cybersecurity-exchange/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"EC-Council"}]},{"@type":"WebSite","@id":"https://eccouncil.org/cybersecurity-exchange/#website","url":"https://eccouncil.org/cybersecurity-exchange/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https://eccouncil.org/cybersecurity-exchange/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://eccouncil.org/cybersecurity-exchange/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://eccouncil.org/cybersecurity-exchange/#organization","name":"Cybersecurity Exchange","url":"https://eccouncil.org/cybersecurity-exchange/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://eccouncil.org/cybersecurity-exchange/#/schema/logo/image/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https://eccouncil.org/cybersecurity-exchange/#/schema/logo/image/"}}]}</script> <meta name="msvalidate.01" content="654532DF5B37E6AFC75B99AB6A902D30" /> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//www.eccouncil.org' /> <link rel='dns-prefetch' href='//www.google.com' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel="alternate" type="application/rss+xml" title="Cybersecurity Exchange » Feed" href="https://www.eccouncil.org/cybersecurity-exchange/feed/" /> <link rel="alternate" type="application/rss+xml" title="Cybersecurity Exchange » Comments Feed" href="https://www.eccouncil.org/cybersecurity-exchange/comments/feed/" /> <script> window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.7.1"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); </script> <style id='wp-emoji-styles-inline-css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <style id='classic-theme-styles-inline-css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #FFF;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--color--accent: #999999;--wp--preset--color--dark-gray: #111;--wp--preset--color--light-gray: #767676;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='the7-font-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/fonts/icomoon-the7-font/icomoon-the7-font.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='the7-awesome-fonts-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/fonts/FontAwesome/css/all.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='elementor-frontend-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/frontend.min.css?ver=3.25.10' media='all' /> <link rel='stylesheet' id='widget-image-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-image.min.css?ver=3.25.10' media='all' /> <link rel='stylesheet' id='e-animation-fadeInDown-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/lib/animations/styles/fadeInDown.min.css?ver=3.25.10' media='all' /> <link rel='stylesheet' id='the7_horizontal-menu-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-horizontal-menu-widget.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='the7-icon-widget-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-icon-widget.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='the7-e-sticky-effect-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-sticky-effects.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='widget-social-icons-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-social-icons.min.css?ver=3.25.10' media='all' /> <link rel='stylesheet' id='e-apple-webkit-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/conditionals/apple-webkit.min.css?ver=3.25.10' media='all' /> <link rel='stylesheet' id='widget-text-editor-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-text-editor.min.css?ver=3.25.10' media='all' /> <link rel='stylesheet' id='widget-divider-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-divider.min.css?ver=3.25.10' media='all' /> <link rel='stylesheet' id='swiper-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/lib/swiper/v8/css/swiper.min.css?ver=8.4.5' media='all' /> <link rel='stylesheet' id='e-swiper-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/conditionals/e-swiper.min.css?ver=3.25.10' media='all' /> <link rel='stylesheet' id='elementor-post-19542-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-19542.css?ver=1732518959' media='all' /> <link rel='stylesheet' id='e-popup-style-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/css/conditionals/popup.min.css?ver=3.25.4' media='all' /> <link rel='stylesheet' id='the7-filter-decorations-base-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-filter-decorations-base.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='the7-simple-common-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-simple-common.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='the7_elements-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-elements-widget.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='widget-spacer-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-spacer.min.css?ver=3.25.10' media='all' /> <link rel='stylesheet' id='widget-heading-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-heading.min.css?ver=3.25.10' media='all' /> <link rel='stylesheet' id='the7-carousel-widget-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-carousel-widget.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='the7-carousel-navigation-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-carousel-navigation.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='the7-carousel-text-and-icon-widget-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-carousel-text-and-icon-widget.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='elementor-post-76783-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-76783.css?ver=1732520387' media='all' /> <link rel='stylesheet' id='elementor-post-80080-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-80080.css?ver=1732519000' media='all' /> <link rel='stylesheet' id='elementor-post-50845-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-50845.css?ver=1732518959' media='all' /> <link rel='stylesheet' id='elementor-post-21569-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-21569.css?ver=1732518960' media='all' /> <link rel='stylesheet' id='elementor-post-50913-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-50913.css?ver=1732519158' media='all' /> <link rel='stylesheet' id='dt-web-fonts-css' href='https://fonts.googleapis.com/css?family=Nunito+Sans:200,300,400,600,700%7CRoboto:400,600,700%7CNunito:300,400,600,700%7CMerriweather:400,600,700' media='all' /> <link rel='stylesheet' id='dt-main-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/main.min.css?ver=12.1.1' media='all' /> <style id='dt-main-inline-css'> body #load { display: block; height: 100%; overflow: hidden; position: fixed; width: 100%; z-index: 9901; opacity: 1; visibility: visible; transition: all .35s ease-out; } .load-wrap { width: 100%; height: 100%; background-position: center center; background-repeat: no-repeat; text-align: center; display: -ms-flexbox; display: -ms-flex; display: flex; -ms-align-items: center; -ms-flex-align: center; align-items: center; -ms-flex-flow: column wrap; flex-flow: column wrap; -ms-flex-pack: center; -ms-justify-content: center; justify-content: center; } .load-wrap > svg { position: absolute; top: 50%; left: 50%; transform: translate(-50%,-50%); } #load { background: var(--the7-elementor-beautiful-loading-bg,#ffffff); --the7-beautiful-spinner-color2: var(--the7-beautiful-spinner-color,rgba(0,0,0,0.12)); } </style> <link rel='stylesheet' id='the7-custom-scrollbar-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/lib/custom-scrollbar/custom-scrollbar.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='the7-core-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/dt-the7-core/assets/css/post-type.min.css?ver=2.7.10' media='all' /> <link rel='stylesheet' id='the7-css-vars-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/css-vars.css?ver=a588dac7d36a' media='all' /> <link rel='stylesheet' id='dt-custom-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/custom.css?ver=a588dac7d36a' media='all' /> <link rel='stylesheet' id='dt-media-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/media.css?ver=a588dac7d36a' media='all' /> <link rel='stylesheet' id='the7-mega-menu-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/mega-menu.css?ver=a588dac7d36a' media='all' /> <link rel='stylesheet' id='the7-elements-albums-portfolio-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/the7-elements-albums-portfolio.css?ver=a588dac7d36a' media='all' /> <link rel='stylesheet' id='the7-elements-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/post-type-dynamic.css?ver=a588dac7d36a' media='all' /> <link rel='stylesheet' id='style-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7-child/style.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='the7-elementor-global-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/elementor-global.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='eael-general-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/css/view/general.min.css?ver=6.0.10' media='all' /> <link rel='stylesheet' id='ecs-styles-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/ele-custom-skin/assets/css/ecs-style.css?ver=3.1.9' media='all' /> <link rel='stylesheet' id='elementor-post-78847-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-78847.css?ver=1698847797' media='all' /> <link rel='stylesheet' id='google-fonts-1-css' href='https://fonts.googleapis.com/css?family=DM+Sans%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic%7CInter%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic%7CAssistant%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic%7CRoboto%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic%7COverpass%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic&display=auto&ver=6.7.1' media='all' /> <link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin><script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script id="dt-above-fold-js-extra"> var dtLocal = {"themeUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/themes\/dt-the7","passText":"To view this protected post, enter the password below:","moreButtonText":{"loading":"Loading...","loadMore":"Load more"},"postID":"76783","ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","REST":{"baseUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/the7\/v1","endpoints":{"sendMail":"\/send-mail"}},"contactMessages":{"required":"One or more fields have an error. Please check and try again.","terms":"Please accept the privacy policy.","fillTheCaptchaError":"Please, fill the captcha."},"captchaSiteKey":"","ajaxNonce":"910521da57","pageData":{"type":"page","template":"page","layout":null},"themeSettings":{"smoothScroll":"off","lazyLoading":false,"desktopHeader":{"height":""},"ToggleCaptionEnabled":"disabled","ToggleCaption":"Navigation","floatingHeader":{"showAfter":94,"showMenu":false,"height":64,"logo":{"showLogo":true,"html":"","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"}},"topLine":{"floatingTopLine":{"logo":{"showLogo":false,"html":""}}},"mobileHeader":{"firstSwitchPoint":1150,"secondSwitchPoint":600,"firstSwitchPointHeight":60,"secondSwitchPointHeight":50,"mobileToggleCaptionEnabled":"right","mobileToggleCaption":"Menu"},"stickyMobileHeaderFirstSwitch":{"logo":{"html":""}},"stickyMobileHeaderSecondSwitch":{"logo":{"html":""}},"sidebar":{"switchPoint":992},"boxedWidth":"1280px"},"elementor":{"settings":{"container_width":1200}}}; var dtShare = {"shareButtonText":{"facebook":"Share on Facebook","twitter":"Share on X","pinterest":"Pin it","linkedin":"Share on Linkedin","whatsapp":"Share on Whatsapp"},"overlayOpacity":"90"}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/above-the-fold.min.js?ver=12.1.1" id="dt-above-fold-js"></script> <script id="ecs_ajax_load-js-extra"> var ecs_ajax_params = {"ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","posts":"{\"error\":\"\",\"m\":\"\",\"p\":\"76783\",\"post_parent\":\"\",\"subpost\":\"\",\"subpost_id\":\"\",\"attachment\":\"\",\"attachment_id\":0,\"name\":\"\",\"pagename\":\"\",\"page_id\":\"76783\",\"second\":\"\",\"minute\":\"\",\"hour\":\"\",\"day\":0,\"monthnum\":0,\"year\":0,\"w\":0,\"category_name\":\"\",\"tag\":\"\",\"cat\":\"\",\"tag_id\":\"\",\"author\":\"\",\"author_name\":\"\",\"feed\":\"\",\"tb\":\"\",\"paged\":0,\"meta_key\":\"\",\"meta_value\":\"\",\"preview\":\"\",\"s\":\"\",\"sentence\":\"\",\"title\":\"\",\"fields\":\"\",\"menu_order\":\"\",\"embed\":\"\",\"category__in\":[],\"category__not_in\":[],\"category__and\":[],\"post__in\":[],\"post__not_in\":[],\"post_name__in\":[],\"tag__in\":[],\"tag__not_in\":[],\"tag__and\":[],\"tag_slug__in\":[],\"tag_slug__and\":[],\"post_parent__in\":[],\"post_parent__not_in\":[],\"author__in\":[],\"author__not_in\":[],\"search_columns\":[],\"ignore_sticky_posts\":false,\"suppress_filters\":false,\"cache_results\":true,\"update_post_term_cache\":true,\"update_menu_item_cache\":false,\"lazy_load_term_meta\":true,\"update_post_meta_cache\":true,\"post_type\":\"\",\"posts_per_page\":10,\"nopaging\":false,\"comments_per_page\":\"50\",\"no_found_rows\":false,\"order\":\"DESC\"}"}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/ele-custom-skin/assets/js/ecs_ajax_pagination.js?ver=3.1.9" id="ecs_ajax_load-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/ele-custom-skin/assets/js/ecs.js?ver=3.1.9" id="ecs-script-js"></script> <link rel="https://api.w.org/" href="https://www.eccouncil.org/cybersecurity-exchange/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.eccouncil.org/cybersecurity-exchange/wp-json/wp/v2/pages/76783" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.eccouncil.org/cybersecurity-exchange/xmlrpc.php?rsd" /> <meta name="generator" content="WordPress 6.7.1" /> <link rel='shortlink' href='https://www.eccouncil.org/cybersecurity-exchange/' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.eccouncil.org/cybersecurity-exchange/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.eccouncil.org%2Fcybersecurity-exchange%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.eccouncil.org/cybersecurity-exchange/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.eccouncil.org%2Fcybersecurity-exchange%2F&format=xml" /> <meta name="generator" content="Elementor 3.25.10; features: e_font_icon_svg, e_optimized_control_loading; settings: css_print_method-external, google_font-enabled, font_display-auto"> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-M5VLP9X');</script> <!-- End Google Tag Manager --> <!--<script src="https://www.googleoptimize.com/optimize.js?id=GTM-5ZS5R76"></script>--> <!-- Global site tag (gtag.js) - Google Ads: 1028393842 --> <script async src="https://www.googletagmanager.com/gtag/js?id=AW-1028393842"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'AW-1028393842'); </script> <!--End--> <script> jQuery(document).ready(function() { jQuery('#mainNav a[href*=#]').bind('click', function(e) { e.preventDefault(); var target = jQuery(this).attr('href'); jQuery('html, body').stop().animate({ scrollTop: jQuery(target).offset().top }, 600, function() { location.hash = target; }); return false; }); }); // jQuery(window).scroll(function() { // var scrollDistance = jQuery(window).scrollTop(); // jQuery('.page-section').each(function(i) { // if (jQuery(this).position().top+350 <= scrollDistance) { // jQuery('#mainNav a.active').removeClass('active'); // jQuery('#mainNav a').eq(i).addClass('active'); // } // }); // }).scroll(); </script> <!-- This site is converting visitors into subscribers and customers with OptinMonster - https://optinmonster.com --> <script>(function(d,u,ac){var s=d.createElement('script');s.type='text/javascript';s.src='https://a.omappapi.com/app/js/api.min.js';s.async=true;s.dataset.user=u;s.dataset.account=ac;d.getElementsByTagName('head')[0].appendChild(s);})(document,159113,172974);</script> <!-- / https://optinmonster.com --> <style> .e-con.e-parent:nth-of-type(n+4):not(.e-lazyloaded):not(.e-no-lazyload), .e-con.e-parent:nth-of-type(n+4):not(.e-lazyloaded):not(.e-no-lazyload) * { background-image: none !important; } @media screen and (max-height: 1024px) { .e-con.e-parent:nth-of-type(n+3):not(.e-lazyloaded):not(.e-no-lazyload), .e-con.e-parent:nth-of-type(n+3):not(.e-lazyloaded):not(.e-no-lazyload) * { background-image: none !important; } } @media screen and (max-height: 640px) { .e-con.e-parent:nth-of-type(n+2):not(.e-lazyloaded):not(.e-no-lazyload), .e-con.e-parent:nth-of-type(n+2):not(.e-lazyloaded):not(.e-no-lazyload) * { background-image: none !important; } } </style> <script type="text/javascript" id="the7-loader-script"> document.addEventListener("DOMContentLoaded", function(event) { var load = document.getElementById("load"); if(!load.classList.contains('loader-removed')){ var removeLoading = setTimeout(function() { load.className += " loader-removed"; }, 300); } }); </script> <link rel="icon" href="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cropped-fav-icon-3-32x32.png" sizes="32x32" /> <link rel="icon" href="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cropped-fav-icon-3-192x192.png" sizes="192x192" /> <link rel="apple-touch-icon" href="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cropped-fav-icon-3-180x180.png" /> <meta name="msapplication-TileImage" content="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cropped-fav-icon-3-270x270.png" /> <style id="wp-custom-css"> .eael-grid-post-holder-inner { min-height: 330px; } .elementor-heading-title { line-height: 1.3 !important} .menu-item-text, h5.ele-entry-title{ word-spacing:0 !important; } h5{ word-spacing: 0px; } h6.heading{ word-spacing: 0px !important; } .gform_legacy_markup_wrapper li.hidden_label input{ margin-top:0 !important; } </style> <style id='the7-custom-inline-css' type='text/css'> .sub-nav .menu-item i.fa, .sub-nav .menu-item i.fas, .sub-nav .menu-item i.far, .sub-nav .menu-item i.fab { text-align: center; width: 1.25em; } </style> </head> <body id="the7-body" class="home page-template-default page page-id-76783 wp-embed-responsive the7-core-ver-2.7.10 title-off dt-responsive-on right-mobile-menu-close-icon ouside-menu-close-icon mobile-close-right-caption fade-thin-mobile-menu-close-icon fade-medium-menu-close-icon srcset-enabled btn-flat custom-btn-color custom-btn-hover-color first-switch-logo-left first-switch-menu-right second-switch-logo-left second-switch-menu-right right-mobile-menu layzr-loading-on no-avatars popup-message-style the7-ver-12.1.1 dt-fa-compatibility elementor-default elementor-template-full-width elementor-clear-template elementor-kit-19542 elementor-page elementor-page-76783 elementor-page-50913"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M5VLP9X" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- The7 12.1.1 --> <div id="load" class="spinner-loader"> <div class="load-wrap"><style type="text/css"> [class*="the7-spinner-animate-"]{ animation: spinner-animation 1s cubic-bezier(1,1,1,1) infinite; x:46.5px; y:40px; width:7px; height:20px; fill:var(--the7-beautiful-spinner-color2); opacity: 0.2; } .the7-spinner-animate-2{ animation-delay: 0.083s; } .the7-spinner-animate-3{ animation-delay: 0.166s; } .the7-spinner-animate-4{ animation-delay: 0.25s; } .the7-spinner-animate-5{ animation-delay: 0.33s; } .the7-spinner-animate-6{ animation-delay: 0.416s; } .the7-spinner-animate-7{ animation-delay: 0.5s; } .the7-spinner-animate-8{ animation-delay: 0.58s; } .the7-spinner-animate-9{ animation-delay: 0.666s; } .the7-spinner-animate-10{ animation-delay: 0.75s; } .the7-spinner-animate-11{ animation-delay: 0.83s; } .the7-spinner-animate-12{ animation-delay: 0.916s; } @keyframes spinner-animation{ from { opacity: 1; } to{ opacity: 0; } } </style> <svg width="75px" height="75px" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100" preserveAspectRatio="xMidYMid"> <rect class="the7-spinner-animate-1" rx="5" ry="5" transform="rotate(0 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-2" rx="5" ry="5" transform="rotate(30 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-3" rx="5" ry="5" transform="rotate(60 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-4" rx="5" ry="5" transform="rotate(90 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-5" rx="5" ry="5" transform="rotate(120 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-6" rx="5" ry="5" transform="rotate(150 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-7" rx="5" ry="5" transform="rotate(180 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-8" rx="5" ry="5" transform="rotate(210 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-9" rx="5" ry="5" transform="rotate(240 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-10" rx="5" ry="5" transform="rotate(270 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-11" rx="5" ry="5" transform="rotate(300 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-12" rx="5" ry="5" transform="rotate(330 50 50) translate(0 -30)"></rect> </svg></div> </div> <div id="page" > <a class="skip-link screen-reader-text" href="#content">Skip to content</a> <div data-elementor-type="header" data-elementor-id="50845" class="elementor elementor-50845 elementor-location-header" data-elementor-post-type="elementor_library"> <section class="elementor-section elementor-top-section elementor-element elementor-element-968da6e the7-e-sticky-row-yes the7-e-sticky-effect-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="968da6e" data-element_type="section" data-settings="{"background_background":"classic","the7_sticky_row":"yes","the7_sticky_effects_offset":30,"the7_sticky_effects":"yes","the7_sticky_effects_devices":["desktop"],"the7_sticky_row_devices":["desktop","tablet","mobile"],"the7_sticky_row_offset":0}"> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-49473c7 elementor-hidden-tablet elementor-hidden-mobile" data-id="49473c7" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-fa8bc97 the7-img-sticky-size-effect-yes elementor-widget elementor-widget-image" data-id="fa8bc97" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <a href="https://www.eccouncil.org/cybersecurity-exchange"> <img loading="lazy" width="1087" height="650" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1.png" class="attachment-full size-full wp-image-77272" alt="EC-Council Cybersecurity Exchange Logo" srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1.png 1087w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1-300x179.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1-1024x612.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1-768x459.png 768w" sizes="(max-width: 1087px) 100vw, 1087px" /> </a> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-d76c1a4" data-id="d76c1a4" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-18944c0 items-decoration-yes sub-icon_align-side sub-menu-position-tablet-justify toggle-align-left decoration-downwards decoration-position-top mob-menu-popup elementor-widget__width-inherit show-sub-menu-on-hover horizontal-menu--dropdown-tablet decoration-align-height sub-menu-position-left dt-sub-menu_align-left sub-icon_position-right elementor-widget elementor-widget-the7_horizontal-menu" data-id="18944c0" data-element_type="widget" data-settings="{"dropdown_type":"popup","dropdown":"tablet"}" data-widget_type="the7_horizontal-menu.default"> <div class="elementor-widget-container"> <div class="horizontal-menu-wrap"><a class="horizontal-menu-toggle hidden-on-load" role="button" tabindex="0" aria-label="Menu Toggle" aria-expanded="false" href="#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6NzM2ODksInRvZ2dsZSI6ZmFsc2V9"><span class="right menu-toggle-icons" aria-hidden="true" role="presentation"></span></a><nav class="dt-nav-menu-horizontal--main dt-nav-menu-horizontal__container justify-content-end widget-divider- indicator-off"><ul class="dt-nav-menu-horizontal d-flex flex-row justify-content-end"><li class="menu-item menu-item-type-custom menu-item-object-custom current-menu-item current_page_item menu-item-home menu-item-77187 act first depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Articles</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-78453 depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/whitepapers/' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Whitepapers</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-79632 depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/cyber-talks/' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Cyber Talks</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-79998 depth-0"><a href='https://www.eccouncil.org/success-stories/is-ceh-worth-it/?utm_source=cyberxchange-homepage&utm_medium=website&utm_campaign=success%20stories' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Success Stories</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="gcb-btn menu-item menu-item-type-custom menu-item-object-custom menu-item-78176 last has-children depth-0 the7-e-mega-menu"><a href='https://www.eccouncil.org/train-certify/?utm_source=ecc-train-certify&utm_medium=cybersecurity-exchange&utm_campaign=ecc-blog-referral' target='_blank' class='not-clickable-item' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Train & Certify</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a><ul class="the7-e-sub-nav the7-e-mega-menu-sub-nav"><li> <div data-elementor-type="the7-mega-menu" data-elementor-id="78556" class="elementor elementor-78556 the7-e-mega-menu-content the7-e-mega-menu-width-full" data-elementor-post-type="elementor_library"> <div class="elementor-section-wrap"> <section class="elementor-section elementor-top-section elementor-element elementor-element-63fedec4 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="63fedec4" data-element_type="section" data-settings="{"background_background":"classic"}"> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-65a36019" data-id="65a36019" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-2b953b65 elementor-widget elementor-widget-heading" data-id="2b953b65" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Certifications</h2> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-126d7885 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="126d7885" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-5a62212c" data-id="5a62212c" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-49cad7f5 elementor-widget elementor-widget-heading" data-id="49cad7f5" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/ethical-hacking/">ETHICAL HACKING</a></h6> </div> </div> <div class="elementor-element elementor-element-5af40aeb elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5af40aeb" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Ethical Hacker (C|EH)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ceh-master/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">C|EH (MASTER)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-5327f2e4 elementor-widget elementor-widget-heading" data-id="5327f2e4" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <p class="elementor-heading-title elementor-size-default"><a href="/train-certify/executive-management/">EXECUTIVE MANAGEMENT</a></p> </div> </div> <div class="elementor-element elementor-element-7c0f22c3 content-align-left icon-box-vertical-align-top icon-position-left icon-vertical-align-start elementor-widget elementor-widget-the7_icon_box_grid_widget" data-id="7c0f22c3" data-element_type="widget" data-widget_type="the7_icon_box_grid_widget.default"> <div class="elementor-widget-container"> <div class="the7-box-grid-wrapper the7-elementor-widget loading-effect-none the7_icon_box_grid_widget-7c0f22c3"> <div class="dt-css-grid"> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/certified-chief-information-security-officer-cciso/" target="_blank" aria-label="Certified Chief Information Security Officer (C|CISO)"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Certified Chief Information Security Officer (C|CISO) </div> </div> </div> </a> </div> </div> </div> </div> </div> <div class="elementor-element elementor-element-a32c621 content-align-left icon-box-vertical-align-top icon-position-left icon-vertical-align-start elementor-widget elementor-widget-the7_icon_box_grid_widget" data-id="a32c621" data-element_type="widget" data-widget_type="the7_icon_box_grid_widget.default"> <div class="elementor-widget-container"> <div class="the7-box-grid-wrapper the7-elementor-widget loading-effect-none the7_icon_box_grid_widget-a32c621"> <div class="dt-css-grid"> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/associate-cciso/" target="_blank" aria-label="Associate C|CISO"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Associate C|CISO </div> </div> </div> </a> </div> </div> </div> </div> </div> <div class="elementor-element elementor-element-791c93cb elementor-widget elementor-widget-heading" data-id="791c93cb" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/computer-forensics/">COMPUTER FORENSICS</a></h6> </div> </div> <div class="elementor-element elementor-element-277c8451 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="277c8451" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-hacking-forensic-investigator-chfi/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Computer Hacking Forensic Investigator (C|HFI)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-2f9ff8e9 elementor-widget elementor-widget-heading" data-id="2f9ff8e9" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/network-security/">NETWORK SECURITY</a></h6> </div> </div> <div class="elementor-element elementor-element-5cd38d09 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5cd38d09" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-network-security-course/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Network Defender (C|ND)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ics-scada-cybersecurity/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">ICS/SCADA Cybersecurity</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-55ce970e elementor-widget elementor-widget-heading" data-id="55ce970e" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/encryption/">ENCRYPTION</a></h6> </div> </div> <div class="elementor-element elementor-element-5b28a167 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5b28a167" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ec-council-certified-encryption-specialist-eces/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Encryption Specialist (E|CES)</span> </a> </li> </ul> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-54f4d41c" data-id="54f4d41c" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-53c75e7 elementor-widget elementor-widget-heading" data-id="53c75e7" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/pen-testing/">Pen testing</a></h6> </div> </div> <div class="elementor-element elementor-element-7dd26587 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="7dd26587" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-penetration-testing-professional-cpent/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Penetration Testing Professional (C|PENT)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-a086b3d elementor-widget elementor-widget-heading" data-id="a086b3d" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/incident-handling/">INCIDENT HANDLING</a></h6> </div> </div> <div class="elementor-element elementor-element-78ecf7d5 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="78ecf7d5" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ec-council-certified-incident-handler-ecih/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Incident Handler (E|CIH)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-threat-intelligence-analyst-ctia/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Threat Intelligence Analyst (C|TIA)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-soc-analyst-csa/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified SOC Analyst (C|SA)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-1e46b8e5 elementor-widget elementor-widget-heading" data-id="1e46b8e5" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/cloud-security/">CLOUD SECURITY</a></h6> </div> </div> <div class="elementor-element elementor-element-f7377f2 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="f7377f2" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-cloud-security-engineer-course/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Cloud Security Engineer (C|CSE)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-8d4389b elementor-widget elementor-widget-heading" data-id="8d4389b" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/dev-sec-ops/">DevSecOps</a></h6> </div> </div> <div class="elementor-element elementor-element-61a24ab9 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="61a24ab9" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-devsecops-engineer-ecde/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified DevSecOps Engineer (E|CDE)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-6f4a9983 elementor-widget elementor-widget-heading" data-id="6f4a9983" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/cyber-technician/">CYBER TECHNICIAN</a></h6> </div> </div> <div class="elementor-element elementor-element-1132d360 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="1132d360" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-cybersecurity-technician-certification/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Cybersecurity Technician (C|CT)</span> </a> </li> </ul> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-4411e0c2" data-id="4411e0c2" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-325058ee elementor-widget elementor-widget-heading" data-id="325058ee" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/blockchain/">BLOCKCHAIN</a></h6> </div> </div> <div class="elementor-element elementor-element-935b7c2 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="935b7c2" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/blockchain-developer-courses/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Blockchain Developer Certification (B|DC)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/blockchain-fintech-course-bfc/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Blockchain Fintech Certification (B|FC)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/blockchain-business-leader-certification-bblc/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Blockchain Business Leader Certification (B|BLC)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-55d76a6e elementor-widget elementor-widget-heading" data-id="55d76a6e" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/business-continuity-and-disaster-recovery/">BUSINESS CONTINUITY AND DISASTER RECOVERY</a></h6> </div> </div> <div class="elementor-element elementor-element-32df3ae8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="32df3ae8" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/business-continuity-and-disaster-recovery-training/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Disaster Recovery Professional (E|DRP)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-546f6f77 elementor-widget elementor-widget-heading" data-id="546f6f77" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/fundamentals/">FUNDAMENTALS</a></h6> </div> </div> <div class="elementor-element elementor-element-3bff0f8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="3bff0f8" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-secure-computer-user-cscu/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Secure Computer User (C|SCU)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-security-specialist-ecss/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">EC-Council Certified Security Specialist (E|CSS)</span> </a> </li> </ul> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-36e786e1" data-id="36e786e1" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-40d2e2e2 elementor-widget elementor-widget-heading" data-id="40d2e2e2" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/essentials/">ESSENTIALS SERIES</a></h6> </div> </div> <div class="elementor-element elementor-element-3ea8398 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="3ea8398" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/network-defense-essentials-nde/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Network Defense Essentials (N|DE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ethical-hacking-essentials-ehe/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Ethical Hacking Essentials (E|HE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/digital-forensics-essentials-dfe/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Digital Forensics Essentials (D|FE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/devsecops-essentials-dse/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">DevSecOps Essentials (D|SE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/soc-essentials-course-sce/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">SOC Essentials (S|CE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/cloud-security-essentials-cse/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Cloud Security Essentials (C|SE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/iot-security-essentials-ise/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">IoT Security Essentials (I|SE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/threat-intelligence-essentials-tie/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Threat Intelligence Essentials (T|IE)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-4278dee2 elementor-widget elementor-widget-heading" data-id="4278dee2" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <p class="elementor-heading-title elementor-size-default"><a href="/train-certify/application-security/">APPLICATION SECURITY</a></p> </div> </div> <div class="elementor-element elementor-element-6907196 content-align-left icon-box-vertical-align-top icon-position-left icon-vertical-align-start elementor-widget elementor-widget-the7_icon_box_grid_widget" data-id="6907196" data-element_type="widget" data-widget_type="the7_icon_box_grid_widget.default"> <div class="elementor-widget-container"> <div class="the7-box-grid-wrapper the7-elementor-widget loading-effect-none the7_icon_box_grid_widget-6907196"> <div class="dt-css-grid"> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-net/" target="_blank" aria-label="Certified Application Security Engineer (C|ASE .NET)"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Certified Application Security Engineer (C|ASE .NET) </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-java/" target="_blank" aria-label="Certified Application Security Engineer (C|ASE Java)"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Certified Application Security Engineer (C|ASE Java) </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/certified-web-application-security-tester-wahs/" target="_blank" aria-label="Web Application Hacking and Security (W|AHS)"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Web Application Hacking and Security (W|AHS) </div> </div> </div> </a> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4a1b0d3b" data-id="4a1b0d3b" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-77eeb67f elementor-widget elementor-widget-heading" data-id="77eeb67f" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Micro Learning</h2> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-7502e767 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="7502e767" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-228d659b" data-id="228d659b" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-4b39ca95 content-align-left icon-box-vertical-align-top icon-position-left icon-vertical-align-start elementor-widget elementor-widget-the7_icon_box_grid_widget" data-id="4b39ca95" data-element_type="widget" data-widget_type="the7_icon_box_grid_widget.default"> <div class="elementor-widget-container"> <div class="the7-box-grid-wrapper the7-elementor-widget loading-effect-none the7_icon_box_grid_widget-4b39ca95"> <div class="dt-css-grid"> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/python-for-absolute-beginners?utm_source=ecc-website&utm_medium=product-category&utm_campaign=python-for-absolute-beginners" target="_blank" aria-label="Python Programming for Beginners"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Python Programming for Beginners </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/pro?utm_source=ecc-website&utm_medium=product-category&utm_campaign=learn-python-online&logged=false" target="_blank" aria-label="Learn Python Online: From Novice to Pro"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Learn Python Online: From Novice to Pro </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://coderedmarketing.eccouncil.org/python-security-microdegree-program/?utm_source=ecc-website&utm_medium=product-menu&utm_campaign=microdegree-in-python-security" target="_blank" aria-label="Microdegree in Python Security"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Microdegree in Python Security </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://coderedmarketing.eccouncil.org/php-security-microdegree/" target="_blank" aria-label="Microdegree in PHP Security"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Microdegree in PHP Security </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/identity-and-access-management?utm_source=ecc-website&utm_medium=product-category&utm_campaign=identity-and-access-management" target="_blank" aria-label="Identity and Access Management"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Identity and Access Management </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/ubuntu-linux-fundamentals-learn-linux-server-with-ubuntu?utm_source=ecc-website&utm_medium=programs-category&utm_campaign=linux-fundamentals" target="_blank" aria-label="Linux Fundamentals"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Linux Fundamentals </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/linux-server-administration-made-easy-with-hands-on-training?utm_source=ecc-website&utm_medium=product-category&utm_campaign=linux-server-administration-made-easy-with-hands-on-training" target="_blank" aria-label="Linux-Server Administration"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Linux-Server Administration </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/cybersecurity-for-blockchain-from-ground-up?utm_source=ecc-menu&utm_medium=webiste&logged=false" target="_blank" aria-label="Cybersecurity for Blockchain from Ground Up"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Cybersecurity for Blockchain from Ground Up </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/cybersecurity-for-businesses-the-fundamental-edition?utm_source=ecc-website&utm_medium=programs-category&utm_campaign=cybersecurity-for-businesses" target="_blank" aria-label="Cybersecurity for Business"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Cybersecurity for Business </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/email-phishing?utm_source=ecc-website&utm_medium=programs-category&utm_campaign=email-phishing" target="_blank" aria-label="Email Phishing"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Email Phishing </div> </div> </div> </a> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </section> </div> </div> </li></ul></li> </ul></nav></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-5a0164f elementor-hidden-desktop" data-id="5a0164f" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-a88f71b elementor-widget elementor-widget-image" data-id="a88f71b" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <a href="https://www.eccouncil.org/cybersecurity-exchange"> <img loading="lazy" width="1087" height="650" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab.png" class="attachment-full size-full wp-image-77265" alt="EC-Council_Cybersecurity-Exchange-tab" srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab.png 1087w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-300x179.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1024x612.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-768x459.png 768w" sizes="(max-width: 1087px) 100vw, 1087px" /> </a> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-3dd1f80" data-id="3dd1f80" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-3a79a7b elementor-widget__width-auto elementor-hidden-desktop elementor-align-center elementor-widget elementor-widget-the7_icon_widget" data-id="3a79a7b" data-element_type="widget" data-widget_type="the7_icon_widget.default"> <div class="elementor-widget-container"> <div class="the7-icon-wrapper the7-elementor-widget"><a class="elementor-icon" href="#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjczNjg5IiwidG9nZ2xlIjpmYWxzZX0%3D"><svg aria-hidden="true" class="e-font-icon-svg e-fas-bars" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M16 132h416c8.837 0 16-7.163 16-16V76c0-8.837-7.163-16-16-16H16C7.163 60 0 67.163 0 76v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16z"></path></svg></a></div> </div> </div> </div> </div> </div> </section> </div> <div id="main" class="sidebar-none sidebar-divider-off"> <div class="main-gradient"></div> <div class="wf-wrap"> <div class="wf-container-main"> <div id="content" class="content" role="main"> <div data-elementor-type="single-page" data-elementor-id="50913" class="elementor elementor-50913 elementor-location-single post-76783 page type-page status-publish" data-elementor-post-type="elementor_library"> <section class="elementor-section elementor-top-section elementor-element elementor-element-0baf9b6 elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="0baf9b6" data-element_type="section" data-settings="{"background_background":"classic"}"> <div class="elementor-background-overlay"></div> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1102c08" data-id="1102c08" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-98f5a50 elementor-widget elementor-widget-theme-post-content" data-id="98f5a50" data-element_type="widget" data-widget_type="theme-post-content.default"> <div class="elementor-widget-container"> <div data-elementor-type="wp-page" data-elementor-id="76783" class="elementor elementor-76783" data-elementor-post-type="page"> <section class="elementor-section elementor-top-section elementor-element elementor-element-897ee5f elementor-section-full_width elementor-section-height-min-height elementor-section-stretched elementor-section-items-top elementor-section-content-middle elementor-hidden-tablet elementor-hidden-mobile elementor-section-height-default" data-id="897ee5f" data-element_type="section" data-settings="{"stretch_section":"section-stretched"}"> <div class="elementor-background-overlay"></div> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-606bf79" data-id="606bf79" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-a914c04 elementor-widget elementor-widget-image" data-id="a914c04" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <img fetchpriority="high" fetchpriority="high" decoding="async" width="1920" height="350" src="data:image/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 1920 350'%2F%3E" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/Cybersecurity-banner-wide.webp" class="lazy-load attachment-full size-full wp-image-77290" alt="" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/Cybersecurity-banner-wide.webp 1920w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/Cybersecurity-banner-wide-300x55.webp 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/Cybersecurity-banner-wide-1024x187.webp 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/Cybersecurity-banner-wide-768x140.webp 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/Cybersecurity-banner-wide-1536x280.webp 1536w" sizes="(max-width: 1920px) 100vw, 1920px" /> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-39142ce elementor-section-full_width elementor-section-stretched elementor-section-content-middle elementor-hidden-desktop elementor-hidden-mobile elementor-section-height-default elementor-section-height-default" data-id="39142ce" data-element_type="section" data-settings="{"stretch_section":"section-stretched"}"> <div class="elementor-background-overlay"></div> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e34f3ea" data-id="e34f3ea" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-bee984c elementor-widget elementor-widget-image" data-id="bee984c" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <img decoding="async" width="1024" height="350" src="data:image/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 1024 350'%2F%3E" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/Cybersecurity-home-banner2.jpg" class="lazy-load attachment-full size-full wp-image-77208" alt="Cybersecurity home banner" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/Cybersecurity-home-banner2.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/Cybersecurity-home-banner2-300x103.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/Cybersecurity-home-banner2-768x263.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-84c4d60 elementor-section-full_width elementor-section-stretched elementor-section-content-top elementor-hidden-desktop elementor-hidden-tablet elementor-section-height-default elementor-section-height-default" data-id="84c4d60" data-element_type="section" data-settings="{"stretch_section":"section-stretched"}"> <div class="elementor-background-overlay"></div> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-42fb7e5" data-id="42fb7e5" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-b65f8ae elementor-widget elementor-widget-image" data-id="b65f8ae" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <img decoding="async" width="767" height="500" src="data:image/svg+xml;charset=utf-8,%3Csvg xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg' viewBox%3D'0 0 767 500'%2F%3E" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/Cybersecurity-home-banner.jpg" class="lazy-load attachment-full size-full wp-image-77206" alt="Cybersecurity home banner" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/Cybersecurity-home-banner.jpg 767w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/Cybersecurity-home-banner-300x196.jpg 300w" sizes="(max-width: 767px) 100vw, 767px" /> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-3bfdbf1d elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="3bfdbf1d" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-10936b85 elementor-hidden-tablet elementor-hidden-mobile" data-id="10936b85" data-element_type="column" id="sticky" data-settings="{"background_background":"classic"}"> <div class="elementor-widget-wrap elementor-element-populated"> <section class="elementor-section elementor-inner-section elementor-element elementor-element-bd33c91 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="bd33c91" data-element_type="section" id="blog_sidebar"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0731361" data-id="0731361" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-5387221 elementor-widget elementor-widget-text-editor" data-id="5387221" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div id="mainNav"><a class="side_nav_item active" href="#ethical-hacking">Ethical Hacking</a><a class="side_nav_item" href="#network-security">Network Security</a><a class="side_nav_item" href="#penetration-testing">Penetration Testing</a> <a class="side_nav_item" href="#web-application-hacking">Web Application Hacking</a> <a class="side_nav_item" href="#security-operation-center">Security Operation Center</a> <a class="side_nav_item" href="#threat-intelligence">Threat Intelligence</a> <a class="side_nav_item" href="#application-security">Application Security</a><a class="side_nav_item" href="#cloud-security">Cloud Security</a> <a class="side_nav_item" href="#devsecops">DevSecOps</a><a class="side_nav_item" href="#cyber-novice">Cyber Novice</a><a class="side_nav_item" href="#incident-handling">Incident Handling</a> <a class="side_nav_item" href="#cybersecurity-technician">Cybersecurity Technician</a><!--<a class="side_nav_item" href="#disaster-recovery">Disaster Recovery</a>--><a class="side_nav_item" href="#computer-forensics">Computer Forensics</a> <a class="side_nav_item" href="#executive-management">Executive Management</a></div> </div> </div> </div> </div> </div> </section> </div> </div> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-44346897" data-id="44346897" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <section class="elementor-section elementor-inner-section elementor-element elementor-element-daedf0a page-section elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="daedf0a" data-element_type="section" id="ethical-hacking"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-10ad868" data-id="10ad868" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-e1cf447 elementor-widget elementor-widget-text-editor" data-id="e1cf447" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>Ethical Hacking</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/ethical-hacking/" target="_blank" rel="noopener">View All </a></div> </div> </div> </div> <div class="elementor-element elementor-element-dc8d296 preserve-img-ratio-cover elementor-widget elementor-widget-the7_elements" data-id="dc8d296" data-element_type="widget" data-widget_type="the7_elements.default"> <div class="elementor-widget-container"> <div class="portfolio-shortcode the7-elementor-widget the7_elements-dc8d296 mode-grid dt-css-grid-wrap content-rollover-layout-list description-on-hover quick-scale-img content-bg-on enable-bg-rollover resize-by-browser-width widget-with-filter loading-effect-none jquery-filter" data-padding="10px" data-mobile-columns-num="1" data-tablet-columns-num="2" data-desktop-columns-num="3" data-wide-desktop-columns-num="3" data-post-limit="3" data-pagination-mode="load-more" data-scroll-offset="" aria-live="assertive"><div class="dt-css-grid custom-pagination-handler"><div class="visible wf-cell category-12083" data-post-id="82512" data-date="2024-11-21T05:53:03+00:00" data-name="What is NIS2? NIS 2 Directive? Guide to EC-Council Certifications mapped to Nis2"><article class="post visible forward-post post-82512 type-post status-publish format-standard has-post-thumbnail category-ethical-hacking" data-name="What is NIS2? NIS 2 Directive? Guide to EC-Council Certifications mapped to Nis2" data-date="2024-11-21T05:53:03+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/ethical-hacking/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="What is NIS2? EC-Council Certifications Mapped to NIS 2 Directive Guide" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/Blog.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/Blog.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/Blog-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/Blog-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/Blog-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/Blog-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h5 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/ethical-hacking/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2/" rel="bookmark" title="What is NIS2? NIS 2 Directive? Guide to EC-Council Certifications mapped to Nis2">What is NIS2? NIS 2 Directive? Guide to EC-Council Certifications mapped to Nis2</a></h5><div class="entry-meta"><span class="meta-item category-link"><span>Ethical Hacking</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2024-11-21T05:53:03+00:00">November 21, 2024</time></span></div><a href="https://www.eccouncil.org/cybersecurity-exchange/ethical-hacking/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2/" target="" aria-label="Read more about What is NIS2? NIS 2 Directive? Guide to EC-Council Certifications mapped to Nis2" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-12083" data-post-id="82496" data-date="2024-11-21T04:25:57+00:00" data-name="Cyber Security Analyst Salary | Global Salaries: A Comprehensive Guide to Earnings and Career Growth: Global Outlook聽"><article class="post visible forward-post post-82496 type-post status-publish format-standard has-post-thumbnail category-ethical-hacking" data-name="Cyber Security Analyst Salary | Global Salaries: A Comprehensive Guide to Earnings and Career Growth: Global Outlook聽" data-date="2024-11-21T04:25:57+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/ethical-hacking/cybersecurity-analyst-salary-global-salaries/"><img width="1024" height="1024" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201024%201024'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Cyber Security Analyst Salary" decoding="async" sizes="(max-width: 1024px) 100vw, 1024px" style="--ratio: 1024 / 1024;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/Blog-Image-1080-x-1080_BG.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/Blog-Image-1080-x-1080_BG.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/Blog-Image-1080-x-1080_BG-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/Blog-Image-1080-x-1080_BG-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/Blog-Image-1080-x-1080_BG-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h5 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/ethical-hacking/cybersecurity-analyst-salary-global-salaries/" rel="bookmark" title="Cyber Security Analyst Salary | Global Salaries: A Comprehensive Guide to Earnings and Career Growth: Global Outlook聽">Cyber Security Analyst Salary | Global Salaries: A Comprehensive Guide to Earnings and Career Growth: Global Outlook聽</a></h5><div class="entry-meta"><span class="meta-item category-link"><span>Ethical Hacking</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2024-11-21T04:25:57+00:00">November 21, 2024</time></span></div><a href="https://www.eccouncil.org/cybersecurity-exchange/ethical-hacking/cybersecurity-analyst-salary-global-salaries/" target="" aria-label="Read more about Cyber Security Analyst Salary | Global Salaries: A Comprehensive Guide to Earnings and Career Growth: Global Outlook聽" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-12083" data-post-id="82373" data-date="2024-09-23T12:35:59+00:00" data-name="A New Era in Cybersecurity: Announcing C|EH v13"><article class="post visible forward-post post-82373 type-post status-publish format-standard has-post-thumbnail category-ethical-hacking" data-name="A New Era in Cybersecurity: Announcing C|EH v13" data-date="2024-09-23T12:35:59+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/ethical-hacking/a-new-era-in-cybersecurity-announcing-ceh-v13/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Closing the AI Chasm and Certified Ethical Hacker" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/press-release-BG.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/press-release-BG.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/press-release-BG-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/press-release-BG-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/press-release-BG-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/press-release-BG-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h5 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/ethical-hacking/a-new-era-in-cybersecurity-announcing-ceh-v13/" rel="bookmark" title="A New Era in Cybersecurity: Announcing C|EH v13">A New Era in Cybersecurity: Announcing C|EH v13</a></h5><div class="entry-meta"><span class="meta-item category-link"><span>Ethical Hacking</span></span><span class="meta-item data-link"><time class="entry-date updated" datetime="2024-09-23T12:35:59+00:00">September 23, 2024</time></span></div><a href="https://www.eccouncil.org/cybersecurity-exchange/ethical-hacking/a-new-era-in-cybersecurity-announcing-ceh-v13/" target="" aria-label="Read more about A New Era in Cybersecurity: Announcing C|EH v13" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div></div><!-- iso-container|iso-grid --><div class="paginator filter-decorations paginator-more-button filter-pointer-background"> <a class="button-load-more highlighted filter-item" href="javascript:void(0);" data-dt-page="1" ><span class="button-caption">Load more</span></a> </div></div> </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-ab4cb99 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="ab4cb99" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-205cbf7 page-section elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="205cbf7" data-element_type="section" id="network-security"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-f5e1548" data-id="f5e1548" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-6bac2fe elementor-widget elementor-widget-text-editor" data-id="6bac2fe" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>Network Security</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/network-security/"target="_blank">View All </a></div> </div> </div> </div> <div class="elementor-element elementor-element-f096704 preserve-img-ratio-cover elementor-widget elementor-widget-the7_elements" data-id="f096704" data-element_type="widget" data-widget_type="the7_elements.default"> <div class="elementor-widget-container"> <div class="portfolio-shortcode the7-elementor-widget the7_elements-f096704 mode-grid dt-css-grid-wrap content-rollover-layout-list description-on-hover quick-scale-img content-bg-on enable-bg-rollover resize-by-browser-width widget-with-filter loading-effect-none jquery-filter" data-padding="10px" data-mobile-columns-num="1" data-tablet-columns-num="2" data-desktop-columns-num="3" data-wide-desktop-columns-num="3" data-post-limit="3" data-pagination-mode="load-more" data-scroll-offset="" aria-live="assertive"><div class="dt-css-grid custom-pagination-handler"><div class="visible wf-cell category-11251" data-post-id="82318" data-date="2024-08-30T06:44:23+00:00" data-name="From Drowning to Thriving: The Evolution of Vulnerability Management"><article class="post visible forward-post post-82318 type-post status-publish format-standard has-post-thumbnail category-network-security tag-cybersecurity tag-ec-council-2 tag-ethical-hacking tag-network-security tag-vulnerability-assessment tag-vulnerability-management tag-vulnerability-scoring" data-name="From Drowning to Thriving: The Evolution of Vulnerability Management" data-date="2024-08-30T06:44:23+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/network-security/advanced-vulnerability-management-approach/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Vulnerability Management" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/From-Drowning-to-Thriving_A-pix.png" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/From-Drowning-to-Thriving_A-pix.png 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/From-Drowning-to-Thriving_A-pix-300x300.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/From-Drowning-to-Thriving_A-pix-1024x1024.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/From-Drowning-to-Thriving_A-pix-150x150.png 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/From-Drowning-to-Thriving_A-pix-768x768.png 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h5 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/network-security/advanced-vulnerability-management-approach/" rel="bookmark" title="From Drowning to Thriving: The Evolution of Vulnerability Management">From Drowning to Thriving: The Evolution of Vulnerability Management</a></h5><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/network-security/" rel="tag">Network Security</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/08/30/" title="6:44 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-08-30T06:44:23+00:00">August 30, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/network-security/advanced-vulnerability-management-approach/" target="" aria-label="Read more about From Drowning to Thriving: The Evolution of Vulnerability Management" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-11251" data-post-id="82238" data-date="2024-08-02T14:26:28+00:00" data-name="GenZ IAM: Transforming Identity and Access Management with Gen-AI"><article class="post visible forward-post post-82238 type-post status-publish format-standard has-post-thumbnail category-network-security tag-access-management tag-artificial-intelligence tag-cybersecurity tag-ec-council tag-iam tag-machine-learning tag-user-behavior-analysis" data-name="GenZ IAM: Transforming Identity and Access Management with Gen-AI" data-date="2024-08-02T14:26:28+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/network-security/imagine-genz-iam-with-gen-ai/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/08/GenZ-IAM-Transforming-Identity-Thumbnail-2.png" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/08/GenZ-IAM-Transforming-Identity-Thumbnail-2.png 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/08/GenZ-IAM-Transforming-Identity-Thumbnail-2-300x300.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/08/GenZ-IAM-Transforming-Identity-Thumbnail-2-1024x1024.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/08/GenZ-IAM-Transforming-Identity-Thumbnail-2-150x150.png 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/08/GenZ-IAM-Transforming-Identity-Thumbnail-2-768x768.png 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h5 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/network-security/imagine-genz-iam-with-gen-ai/" rel="bookmark" title="GenZ IAM: Transforming Identity and Access Management with Gen-AI">GenZ IAM: Transforming Identity and Access Management with Gen-AI</a></h5><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/network-security/" rel="tag">Network Security</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/08/02/" title="2:26 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-08-02T14:26:28+00:00">August 2, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/network-security/imagine-genz-iam-with-gen-ai/" target="" aria-label="Read more about GenZ IAM: Transforming Identity and Access Management with Gen-AI" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-11251" data-post-id="81719" data-date="2024-03-12T05:03:03+00:00" data-name="How to Become An Enterprise Architect"><article class="post visible forward-post post-81719 type-post status-publish format-standard has-post-thumbnail category-network-security" data-name="How to Become An Enterprise Architect" data-date="2024-03-12T05:03:03+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/network-security/how-to-become-an-enterprise-architect/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/how-to-become-an-enterprise-architect-thumb-1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/how-to-become-an-enterprise-architect-thumb-1.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/how-to-become-an-enterprise-architect-thumb-1-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/how-to-become-an-enterprise-architect-thumb-1-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h5 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/network-security/how-to-become-an-enterprise-architect/" rel="bookmark" title="How to Become An Enterprise Architect">How to Become An Enterprise Architect</a></h5><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/network-security/" rel="tag">Network Security</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/03/12/" title="5:03 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-03-12T05:03:03+00:00">March 12, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/network-security/how-to-become-an-enterprise-architect/" target="" aria-label="Read more about How to Become An Enterprise Architect" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div></div><!-- iso-container|iso-grid --><div class="paginator filter-decorations paginator-more-button filter-pointer-background"> <a class="button-load-more highlighted filter-item" href="javascript:void(0);" data-dt-page="1" ><span class="button-caption">Load more</span></a> </div></div> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-inner-section elementor-element elementor-element-972c0bc page-section elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="972c0bc" data-element_type="section" id="penetration-testing"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1e48c9d" data-id="1e48c9d" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-7be3dee elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="7be3dee" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <div class="elementor-element elementor-element-7651f71 elementor-widget elementor-widget-text-editor" data-id="7651f71" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>Penetration Testing</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/penetration-testing/" target="_blank" rel="noopener">View All </a></div> </div> </div> </div> <div class="elementor-element elementor-element-b389292 preserve-img-ratio-cover elementor-widget elementor-widget-the7_elements" data-id="b389292" data-element_type="widget" data-widget_type="the7_elements.default"> <div class="elementor-widget-container"> <div class="portfolio-shortcode the7-elementor-widget the7_elements-b389292 mode-grid dt-css-grid-wrap content-rollover-layout-list description-on-hover quick-scale-img content-bg-on enable-bg-rollover resize-by-browser-width widget-with-filter loading-effect-none jquery-filter" data-padding="10px" data-mobile-columns-num="1" data-tablet-columns-num="2" data-desktop-columns-num="3" data-wide-desktop-columns-num="3" data-post-limit="3" data-pagination-mode="load-more" data-scroll-offset="" aria-live="assertive"><div class="dt-css-grid custom-pagination-handler"><div class="visible wf-cell category-11466" data-post-id="81961" data-date="2024-05-13T03:55:24+00:00" data-name="What to Do After Ethical Hacking? Learn Advanced Pentesting Skills with the C|PENT"><article class="post visible forward-post post-81961 type-post status-publish format-standard has-post-thumbnail category-penetration-testing" data-name="What to Do After Ethical Hacking? Learn Advanced Pentesting Skills with the C|PENT" data-date="2024-05-13T03:55:24+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/penetration-testing/what-do-after-ethical-hacking/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/What-to-Do-After-Ethical-Hacking-1080-x-1080_A.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/What-to-Do-After-Ethical-Hacking-1080-x-1080_A.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/What-to-Do-After-Ethical-Hacking-1080-x-1080_A-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/What-to-Do-After-Ethical-Hacking-1080-x-1080_A-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/What-to-Do-After-Ethical-Hacking-1080-x-1080_A-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/What-to-Do-After-Ethical-Hacking-1080-x-1080_A-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/penetration-testing/what-do-after-ethical-hacking/" rel="bookmark" title="What to Do After Ethical Hacking? Learn Advanced Pentesting Skills with the C|PENT">What to Do After Ethical Hacking? Learn Advanced Pentesting Skills with the C|PENT</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/penetration-testing/" rel="tag">Penetration Testing</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/05/13/" title="3:55 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-05-13T03:55:24+00:00">May 13, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/penetration-testing/what-do-after-ethical-hacking/" target="" aria-label="Read more about What to Do After Ethical Hacking? Learn Advanced Pentesting Skills with the C|PENT" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-11466" data-post-id="81942" data-date="2024-05-08T09:14:36+00:00" data-name="Burp Suite for Penetration Testing of Web Applications"><article class="post visible forward-post post-81942 type-post status-publish format-standard has-post-thumbnail category-penetration-testing" data-name="Burp Suite for Penetration Testing of Web Applications" data-date="2024-05-08T09:14:36+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/penetration-testing/burp-suite-penetration-testing-web-application/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Burp-Suite-for-Penetration-Testing-of-Web-Applications-1080-x-1080_A.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Burp-Suite-for-Penetration-Testing-of-Web-Applications-1080-x-1080_A.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Burp-Suite-for-Penetration-Testing-of-Web-Applications-1080-x-1080_A-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Burp-Suite-for-Penetration-Testing-of-Web-Applications-1080-x-1080_A-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Burp-Suite-for-Penetration-Testing-of-Web-Applications-1080-x-1080_A-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Burp-Suite-for-Penetration-Testing-of-Web-Applications-1080-x-1080_A-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/penetration-testing/burp-suite-penetration-testing-web-application/" rel="bookmark" title="Burp Suite for Penetration Testing of Web Applications">Burp Suite for Penetration Testing of Web Applications</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/penetration-testing/" rel="tag">Penetration Testing</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/05/08/" title="9:14 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-05-08T09:14:36+00:00">May 8, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/penetration-testing/burp-suite-penetration-testing-web-application/" target="" aria-label="Read more about Burp Suite for Penetration Testing of Web Applications" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-11466" data-post-id="81556" data-date="2024-03-01T06:04:08+00:00" data-name="PowerShell Scripting: Definition, Use Cases, and More"><article class="post visible forward-post post-81556 type-post status-publish format-standard has-post-thumbnail category-penetration-testing" data-name="PowerShell Scripting: Definition, Use Cases, and More" data-date="2024-03-01T06:04:08+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/penetration-testing/powershell-scripting-definition-use-cases/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/Blog-Banners-generic-feb-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/Blog-Banners-generic-feb-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/Blog-Banners-generic-feb-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/Blog-Banners-generic-feb-thumb-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/penetration-testing/powershell-scripting-definition-use-cases/" rel="bookmark" title="PowerShell Scripting: Definition, Use Cases, and More">PowerShell Scripting: Definition, Use Cases, and More</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/penetration-testing/" rel="tag">Penetration Testing</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/03/01/" title="6:04 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-03-01T06:04:08+00:00">March 1, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/penetration-testing/powershell-scripting-definition-use-cases/" target="" aria-label="Read more about PowerShell Scripting: Definition, Use Cases, and More" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div></div><!-- iso-container|iso-grid --><div class="paginator filter-decorations paginator-more-button filter-pointer-background"> <a class="button-load-more highlighted filter-item" href="javascript:void(0);" data-dt-page="1" ><span class="button-caption">Load more</span></a> </div></div> </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-b9e78da elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="b9e78da" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-1e38aeb page-section elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="1e38aeb" data-element_type="section" id="web-application-hacking"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d443da7" data-id="d443da7" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-5a77972 elementor-widget elementor-widget-text-editor" data-id="5a77972" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>Web Application Hacking</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/web-application-hacking/" target="_blank" rel="noopener">View All </a></div> </div> </div> </div> <div class="elementor-element elementor-element-16bd633 preserve-img-ratio-cover elementor-widget elementor-widget-the7_elements" data-id="16bd633" data-element_type="widget" data-widget_type="the7_elements.default"> <div class="elementor-widget-container"> <div class="portfolio-shortcode the7-elementor-widget the7_elements-16bd633 mode-grid dt-css-grid-wrap content-rollover-layout-list description-on-hover quick-scale-img content-bg-on enable-bg-rollover resize-by-browser-width widget-with-filter loading-effect-none jquery-filter" data-padding="10px" data-mobile-columns-num="1" data-tablet-columns-num="2" data-desktop-columns-num="3" data-wide-desktop-columns-num="3" data-post-limit="3" data-pagination-mode="load-more" data-scroll-offset="" aria-live="assertive"><div class="dt-css-grid custom-pagination-handler"><div class="visible wf-cell category-12227" data-post-id="77681" data-date="2022-10-12T05:10:05+00:00" data-name="What Is Broken Access Control Vulnerability?聽聽聽"><article class="post visible forward-post post-77681 type-post status-publish format-standard has-post-thumbnail category-web-application-hacking" data-name="What Is Broken Access Control Vulnerability?聽聽聽" data-date="2022-10-12T05:10:05+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/web-application-hacking/broken-access-control-vulnerability/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Broken Access Control Vulnerability" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/10/broken-access-control-vulnerability-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/10/broken-access-control-vulnerability-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/10/broken-access-control-vulnerability-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/10/broken-access-control-vulnerability-thumb-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/web-application-hacking/broken-access-control-vulnerability/" rel="bookmark" title="What Is Broken Access Control Vulnerability?聽聽聽">What Is Broken Access Control Vulnerability?聽聽聽</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/web-application-hacking/" rel="tag">Web Application Hacking</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2022/10/12/" title="5:10 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2022-10-12T05:10:05+00:00">October 12, 2022</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/web-application-hacking/broken-access-control-vulnerability/" target="" aria-label="Read more about What Is Broken Access Control Vulnerability?聽聽聽" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-12227" data-post-id="77662" data-date="2022-10-11T05:16:26+00:00" data-name="Insecure Direct Object Reference (IDOR) Vulnerability Detection and Prevention聽"><article class="post visible forward-post post-77662 type-post status-publish format-standard has-post-thumbnail category-web-application-hacking" data-name="Insecure Direct Object Reference (IDOR) Vulnerability Detection and Prevention聽" data-date="2022-10-11T05:16:26+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/web-application-hacking/idor-vulnerability-detection-prevention/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Insecure Direct Object Reference IDOR Vulnerability" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/10/idor-vulnerability-detection-prevention-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/10/idor-vulnerability-detection-prevention-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/10/idor-vulnerability-detection-prevention-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/10/idor-vulnerability-detection-prevention-thumb-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/web-application-hacking/idor-vulnerability-detection-prevention/" rel="bookmark" title="Insecure Direct Object Reference (IDOR) Vulnerability Detection and Prevention聽">Insecure Direct Object Reference (IDOR) Vulnerability Detection and Prevention聽</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/web-application-hacking/" rel="tag">Web Application Hacking</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2022/10/11/" title="5:16 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2022-10-11T05:16:26+00:00">October 11, 2022</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/web-application-hacking/idor-vulnerability-detection-prevention/" target="" aria-label="Read more about Insecure Direct Object Reference (IDOR) Vulnerability Detection and Prevention聽" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-12227" data-post-id="5926" data-date="2021-10-09T16:40:18+00:00" data-name="Cross-Site Request Forgery (CSRF) Attacks: Common Vulnerabilities and Prevention Methods"><article class="post visible forward-post post-5926 type-post status-publish format-standard has-post-thumbnail category-web-application-hacking tag-application-security" data-name="Cross-Site Request Forgery (CSRF) Attacks: Common Vulnerabilities and Prevention Methods" data-date="2021-10-09T16:40:18+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/web-application-hacking/cross-site-request-forgery-csrf-attacks-vulnerabilities-prevention/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Cross-Site Request Forgery CSRF Attacks Vulnerabilities and Prevention" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/10/cross-site-request-forgery-csrf-attacks-vulnerabilities-prevention-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/10/cross-site-request-forgery-csrf-attacks-vulnerabilities-prevention-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/10/cross-site-request-forgery-csrf-attacks-vulnerabilities-prevention-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/10/cross-site-request-forgery-csrf-attacks-vulnerabilities-prevention-thumb-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/web-application-hacking/cross-site-request-forgery-csrf-attacks-vulnerabilities-prevention/" rel="bookmark" title="Cross-Site Request Forgery (CSRF) Attacks: Common Vulnerabilities and Prevention Methods">Cross-Site Request Forgery (CSRF) Attacks: Common Vulnerabilities and Prevention Methods</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/web-application-hacking/" rel="tag">Web Application Hacking</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2021/10/09/" title="4:40 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2021-10-09T16:40:18+00:00">October 9, 2021</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/web-application-hacking/cross-site-request-forgery-csrf-attacks-vulnerabilities-prevention/" target="" aria-label="Read more about Cross-Site Request Forgery (CSRF) Attacks: Common Vulnerabilities and Prevention Methods" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div></div><!-- iso-container|iso-grid --><div class="paginator filter-decorations paginator-more-button filter-pointer-background"> <a class="button-load-more highlighted filter-item" href="javascript:void(0);" data-dt-page="1" ><span class="button-caption">Load more</span></a> </div></div> </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-c200a2f elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="c200a2f" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-9e16254 page-section elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9e16254" data-element_type="section" id="security-operation-center"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b71c6f7" data-id="b71c6f7" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-8848d74 elementor-widget elementor-widget-text-editor" data-id="8848d74" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>Security Operation Center</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/security-operation-center/" target="_blank" rel="noopener">View All </a></div> </div> </div> </div> <div class="elementor-element elementor-element-4360c6f preserve-img-ratio-cover elementor-widget elementor-widget-the7_elements" data-id="4360c6f" data-element_type="widget" data-widget_type="the7_elements.default"> <div class="elementor-widget-container"> <div class="portfolio-shortcode the7-elementor-widget the7_elements-4360c6f mode-grid dt-css-grid-wrap content-rollover-layout-list description-on-hover quick-scale-img content-bg-on enable-bg-rollover resize-by-browser-width widget-with-filter loading-effect-none jquery-filter" data-padding="10px" data-mobile-columns-num="1" data-tablet-columns-num="2" data-desktop-columns-num="3" data-wide-desktop-columns-num="3" data-post-limit="3" data-pagination-mode="load-more" data-scroll-offset="" aria-live="assertive"><div class="dt-css-grid custom-pagination-handler"><div class="visible wf-cell category-12225" data-post-id="81601" data-date="2024-03-06T16:26:00+00:00" data-name="What is SOC Security Operations Center"><article class="post visible forward-post post-81601 type-post status-publish format-standard has-post-thumbnail category-security-operation-center" data-name="What is SOC Security Operations Center" data-date="2024-03-06T16:26:00+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/security-operation-center/what-is-soc-security-operations-center/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-is-Security-Operations-Center-SOC-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-is-Security-Operations-Center-SOC-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-is-Security-Operations-Center-SOC-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-is-Security-Operations-Center-SOC-thumb-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/security-operation-center/what-is-soc-security-operations-center/" rel="bookmark" title="What is SOC Security Operations Center">What is SOC Security Operations Center</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/security-operation-center/" rel="tag">Security Operation Center</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/03/06/" title="4:26 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-03-06T16:26:00+00:00">March 6, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/security-operation-center/what-is-soc-security-operations-center/" target="" aria-label="Read more about What is SOC Security Operations Center" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-12225" data-post-id="81250" data-date="2023-12-15T13:21:18+00:00" data-name="What Is SOC Reporting, and Why Does Every Organization Need It?"><article class="post visible forward-post post-81250 type-post status-publish format-standard has-post-thumbnail category-security-operation-center" data-name="What Is SOC Reporting, and Why Does Every Organization Need It?" data-date="2023-12-15T13:21:18+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/security-operation-center/what-is-soc-reporting/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="what-is-soc-reporting-thumb" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/what-is-soc-reporting-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/what-is-soc-reporting-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/what-is-soc-reporting-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/what-is-soc-reporting-thumb-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/security-operation-center/what-is-soc-reporting/" rel="bookmark" title="What Is SOC Reporting, and Why Does Every Organization Need It?">What Is SOC Reporting, and Why Does Every Organization Need It?</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/security-operation-center/" rel="tag">Security Operation Center</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2023/12/15/" title="1:21 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2023-12-15T13:21:18+00:00">December 15, 2023</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/security-operation-center/what-is-soc-reporting/" target="" aria-label="Read more about What Is SOC Reporting, and Why Does Every Organization Need It?" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-12225" data-post-id="80403" data-date="2023-10-26T14:19:54+00:00" data-name="SOC Analyst: A Career Worth Considering (C|SA)聽"><article class="post visible forward-post post-80403 type-post status-publish format-standard has-post-thumbnail category-security-operation-center" data-name="SOC Analyst: A Career Worth Considering (C|SA)聽" data-date="2023-10-26T14:19:54+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/security-operation-center/soc-analyst-careers/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="What Is The Career Path For A SOC Analyst?" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/10/soc-analyst-careers-thumbnail.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/10/soc-analyst-careers-thumbnail.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/10/soc-analyst-careers-thumbnail-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/10/soc-analyst-careers-thumbnail-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/security-operation-center/soc-analyst-careers/" rel="bookmark" title="SOC Analyst: A Career Worth Considering (C|SA)聽">SOC Analyst: A Career Worth Considering (C|SA)聽</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/security-operation-center/" rel="tag">Security Operation Center</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2023/10/26/" title="2:19 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2023-10-26T14:19:54+00:00">October 26, 2023</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/security-operation-center/soc-analyst-careers/" target="" aria-label="Read more about SOC Analyst: A Career Worth Considering (C|SA)聽" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div></div><!-- iso-container|iso-grid --><div class="paginator filter-decorations paginator-more-button filter-pointer-background"> <a class="button-load-more highlighted filter-item" href="javascript:void(0);" data-dt-page="1" ><span class="button-caption">Load more</span></a> </div></div> </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-528fdcc elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="528fdcc" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-870fc03 page-section elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="870fc03" data-element_type="section" id="threat-intelligence"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-c81fa4f" data-id="c81fa4f" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-2f63c6c elementor-widget elementor-widget-text-editor" data-id="2f63c6c" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>Threat Intelligence</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/threat-intelligence/" target="_blank" rel="noopener">View All </a></div> </div> </div> </div> <div class="elementor-element elementor-element-7d8adf3 preserve-img-ratio-cover elementor-widget elementor-widget-the7_elements" data-id="7d8adf3" data-element_type="widget" data-widget_type="the7_elements.default"> <div class="elementor-widget-container"> <div class="portfolio-shortcode the7-elementor-widget the7_elements-7d8adf3 mode-grid dt-css-grid-wrap content-rollover-layout-list description-on-hover quick-scale-img content-bg-on enable-bg-rollover resize-by-browser-width widget-with-filter loading-effect-none jquery-filter" data-padding="10px" data-mobile-columns-num="1" data-tablet-columns-num="2" data-desktop-columns-num="3" data-wide-desktop-columns-num="3" data-post-limit="3" data-pagination-mode="load-more" data-scroll-offset="" aria-live="assertive"><div class="dt-css-grid custom-pagination-handler"><div class="visible wf-cell category-12226" data-post-id="82149" data-date="2024-06-29T10:36:00+00:00" data-name="Importance of Active Defense to Mitigate Security Threats and Intrusions"><article class="post visible forward-post post-82149 type-post status-publish format-standard has-post-thumbnail category-threat-intelligence tag-active-defense tag-cybersecurity tag-ec-council tag-honey-token tag-honeypot tag-incident-response tag-soc tag-threat-intelligence" data-name="Importance of Active Defense to Mitigate Security Threats and Intrusions" data-date="2024-06-29T10:36:00+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/active-defense-for-mitigating-security-threats-and-intrusions/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Thumbnail2.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Thumbnail2.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Thumbnail2-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Thumbnail2-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Thumbnail2-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Thumbnail2-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/active-defense-for-mitigating-security-threats-and-intrusions/" rel="bookmark" title="Importance of Active Defense to Mitigate Security Threats and Intrusions">Importance of Active Defense to Mitigate Security Threats and Intrusions</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/threat-intelligence/" rel="tag">Threat Intelligence</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/06/29/" title="10:36 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-06-29T10:36:00+00:00">June 29, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/active-defense-for-mitigating-security-threats-and-intrusions/" target="" aria-label="Read more about Importance of Active Defense to Mitigate Security Threats and Intrusions" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-12226" data-post-id="81993" data-date="2024-05-30T05:39:08+00:00" data-name="Security Automation for Risk-Based Decisions"><article class="post visible forward-post post-81993 type-post status-publish format-standard has-post-thumbnail category-threat-intelligence tag-ec-council tag-information-security tag-risk-based-decision tag-security-automation tag-soar tag-soc tag-xdr" data-name="Security Automation for Risk-Based Decisions" data-date="2024-05-30T05:39:08+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/security-automation-for-risk-based-decisions/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/security-automation-1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/security-automation-1.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/security-automation-1-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/security-automation-1-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/security-automation-1-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/security-automation-1-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/security-automation-for-risk-based-decisions/" rel="bookmark" title="Security Automation for Risk-Based Decisions">Security Automation for Risk-Based Decisions</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/threat-intelligence/" rel="tag">Threat Intelligence</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/05/30/" title="5:39 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-05-30T05:39:08+00:00">May 30, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/security-automation-for-risk-based-decisions/" target="" aria-label="Read more about Security Automation for Risk-Based Decisions" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-12226" data-post-id="81645" data-date="2024-03-07T04:39:04+00:00" data-name="What is Threat Intelligence in Cybersecurity?"><article class="post visible forward-post post-81645 type-post status-publish format-standard has-post-thumbnail category-threat-intelligence" data-name="What is Threat Intelligence in Cybersecurity?" data-date="2024-03-07T04:39:04+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/what-is-cyber-threat-intelligence/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-is-cyber-threat-intelligence-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-is-cyber-threat-intelligence-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-is-cyber-threat-intelligence-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/what-is-cyber-threat-intelligence-thumb-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/what-is-cyber-threat-intelligence/" rel="bookmark" title="What is Threat Intelligence in Cybersecurity?">What is Threat Intelligence in Cybersecurity?</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/threat-intelligence/" rel="tag">Threat Intelligence</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/03/07/" title="4:39 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-03-07T04:39:04+00:00">March 7, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/what-is-cyber-threat-intelligence/" target="" aria-label="Read more about What is Threat Intelligence in Cybersecurity?" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div></div><!-- iso-container|iso-grid --><div class="paginator filter-decorations paginator-more-button filter-pointer-background"> <a class="button-load-more highlighted filter-item" href="javascript:void(0);" data-dt-page="1" ><span class="button-caption">Load more</span></a> </div></div> </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-3fad416 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="3fad416" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-51616d07 page-section elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="51616d07" data-element_type="section" id="application-security"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-66d7463c" data-id="66d7463c" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-c7dd5d7 elementor-widget elementor-widget-text-editor" data-id="c7dd5d7" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>Application Security</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/application-security/"target="_blank">View All </a></div> </div> </div> </div> <div class="elementor-element elementor-element-8475463 preserve-img-ratio-cover elementor-widget elementor-widget-the7_elements" data-id="8475463" data-element_type="widget" data-widget_type="the7_elements.default"> <div class="elementor-widget-container"> <div class="portfolio-shortcode the7-elementor-widget the7_elements-8475463 mode-grid dt-css-grid-wrap content-rollover-layout-list description-on-hover quick-scale-img content-bg-on enable-bg-rollover resize-by-browser-width widget-with-filter loading-effect-none jquery-filter" data-padding="10px" data-mobile-columns-num="1" data-tablet-columns-num="2" data-desktop-columns-num="3" data-wide-desktop-columns-num="3" data-post-limit="3" data-pagination-mode="load-more" data-scroll-offset="" aria-live="assertive"><div class="dt-css-grid custom-pagination-handler"><div class="visible wf-cell category-22" data-post-id="79999" data-date="2023-08-16T06:51:23+00:00" data-name="Threat Mitigation Strategies and Best Practices for Securing Web Applications"><article class="post visible forward-post post-79999 type-post status-publish format-standard has-post-thumbnail category-application-security tag-cyber-security tag-ec-council-blog tag-threat-mitigation tag-vulnerabilities tag-web-application-security tag-web-apps" data-name="Threat Mitigation Strategies and Best Practices for Securing Web Applications" data-date="2023-08-16T06:51:23+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/application-security/threat-mitigation-strategies-for-securing-web-applications/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Threat-Mitigation-banner'" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/06/IoT-Penetration-Testing-How-to-Perform-Pentesting-on-a-Connected-Device-Featured.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/06/IoT-Penetration-Testing-How-to-Perform-Pentesting-on-a-Connected-Device-Featured.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/06/IoT-Penetration-Testing-How-to-Perform-Pentesting-on-a-Connected-Device-Featured-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/06/IoT-Penetration-Testing-How-to-Perform-Pentesting-on-a-Connected-Device-Featured-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/application-security/threat-mitigation-strategies-for-securing-web-applications/" rel="bookmark" title="Threat Mitigation Strategies and Best Practices for Securing Web Applications">Threat Mitigation Strategies and Best Practices for Securing Web Applications</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/application-security/" rel="tag">Application Security</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2023/08/16/" title="6:51 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2023-08-16T06:51:23+00:00">August 16, 2023</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/application-security/threat-mitigation-strategies-for-securing-web-applications/" target="" aria-label="Read more about Threat Mitigation Strategies and Best Practices for Securing Web Applications" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-22" data-post-id="77015" data-date="2022-03-22T09:14:17+00:00" data-name="How to Defend Against Common Web Application Attacks"><article class="post visible forward-post post-77015 type-post status-publish format-standard has-post-thumbnail category-application-security" data-name="How to Defend Against Common Web Application Attacks" data-date="2022-03-22T09:14:17+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/application-security/defend-against-web-application-attacks/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Web Application Attacks" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/defend-against-web-application-attacks-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/defend-against-web-application-attacks-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/defend-against-web-application-attacks-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/03/defend-against-web-application-attacks-thumb-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/application-security/defend-against-web-application-attacks/" rel="bookmark" title="How to Defend Against Common Web Application Attacks">How to Defend Against Common Web Application Attacks</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/application-security/" rel="tag">Application Security</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2022/03/22/" title="9:14 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2022-03-22T09:14:17+00:00">March 22, 2022</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/application-security/defend-against-web-application-attacks/" target="" aria-label="Read more about How to Defend Against Common Web Application Attacks" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-22" data-post-id="880" data-date="2020-10-20T23:58:02+00:00" data-name="What Are the Five Phases of the Secure Software Development Life Cycle?"><article class="post visible forward-post post-880 type-post status-publish format-standard has-post-thumbnail category-application-security tag-application-security" data-name="What Are the Five Phases of the Secure Software Development Life Cycle?" data-date="2020-10-20T23:58:02+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/application-security/what-are-the-five-phases-of-the-secure-software-development-life-cycle/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2020/10/what-are-the-five-phases-of-the-secure-software-development-life-cycle-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2020/10/what-are-the-five-phases-of-the-secure-software-development-life-cycle-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2020/10/what-are-the-five-phases-of-the-secure-software-development-life-cycle-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2020/10/what-are-the-five-phases-of-the-secure-software-development-life-cycle-thumb-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/application-security/what-are-the-five-phases-of-the-secure-software-development-life-cycle/" rel="bookmark" title="What Are the Five Phases of the Secure Software Development Life Cycle?">What Are the Five Phases of the Secure Software Development Life Cycle?</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/application-security/" rel="tag">Application Security</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2020/10/20/" title="11:58 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2020-10-20T23:58:02+00:00">October 20, 2020</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/application-security/what-are-the-five-phases-of-the-secure-software-development-life-cycle/" target="" aria-label="Read more about What Are the Five Phases of the Secure Software Development Life Cycle?" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div></div><!-- iso-container|iso-grid --><div class="paginator filter-decorations paginator-more-button filter-pointer-background"> <a class="button-load-more highlighted filter-item" href="javascript:void(0);" data-dt-page="1" ><span class="button-caption">Load more</span></a> </div></div> </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-fab0053 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="fab0053" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-2f2d2529 page-section elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="2f2d2529" data-element_type="section" id="cloud-security"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-344c1fe9" data-id="344c1fe9" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-0e74ecf elementor-widget elementor-widget-text-editor" data-id="0e74ecf" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>Cloud Security</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/cloud-security/"target="_blank">View All </a></div> </div> </div> </div> <div class="elementor-element elementor-element-b42dc2f preserve-img-ratio-cover elementor-widget elementor-widget-the7_elements" data-id="b42dc2f" data-element_type="widget" data-widget_type="the7_elements.default"> <div class="elementor-widget-container"> <div class="portfolio-shortcode the7-elementor-widget the7_elements-b42dc2f mode-grid dt-css-grid-wrap content-rollover-layout-list description-on-hover quick-scale-img content-bg-on enable-bg-rollover resize-by-browser-width widget-with-filter loading-effect-none jquery-filter" data-padding="10px" data-mobile-columns-num="1" data-tablet-columns-num="2" data-desktop-columns-num="3" data-wide-desktop-columns-num="3" data-post-limit="3" data-pagination-mode="load-more" data-scroll-offset="" aria-live="assertive"><div class="dt-css-grid custom-pagination-handler"><div class="visible wf-cell category-11722" data-post-id="82403" data-date="2024-09-27T09:25:33+00:00" data-name="Multi Cloud Security: Proactive Hunting and Choosing the Right CNAPP"><article class="post visible forward-post post-82403 type-post status-publish format-standard has-post-thumbnail category-cloud-security" data-name="Multi Cloud Security: Proactive Hunting and Choosing the Right CNAPP" data-date="2024-09-27T09:25:33+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cloud-security/multi-cloud-security-proactive-hunting-cnapp/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Multi Cloud Security" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/Multi-Cloud-Security_A-Pix.png" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/Multi-Cloud-Security_A-Pix.png 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/Multi-Cloud-Security_A-Pix-300x300.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/Multi-Cloud-Security_A-Pix-1024x1024.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/Multi-Cloud-Security_A-Pix-150x150.png 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/Multi-Cloud-Security_A-Pix-768x768.png 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/cloud-security/multi-cloud-security-proactive-hunting-cnapp/" rel="bookmark" title="Multi Cloud Security: Proactive Hunting and Choosing the Right CNAPP">Multi Cloud Security: Proactive Hunting and Choosing the Right CNAPP</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/cloud-security/" rel="tag">Cloud Security</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/09/27/" title="9:25 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-09-27T09:25:33+00:00">September 27, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/cloud-security/multi-cloud-security-proactive-hunting-cnapp/" target="" aria-label="Read more about Multi Cloud Security: Proactive Hunting and Choosing the Right CNAPP" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-11722" data-post-id="82401" data-date="2024-09-27T09:14:38+00:00" data-name="Cloud Security - Debunking Myths and Building a Secure Environment聽"><article class="post visible forward-post post-82401 type-post status-publish format-standard has-post-thumbnail category-cloud-security" data-name="Cloud Security – Debunking Myths and Building a Secure Environment聽" data-date="2024-09-27T09:14:38+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cloud-security/cloud-security-myths/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Debunking Myths and Building a Secure Environment" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/cccse-blog-post-square-BG-1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/cccse-blog-post-square-BG-1.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/cccse-blog-post-square-BG-1-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/cccse-blog-post-square-BG-1-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/cccse-blog-post-square-BG-1-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/09/cccse-blog-post-square-BG-1-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/cloud-security/cloud-security-myths/" rel="bookmark" title="Cloud Security – Debunking Myths and Building a Secure Environment聽">Cloud Security – Debunking Myths and Building a Secure Environment聽</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/cloud-security/" rel="tag">Cloud Security</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/09/27/" title="9:14 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-09-27T09:14:38+00:00">September 27, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/cloud-security/cloud-security-myths/" target="" aria-label="Read more about Cloud Security – Debunking Myths and Building a Secure Environment聽" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-11722" data-post-id="82141" data-date="2024-06-28T12:00:00+00:00" data-name="An Identity-Based Security Infrastructure for Cloud Environments"><article class="post visible forward-post post-82141 type-post status-publish format-standard has-post-thumbnail category-cloud-security tag-access-managment tag-cloud tag-cloud-security tag-cybersecurity tag-ec-council tag-iam tag-identity-based-security" data-name="An Identity-Based Security Infrastructure for Cloud Environments" data-date="2024-06-28T12:00:00+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cloud-security/cloud-security-identity-based-security/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/An-Identity-Based-Security-Infrastructure-for-Cloud-Environments-Thumbnail-2.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/An-Identity-Based-Security-Infrastructure-for-Cloud-Environments-Thumbnail-2.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/An-Identity-Based-Security-Infrastructure-for-Cloud-Environments-Thumbnail-2-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/An-Identity-Based-Security-Infrastructure-for-Cloud-Environments-Thumbnail-2-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/An-Identity-Based-Security-Infrastructure-for-Cloud-Environments-Thumbnail-2-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/An-Identity-Based-Security-Infrastructure-for-Cloud-Environments-Thumbnail-2-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/cloud-security/cloud-security-identity-based-security/" rel="bookmark" title="An Identity-Based Security Infrastructure for Cloud Environments">An Identity-Based Security Infrastructure for Cloud Environments</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/cloud-security/" rel="tag">Cloud Security</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/06/28/" title="12:00 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-06-28T12:00:00+00:00">June 28, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/cloud-security/cloud-security-identity-based-security/" target="" aria-label="Read more about An Identity-Based Security Infrastructure for Cloud Environments" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div></div><!-- iso-container|iso-grid --><div class="paginator filter-decorations paginator-more-button filter-pointer-background"> <a class="button-load-more highlighted filter-item" href="javascript:void(0);" data-dt-page="1" ><span class="button-caption">Load more</span></a> </div></div> </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-bda58cb elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="bda58cb" data-element_type="widget" id="devsecops" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-d71946f page-section elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="d71946f" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0441c7e" data-id="0441c7e" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-3b82fdd elementor-widget elementor-widget-text-editor" data-id="3b82fdd" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>DevSecOps</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/devsecops/" target="_blank" rel="noopener">View All </a></div> </div> </div> </div> <div class="elementor-element elementor-element-6e6726a preserve-img-ratio-cover elementor-widget elementor-widget-the7_elements" data-id="6e6726a" data-element_type="widget" data-widget_type="the7_elements.default"> <div class="elementor-widget-container"> <div class="portfolio-shortcode the7-elementor-widget the7_elements-6e6726a mode-grid dt-css-grid-wrap content-rollover-layout-list description-on-hover quick-scale-img content-bg-on enable-bg-rollover resize-by-browser-width widget-with-filter loading-effect-none jquery-filter" data-padding="10px" data-mobile-columns-num="1" data-tablet-columns-num="2" data-desktop-columns-num="3" data-wide-desktop-columns-num="3" data-post-limit="3" data-pagination-mode="load-more" data-scroll-offset="" aria-live="assertive"><div class="dt-css-grid custom-pagination-handler"><div class="visible wf-cell category-12459" data-post-id="82042" data-date="2024-06-10T13:22:22+00:00" data-name="Tips to Choose the Right DevSecOps Certification Course"><article class="post visible forward-post post-82042 type-post status-publish format-standard has-post-thumbnail category-devsecops" data-name="Tips to Choose the Right DevSecOps Certification Course" data-date="2024-06-10T13:22:22+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/devsecops/tips-to-choose-best-devsecops-certification/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Tips-to-Choose-the-Right-DevSecOps-Certification-Course-1080-x-1080.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Tips-to-Choose-the-Right-DevSecOps-Certification-Course-1080-x-1080.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Tips-to-Choose-the-Right-DevSecOps-Certification-Course-1080-x-1080-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Tips-to-Choose-the-Right-DevSecOps-Certification-Course-1080-x-1080-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Tips-to-Choose-the-Right-DevSecOps-Certification-Course-1080-x-1080-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Tips-to-Choose-the-Right-DevSecOps-Certification-Course-1080-x-1080-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/devsecops/tips-to-choose-best-devsecops-certification/" rel="bookmark" title="Tips to Choose the Right DevSecOps Certification Course">Tips to Choose the Right DevSecOps Certification Course</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/devsecops/" rel="tag">DevSecOps</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/06/10/" title="1:22 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-06-10T13:22:22+00:00">June 10, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/devsecops/tips-to-choose-best-devsecops-certification/" target="" aria-label="Read more about Tips to Choose the Right DevSecOps Certification Course" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-12459" data-post-id="81979" data-date="2024-05-21T05:00:47+00:00" data-name="Why You Should Join EC-Council's Certified DevSecOps Engineer (E|CDE) Course聽"><article class="post visible forward-post post-81979 type-post status-publish format-standard has-post-thumbnail category-devsecops" data-name="Why You Should Join EC-Council’s Certified DevSecOps Engineer (E|CDE) Course聽" data-date="2024-05-21T05:00:47+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/devsecops/ec-council-devsecops-what-you-need-to-know/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Why-You-Should-Join-EC-Councils-Certified-DevSecOps-Engineer-Course-1080-x-1080_A.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Why-You-Should-Join-EC-Councils-Certified-DevSecOps-Engineer-Course-1080-x-1080_A.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Why-You-Should-Join-EC-Councils-Certified-DevSecOps-Engineer-Course-1080-x-1080_A-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Why-You-Should-Join-EC-Councils-Certified-DevSecOps-Engineer-Course-1080-x-1080_A-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Why-You-Should-Join-EC-Councils-Certified-DevSecOps-Engineer-Course-1080-x-1080_A-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Why-You-Should-Join-EC-Councils-Certified-DevSecOps-Engineer-Course-1080-x-1080_A-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/devsecops/ec-council-devsecops-what-you-need-to-know/" rel="bookmark" title="Why You Should Join EC-Council’s Certified DevSecOps Engineer (E|CDE) Course聽">Why You Should Join EC-Council’s Certified DevSecOps Engineer (E|CDE) Course聽</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/devsecops/" rel="tag">DevSecOps</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/05/21/" title="5:00 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-05-21T05:00:47+00:00">May 21, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/devsecops/ec-council-devsecops-what-you-need-to-know/" target="" aria-label="Read more about Why You Should Join EC-Council’s Certified DevSecOps Engineer (E|CDE) Course聽" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-12459" data-post-id="81972" data-date="2024-05-16T05:30:16+00:00" data-name="Decoding DevSecOps and DevOps Course"><article class="post visible forward-post post-81972 type-post status-publish format-standard has-post-thumbnail category-devsecops" data-name="Decoding DevSecOps and DevOps Course" data-date="2024-05-16T05:30:16+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/devsecops/devsecops-devops-course/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/security-skills-thumbimage.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/security-skills-thumbimage.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/security-skills-thumbimage-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/security-skills-thumbimage-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/security-skills-thumbimage-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/security-skills-thumbimage-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/devsecops/devsecops-devops-course/" rel="bookmark" title="Decoding DevSecOps and DevOps Course">Decoding DevSecOps and DevOps Course</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/devsecops/" rel="tag">DevSecOps</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/05/16/" title="5:30 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-05-16T05:30:16+00:00">May 16, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/devsecops/devsecops-devops-course/" target="" aria-label="Read more about Decoding DevSecOps and DevOps Course" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div></div><!-- iso-container|iso-grid --><div class="paginator filter-decorations paginator-more-button filter-pointer-background"> <a class="button-load-more highlighted filter-item" href="javascript:void(0);" data-dt-page="1" ><span class="button-caption">Load more</span></a> </div></div> </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-85eb106 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="85eb106" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-3c71793 page-section elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="3c71793" data-element_type="section" id="cyber-novice"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-01d699d" data-id="01d699d" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-eb967c4 elementor-widget elementor-widget-text-editor" data-id="eb967c4" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>Cyber Novice</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/cyber-novice/"target="_blank">View All </a></div> </div> </div> </div> <div class="elementor-element elementor-element-ab3296d preserve-img-ratio-cover elementor-widget elementor-widget-the7_elements" data-id="ab3296d" data-element_type="widget" data-widget_type="the7_elements.default"> <div class="elementor-widget-container"> <div class="portfolio-shortcode the7-elementor-widget the7_elements-ab3296d mode-grid dt-css-grid-wrap content-rollover-layout-list description-on-hover quick-scale-img content-bg-on enable-bg-rollover resize-by-browser-width widget-with-filter loading-effect-none jquery-filter" data-padding="10px" data-mobile-columns-num="1" data-tablet-columns-num="2" data-desktop-columns-num="3" data-wide-desktop-columns-num="3" data-post-limit="3" data-pagination-mode="load-more" data-scroll-offset="" aria-live="assertive"><div class="dt-css-grid custom-pagination-handler"><div class="visible wf-cell category-11219" data-post-id="77795" data-date="2023-01-04T06:24:53+00:00" data-name="How to Prevent the Top 10 Most Common Cyberattacks"><article class="post visible forward-post post-77795 type-post status-publish format-standard has-post-thumbnail category-cyber-novice" data-name="How to Prevent the Top 10 Most Common Cyberattacks" data-date="2023-01-04T06:24:53+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cyber-novice/common-cyber-attacks/"><img width="1500" height="750" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201500%20750'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="A featured image showing shattering glass illustrates how most common cyberattacks happen and their impact on business" decoding="async" sizes="(max-width: 1500px) 100vw, 1500px" style="--ratio: 1500 / 750;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/01/How-to-Prevent-the-Top-10-Most-Common-Cyberattacks.png" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/01/How-to-Prevent-the-Top-10-Most-Common-Cyberattacks.png 1500w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/01/How-to-Prevent-the-Top-10-Most-Common-Cyberattacks-300x150.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/01/How-to-Prevent-the-Top-10-Most-Common-Cyberattacks-1024x512.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/01/How-to-Prevent-the-Top-10-Most-Common-Cyberattacks-768x384.png 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/cyber-novice/common-cyber-attacks/" rel="bookmark" title="How to Prevent the Top 10 Most Common Cyberattacks">How to Prevent the Top 10 Most Common Cyberattacks</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/cyber-novice/" rel="tag">Cyber Novice</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2023/01/04/" title="6:24 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2023-01-04T06:24:53+00:00">January 4, 2023</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/cyber-novice/common-cyber-attacks/" target="" aria-label="Read more about How to Prevent the Top 10 Most Common Cyberattacks" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-11219" data-post-id="77609" data-date="2022-09-15T07:54:44+00:00" data-name="Cyber Security Courses & Cyber Security training for Beginners and Educators"><article class="post visible forward-post post-77609 type-post status-publish format-standard has-post-thumbnail category-cyber-novice" data-name="Cyber Security Courses & Cyber Security training for Beginners and Educators" data-date="2022-09-15T07:54:44+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cyber-novice/free-cybersecurity-courses-beginners/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Free Cybersecurity Courses for Beginners" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/09/Free-Cybersecurity-Courses-for-Beginners.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/09/Free-Cybersecurity-Courses-for-Beginners.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/09/Free-Cybersecurity-Courses-for-Beginners-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/09/Free-Cybersecurity-Courses-for-Beginners-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/09/Free-Cybersecurity-Courses-for-Beginners-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/09/Free-Cybersecurity-Courses-for-Beginners-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/cyber-novice/free-cybersecurity-courses-beginners/" rel="bookmark" title="Cyber Security Courses & Cyber Security training for Beginners and Educators">Cyber Security Courses & Cyber Security training for Beginners and Educators</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/cyber-novice/" rel="tag">Cyber Novice</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2022/09/15/" title="7:54 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2022-09-15T07:54:44+00:00">September 15, 2022</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/cyber-novice/free-cybersecurity-courses-beginners/" target="" aria-label="Read more about Cyber Security Courses & Cyber Security training for Beginners and Educators" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-11219" data-post-id="5937" data-date="2022-02-02T16:53:34+00:00" data-name="The Six Types of Cyberattacks You鈥檙e Most Likely to Face"><article class="post visible forward-post post-5937 type-post status-publish format-standard has-post-thumbnail category-cyber-novice" data-name="The Six Types of Cyberattacks You鈥檙e Most Likely to Face" data-date="2022-02-02T16:53:34+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cyber-novice/six-most-common-types-cyberattacks/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/02/six-most-common-types-cyberattacks-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/02/six-most-common-types-cyberattacks-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/02/six-most-common-types-cyberattacks-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/02/six-most-common-types-cyberattacks-thumb-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/cyber-novice/six-most-common-types-cyberattacks/" rel="bookmark" title="The Six Types of Cyberattacks You鈥檙e Most Likely to Face">The Six Types of Cyberattacks You鈥檙e Most Likely to Face</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/cyber-novice/" rel="tag">Cyber Novice</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2022/02/02/" title="4:53 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2022-02-02T16:53:34+00:00">February 2, 2022</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/cyber-novice/six-most-common-types-cyberattacks/" target="" aria-label="Read more about The Six Types of Cyberattacks You鈥檙e Most Likely to Face" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div></div><!-- iso-container|iso-grid --><div class="paginator filter-decorations paginator-more-button filter-pointer-background"> <a class="button-load-more highlighted filter-item" href="javascript:void(0);" data-dt-page="1" ><span class="button-caption">Load more</span></a> </div></div> </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-dc031f4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="dc031f4" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-c9449ad page-section elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="c9449ad" data-element_type="section" id="incident-handling"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-55cab21" data-id="55cab21" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-59ec420 elementor-widget elementor-widget-text-editor" data-id="59ec420" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>Incident Handling</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/incident-handling/"target="_blank">View All </a></div> </div> </div> </div> <div class="elementor-element elementor-element-5525c21 preserve-img-ratio-cover elementor-widget elementor-widget-the7_elements" data-id="5525c21" data-element_type="widget" data-widget_type="the7_elements.default"> <div class="elementor-widget-container"> <div class="portfolio-shortcode the7-elementor-widget the7_elements-5525c21 mode-grid dt-css-grid-wrap content-rollover-layout-list description-on-hover quick-scale-img content-bg-on enable-bg-rollover resize-by-browser-width widget-with-filter loading-effect-none jquery-filter" data-padding="10px" data-mobile-columns-num="1" data-tablet-columns-num="2" data-desktop-columns-num="3" data-wide-desktop-columns-num="3" data-post-limit="3" data-pagination-mode="load-more" data-scroll-offset="" aria-live="assertive"><div class="dt-css-grid custom-pagination-handler"><div class="visible wf-cell category-12082" data-post-id="82220" data-date="2024-07-30T15:18:40+00:00" data-name="CrowdStrike Incident聽"><article class="post visible forward-post post-82220 type-post status-publish format-standard has-post-thumbnail category-incident-handling" data-name="CrowdStrike Incident聽" data-date="2024-07-30T15:18:40+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/incident-handling/crowdstrike-incident/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/CrowdStrike-Incident_A-pix.png" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/CrowdStrike-Incident_A-pix.png 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/CrowdStrike-Incident_A-pix-300x300.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/CrowdStrike-Incident_A-pix-1024x1024.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/CrowdStrike-Incident_A-pix-150x150.png 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/CrowdStrike-Incident_A-pix-768x768.png 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/incident-handling/crowdstrike-incident/" rel="bookmark" title="CrowdStrike Incident聽">CrowdStrike Incident聽</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/incident-handling/" rel="tag">Incident Handling</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/07/30/" title="3:18 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-07-30T15:18:40+00:00">July 30, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/incident-handling/crowdstrike-incident/" target="" aria-label="Read more about CrowdStrike Incident聽" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-12082" data-post-id="82029" data-date="2024-06-04T13:12:33+00:00" data-name="Become Elite Cyber Defense Responders with EC-Council's E|CIH Certification, now Validated by the US Department of Defense (DoD) for 8140 Job Roles聽"><article class="post visible forward-post post-82029 type-post status-publish format-standard has-post-thumbnail category-incident-handling" data-name="Become Elite Cyber Defense Responders with EC-Council’s E|CIH Certification, now Validated by the US Department of Defense (DoD) for 8140 Job Roles聽" data-date="2024-06-04T13:12:33+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/incident-handling/eccouncil-ecih-validated-by-us-dod-8140/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Become Elite Cyber Defense Responders with EC-Council's E|CIH Certification" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Become-Elite-Cyber-Defense-Responders-1080-x-1080-1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Become-Elite-Cyber-Defense-Responders-1080-x-1080-1.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Become-Elite-Cyber-Defense-Responders-1080-x-1080-1-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Become-Elite-Cyber-Defense-Responders-1080-x-1080-1-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Become-Elite-Cyber-Defense-Responders-1080-x-1080-1-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Become-Elite-Cyber-Defense-Responders-1080-x-1080-1-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/incident-handling/eccouncil-ecih-validated-by-us-dod-8140/" rel="bookmark" title="Become Elite Cyber Defense Responders with EC-Council’s E|CIH Certification, now Validated by the US Department of Defense (DoD) for 8140 Job Roles聽">Become Elite Cyber Defense Responders with EC-Council’s E|CIH Certification, now Validated by the US Department of Defense (DoD) for 8140 Job Roles聽</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/incident-handling/" rel="tag">Incident Handling</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/06/04/" title="1:12 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-06-04T13:12:33+00:00">June 4, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/incident-handling/eccouncil-ecih-validated-by-us-dod-8140/" target="" aria-label="Read more about Become Elite Cyber Defense Responders with EC-Council’s E|CIH Certification, now Validated by the US Department of Defense (DoD) for 8140 Job Roles聽" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-12082" data-post-id="82005" data-date="2024-05-31T07:26:54+00:00" data-name="EDR Best Practices: Maximizing Threat Detection and Incident Response"><article class="post visible forward-post post-82005 type-post status-publish format-standard has-post-thumbnail category-incident-handling tag-cybersecurity tag-ec-council tag-edr tag-endpoints tag-incident-response tag-threat-detection" data-name="EDR Best Practices: Maximizing Threat Detection and Incident Response" data-date="2024-05-31T07:26:54+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/incident-handling/edr-best-practices-maximizing-threat-detection-and-incident-response/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/EDR-T.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/EDR-T.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/EDR-T-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/EDR-T-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/EDR-T-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/EDR-T-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/incident-handling/edr-best-practices-maximizing-threat-detection-and-incident-response/" rel="bookmark" title="EDR Best Practices: Maximizing Threat Detection and Incident Response">EDR Best Practices: Maximizing Threat Detection and Incident Response</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/incident-handling/" rel="tag">Incident Handling</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/05/31/" title="7:26 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-05-31T07:26:54+00:00">May 31, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/incident-handling/edr-best-practices-maximizing-threat-detection-and-incident-response/" target="" aria-label="Read more about EDR Best Practices: Maximizing Threat Detection and Incident Response" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div></div><!-- iso-container|iso-grid --><div class="paginator filter-decorations paginator-more-button filter-pointer-background"> <a class="button-load-more highlighted filter-item" href="javascript:void(0);" data-dt-page="1" ><span class="button-caption">Load more</span></a> </div></div> </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-fb53e51 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="fb53e51" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-867c04d page-section elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="867c04d" data-element_type="section" id="cybersecurity-technician"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5e1d180" data-id="5e1d180" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-58c9010 elementor-widget elementor-widget-text-editor" data-id="58c9010" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>Cybersecurity Technician</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/cybersecurity-technician/"target="_blank">View All </a></div> </div> </div> </div> <div class="elementor-element elementor-element-459bfe8 preserve-img-ratio-cover elementor-widget elementor-widget-the7_elements" data-id="459bfe8" data-element_type="widget" data-widget_type="the7_elements.default"> <div class="elementor-widget-container"> <div class="portfolio-shortcode the7-elementor-widget the7_elements-459bfe8 mode-grid dt-css-grid-wrap content-rollover-layout-list description-on-hover quick-scale-img content-bg-on enable-bg-rollover resize-by-browser-width widget-with-filter loading-effect-none jquery-filter" data-padding="10px" data-mobile-columns-num="1" data-tablet-columns-num="2" data-desktop-columns-num="3" data-wide-desktop-columns-num="3" data-post-limit="3" data-pagination-mode="load-more" data-scroll-offset="" aria-live="assertive"><div class="dt-css-grid custom-pagination-handler"><div class="visible wf-cell category-12224" data-post-id="81866" data-date="2024-04-19T13:30:02+00:00" data-name="Can I Get an Entry-Level Cybersecurity Certification Without an IT Background?聽"><article class="post visible forward-post post-81866 type-post status-publish format-standard has-post-thumbnail category-cybersecurity-technician" data-name="Can I Get an Entry-Level Cybersecurity Certification Without an IT Background?聽" data-date="2024-04-19T13:30:02+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cybersecurity-technician/entry-level-cybersecurity-certification-without-an-it-background/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/entry-level-cybersecurity-certification-background-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/entry-level-cybersecurity-certification-background-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/entry-level-cybersecurity-certification-background-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/entry-level-cybersecurity-certification-background-thumb-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/cybersecurity-technician/entry-level-cybersecurity-certification-without-an-it-background/" rel="bookmark" title="Can I Get an Entry-Level Cybersecurity Certification Without an IT Background?聽">Can I Get an Entry-Level Cybersecurity Certification Without an IT Background?聽</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/cybersecurity-technician/" rel="tag">Cybersecurity Technician</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/04/19/" title="1:30 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-04-19T13:30:02+00:00">April 19, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/cybersecurity-technician/entry-level-cybersecurity-certification-without-an-it-background/" target="" aria-label="Read more about Can I Get an Entry-Level Cybersecurity Certification Without an IT Background?聽" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-12224" data-post-id="81776" data-date="2024-03-19T11:53:51+00:00" data-name="Top Skills Required to Start Your Career in Cybersecurity"><article class="post visible forward-post post-81776 type-post status-publish format-standard has-post-thumbnail category-cybersecurity-technician" data-name="Top Skills Required to Start Your Career in Cybersecurity" data-date="2024-03-19T11:53:51+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cybersecurity-technician/top-skills-required-start-your-career-cybersecurity/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Top Skills Required to Start Your Career in Cybersecurity" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/top-skills-required-start-your-career-cybersecurity-thumb-1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/top-skills-required-start-your-career-cybersecurity-thumb-1.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/top-skills-required-start-your-career-cybersecurity-thumb-1-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/top-skills-required-start-your-career-cybersecurity-thumb-1-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/cybersecurity-technician/top-skills-required-start-your-career-cybersecurity/" rel="bookmark" title="Top Skills Required to Start Your Career in Cybersecurity">Top Skills Required to Start Your Career in Cybersecurity</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/cybersecurity-technician/" rel="tag">Cybersecurity Technician</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/03/19/" title="11:53 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-03-19T11:53:51+00:00">March 19, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/cybersecurity-technician/top-skills-required-start-your-career-cybersecurity/" target="" aria-label="Read more about Top Skills Required to Start Your Career in Cybersecurity" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-12224" data-post-id="81273" data-date="2023-12-22T07:40:44+00:00" data-name="You Got Sec+ Certification, What's Next? Build Technical Skills With a C|CT"><article class="post visible forward-post post-81273 type-post status-publish format-standard has-post-thumbnail category-cybersecurity-technician" data-name="You Got Sec+ Certification, What’s Next? Build Technical Skills With a C|CT" data-date="2023-12-22T07:40:44+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cybersecurity-technician/build-technical-skills-with-cct/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Build-Technical-Skills-With-a-CCT-feature-1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Build-Technical-Skills-With-a-CCT-feature-1.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Build-Technical-Skills-With-a-CCT-feature-1-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Build-Technical-Skills-With-a-CCT-feature-1-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/cybersecurity-technician/build-technical-skills-with-cct/" rel="bookmark" title="You Got Sec+ Certification, What’s Next? Build Technical Skills With a C|CT">You Got Sec+ Certification, What’s Next? Build Technical Skills With a C|CT</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/cybersecurity-technician/" rel="tag">Cybersecurity Technician</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2023/12/22/" title="7:40 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2023-12-22T07:40:44+00:00">December 22, 2023</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/cybersecurity-technician/build-technical-skills-with-cct/" target="" aria-label="Read more about You Got Sec+ Certification, What’s Next? Build Technical Skills With a C|CT" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div></div><!-- iso-container|iso-grid --><div class="paginator filter-decorations paginator-more-button filter-pointer-background"> <a class="button-load-more highlighted filter-item" href="javascript:void(0);" data-dt-page="1" ><span class="button-caption">Load more</span></a> </div></div> </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-19a6a21 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="19a6a21" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-a8f0e96 page-section elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="a8f0e96" data-element_type="section" id="disaster-recovery"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-4798793" data-id="4798793" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-a5c5eb8 elementor-widget elementor-widget-text-editor" data-id="a5c5eb8" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>Disaster Recovery</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/disaster-recovery/"target="_blank">View All </a></div> </div> </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-0c94c1a elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="0c94c1a" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-c80ab7f page-section elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="c80ab7f" data-element_type="section" id="computer-forensics"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-25d45ae" data-id="25d45ae" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-8d239ac elementor-widget elementor-widget-text-editor" data-id="8d239ac" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>Computer Forensics</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/computer-forensics/" target="_blank" rel="noopener">View All </a></div> </div> </div> </div> <div class="elementor-element elementor-element-9057289 preserve-img-ratio-cover elementor-widget elementor-widget-the7_elements" data-id="9057289" data-element_type="widget" data-widget_type="the7_elements.default"> <div class="elementor-widget-container"> <div class="portfolio-shortcode the7-elementor-widget the7_elements-9057289 mode-grid dt-css-grid-wrap content-rollover-layout-list description-on-hover quick-scale-img content-bg-on enable-bg-rollover resize-by-browser-width widget-with-filter loading-effect-none jquery-filter" data-padding="10px" data-mobile-columns-num="1" data-tablet-columns-num="2" data-desktop-columns-num="3" data-wide-desktop-columns-num="3" data-post-limit="3" data-pagination-mode="load-more" data-scroll-offset="" aria-live="assertive"><div class="dt-css-grid custom-pagination-handler"><div class="visible wf-cell category-29" data-post-id="81786" data-date="2024-03-20T13:08:43+00:00" data-name="What Is Network Forensics? How to Successfully Examine the Network"><article class="post visible forward-post post-81786 type-post status-publish format-standard has-post-thumbnail category-computer-forensics" data-name="What Is Network Forensics? How to Successfully Examine the Network" data-date="2024-03-20T13:08:43+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-network-forensics/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="What is Network Forensics" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-is-Network-Forensics-social.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-is-Network-Forensics-social.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-is-Network-Forensics-social-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-is-Network-Forensics-social-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-network-forensics/" rel="bookmark" title="What Is Network Forensics? How to Successfully Examine the Network">What Is Network Forensics? How to Successfully Examine the Network</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/computer-forensics/" rel="tag">Computer Forensics</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/03/20/" title="1:08 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-03-20T13:08:43+00:00">March 20, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-network-forensics/" target="" aria-label="Read more about What Is Network Forensics? How to Successfully Examine the Network" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-29" data-post-id="81588" data-date="2024-03-06T16:14:20+00:00" data-name="What is Digital Forensics"><article class="post visible forward-post post-81588 type-post status-publish format-standard has-post-thumbnail category-computer-forensics" data-name="What is Digital Forensics" data-date="2024-03-06T16:14:20+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-Is-Digital-Forensics-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-Is-Digital-Forensics-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-Is-Digital-Forensics-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-Is-Digital-Forensics-thumb-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/" rel="bookmark" title="What is Digital Forensics">What is Digital Forensics</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/computer-forensics/" rel="tag">Computer Forensics</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/03/06/" title="4:14 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-03-06T16:14:20+00:00">March 6, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/" target="" aria-label="Read more about What is Digital Forensics" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-29" data-post-id="81246" data-date="2023-12-15T13:13:26+00:00" data-name="Mobile Device Forensics in the Evolving World of Electronics"><article class="post visible forward-post post-81246 type-post status-publish format-standard has-post-thumbnail category-computer-forensics" data-name="Mobile Device Forensics in the Evolving World of Electronics" data-date="2023-12-15T13:13:26+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/mobile-device-forensics/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Mobile-Device-Forensics-in-the-Evolving-World-of-Electronics-thumb" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Mobile-Device-Forensics-in-the-Evolving-World-of-Electronics-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Mobile-Device-Forensics-in-the-Evolving-World-of-Electronics-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Mobile-Device-Forensics-in-the-Evolving-World-of-Electronics-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Mobile-Device-Forensics-in-the-Evolving-World-of-Electronics-thumb-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/mobile-device-forensics/" rel="bookmark" title="Mobile Device Forensics in the Evolving World of Electronics">Mobile Device Forensics in the Evolving World of Electronics</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/computer-forensics/" rel="tag">Computer Forensics</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2023/12/15/" title="1:13 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2023-12-15T13:13:26+00:00">December 15, 2023</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/mobile-device-forensics/" target="" aria-label="Read more about Mobile Device Forensics in the Evolving World of Electronics" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div></div><!-- iso-container|iso-grid --><div class="paginator filter-decorations paginator-more-button filter-pointer-background"> <a class="button-load-more highlighted filter-item" href="javascript:void(0);" data-dt-page="1" ><span class="button-caption">Load more</span></a> </div></div> </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-146f74f elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="146f74f" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-a4cc54c page-section elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="a4cc54c" data-element_type="section" id="executive-management"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5230be8" data-id="5230be8" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-bec0af5 elementor-widget elementor-widget-text-editor" data-id="bec0af5" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="elementor-row space-between"> <div> <h2>Executive Management</h2> </div> <div class="btn-right-flex"><a href="https://eccouncil.org/cybersecurity-exchange/executive-management/" target="_blank" rel="noopener">View All </a></div> </div> </div> </div> <div class="elementor-element elementor-element-8352737 preserve-img-ratio-cover elementor-widget elementor-widget-the7_elements" data-id="8352737" data-element_type="widget" data-widget_type="the7_elements.default"> <div class="elementor-widget-container"> <div class="portfolio-shortcode the7-elementor-widget the7_elements-8352737 mode-grid dt-css-grid-wrap content-rollover-layout-list description-on-hover quick-scale-img content-bg-on enable-bg-rollover resize-by-browser-width widget-with-filter loading-effect-none jquery-filter" data-padding="10px" data-mobile-columns-num="1" data-tablet-columns-num="2" data-desktop-columns-num="3" data-wide-desktop-columns-num="3" data-post-limit="3" data-pagination-mode="load-more" data-scroll-offset="" aria-live="assertive"><div class="dt-css-grid custom-pagination-handler"><div class="visible wf-cell category-3444" data-post-id="82198" data-date="2024-07-23T08:24:20+00:00" data-name="Certified CISO: A Strategic Imperative for Chief Risk Officer in Modern Organizations"><article class="post visible forward-post post-82198 type-post status-publish format-standard has-post-thumbnail category-executive-management" data-name="Certified CISO: A Strategic Imperative for Chief Risk Officer in Modern Organizations" data-date="2024-07-23T08:24:20+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/role-of-cciso-for-chief-risk-officer/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="A Strategic Imperative for Chief Risk Officer in Modern Organizations" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/Certified-CISO-A-Strategic-Imperative-for-Chief-Risk-Officer-in-Modern-Organizations-1080-x-1080-pix_A.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/Certified-CISO-A-Strategic-Imperative-for-Chief-Risk-Officer-in-Modern-Organizations-1080-x-1080-pix_A.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/Certified-CISO-A-Strategic-Imperative-for-Chief-Risk-Officer-in-Modern-Organizations-1080-x-1080-pix_A-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/Certified-CISO-A-Strategic-Imperative-for-Chief-Risk-Officer-in-Modern-Organizations-1080-x-1080-pix_A-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/Certified-CISO-A-Strategic-Imperative-for-Chief-Risk-Officer-in-Modern-Organizations-1080-x-1080-pix_A-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/07/Certified-CISO-A-Strategic-Imperative-for-Chief-Risk-Officer-in-Modern-Organizations-1080-x-1080-pix_A-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/role-of-cciso-for-chief-risk-officer/" rel="bookmark" title="Certified CISO: A Strategic Imperative for Chief Risk Officer in Modern Organizations">Certified CISO: A Strategic Imperative for Chief Risk Officer in Modern Organizations</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/executive-management/" rel="tag">Executive Management</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/07/23/" title="8:24 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-07-23T08:24:20+00:00">July 23, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/role-of-cciso-for-chief-risk-officer/" target="" aria-label="Read more about Certified CISO: A Strategic Imperative for Chief Risk Officer in Modern Organizations" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-3444" data-post-id="82063" data-date="2024-06-19T09:49:55+00:00" data-name="Navigating Cybersecurity Risk Management, Governance, and Compliance as a CISO"><article class="post visible forward-post post-82063 type-post status-publish format-standard has-post-thumbnail category-executive-management" data-name="Navigating Cybersecurity Risk Management, Governance, and Compliance as a CISO" data-date="2024-06-19T09:49:55+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-cybersecurity-risk-management-governance-compliance/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Understanding Role of a CISO" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/CISO-Blog-banner-1080-x-1080.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/CISO-Blog-banner-1080-x-1080.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/CISO-Blog-banner-1080-x-1080-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/CISO-Blog-banner-1080-x-1080-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/CISO-Blog-banner-1080-x-1080-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/CISO-Blog-banner-1080-x-1080-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-cybersecurity-risk-management-governance-compliance/" rel="bookmark" title="Navigating Cybersecurity Risk Management, Governance, and Compliance as a CISO">Navigating Cybersecurity Risk Management, Governance, and Compliance as a CISO</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/executive-management/" rel="tag">Executive Management</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/06/19/" title="9:49 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-06-19T09:49:55+00:00">June 19, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/ciso-cybersecurity-risk-management-governance-compliance/" target="" aria-label="Read more about Navigating Cybersecurity Risk Management, Governance, and Compliance as a CISO" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div><div class="visible wf-cell category-3444" data-post-id="81936" data-date="2024-05-08T08:30:11+00:00" data-name="Associate C|CISO Grandfathering: A Strategic Move to Transition to the Office of a CISO"><article class="post visible forward-post post-81936 type-post status-publish format-standard has-post-thumbnail category-executive-management" data-name="Associate C|CISO Grandfathering: A Strategic Move to Transition to the Office of a CISO" data-date="2024-05-08T08:30:11+00:00"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/associate-cciso-grandfathering-program-paving-way-to-grow-into-a-ciso-role/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201080%201080'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Overview of the Associate CCISO Grandfathering" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Associate-CCISO-Grandfathering-1080-x-1080-1-1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Associate-CCISO-Grandfathering-1080-x-1080-1-1.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Associate-CCISO-Grandfathering-1080-x-1080-1-1-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Associate-CCISO-Grandfathering-1080-x-1080-1-1-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Associate-CCISO-Grandfathering-1080-x-1080-1-1-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/05/Associate-CCISO-Grandfathering-1080-x-1080-1-1-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/associate-cciso-grandfathering-program-paving-way-to-grow-into-a-ciso-role/" rel="bookmark" title="Associate C|CISO Grandfathering: A Strategic Move to Transition to the Office of a CISO">Associate C|CISO Grandfathering: A Strategic Move to Transition to the Office of a CISO</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/executive-management/" rel="tag">Executive Management</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/05/08/" title="8:30 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-05-08T08:30:11+00:00">May 8, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/executive-management/associate-cciso-grandfathering-program-paving-way-to-grow-into-a-ciso-role/" target="" aria-label="Read more about Associate C|CISO Grandfathering: A Strategic Move to Transition to the Office of a CISO" class="box-button elementor-button elementor-size-xs">Read article</a> </div> </div> </div></article></div></div><!-- iso-container|iso-grid --><div class="paginator filter-decorations paginator-more-button filter-pointer-background"> <a class="button-load-more highlighted filter-item" href="javascript:void(0);" data-dt-page="1" ><span class="button-caption">Load more</span></a> </div></div> </div> </div> <div class="elementor-element elementor-element-f4bdb57 elementor-widget elementor-widget-spacer" data-id="f4bdb57" data-element_type="widget" data-widget_type="spacer.default"> <div class="elementor-widget-container"> <div class="elementor-spacer"> <div class="elementor-spacer-inner"></div> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-3a829c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="3a829c8" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f7425b6" data-id="f7425b6" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-cbe4bc0 elementor-widget elementor-widget-heading" data-id="cbe4bc0" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Cyber Talks</h2> </div> </div> <div class="elementor-element elementor-element-237db45 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="237db45" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-538de7b2 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="538de7b2" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-50a6ae2f" data-id="50a6ae2f" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-698c9fc2 arrows-relative-to-box_area preserve-img-ratio-cover bullets-small-dot-stroke elementor-widget elementor-widget-the7_elements_carousel" data-id="698c9fc2" data-element_type="widget" data-settings="{"widget_columns":4,"gap_between_posts":{"unit":"px","size":20,"sizes":[]},"widget_columns_tablet":2,"widget_columns_mobile":1,"gap_between_posts_tablet":{"unit":"px","size":"","sizes":[]},"gap_between_posts_mobile":{"unit":"px","size":"","sizes":[]}}" data-widget_type="the7_elements_carousel.default"> <div class="elementor-widget-container"> <div class="disable-arrows-hover-bg the7_elements_carousel-698c9fc2 owl-carousel portfolio-carousel-shortcode elementor-owl-carousel-call portfolio-shortcode the7-elementor-widget content-bg-on content-rollover-layout-list disable-layout-hover description-on-hover meta-info-off" data-scroll-mode="1" data-auto-height="false" data-speed="600" data-autoplay="false" data-autoplay_speed=""><article class="post visible forward-post post-82447 type-post status-publish format-standard has-post-thumbnail category-cyber-talks category-upcoming-cybertalks"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cyber-talks/predicting-the-unpredictable-how-ai-is-shaping-ransomware-attacks/"><img width="1396" height="930" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201396%20930'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="AI and Ransomware" decoding="async" sizes="(max-width: 1396px) 100vw, 1396px" style="--ratio: 1396 / 930;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/465-310-1-33.png" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/465-310-1-33.png 1396w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/465-310-1-33-300x200.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/465-310-1-33-1024x682.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/465-310-1-33-768x512.png 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> </div> </div> </div></article><article class="post visible forward-post post-82505 type-post status-publish format-standard has-post-thumbnail category-cyber-talks category-upcoming-cybertalks"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cyber-talks/optimizing-devsecops-secure-solutions-for-fast-delivery/"><img width="1396" height="930" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201396%20930'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Secure Solutions for Fast Delivery" decoding="async" sizes="(max-width: 1396px) 100vw, 1396px" style="--ratio: 1396 / 930;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/465-310-1-1.png" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/465-310-1-1.png 1396w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/465-310-1-1-300x200.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/465-310-1-1-1024x682.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/465-310-1-1-768x512.png 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> </div> </div> </div></article><article class="post visible forward-post post-82539 type-post status-publish format-standard has-post-thumbnail category-cyber-talks category-upcoming-cybertalks"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cyber-talks/cybersecurity-in-healthcare-protecting-patient-data-and-medical-systems/"><img width="1396" height="930" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201396%20930'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Cybersecurity in Healthcare" decoding="async" sizes="(max-width: 1396px) 100vw, 1396px" style="--ratio: 1396 / 930;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/465-310-1-34.png" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/465-310-1-34.png 1396w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/465-310-1-34-300x200.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/465-310-1-34-1024x682.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/465-310-1-34-768x512.png 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> </div> </div> </div></article><article class="post visible forward-post post-82543 type-post status-publish format-standard has-post-thumbnail category-cyber-talks category-upcoming-cybertalks"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cyber-talks/building-a-cloud-security-strategy-with-actionable-threat-intelligence/"><img width="1000" height="666" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201000%20666'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Cloud Security Strategy" decoding="async" sizes="(max-width: 1000px) 100vw, 1000px" style="--ratio: 1000 / 666;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/465-310-1-2.png" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/465-310-1-2.png 1000w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/465-310-1-2-300x200.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/465-310-1-2-768x511.png 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> </div> </div> </div></article><article class="post visible forward-post post-82546 type-post status-publish format-standard has-post-thumbnail category-cyber-talks category-upcoming-cybertalks"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cyber-talks/revolutionizing-security-with-ai-enhanced-soc/"><img width="1100" height="732" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201100%20732'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Next-Gen SOC with Artificial Intelligence" decoding="async" sizes="(max-width: 1100px) 100vw, 1100px" style="--ratio: 1100 / 732;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/465-310-1-35.png" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/465-310-1-35.png 1100w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/465-310-1-35-300x200.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/465-310-1-35-1024x681.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/11/465-310-1-35-768x511.png 768w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> </div> </div> </div></article></div><div class="owl-nav disabled"><div class="owl-prev" role="button"><svg class="e-font-icon-svg e-fas-chevron-left" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z"></path></svg></div><div class="owl-next" role="button"><svg class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg></div></div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-73398e23 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="73398e23" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-613d2cef" data-id="613d2cef" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-5b2aff2c elementor-align-center elementor-widget elementor-widget-button" data-id="5b2aff2c" data-element_type="widget" data-widget_type="button.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"> <a class="elementor-button elementor-button-link elementor-size-md" href="https://www.eccouncil.org/cybersecurity-exchange/cyber-talks" target="_blank"> <span class="elementor-button-content-wrapper"> <span class="elementor-button-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-eye" viewBox="0 0 576 512" xmlns="http://www.w3.org/2000/svg"><path d="M572.52 241.4C518.29 135.59 410.93 64 288 64S57.68 135.64 3.48 241.41a32.35 32.35 0 0 0 0 29.19C57.71 376.41 165.07 448 288 448s230.32-71.64 284.52-177.41a32.35 32.35 0 0 0 0-29.19zM288 400a144 144 0 1 1 144-144 143.93 143.93 0 0 1-144 144zm0-240a95.31 95.31 0 0 0-25.31 3.79 47.85 47.85 0 0 1-66.9 66.9A95.78 95.78 0 1 0 288 160z"></path></svg> </span> <span class="elementor-button-text">View All Cyber Talks</span> </span> </a> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-3dfecb2 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="3dfecb2" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f9405c1" data-id="f9405c1" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-12869fa elementor-widget elementor-widget-heading" data-id="12869fa" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Interviews </h2> </div> </div> <div class="elementor-element elementor-element-59887b6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="59887b6" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-2147c20b elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="2147c20b" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3b293e7" data-id="3b293e7" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-52014b7 arrows-relative-to-box_area preserve-img-ratio-cover bullets-small-dot-stroke elementor-widget elementor-widget-the7_elements_carousel" data-id="52014b7" data-element_type="widget" data-settings="{"widget_columns":4,"gap_between_posts":{"unit":"px","size":40,"sizes":[]},"widget_columns_tablet":2,"widget_columns_mobile":1,"gap_between_posts_tablet":{"unit":"px","size":"","sizes":[]},"gap_between_posts_mobile":{"unit":"px","size":"","sizes":[]}}" data-widget_type="the7_elements_carousel.default"> <div class="elementor-widget-container"> <div class="disable-arrows-hover-bg the7_elements_carousel-52014b7 owl-carousel portfolio-carousel-shortcode elementor-owl-carousel-call portfolio-shortcode the7-elementor-widget content-bg-on content-rollover-layout-list description-on-hover quick-scale-img" data-scroll-mode="1" data-auto-height="false" data-speed="600" data-autoplay="false" data-autoplay_speed=""><article class="post visible forward-post post-81458 type-post status-publish format-standard has-post-thumbnail category-interview tag-ceh tag-cybersecurity tag-ec-council tag-ethical-hacking tag-penetration-testing-information-security"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/interview/navigating-the-world-of-ethical-hacking-with-the-ceh-program/"><img width="2171" height="2171" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%202171%202171'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 2171px) 100vw, 2171px" style="--ratio: 2171 / 2171;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/Navigating-the-World-of-Ethical-Thumbnail-2.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/Navigating-the-World-of-Ethical-Thumbnail-2.jpg 2171w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/Navigating-the-World-of-Ethical-Thumbnail-2-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/Navigating-the-World-of-Ethical-Thumbnail-2-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/Navigating-the-World-of-Ethical-Thumbnail-2-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/Navigating-the-World-of-Ethical-Thumbnail-2-768x768.jpg 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/Navigating-the-World-of-Ethical-Thumbnail-2-1536x1536.jpg 1536w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/01/Navigating-the-World-of-Ethical-Thumbnail-2-2048x2048.jpg 2048w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/interview/navigating-the-world-of-ethical-hacking-with-the-ceh-program/" rel="bookmark" title="Navigating the World of Ethical Hacking with the C|EH Program: Interview with Andreas Constantinides">Navigating the World of Ethical Hacking with the C|EH Program: Interview with Andreas Constantinides</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/interview/" rel="tag">Interview</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/01/31/" title="8:08 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-01-31T08:08:02+00:00">January 31, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/interview/navigating-the-world-of-ethical-hacking-with-the-ceh-program/" target="" aria-label="Read more about Navigating the World of Ethical Hacking with the C|EH Program: Interview with Andreas Constantinides" class="box-button elementor-button elementor-size-xs">Read more</a> </div> </div> </div></article><article class="post visible forward-post post-81298 type-post status-publish format-standard has-post-thumbnail category-interview tag-cloud tag-cloud-security tag-cybersecurity tag-data-protection tag-ec-council tag-information-security"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/interview/fortifying-cloud-native-security/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Fortifying Cloud-Native Environments" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Fortifying-Cloud-Native-Environments-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Fortifying-Cloud-Native-Environments-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Fortifying-Cloud-Native-Environments-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Fortifying-Cloud-Native-Environments-thumb-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/interview/fortifying-cloud-native-security/" rel="bookmark" title="Fortifying Cloud-Native Environments: Experts Insights on the Evolution of Cloud Security">Fortifying Cloud-Native Environments: Experts Insights on the Evolution of Cloud Security</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/interview/" rel="tag">Interview</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/01/08/" title="1:03 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-01-08T13:03:00+00:00">January 8, 2024</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/interview/fortifying-cloud-native-security/" target="" aria-label="Read more about Fortifying Cloud-Native Environments: Experts Insights on the Evolution of Cloud Security" class="box-button elementor-button elementor-size-xs">Read more</a> </div> </div> </div></article><article class="post visible forward-post post-81154 type-post status-publish format-standard has-post-thumbnail category-interview tag-application-security tag-ci-cd-pipeline tag-cybersecurity tag-devsecops tag-ec-council tag-web-application tag-web-application-security"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/interview/strengthening-your-devsecops-with-web-application-security-testing/"><img width="2171" height="2171" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%202171%202171'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 2171px) 100vw, 2171px" style="--ratio: 2171 / 2171;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Strengthening-Your-DevSecOps-with-Web-Application-Security-Testing-featured-image.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Strengthening-Your-DevSecOps-with-Web-Application-Security-Testing-featured-image.jpg 2171w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Strengthening-Your-DevSecOps-with-Web-Application-Security-Testing-featured-image-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Strengthening-Your-DevSecOps-with-Web-Application-Security-Testing-featured-image-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Strengthening-Your-DevSecOps-with-Web-Application-Security-Testing-featured-image-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Strengthening-Your-DevSecOps-with-Web-Application-Security-Testing-featured-image-768x768.jpg 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Strengthening-Your-DevSecOps-with-Web-Application-Security-Testing-featured-image-1536x1536.jpg 1536w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Strengthening-Your-DevSecOps-with-Web-Application-Security-Testing-featured-image-2048x2048.jpg 2048w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/interview/strengthening-your-devsecops-with-web-application-security-testing/" rel="bookmark" title="Experts Insights: Strengthening Your DevSecOps with Web Application Security Testing">Experts Insights: Strengthening Your DevSecOps with Web Application Security Testing</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/interview/" rel="tag">Interview</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2023/11/27/" title="9:52 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2023-11-27T09:52:59+00:00">November 27, 2023</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/interview/strengthening-your-devsecops-with-web-application-security-testing/" target="" aria-label="Read more about Experts Insights: Strengthening Your DevSecOps with Web Application Security Testing" class="box-button elementor-button elementor-size-xs">Read more</a> </div> </div> </div></article><article class="post visible forward-post post-81148 type-post status-publish format-standard has-post-thumbnail category-interview tag-cybersecurity tag-data-recovery tag-data-security tag-ec-council tag-information-security tag-malware tag-ransomware"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/interview/guarding-your-business-ransomware-security-and-data-recovery/"><img width="2171" height="2171" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%202171%202171'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 2171px) 100vw, 2171px" style="--ratio: 2171 / 2171;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Guarding-Your-Business-Ransomware-Security-and-Data-Recovery-featured-image.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Guarding-Your-Business-Ransomware-Security-and-Data-Recovery-featured-image.jpg 2171w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Guarding-Your-Business-Ransomware-Security-and-Data-Recovery-featured-image-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Guarding-Your-Business-Ransomware-Security-and-Data-Recovery-featured-image-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Guarding-Your-Business-Ransomware-Security-and-Data-Recovery-featured-image-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Guarding-Your-Business-Ransomware-Security-and-Data-Recovery-featured-image-768x768.jpg 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Guarding-Your-Business-Ransomware-Security-and-Data-Recovery-featured-image-1536x1536.jpg 1536w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/Guarding-Your-Business-Ransomware-Security-and-Data-Recovery-featured-image-2048x2048.jpg 2048w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/interview/guarding-your-business-ransomware-security-and-data-recovery/" rel="bookmark" title="Guarding Your Business: Ransomware Security and Data Recovery">Guarding Your Business: Ransomware Security and Data Recovery</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/interview/" rel="tag">Interview</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2023/11/27/" title="9:21 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2023-11-27T09:21:54+00:00">November 27, 2023</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/interview/guarding-your-business-ransomware-security-and-data-recovery/" target="" aria-label="Read more about Guarding Your Business: Ransomware Security and Data Recovery" class="box-button elementor-button elementor-size-xs">Read more</a> </div> </div> </div></article><article class="post visible forward-post post-80125 type-post status-publish format-standard has-post-thumbnail category-interview tag-artifiicial-inteligence tag-cyber-secuirty tag-cyber-security-audits tag-cyber-security-expert-interview tag-soc"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail "> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/interview/decoding-cybersecurity-2023-with-ciso-graham-thomson/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20521%20521'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security-150x150.jpg 150w" /></a> </div> </div> <div class="post-entry-content"> <div class="post-entry-wrapper"> <div class="post-entry-body"> <h6 class="ele-entry-title"><a href="https://www.eccouncil.org/cybersecurity-exchange/interview/decoding-cybersecurity-2023-with-ciso-graham-thomson/" rel="bookmark" title="Decoding Cybersecurity 2023: An In-Depth Chat with CISO Graham Thomson">Decoding Cybersecurity 2023: An In-Depth Chat with CISO Graham Thomson</a></h6><div class="entry-meta"><span class="meta-item category-link"><a href="https://www.eccouncil.org/cybersecurity-exchange/category/interview/" rel="tag">Interview</a></span><a href="https://www.eccouncil.org/cybersecurity-exchange/2023/09/07/" title="1:02 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2023-09-07T13:02:31+00:00">September 7, 2023</time></a></div><a href="https://www.eccouncil.org/cybersecurity-exchange/interview/decoding-cybersecurity-2023-with-ciso-graham-thomson/" target="" aria-label="Read more about Decoding Cybersecurity 2023: An In-Depth Chat with CISO Graham Thomson" class="box-button elementor-button elementor-size-xs">Read more</a> </div> </div> </div></article></div><div class="owl-nav disabled"><div class="owl-prev" role="button"><svg class="e-font-icon-svg e-fas-chevron-left" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z"></path></svg></div><div class="owl-next" role="button"><svg class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg></div></div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-56295561 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="56295561" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-47aa3f" data-id="47aa3f" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-6efff789 elementor-align-center elementor-widget elementor-widget-button" data-id="6efff789" data-element_type="widget" data-widget_type="button.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"> <a class="elementor-button elementor-button-link elementor-size-md" href="/cybersecurity-exchange/interviews/" target="_blank"> <span class="elementor-button-content-wrapper"> <span class="elementor-button-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-eye" viewBox="0 0 576 512" xmlns="http://www.w3.org/2000/svg"><path d="M572.52 241.4C518.29 135.59 410.93 64 288 64S57.68 135.64 3.48 241.41a32.35 32.35 0 0 0 0 29.19C57.71 376.41 165.07 448 288 448s230.32-71.64 284.52-177.41a32.35 32.35 0 0 0 0-29.19zM288 400a144 144 0 1 1 144-144 143.93 143.93 0 0 1-144 144zm0-240a95.31 95.31 0 0 0-25.31 3.79 47.85 47.85 0 0 1-66.9 66.9A95.78 95.78 0 1 0 288 160z"></path></svg> </span> <span class="elementor-button-text">View All Interviews</span> </span> </a> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-b3203b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="b3203b6" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b2ab05d" data-id="b2ab05d" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-29232a5 elementor-widget elementor-widget-heading" data-id="29232a5" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Whitepapers</h2> </div> </div> <div class="elementor-element elementor-element-d8ecd28 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="d8ecd28" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-6d062f8 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="6d062f8" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a981fb6" data-id="a981fb6" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-d319182 arrows-relative-to-box_area bullets-small-dot-stroke elementor-widget elementor-widget-the7_elements_carousel" data-id="d319182" data-element_type="widget" data-settings="{"widget_columns":4,"gap_between_posts":{"unit":"px","size":40,"sizes":[]},"widget_columns_tablet":2,"widget_columns_mobile":1,"gap_between_posts_tablet":{"unit":"px","size":"","sizes":[]},"gap_between_posts_mobile":{"unit":"px","size":"","sizes":[]}}" data-widget_type="the7_elements_carousel.default"> <div class="elementor-widget-container"> <div class="disable-arrows-hover-bg the7_elements_carousel-d319182 owl-carousel portfolio-carousel-shortcode elementor-owl-carousel-call portfolio-shortcode the7-elementor-widget content-bg-on classic-layout-list description-under-image meta-info-off" data-scroll-mode="1" data-auto-height="false" data-speed="600" data-autoplay="false" data-autoplay_speed=""><article class="post visible post-82130 type-post status-publish format-standard has-post-thumbnail category-whitepaper tag-access-control tag-authentication tag-automation tag-credential-stuffing tag-cybersecurity tag-ec-council tag-network-security tag-security-operations tag-threat-intelligence"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/whitepaper/safeguarding-against-credential-stuffing/"><img width="1200" height="1200" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201200%201200'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Account Protection 101 Of Credential Stuffing" decoding="async" sizes="(max-width: 1200px) 100vw, 1200px" style="--ratio: 1200 / 1200;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Account-Protection-101-Of-Credential-Stuffing.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Account-Protection-101-Of-Credential-Stuffing.jpg 1200w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Account-Protection-101-Of-Credential-Stuffing-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Account-Protection-101-Of-Credential-Stuffing-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Account-Protection-101-Of-Credential-Stuffing-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/06/Account-Protection-101-Of-Credential-Stuffing-768x768.jpg 768w" /></a> </div> </div> <div class="post-entry-content"> </div></article><article class="post visible post-81898 type-post status-publish format-standard has-post-thumbnail category-whitepaper tag-ec-council tag-security-information-and-event-management-siem tag-security-operations tag-security-operations-centers-socs-network-security-cybersecurity"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/whitepaper/security-operations-management-for-enterprises/"><img width="2171" height="2171" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%202171%202171'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 2171px) 100vw, 2171px" style="--ratio: 2171 / 2171;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/Security-Operations-Management-thumbnail.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/Security-Operations-Management-thumbnail.jpg 2171w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/Security-Operations-Management-thumbnail-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/Security-Operations-Management-thumbnail-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/Security-Operations-Management-thumbnail-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/Security-Operations-Management-thumbnail-768x768.jpg 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/Security-Operations-Management-thumbnail-1536x1536.jpg 1536w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/Security-Operations-Management-thumbnail-2048x2048.jpg 2048w" /></a> </div> </div> <div class="post-entry-content"> </div></article><article class="post visible post-81832 type-post status-publish format-standard has-post-thumbnail category-whitepaper tag-ec-council tag-firewall tag-hping tag-ip tag-nmap tag-penetration-testing tag-protocol-tunneling tag-proxying tag-spoofing tag-tcp"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/whitepaper/a-guide-to-firewall-penetration-testing/"><img width="2171" height="2171" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%202171%202171'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Firewall Penetration Testing" decoding="async" sizes="(max-width: 2171px) 100vw, 2171px" style="--ratio: 2171 / 2171;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-1.jpg 2171w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-1-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-1-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-1-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-1-768x768.jpg 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-1-1536x1536.jpg 1536w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-1-2048x2048.jpg 2048w" /></a> </div> </div> <div class="post-entry-content"> </div></article><article class="post visible post-81815 type-post status-publish format-standard has-post-thumbnail category-whitepaper tag-cybersecurity tag-ec-council tag-ethical-hacking tag-issaf tag-nist tag-osstmm tag-owasp tag-penetration-testing tag-ptes tag-red-teaming"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/whitepaper/a-comprehensive-guide-to-penetration-testing/"><img width="2171" height="2171" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%202171%202171'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Navigating Penetration Testing: A Comprehensive Guide and Conforming to Industry Standards" decoding="async" sizes="(max-width: 2171px) 100vw, 2171px" style="--ratio: 2171 / 2171;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-4-1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-4-1.jpg 2171w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-4-1-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-4-1-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-4-1-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-4-1-768x768.jpg 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-4-1-1536x1536.jpg 1536w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/04/thumbnail-4-1-2048x2048.jpg 2048w" /></a> </div> </div> <div class="post-entry-content"> </div></article><article class="post visible post-81796 type-post status-publish format-standard has-post-thumbnail category-whitepaper tag-android tag-application-security tag-cybersecurity tag-dast tag-ec-council tag-ios tag-linux tag-mobile-application tag-sast tag-sdlc"> <div class="post-thumbnail-wrap"> <div class="post-thumbnail"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/whitepaper/mobile-app-security-vulnerability-testing-roadmap/"><img width="2171" height="2171" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%202171%202171'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Mobile App Security Testing" decoding="async" sizes="(max-width: 2171px) 100vw, 2171px" style="--ratio: 2171 / 2171;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/thumbnail-1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/thumbnail-1.jpg 2171w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/thumbnail-1-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/thumbnail-1-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/thumbnail-1-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/thumbnail-1-768x768.jpg 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/thumbnail-1-1536x1536.jpg 1536w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/thumbnail-1-2048x2048.jpg 2048w" /></a> </div> </div> <div class="post-entry-content"> </div></article></div><div class="owl-nav disabled"><div class="owl-prev" role="button"><svg class="e-font-icon-svg e-fas-chevron-left" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z"></path></svg></div><div class="owl-next" role="button"><svg class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg></div></div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-daf4394 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="daf4394" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-580c40a" data-id="580c40a" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-d38690a elementor-align-center elementor-widget elementor-widget-button" data-id="d38690a" data-element_type="widget" data-widget_type="button.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"> <a class="elementor-button elementor-button-link elementor-size-md" href="/cybersecurity-exchange/whitepapers/" target="_blank"> <span class="elementor-button-content-wrapper"> <span class="elementor-button-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-eye" viewBox="0 0 576 512" xmlns="http://www.w3.org/2000/svg"><path d="M572.52 241.4C518.29 135.59 410.93 64 288 64S57.68 135.64 3.48 241.41a32.35 32.35 0 0 0 0 29.19C57.71 376.41 165.07 448 288 448s230.32-71.64 284.52-177.41a32.35 32.35 0 0 0 0-29.19zM288 400a144 144 0 1 1 144-144 143.93 143.93 0 0 1-144 144zm0-240a95.31 95.31 0 0 0-25.31 3.79 47.85 47.85 0 0 1-66.9 66.9A95.78 95.78 0 1 0 288 160z"></path></svg> </span> <span class="elementor-button-text">View All Whitepapers</span> </span> </a> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-9995d0d elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9995d0d" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-68aa7d2" data-id="68aa7d2" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-0e9643f elementor-widget elementor-widget-heading" data-id="0e9643f" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Cyber Brief</h2> </div> </div> <div class="elementor-element elementor-element-6b06261 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="6b06261" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-4f76f9d elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="4f76f9d" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3b76677" data-id="3b76677" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-252a90a arrows-mobile-relative-to-box_area arrows-relative-to-box_area slider-layout_1 slider-tablet-default slider-mobile-default slide-h-position-center bullets-small-dot-stroke elementor-widget elementor-widget-the7_content_carousel" data-id="252a90a" data-element_type="widget" data-settings="{"wide_desk_columns":4,"widget_columns":4,"gap_between_posts":{"unit":"px","size":40,"sizes":[]},"widget_columns_tablet":2,"widget_columns_mobile":1,"gap_between_posts_tablet":{"unit":"px","size":"","sizes":[]},"gap_between_posts_mobile":{"unit":"px","size":"","sizes":[]}}" data-widget_type="the7_content_carousel.default"> <div class="elementor-widget-container"> <div class="disable-arrows-hover-bg owl-carousel text-and-icon-carousel elementor-owl-carousel-call the7-elementor-widget the7_content_carousel-252a90a" data-scroll-mode="1" data-auto-height="true" data-speed="600" data-autoplay="false" data-autoplay_speed=""><a class="dt-owl-item-wrap box-hover box-hover" href="/cybersecurity-exchange/wp-content/uploads/2023/06/Cyber-Brief-May-2023.pdf" target="_blank"><div class="dt-owl-item-inner "><div class="dt-owl-item-image layzr-bg img-css-resize-wrapper"> <img width="800" height="1070" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20800%201070'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Cyber-Brief-May-2023" decoding="async" sizes="(max-width: 800px) 100vw, 800px" style="--ratio: 800 / 1070;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/06/Cyber-Brief-May-2023.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/06/Cyber-Brief-May-2023.jpg 800w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/06/Cyber-Brief-May-2023-224x300.jpg 224w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/06/Cyber-Brief-May-2023-766x1024.jpg 766w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/06/Cyber-Brief-May-2023-768x1027.jpg 768w" /></div><h4 class="dt-owl-item-heading">(May-2023)</h4></div></a><a class="dt-owl-item-wrap box-hover box-hover" href="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/05/Cyber-Brief-April-2023.pdf" target="_blank"><div class="dt-owl-item-inner "><div class="dt-owl-item-image layzr-bg img-css-resize-wrapper"> <img width="1000" height="1338" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201000%201338'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Cyber Brief April 2023" decoding="async" sizes="(max-width: 1000px) 100vw, 1000px" style="--ratio: 1000 / 1338;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/05/Cyber-Brief-April-2023.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/05/Cyber-Brief-April-2023.jpg 1000w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/05/Cyber-Brief-April-2023-224x300.jpg 224w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/05/Cyber-Brief-April-2023-765x1024.jpg 765w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/05/Cyber-Brief-April-2023-768x1028.jpg 768w" /></div><h4 class="dt-owl-item-heading">(Apr-2023)</h4></div></a><a class="dt-owl-item-wrap box-hover box-hover" href="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/04/Cyber-Brief-Newsletter-Mar-2023.pdf" target="_blank"><div class="dt-owl-item-inner "><div class="dt-owl-item-image layzr-bg img-css-resize-wrapper"> <img width="925" height="1238" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20925%201238'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 925px) 100vw, 925px" style="--ratio: 925 / 1238;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/04/Cyber-Brief-Newsletter-Mar-2023.png" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/04/Cyber-Brief-Newsletter-Mar-2023.png 925w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/04/Cyber-Brief-Newsletter-Mar-2023-224x300.png 224w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/04/Cyber-Brief-Newsletter-Mar-2023-765x1024.png 765w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/04/Cyber-Brief-Newsletter-Mar-2023-768x1028.png 768w" /></div><h4 class="dt-owl-item-heading">(Mar-2023)</h4></div></a><a class="dt-owl-item-wrap box-hover box-hover" href="/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Feb-2023.pdf" target="_blank"><div class="dt-owl-item-inner "><div class="dt-owl-item-image layzr-bg img-css-resize-wrapper"> <img width="800" height="1070" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20800%201070'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Cyber Brief Feb 2023" decoding="async" sizes="(max-width: 800px) 100vw, 800px" style="--ratio: 800 / 1070;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Feb-2023.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Feb-2023.jpg 800w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Feb-2023-224x300.jpg 224w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Feb-2023-766x1024.jpg 766w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Feb-2023-768x1027.jpg 768w" /></div><h4 class="dt-owl-item-heading">(Feb-2023)</h4></div></a><a class="dt-owl-item-wrap box-hover box-hover" href="/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Jan-2023.pdf" target="_blank"><div class="dt-owl-item-inner "><div class="dt-owl-item-image layzr-bg img-css-resize-wrapper"> <img width="925" height="1237" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20925%201237'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Cyber Brief Jan 2023" decoding="async" sizes="(max-width: 925px) 100vw, 925px" style="--ratio: 925 / 1237;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Jan-2023.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Jan-2023.jpg 925w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Jan-2023-224x300.jpg 224w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Jan-2023-766x1024.jpg 766w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Jan-2023-768x1027.jpg 768w" /></div><h4 class="dt-owl-item-heading">(Jan-2023)</h4></div></a><a class="dt-owl-item-wrap box-hover box-hover" href="/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-brief-dec-2022.pdf" target="_blank"><div class="dt-owl-item-inner "><div class="dt-owl-item-image layzr-bg img-css-resize-wrapper"> <img width="765" height="1024" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20765%201024'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 765px) 100vw, 765px" style="--ratio: 765 / 1024;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-brief-dec-2022.webp" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-brief-dec-2022.webp 765w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-brief-dec-2022-224x300.webp 224w" /></div><h4 class="dt-owl-item-heading">(Dec-2022)</h4></div></a><a class="dt-owl-item-wrap box-hover box-hover" href="https://community.eccouncil.org/signUp?referal=newsLetter&slug=Cyber-Brief-Nov-2022" target="_blank"><div class="dt-owl-item-inner "><div class="dt-owl-item-image layzr-bg img-css-resize-wrapper"> <img width="1850" height="2475" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201850%202475'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1850px) 100vw, 1850px" style="--ratio: 1850 / 2475;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Nov-2022-1.png" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Nov-2022-1.png 1850w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Nov-2022-1-224x300.png 224w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Nov-2022-1-765x1024.png 765w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Nov-2022-1-768x1027.png 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Nov-2022-1-1148x1536.png 1148w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Nov-2022-1-1531x2048.png 1531w" /></div><h4 class="dt-owl-item-heading">(Nov-2022)</h4></div></a><a class="dt-owl-item-wrap box-hover box-hover" href="https://community.eccouncil.org/signUp?referal=newsLetter&slug=Cyber-Brief-Oct-2022" target="_blank"><div class="dt-owl-item-inner "><div class="dt-owl-item-image layzr-bg img-css-resize-wrapper"> <img width="598" height="800" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20598%20800'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 598px) 100vw, 598px" style="--ratio: 598 / 800;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Oct-2022.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Oct-2022.jpg 598w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Oct-2022-224x300.jpg 224w" /></div><h4 class="dt-owl-item-heading">(Oct-2022)</h4></div></a><a class="dt-owl-item-wrap box-hover box-hover" href="https://community.eccouncil.org/signUp?referal=newsLetter&slug=Cyber-Brief-September-2022" target="_blank"><div class="dt-owl-item-inner "><div class="dt-owl-item-image layzr-bg img-css-resize-wrapper"> <img width="598" height="800" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%20598%20800'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 598px) 100vw, 598px" style="--ratio: 598 / 800;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Sept-2022.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Sept-2022.jpg 598w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-Sept-2022-224x300.jpg 224w" /></div><h4 class="dt-owl-item-heading">(Sep-2022)</h4></div></a><a class="dt-owl-item-wrap box-hover box-hover" href="https://community.eccouncil.org/signUp?referal=newsLetter&slug=Cyber-Brief-August-2022" target="_blank"><div class="dt-owl-item-inner "><div class="dt-owl-item-image layzr-bg img-css-resize-wrapper"> <img width="1000" height="1338" src="data:image/svg+xml,%3Csvg%20xmlns%3D'http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg'%20viewBox%3D'0%200%201000%201338'%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1000px) 100vw, 1000px" style="--ratio: 1000 / 1338;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-August-2022.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-August-2022.jpg 1000w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-August-2022-224x300.jpg 224w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-August-2022-765x1024.jpg 765w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/03/Cyber-Brief-August-2022-768x1028.jpg 768w" /></div><h4 class="dt-owl-item-heading">(Aug-2022)</h4></div></a></div><div class="owl-nav disabled"><div class="owl-prev" role="button"><svg class="e-font-icon-svg e-fas-chevron-left" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z"></path></svg></div><div class="owl-next" role="button"><svg class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg></div></div> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-e914dfe elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="e914dfe" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3adabbe" data-id="3adabbe" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-0f0015b elementor-align-center elementor-widget elementor-widget-button" data-id="0f0015b" data-element_type="widget" data-widget_type="button.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"> <a class="elementor-button elementor-button-link elementor-size-md" href="/cybersecurity-exchange/cyber-brief/" target="_blank"> <span class="elementor-button-content-wrapper"> <span class="elementor-button-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-eye" viewBox="0 0 576 512" xmlns="http://www.w3.org/2000/svg"><path d="M572.52 241.4C518.29 135.59 410.93 64 288 64S57.68 135.64 3.48 241.41a32.35 32.35 0 0 0 0 29.19C57.71 376.41 165.07 448 288 448s230.32-71.64 284.52-177.41a32.35 32.35 0 0 0 0-29.19zM288 400a144 144 0 1 1 144-144 143.93 143.93 0 0 1-144 144zm0-240a95.31 95.31 0 0 0-25.31 3.79 47.85 47.85 0 0 1-66.9 66.9A95.78 95.78 0 1 0 288 160z"></path></svg> </span> <span class="elementor-button-text">View All Cyber Brief</span> </span> </a> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </section> </div> </div> </div> </div> </div> </div> </section> </div> </div><!-- #content --> </div><!-- .wf-container --> </div><!-- .wf-wrap --> </div><!-- #main --> <!-- !Footer --> <footer id="footer" class="footer solid-bg elementor-footer"> <div class="wf-wrap"> <div class="wf-container-footer"> <div class="wf-container"> <div data-elementor-type="footer" data-elementor-id="21569" class="elementor elementor-21569 elementor-location-footer" data-elementor-post-type="elementor_library"> <section class="elementor-section elementor-top-section elementor-element elementor-element-99e335b elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="99e335b" data-element_type="section" data-settings="{"background_background":"classic"}"> <div class="elementor-container elementor-column-gap-wider"> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-979bda7" data-id="979bda7" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-adef294 elementor-widget elementor-widget-image" data-id="adef294" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <img loading="lazy" width="200" height="42" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/EC-Council-logo-footer.png" class="attachment-full size-full wp-image-79960" alt="EC-Council Logo" /> </div> </div> </div> </div> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-47645cf" data-id="47645cf" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-dc04426 elementor-shape-circle elementor-grid-6 e-grid-align-right e-grid-align-mobile-center elementor-widget elementor-widget-social-icons" data-id="dc04426" data-element_type="widget" data-widget_type="social-icons.default"> <div class="elementor-widget-container"> <div class="elementor-social-icons-wrapper elementor-grid"> <span class="elementor-grid-item"> <a class="elementor-icon elementor-social-icon elementor-social-icon-linkedin-in elementor-repeater-item-0224fa5" href="https://www.linkedin.com/company/ec-council" target="_blank"> <span class="elementor-screen-only">Linkedin-in</span> <svg class="e-font-icon-svg e-fab-linkedin-in" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"></path></svg> </a> </span> <span class="elementor-grid-item"> <a class="elementor-icon elementor-social-icon elementor-social-icon-twitter elementor-repeater-item-fe64f2d" href="https://twitter.com/ECCOUNCIL" target="_blank"> <span class="elementor-screen-only">Twitter</span> <svg class="e-font-icon-svg e-fab-twitter" viewBox="0 0 512 512" xmlns="http://www.w3.org/2000/svg"><path d="M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z"></path></svg> </a> </span> <span class="elementor-grid-item"> <a class="elementor-icon elementor-social-icon elementor-social-icon-facebook-f elementor-repeater-item-50aa484" href="https://www.facebook.com/ECCouncil" target="_blank"> <span class="elementor-screen-only">Facebook-f</span> <svg class="e-font-icon-svg e-fab-facebook-f" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M279.14 288l14.22-92.66h-88.91v-60.13c0-25.35 12.42-50.06 52.24-50.06h40.42V6.26S260.43 0 225.36 0c-73.22 0-121.08 44.38-121.08 124.72v70.62H22.89V288h81.39v224h100.17V288z"></path></svg> </a> </span> <span class="elementor-grid-item"> <a class="elementor-icon elementor-social-icon elementor-social-icon-youtube elementor-repeater-item-e0f6049" href="https://www.youtube.com/user/eccouncilusa" target="_blank"> <span class="elementor-screen-only">Youtube</span> <svg class="e-font-icon-svg e-fab-youtube" viewBox="0 0 576 512" xmlns="http://www.w3.org/2000/svg"><path d="M549.655 124.083c-6.281-23.65-24.787-42.276-48.284-48.597C458.781 64 288 64 288 64S117.22 64 74.629 75.486c-23.497 6.322-42.003 24.947-48.284 48.597-11.412 42.867-11.412 132.305-11.412 132.305s0 89.438 11.412 132.305c6.281 23.65 24.787 41.5 48.284 47.821C117.22 448 288 448 288 448s170.78 0 213.371-11.486c23.497-6.321 42.003-24.171 48.284-47.821 11.412-42.867 11.412-132.305 11.412-132.305s0-89.438-11.412-132.305zm-317.51 213.508V175.185l142.739 81.205-142.739 81.201z"></path></svg> </a> </span> </div> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-e154a21 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default" data-id="e154a21" data-element_type="section" data-settings="{"background_background":"classic"}"> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6daae7a" data-id="6daae7a" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <section class="elementor-section elementor-inner-section elementor-element elementor-element-8104121 elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="8104121" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-3ccdafa" data-id="3ccdafa" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-23a6ff3 elementor-widget__width-auto elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor" data-id="23a6ff3" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>漏 2024 EC-Council</p> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-5103789" data-id="5103789" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-b2cb538 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="b2cb538" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/cybersecurity-exchange/whitepaper/securing-the-future-of-finance-top-cybersecurity-best-practices-for-financial-institutions/" target="_blank" class="box-button elementor-button elementor-size-xs"> Get Training</a></div> </div> </div> <div class="elementor-element elementor-element-4e28cf5 elementor-widget__width-initial elementor-hidden-tablet elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="4e28cf5" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-0d906de" data-id="0d906de" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-848d4d8 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="848d4d8" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/partner-with-us/" target="_blank" class="box-button elementor-button elementor-size-xs">Partner With Us</a></div> </div> </div> <div class="elementor-element elementor-element-8a377c0 elementor-widget__width-initial elementor-hidden-tablet elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="8a377c0" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-56ba32b" data-id="56ba32b" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-6910c36 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget elementor-widget-the7_button_widget" data-id="6910c36" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/terms-of-use/" target="_blank" class="box-button elementor-button elementor-size-xs">Terms Of Use</a></div> </div> </div> <div class="elementor-element elementor-element-66ff94b elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="66ff94b" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-3ba6b66" data-id="3ba6b66" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-71f5d85 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget elementor-widget-the7_button_widget" data-id="71f5d85" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/privacy-policy/" target="_blank" class="box-button elementor-button elementor-size-xs">Privacy Policy</a></div> </div> </div> <div class="elementor-element elementor-element-f090837 elementor-widget__width-initial elementor-hidden-tablet elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="f090837" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-01b2bf0" data-id="01b2bf0" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-b66dc68 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="b66dc68" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/errata/" target="_blank" class="box-button elementor-button elementor-size-xs">Report Issue</a></div> </div> </div> <div class="elementor-element elementor-element-43ed683 elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="43ed683" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-dddc90d" data-id="dddc90d" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-84f4523 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="84f4523" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://eccouncil.org/cybersecurity-exchange/publishing-guidelines/" class="box-button elementor-button elementor-size-xs">Publishing Guidelines</a></div> </div> </div> <div class="elementor-element elementor-element-d42b0f1 elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="d42b0f1" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-e1824d6" data-id="e1824d6" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-8c1fed7 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="8c1fed7" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/sitemap/" target="_blank" class="box-button elementor-button elementor-size-xs">Sitemap</a></div> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-inner-section elementor-element elementor-element-bf9859a elementor-hidden-desktop elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="bf9859a" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-0125d26" data-id="0125d26" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-2995b92 elementor-widget__width-auto elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor" data-id="2995b92" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>漏 2024 EC-Council</p> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-68fddc8" data-id="68fddc8" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-07f3308 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="07f3308" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/get-certified-with-ec-council-with-form/" class="box-button elementor-button elementor-size-xs"> Get training</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-cfcdc94" data-id="cfcdc94" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-0e24fb8 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="0e24fb8" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/partner-with-us/" class="box-button elementor-button elementor-size-xs">Partner With Us</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-657bb74" data-id="657bb74" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-5799907 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="5799907" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/terms-of-use/" class="box-button elementor-button elementor-size-xs">Terms Of Use</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-a99c553" data-id="a99c553" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-53822b5 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="53822b5" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/privacy-policy/" class="box-button elementor-button elementor-size-xs">Privacy Policy</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-19cbe1c" data-id="19cbe1c" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-8ba50f8 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="8ba50f8" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/errata/" class="box-button elementor-button elementor-size-xs">Report Issue</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-bd8a105" data-id="bd8a105" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-465c68e elementor-align-left elementor-mobile-align-center elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="465c68e" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://eccouncil.org/cybersecurity-exchange/publishing-guidelines/" class="box-button elementor-button elementor-size-xs">Publishing Guidelines</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-e54f023" data-id="e54f023" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-2b562b1 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="2b562b1" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/sitemap/" class="box-button elementor-button elementor-size-xs">Sitemap</a></div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </section> </div> </div><!-- .wf-container --> </div><!-- .wf-container-footer --> </div><!-- .wf-wrap --> </footer><!-- #footer --> <a href="#" class="scroll-top"><svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 16 16" style="enable-background:new 0 0 16 16;" xml:space="preserve"> <path d="M11.7,6.3l-3-3C8.5,3.1,8.3,3,8,3c0,0,0,0,0,0C7.7,3,7.5,3.1,7.3,3.3l-3,3c-0.4,0.4-0.4,1,0,1.4c0.4,0.4,1,0.4,1.4,0L7,6.4 V12c0,0.6,0.4,1,1,1s1-0.4,1-1V6.4l1.3,1.3c0.4,0.4,1,0.4,1.4,0C11.9,7.5,12,7.3,12,7S11.9,6.5,11.7,6.3z"/> </svg><span class="screen-reader-text">Go to Top</span></a> </div><!-- #page --> <div data-elementor-type="popup" data-elementor-id="73689" class="elementor elementor-73689 elementor-location-popup" data-elementor-settings="{"entrance_animation":"fadeInLeft","exit_animation":"fadeInLeft","entrance_animation_duration":{"unit":"px","size":0.3,"sizes":[]},"a11y_navigation":"yes","timing":[]}" data-elementor-post-type="elementor_library"> <section class="elementor-section elementor-top-section elementor-element elementor-element-53c57074 elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="53c57074" data-element_type="section"> <div class="elementor-container elementor-column-gap-wider"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7121ae2a" data-id="7121ae2a" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-6b9c16b widget-divider-yes dt-nav-menu_align-left dt-sub-menu_align-left elementor-widget elementor-widget-the7_nav-menu" data-id="6b9c16b" data-element_type="widget" data-settings="{"submenu_display":"on_click"}" data-widget_type="the7_nav-menu.default"> <div class="elementor-widget-container"> <nav class="dt-nav-menu--main dt-nav-menu__container dt-sub-menu-display-on_click dt-icon-align-side dt-icon-position-right dt-sub-icon-position-right dt-sub-icon-align-side first-item-border-hide last-item-border-hide"><ul class="dt-nav-menu"><li class="menu-item menu-item-type-custom menu-item-object-custom current-menu-item current_page_item menu-item-home menu-item-77187 act first depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Articles</span></span></span><span class="right next-level-button" data-icon = "the7bootstrap- the7-bootstrap-dash"><i aria-hidden="true" class="open-button the7bootstrap- the7-bootstrap-plus"></i> <i aria-hidden="true" class="icon-active the7bootstrap- the7-bootstrap-dash"></i></span></a></li> <li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-78453 depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/whitepapers/' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Whitepapers</span></span></span><span class="right next-level-button" data-icon = "the7bootstrap- the7-bootstrap-dash"><i aria-hidden="true" class="open-button the7bootstrap- the7-bootstrap-plus"></i> <i aria-hidden="true" class="icon-active the7bootstrap- the7-bootstrap-dash"></i></span></a></li> <li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-79632 depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/cyber-talks/' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Cyber Talks</span></span></span><span class="right next-level-button" data-icon = "the7bootstrap- the7-bootstrap-dash"><i aria-hidden="true" class="open-button the7bootstrap- the7-bootstrap-plus"></i> <i aria-hidden="true" class="icon-active the7bootstrap- the7-bootstrap-dash"></i></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-79998 depth-0"><a href='https://www.eccouncil.org/success-stories/is-ceh-worth-it/?utm_source=cyberxchange-homepage&utm_medium=website&utm_campaign=success%20stories' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Success Stories</span></span></span><span class="right next-level-button" data-icon = "the7bootstrap- the7-bootstrap-dash"><i aria-hidden="true" class="open-button the7bootstrap- the7-bootstrap-plus"></i> <i aria-hidden="true" class="icon-active the7bootstrap- the7-bootstrap-dash"></i></span></a></li> <li class="gcb-btn menu-item menu-item-type-custom menu-item-object-custom menu-item-78176 last depth-0"><a href='https://www.eccouncil.org/train-certify/?utm_source=ecc-train-certify&utm_medium=cybersecurity-exchange&utm_campaign=ecc-blog-referral' target='_blank' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Train & Certify</span></span></span><span class="right next-level-button" data-icon = "the7bootstrap- the7-bootstrap-dash"><i aria-hidden="true" class="open-button the7bootstrap- the7-bootstrap-plus"></i> <i aria-hidden="true" class="icon-active the7bootstrap- the7-bootstrap-dash"></i></span></a></li> </ul></nav> </div> </div> </div> </div> </div> </section> </div> <div data-elementor-type="popup" data-elementor-id="80080" class="elementor elementor-80080 elementor-location-popup" data-elementor-settings="{"entrance_animation":"fadeInDown","entrance_animation_duration":{"unit":"px","size":1.2,"sizes":[]},"a11y_navigation":"yes","triggers":{"page_load_delay":1.3,"page_load":"yes"},"timing":[]}" data-elementor-post-type="elementor_library"> <section class="elementor-section elementor-top-section elementor-element elementor-element-25e3a262 elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="25e3a262" data-element_type="section"> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6ff9ebcb" data-id="6ff9ebcb" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-11a0c7e5 elementor-widget elementor-widget-image" data-id="11a0c7e5" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <a href="https://campaigns.eccouncil.org/cyber-career-starter-scholarship?utm_source=cybersecurity-exchange&utm_medium=pop-up&utm_campaign=cct-global-scholarship"> <img loading="lazy" width="1000" height="1000" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/CCT-Scholarship-Revised-Pop-up-June.jpg" class="attachment-large size-large wp-image-82049" alt="" srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/CCT-Scholarship-Revised-Pop-up-June.jpg 1000w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/CCT-Scholarship-Revised-Pop-up-June-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/CCT-Scholarship-Revised-Pop-up-June-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/CCT-Scholarship-Revised-Pop-up-June-768x768.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /> </a> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-5fbdc76 elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="5fbdc76" data-element_type="section"> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-24084ff" data-id="24084ff" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-0eb1749 elementor-align-center elementor-widget elementor-widget-button" data-id="0eb1749" data-element_type="widget" data-widget_type="button.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"> <a class="elementor-button elementor-button-link elementor-size-sm" href="https://campaigns.eccouncil.org/cyber-career-starter-scholarship?utm_source=cybersecurity-exchange&utm_medium=pop-up&utm_campaign=cct-global-scholarship"> <span class="elementor-button-content-wrapper"> <span class="elementor-button-text">YES, I WANT TO APPLY!</span> </span> </a> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </section> </div> <script type='text/javascript'> const lazyloadRunObserver = () => { const lazyloadBackgrounds = document.querySelectorAll( `.e-con.e-parent:not(.e-lazyloaded)` ); const lazyloadBackgroundObserver = new IntersectionObserver( ( entries ) => { entries.forEach( ( entry ) => { if ( entry.isIntersecting ) { let lazyloadBackground = entry.target; if( lazyloadBackground ) { lazyloadBackground.classList.add( 'e-lazyloaded' ); } lazyloadBackgroundObserver.unobserve( entry.target ); } }); }, { rootMargin: '200px 0px 200px 0px' } ); lazyloadBackgrounds.forEach( ( lazyloadBackground ) => { lazyloadBackgroundObserver.observe( lazyloadBackground ); } ); }; const events = [ 'DOMContentLoaded', 'elementor/lazyload/observe', ]; events.forEach( ( event ) => { document.addEventListener( event, lazyloadRunObserver ); } ); </script> <link rel='stylesheet' id='elementor-post-78556-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-78556.css?ver=1732518960' media='all' /> <link rel='stylesheet' id='widget-icon-list-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-icon-list.min.css?ver=3.25.10' media='all' /> <link rel='stylesheet' id='the7-icon-box-grid-widget-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-icon-box-grid-widget.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='elementor-post-73689-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-73689.css?ver=1732518960' media='all' /> <link rel='stylesheet' id='the7-vertical-menu-widget-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-vertical-menu-widget.min.css?ver=12.1.1' media='all' /> <link rel='stylesheet' id='e-animation-fadeInLeft-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/lib/animations/styles/fadeInLeft.min.css?ver=3.25.10' media='all' /> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/frontend-common.min.js?ver=12.1.1" id="the7-elementor-frontend-common-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/main.min.js?ver=12.1.1" id="dt-main-js"></script> <script id="afl-wc-utm-public-js-extra"> var afl_wc_utm_public = {"ajax_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","action":"afl_wc_utm_view","nonce":"","cookie_prefix":"afl_wc_utm_","cookie_expiry":{"days":90},"cookie_renewal":"force","cookie_consent_category":"statistics","domain_info":{"domain":"www.eccouncil.org","path":"\/"},"last_touch_window":"1800","wp_consent_api_enabled":"","user_has_active_attribution":"0"}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/afl-wc-utm/public/js/afl-wc-utm-public.min.js?ver=2.4.12" id="afl-wc-utm-public-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/the7-horizontal-menu.min.js?ver=12.1.1" id="the7_horizontal-menu-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/lib/jquery-sticky/jquery-sticky.min.js?ver=12.1.1" id="the7-e-sticky-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/sticky-effects.min.js?ver=12.1.1" id="the7-e-sticky-effect-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/the7-masonry-widget.min.js?ver=12.1.1" id="the7-elementor-masonry-js"></script> <script id="gforms_recaptcha_recaptcha-js-extra"> var gforms_recaptcha_recaptcha_strings = {"site_key":"6LdJNX4oAAAAAGWiILMPLCGUp8ALa8TJXIWg55PV","ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","nonce":"97cdb5ac32"}; </script> <script src="https://www.google.com/recaptcha/api.js?render=6LdJNX4oAAAAAGWiILMPLCGUp8ALa8TJXIWg55PV&ver=1.6.0" id="gforms_recaptcha_recaptcha-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/legacy.min.js?ver=12.1.1" id="dt-legacy-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/lib/jquery-mousewheel/jquery-mousewheel.min.js?ver=12.1.1" id="jquery-mousewheel-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/lib/custom-scrollbar/custom-scrollbar.min.js?ver=12.1.1" id="the7-custom-scrollbar-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/dt-the7-core/assets/js/post-type.min.js?ver=2.7.10" id="the7-core-js"></script> <script id="eael-general-js-extra"> var localize = {"ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","nonce":"e2d357eb78","i18n":{"added":"Added ","compare":"Compare","loading":"Loading..."},"eael_translate_text":{"required_text":"is a required field","invalid_text":"Invalid","billing_text":"Billing","shipping_text":"Shipping","fg_mfp_counter_text":"of"},"page_permalink":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","cart_redirectition":"no","cart_page_url":"","el_breakpoints":{"mobile":{"label":"Mobile Portrait","value":767,"default_value":767,"direction":"max","is_enabled":true},"mobile_extra":{"label":"Mobile Landscape","value":880,"default_value":880,"direction":"max","is_enabled":false},"tablet":{"label":"Tablet Portrait","value":1024,"default_value":1024,"direction":"max","is_enabled":true},"tablet_extra":{"label":"Tablet Landscape","value":1200,"default_value":1200,"direction":"max","is_enabled":false},"laptop":{"label":"Laptop","value":1366,"default_value":1366,"direction":"max","is_enabled":false},"widescreen":{"label":"Widescreen","value":2400,"default_value":2400,"direction":"min","is_enabled":false}}}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/js/view/general.min.js?ver=6.0.10" id="eael-general-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/the7-vertical-menu.min.js?ver=12.1.1" id="the7_nav-menu-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/js/webpack-pro.runtime.min.js?ver=3.25.4" id="elementor-pro-webpack-runtime-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/js/webpack.runtime.min.js?ver=3.25.10" id="elementor-webpack-runtime-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/js/frontend-modules.min.js?ver=3.25.10" id="elementor-frontend-modules-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/dist/hooks.min.js?ver=4d63a3d491d11ffd8ac6" id="wp-hooks-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/dist/i18n.min.js?ver=5e580eb46a90c2b997e6" id="wp-i18n-js"></script> <script id="wp-i18n-js-after"> wp.i18n.setLocaleData( { 'text direction\u0004ltr': [ 'ltr' ] } ); </script> <script id="elementor-pro-frontend-js-before"> var ElementorProFrontendConfig = {"ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","nonce":"c6bf1d5975","urls":{"assets":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/elementor-pro\/assets\/","rest":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/"},"settings":{"lazy_load_background_images":true},"popup":{"hasPopUps":true},"shareButtonsNetworks":{"facebook":{"title":"Facebook","has_counter":true},"twitter":{"title":"Twitter"},"linkedin":{"title":"LinkedIn","has_counter":true},"pinterest":{"title":"Pinterest","has_counter":true},"reddit":{"title":"Reddit","has_counter":true},"vk":{"title":"VK","has_counter":true},"odnoklassniki":{"title":"OK","has_counter":true},"tumblr":{"title":"Tumblr"},"digg":{"title":"Digg"},"skype":{"title":"Skype"},"stumbleupon":{"title":"StumbleUpon","has_counter":true},"mix":{"title":"Mix"},"telegram":{"title":"Telegram"},"pocket":{"title":"Pocket","has_counter":true},"xing":{"title":"XING","has_counter":true},"whatsapp":{"title":"WhatsApp"},"email":{"title":"Email"},"print":{"title":"Print"},"x-twitter":{"title":"X"},"threads":{"title":"Threads"}}, "facebook_sdk":{"lang":"en_US","app_id":""},"lottie":{"defaultAnimationUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/elementor-pro\/modules\/lottie\/assets\/animations\/default.json"}}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/js/frontend.min.js?ver=3.25.4" id="elementor-pro-frontend-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/jquery/ui/core.min.js?ver=1.13.3" id="jquery-ui-core-js"></script> <script id="elementor-frontend-js-before"> var elementorFrontendConfig = {"environmentMode":{"edit":false,"wpPreview":false,"isScriptDebug":false},"i18n":{"shareOnFacebook":"Share on Facebook","shareOnTwitter":"Share on Twitter","pinIt":"Pin it","download":"Download","downloadImage":"Download image","fullscreen":"Fullscreen","zoom":"Zoom","share":"Share","playVideo":"Play Video","previous":"Previous","next":"Next","close":"Close","a11yCarouselWrapperAriaLabel":"Carousel | Horizontal scrolling: Arrow Left & Right","a11yCarouselPrevSlideMessage":"Previous slide","a11yCarouselNextSlideMessage":"Next slide","a11yCarouselFirstSlideMessage":"This is the first slide","a11yCarouselLastSlideMessage":"This is the last slide","a11yCarouselPaginationBulletMessage":"Go to slide"},"is_rtl":false,"breakpoints":{"xs":0,"sm":480,"md":768,"lg":1025,"xl":1440,"xxl":1600},"responsive":{"breakpoints":{"mobile":{"label":"Mobile Portrait","value":767,"default_value":767,"direction":"max","is_enabled":true},"mobile_extra":{"label":"Mobile Landscape","value":880,"default_value":880,"direction":"max","is_enabled":false},"tablet":{"label":"Tablet Portrait","value":1024,"default_value":1024,"direction":"max","is_enabled":true},"tablet_extra":{"label":"Tablet Landscape","value":1200,"default_value":1200,"direction":"max","is_enabled":false},"laptop":{"label":"Laptop","value":1366,"default_value":1366,"direction":"max","is_enabled":false},"widescreen":{"label":"Widescreen","value":2400,"default_value":2400,"direction":"min","is_enabled":false}}, "hasCustomBreakpoints":false},"version":"3.25.10","is_static":false,"experimentalFeatures":{"e_font_icon_svg":true,"e_swiper_latest":true,"e_nested_atomic_repeaters":true,"e_optimized_control_loading":true,"e_onboarding":true,"theme_builder_v2":true,"home_screen":true,"landing-pages":true,"nested-elements":true,"editor_v2":true,"link-in-bio":true,"floating-buttons":true},"urls":{"assets":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/elementor\/assets\/","ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","uploadUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads"},"nonces":{"floatingButtonsClickTracking":"981a215fe4"},"swiperClass":"swiper","settings":{"page":[],"editorPreferences":[]},"kit":{"viewport_mobile":767,"viewport_tablet":1024,"active_breakpoints":["viewport_mobile","viewport_tablet"],"global_image_lightbox":"yes","lightbox_enable_counter":"yes","lightbox_enable_fullscreen":"yes","lightbox_enable_zoom":"yes","lightbox_enable_share":"yes","lightbox_title_src":"title","lightbox_description_src":"description"},"post":{"id":76783,"title":"Cybersecurity%20Exchange%20%7C%20Cybersecurity%20Courses%2C%20Training%20%26%20Certification%20%7C%20EC-Council","excerpt":"","featuredImage":false}}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/js/frontend.min.js?ver=3.25.10" id="elementor-frontend-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/js/elements-handlers.min.js?ver=3.25.4" id="pro-elements-handlers-js"></script> <script> jQuery(window).scroll(function(){ var banrht; if((jQuery(window).width() >= 1920)){ banrht=450; } else{ banrht=350; } if (jQuery(this).scrollTop() > banrht) { jQuery('#blog_sidebar').addClass('stickyonscroll'); } else { jQuery('#blog_sidebar').removeClass('stickyonscroll'); } if((jQuery(window).scrollTop() + window.innerHeight > jQuery(document).height() - 2020) && (jQuery(window).height() <= 2200)) { jQuery('#blog_sidebar').addClass('sticky-bottom'); } else{ jQuery('#blog_sidebar').removeClass('sticky-bottom'); } }); </script> <script> jQuery(document).ready(function(){ jQuery('article.type-post .post-entry-content a, article.type-post .the7-simple-post-thumb a, article.type-post .post-thumbnail-wrap a').attr('target','_blank'); }); </script> <script> jQuery(document).ready(function () { var country = { "BD": "Bangladesh", "BE": "Belgium", "BF": "Burkina Faso", "BG": "Bulgaria", "BA": "Bosnia and Herzegovina", "BB": "Barbados", "WF": "Wallis and Futuna", "BL": "Saint Barthelemy", "BM": "Bermuda", "BN": "Brunei", "BO": "Bolivia", "BH": "Bahrain", "BI": "Burundi", "BJ": "Benin", "BT": "Bhutan", "JM": "Jamaica", "BV": "Bouvet Island", "BW": "Botswana", "WS": "Samoa", "BQ": "Bonaire, Saint Eustatius and Saba ", "BR": "Brazil", "BS": "Bahamas", "JE": "Jersey", "BY": "Belarus", "BZ": "Belize", "RU": "Russia", "RW": "Rwanda", "RS": "Serbia", "TL": "East Timor", "RE": "Reunion", "TM": "Turkmenistan", "TJ": "Tajikistan", "RO": "Romania", "TK": "Tokelau", "GW": "Guinea-Bissau", "GU": "Guam", "GT": "Guatemala", "GS": "South Georgia and the South Sandwich Islands", "GR": "Greece", "GQ": "Equatorial Guinea", "GP": "Guadeloupe", "JP": "Japan", "GY": "Guyana", "GG": "Guernsey", "GF": "French Guiana", "GE": "Georgia", "GD": "Grenada", "GB": "United Kingdom", "GA": "Gabon", "SV": "El Salvador", "GN": "Guinea", "GM": "Gambia", "GL": "Greenland", "GI": "Gibraltar", "GH": "Ghana", "OM": "Oman", "TN": "Tunisia", "JO": "Jordan", "HR": "Croatia", "HT": "Haiti", "HU": "Hungary", "HK": "Hong Kong", "HN": "Honduras", "HM": "Heard Island and McDonald Islands", "VE": "Venezuela", "PR": "Puerto Rico", "PS": "Palestinian Territory", "PW": "Palau", "PT": "Portugal", "SJ": "Svalbard and Jan Mayen", "PY": "Paraguay", "IQ": "Iraq", "PA": "Panama", "PF": "French Polynesia", "PG": "Papua New Guinea", "PE": "Peru", "PK": "Pakistan", "PH": "Philippines", "PN": "Pitcairn", "PL": "Poland", "PM": "Saint Pierre and Miquelon", "ZM": "Zambia", "EH": "Western Sahara", "EE": "Estonia", "EG": "Egypt", "ZA": "South Africa", "EC": "Ecuador", "IT": "Italy", "VN": "Vietnam", "SB": "Solomon Islands", "ET": "Ethiopia", "SO": "Somalia", "ZW": "Zimbabwe", "SA": "Saudi Arabia", "ES": "Spain", "ER": "Eritrea", "ME": "Montenegro", "MD": "Moldova", "MG": "Madagascar", "MF": "Saint Martin", "MA": "Morocco", "MC": "Monaco", "UZ": "Uzbekistan", "MM": "Myanmar", "ML": "Mali", "MO": "Macao", "MN": "Mongolia", "MH": "Marshall Islands", "MK": "Macedonia", "MU": "Mauritius", "MT": "Malta", "MW": "Malawi", "MV": "Maldives", "MQ": "Martinique", "MP": "Northern Mariana Islands", "MS": "Montserrat", "MR": "Mauritania", "IM": "Isle of Man", "UG": "Uganda", "TZ": "Tanzania", "MY": "Malaysia", "MX": "Mexico", "IL": "Israel", "FR": "France", "IO": "British Indian Ocean Territory", "SH": "Saint Helena", "FI": "Finland", "FJ": "Fiji", "FK": "Falkland Islands", "FM": "Micronesia", "FO": "Faroe Islands", "NI": "Nicaragua", "NL": "Netherlands", "NO": "Norway", "NA": "Namibia", "VU": "Vanuatu", "NC": "New Caledonia", "NE": "Niger", "NF": "Norfolk Island", "NG": "Nigeria", "NZ": "New Zealand", "NP": "Nepal", "NR": "Nauru", "NU": "Niue", "CK": "Cook Islands", "XK": "Kosovo", "CI": "Ivory Coast", "CH": "Switzerland", "CO": "Colombia", "CN": "China", "CM": "Cameroon", "CL": "Chile", "CC": "Cocos Islands", "CA": "Canada", "CG": "Republic of the Congo", "CF": "Central African Republic", "CD": "Democratic Republic of the Congo", "CZ": "Czech Republic", "CY": "Cyprus", "CX": "Christmas Island", "CR": "Costa Rica", "CW": "Curacao", "CV": "Cape Verde", "CU": "Cuba", "SZ": "Swaziland", "SY": "Syria", "SX": "Sint Maarten", "KG": "Kyrgyzstan", "KE": "Kenya", "SS": "South Sudan", "SR": "Suriname", "KI": "Kiribati", "KH": "Cambodia", "KN": "Saint Kitts and Nevis", "KM": "Comoros", "ST": "Sao Tome and Principe", "SK": "Slovakia", "KR": "South Korea", "SI": "Slovenia", "KP": "North Korea", "KW": "Kuwait", "SN": "Senegal", "SM": "San Marino", "SL": "Sierra Leone", "SC": "Seychelles", "KZ": "Kazakhstan", "KY": "Cayman Islands", "SG": "Singapore", "SE": "Sweden", "SD": "Sudan", "DO": "Dominican Republic", "DM": "Dominica", "DJ": "Djibouti", "DK": "Denmark", "VG": "British Virgin Islands", "DE": "Germany", "YE": "Yemen", "DZ": "Algeria", "US": "United States", "UY": "Uruguay", "YT": "Mayotte", "UM": "United States Minor Outlying Islands", "LB": "Lebanon", "LC": "Saint Lucia", "LA": "Laos", "TV": "Tuvalu", "TW": "Taiwan", "TT": "Trinidad and Tobago", "TR": "Turkey", "LK": "Sri Lanka", "LI": "Liechtenstein", "LV": "Latvia", "TO": "Tonga", "LT": "Lithuania", "LU": "Luxembourg", "LR": "Liberia", "LS": "Lesotho", "TH": "Thailand", "TF": "French Southern Territories", "TG": "Togo", "TD": "Chad", "TC": "Turks and Caicos Islands", "LY": "Libya", "VA": "Vatican", "VC": "Saint Vincent and the Grenadines", "AE": "United Arab Emirates", "AD": "Andorra", "AG": "Antigua and Barbuda", "AF": "Afghanistan", "AI": "Anguilla", "VI": "U.S. Virgin Islands", "IS": "Iceland", "IR": "Iran", "AM": "Armenia", "AL": "Albania", "AO": "Angola", "AQ": "Antarctica", "AS": "American Samoa", "AR": "Argentina", "AU": "Australia", "AT": "Austria", "AW": "Aruba", "IN": "India", "AX": "Aland Islands", "AZ": "Azerbaijan", "IE": "Ireland", "ID": "Indonesia", "UA": "Ukraine", "QA": "Qatar", "MZ": "Mozambique" } jQuery.getJSON('https://ipinfo.io/?token=0bf8c6f3cbc2ca', function (data) { countryName = data.country; var cntry = country[countryName]; jQuery("#input_30_6_6 option[value='" + cntry + "']").attr("selected", "selected"); jQuery("#input_31_51_6 option[value='" + cntry + "']").attr("selected", "selected"); //input_30_6_6 }); // Disable Form on submit jQuery(".gform_button").click(function () { jQuery(document).ready(function () { jQuery(':input[type="submit"]').prop('disabled', true); jQuery('input[type="text"]').keyup(function () { if (jQuery(this).val() != '') { Query(':input[type="submit"]').prop('disabled', false); } }); }); }) }); </script> <script>var localize ={"ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","nonce":"e2d357eb78","i18n":{"added":"Added ","compare":"Compare","loading":"Loading..."},"eael_translate_text":{"required_text":"is a required field","invalid_text":"Invalid","billing_text":"Billing","shipping_text":"Shipping","fg_mfp_counter_text":"of"},"page_permalink":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","cart_redirectition":"no","cart_page_url":"","el_breakpoints":{"mobile":{"label":"Mobile Portrait","value":767,"default_value":767,"direction":"max","is_enabled":true},"mobile_extra":{"label":"Mobile Landscape","value":880,"default_value":880,"direction":"max","is_enabled":false},"tablet":{"label":"Tablet Portrait","value":1024,"default_value":1024,"direction":"max","is_enabled":true},"tablet_extra":{"label":"Tablet Landscape","value":1200,"default_value":1200,"direction":"max","is_enabled":false},"laptop":{"label":"Laptop","value":1366,"default_value":1366,"direction":"max","is_enabled":false},"widescreen":{"label":"Widescreen","value":2400,"default_value":2400,"direction":"min","is_enabled":false}}}</script><script id="eael-inline-js">(function(d,u,ac){var s=d.createElement('script');s.type='text/javascript';s.src='https://a.omappapi.com/app/js/api.min.js';s.async=true;s.dataset.user=u;s.dataset.account=ac;d.getElementsByTagName('head')[0].appendChild(s);})(document,159113,172974);;</script> <div class="pswp" tabindex="-1" role="dialog" aria-hidden="true"> <div class="pswp__bg"></div> <div class="pswp__scroll-wrap"> <div class="pswp__container"> <div class="pswp__item"></div> <div class="pswp__item"></div> <div class="pswp__item"></div> </div> <div class="pswp__ui pswp__ui--hidden"> <div class="pswp__top-bar"> <div class="pswp__counter"></div> <button class="pswp__button pswp__button--close" title="Close (Esc)" aria-label="Close (Esc)"></button> <button class="pswp__button pswp__button--share" title="Share" aria-label="Share"></button> <button class="pswp__button pswp__button--fs" title="Toggle fullscreen" aria-label="Toggle fullscreen"></button> <button class="pswp__button pswp__button--zoom" title="Zoom in/out" aria-label="Zoom in/out"></button> <div class="pswp__preloader"> <div class="pswp__preloader__icn"> <div class="pswp__preloader__cut"> <div class="pswp__preloader__donut"></div> </div> </div> </div> </div> <div class="pswp__share-modal pswp__share-modal--hidden pswp__single-tap"> <div class="pswp__share-tooltip"></div> </div> <button class="pswp__button pswp__button--arrow--left" title="Previous (arrow left)" aria-label="Previous (arrow left)"> </button> <button class="pswp__button pswp__button--arrow--right" title="Next (arrow right)" aria-label="Next (arrow right)"> </button> <div class="pswp__caption"> <div class="pswp__caption__center"></div> </div> </div> </div> </div> </body> </html>