CINXE.COM

What is Digital Forensics | Phases of Digital Forensics | EC-Council

<!DOCTYPE html> <!--[if !(IE 6) | !(IE 7) | !(IE 8) ]><!--> <html lang="en-US" class="no-js"> <!--<![endif]--> <head> <meta charset="UTF-8" /> <script> var gform;gform||(document.addEventListener("gform_main_scripts_loaded",function(){gform.scriptsLoaded=!0}),document.addEventListener("gform/theme/scripts_loaded",function(){gform.themeScriptsLoaded=!0}),window.addEventListener("DOMContentLoaded",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>"function"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn("The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1."),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener("gform_main_scripts_loaded",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener("gform/theme/scripts_loaded",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener("DOMContentLoaded",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook("action",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook("filter",o,r,e,t)},doAction:function(o){gform.doHook("action",o,arguments)},applyFilters:function(o){return gform.doHook("filter",o,arguments)},removeAction:function(o,r){gform.removeHook("action",o,r)},removeFilter:function(o,r,e){gform.removeHook("filter",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+"_"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){"function"!=typeof(t=o.callable)&&(t=window[t]),"action"==r?t.apply(null,e):e[0]=t.apply(null,e)})),"filter"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}}); </script> <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=1"> <link rel="profile" href="https://gmpg.org/xfn/11" /> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style> <!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v24.3) - https://yoast.com/wordpress/plugins/seo/ --> <title>What is Digital Forensics | Phases of Digital Forensics | EC-Council</title> <meta name="description" content="Digital forensics or digital forensic science, is a branch of forensic science that focuses on the recovery and investigation of material related to cybercrime, found in digital devices." /> <link rel="canonical" href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="What is Digital Forensics | Phases of Digital Forensics | EC-Council" /> <meta property="og:description" content="Digital forensics or digital forensic science, is a branch of forensic science that focuses on the recovery and investigation of material related to cybercrime, found in digital devices." /> <meta property="og:url" content="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/" /> <meta property="og:site_name" content="Cybersecurity Exchange" /> <meta property="article:published_time" content="2024-03-06T16:14:20+00:00" /> <meta property="article:modified_time" content="2024-08-20T11:43:31+00:00" /> <meta property="og:image" content="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-Is-Digital-Forensics-feature.jpg" /> <meta property="og:image:width" content="521" /> <meta property="og:image:height" content="521" /> <meta property="og:image:type" content="image/jpeg" /> <meta name="author" content="EC-Council" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:title" content="What is Digital Forensics | Phases of Digital Forensics | EC-Council" /> <meta name="twitter:description" content="Digital forensics or digital forensic science, is a branch of forensic science that focuses on the recovery and investigation of material related to cybercrime, found in digital devices." /> <meta name="twitter:image" content="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-Is-Digital-Forensics-feature.jpg" /> <meta name="twitter:label1" content="Written by" /> <meta name="twitter:data1" content="EC-Council" /> <meta name="twitter:label2" content="Est. reading time" /> <meta name="twitter:data2" content="13 minutes" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"Article","@id":"https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/#article","isPartOf":{"@id":"https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/"},"author":{"name":"EC-Council","@id":"https://eccouncil.org/cybersecurity-exchange/#/schema/person/8555903cd3282bafc49158c53da8f806"},"headline":"What is Digital Forensics","datePublished":"2024-03-06T16:14:20+00:00","dateModified":"2024-08-20T11:43:31+00:00","mainEntityOfPage":{"@id":"https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/"},"wordCount":2706,"publisher":{"@id":"https://eccouncil.org/cybersecurity-exchange/#organization"},"image":{"@id":"https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/#primaryimage"},"thumbnailUrl":"https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-Is-Digital-Forensics-thumb.jpg","articleSection":["Computer Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/","url":"https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/","name":"What is Digital Forensics | Phases of Digital Forensics | EC-Council","isPartOf":{"@id":"https://eccouncil.org/cybersecurity-exchange/#website"},"primaryImageOfPage":{"@id":"https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/#primaryimage"},"image":{"@id":"https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/#primaryimage"},"thumbnailUrl":"https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-Is-Digital-Forensics-thumb.jpg","datePublished":"2024-03-06T16:14:20+00:00","dateModified":"2024-08-20T11:43:31+00:00","description":"Digital forensics or digital forensic science, is a branch of forensic science that focuses on the recovery and investigation of material related to cybercrime, found in digital devices.","breadcrumb":{"@id":"https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/#primaryimage","url":"https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-Is-Digital-Forensics-thumb.jpg","contentUrl":"https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-Is-Digital-Forensics-thumb.jpg","width":521,"height":521},{"@type":"BreadcrumbList","@id":"https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"EC-Council","item":"https://www.eccouncil.org/cybersecurity-exchange/"},{"@type":"ListItem","position":2,"name":"What is Digital Forensics"}]},{"@type":"WebSite","@id":"https://eccouncil.org/cybersecurity-exchange/#website","url":"https://eccouncil.org/cybersecurity-exchange/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https://eccouncil.org/cybersecurity-exchange/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://eccouncil.org/cybersecurity-exchange/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://eccouncil.org/cybersecurity-exchange/#organization","name":"Cybersecurity Exchange","url":"https://eccouncil.org/cybersecurity-exchange/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://eccouncil.org/cybersecurity-exchange/#/schema/logo/image/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https://eccouncil.org/cybersecurity-exchange/#/schema/logo/image/"}},{"@type":"Person","@id":"https://eccouncil.org/cybersecurity-exchange/#/schema/person/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}</script> <!-- / Yoast SEO Premium plugin. --> <link rel='dns-prefetch' href='//www.eccouncil.org' /> <link rel='dns-prefetch' href='//www.google.com' /> <link rel='dns-prefetch' href='//fonts.googleapis.com' /> <link rel="alternate" type="application/rss+xml" title="Cybersecurity Exchange &raquo; Feed" href="https://www.eccouncil.org/cybersecurity-exchange/feed/" /> <link rel="alternate" type="application/rss+xml" title="Cybersecurity Exchange &raquo; Comments Feed" href="https://www.eccouncil.org/cybersecurity-exchange/comments/feed/" /> <script> window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.7.1"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); </script> <style id='wp-emoji-styles-inline-css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <style id='classic-theme-styles-inline-css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #FFF;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--color--accent: #999999;--wp--preset--color--dark-gray: #111;--wp--preset--color--light-gray: #767676;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='the7-font-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/fonts/icomoon-the7-font/icomoon-the7-font.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='the7-awesome-fonts-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/fonts/FontAwesome/css/all.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='elementor-frontend-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/frontend.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='widget-image-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-image.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='e-animation-fadeInDown-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/lib/animations/styles/fadeInDown.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='the7_horizontal-menu-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-horizontal-menu-widget.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='the7-icon-widget-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-icon-widget.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='the7-e-sticky-effect-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-sticky-effects.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='widget-social-icons-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-social-icons.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='e-apple-webkit-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/conditionals/apple-webkit.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='widget-text-editor-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-text-editor.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='widget-divider-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-divider.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='eael-general-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/css/view/general.min.css?ver=6.1.1' media='all' /> <link rel='stylesheet' id='eael-79875-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/essential-addons-elementor/eael-79875.css?ver=1724154211' media='all' /> <link rel='stylesheet' id='widget-heading-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-heading.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='widget-share-buttons-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/css/widget-share-buttons.min.css?ver=3.25.5' media='all' /> <link rel='stylesheet' id='widget-spacer-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-spacer.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='widget-author-box-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/css/widget-author-box.min.css?ver=3.25.5' media='all' /> <link rel='stylesheet' id='the7-filter-decorations-base-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-filter-decorations-base.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='the7-simple-common-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-simple-common.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='the7-elements-simple-posts-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-simple-posts.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='gravity_forms_theme_reset-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityforms/assets/css/dist/gravity-forms-theme-reset.min.css?ver=2.9.1' media='all' /> <link rel='stylesheet' id='gravity_forms_theme_foundation-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityforms/assets/css/dist/gravity-forms-theme-foundation.min.css?ver=2.9.1' media='all' /> <link rel='stylesheet' id='gravity_forms_theme_framework-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityforms/assets/css/dist/gravity-forms-theme-framework.min.css?ver=2.9.1' media='all' /> <link rel='stylesheet' id='elementor-post-19542-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-19542.css?ver=1735024234' media='all' /> <link rel='stylesheet' id='e-popup-style-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/css/conditionals/popup.min.css?ver=3.25.5' media='all' /> <link rel='stylesheet' id='e-animation-grow-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/lib/animations/styles/e-animation-grow.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='widget-video-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-video.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='widget-accordion-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-accordion.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='widget-image-box-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-image-box.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='widget-tabs-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-tabs.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='elementor-post-81588-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-81588.css?ver=1735025749' media='all' /> <link rel='stylesheet' id='elementor-post-80080-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-80080.css?ver=1735024234' media='all' /> <link rel='stylesheet' id='elementor-post-50845-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-50845.css?ver=1735024235' media='all' /> <link rel='stylesheet' id='elementor-post-21569-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-21569.css?ver=1735024235' media='all' /> <link rel='stylesheet' id='elementor-post-79875-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-79875.css?ver=1735024323' media='all' /> <link rel='stylesheet' id='dt-web-fonts-css' href='https://fonts.googleapis.com/css?family=Nunito+Sans:200,300,400,600,700%7CRoboto:400,600,700%7CNunito:300,400,600,700%7CMerriweather:400,600,700' media='all' /> <link rel='stylesheet' id='dt-main-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/main.min.css?ver=12.2.0' media='all' /> <style id='dt-main-inline-css'> body #load { display: block; height: 100%; overflow: hidden; position: fixed; width: 100%; z-index: 9901; opacity: 1; visibility: visible; transition: all .35s ease-out; } .load-wrap { width: 100%; height: 100%; background-position: center center; background-repeat: no-repeat; text-align: center; display: -ms-flexbox; display: -ms-flex; display: flex; -ms-align-items: center; -ms-flex-align: center; align-items: center; -ms-flex-flow: column wrap; flex-flow: column wrap; -ms-flex-pack: center; -ms-justify-content: center; justify-content: center; } .load-wrap > svg { position: absolute; top: 50%; left: 50%; transform: translate(-50%,-50%); } #load { background: var(--the7-elementor-beautiful-loading-bg,#ffffff); --the7-beautiful-spinner-color2: var(--the7-beautiful-spinner-color,rgba(0,0,0,0.12)); } </style> <link rel='stylesheet' id='the7-custom-scrollbar-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/lib/custom-scrollbar/custom-scrollbar.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='the7-core-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/dt-the7-core/assets/css/post-type.min.css?ver=2.7.10' media='all' /> <link rel='stylesheet' id='the7-css-vars-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/css-vars.css?ver=baeca5dfba94' media='all' /> <link rel='stylesheet' id='dt-custom-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/custom.css?ver=baeca5dfba94' media='all' /> <link rel='stylesheet' id='dt-media-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/media.css?ver=baeca5dfba94' media='all' /> <link rel='stylesheet' id='the7-mega-menu-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/mega-menu.css?ver=baeca5dfba94' media='all' /> <link rel='stylesheet' id='the7-elements-albums-portfolio-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/the7-elements-albums-portfolio.css?ver=baeca5dfba94' media='all' /> <link rel='stylesheet' id='the7-elements-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/the7-css/post-type-dynamic.css?ver=baeca5dfba94' media='all' /> <link rel='stylesheet' id='style-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7-child/style.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='the7-elementor-global-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/elementor-global.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='ecs-styles-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/ele-custom-skin/assets/css/ecs-style.css?ver=3.1.9' media='all' /> <link rel='stylesheet' id='elementor-post-78847-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-78847.css?ver=1698847797' media='all' /> <link rel='stylesheet' id='google-fonts-1-css' href='https://fonts.googleapis.com/css?family=DM+Sans%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic%7CInter%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic%7CAssistant%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic%7CRoboto%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic%7COverpass%3A100%2C100italic%2C200%2C200italic%2C300%2C300italic%2C400%2C400italic%2C500%2C500italic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic%2C900%2C900italic&#038;display=auto&#038;ver=6.7.1' media='all' /> <link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin><script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script id="dt-above-fold-js-extra"> var dtLocal = {"themeUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/themes\/dt-the7","passText":"To view this protected post, enter the password below:","moreButtonText":{"loading":"Loading...","loadMore":"Load more"},"postID":"81588","ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","REST":{"baseUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/the7\/v1","endpoints":{"sendMail":"\/send-mail"}},"contactMessages":{"required":"One or more fields have an error. Please check and try again.","terms":"Please accept the privacy policy.","fillTheCaptchaError":"Please, fill the captcha."},"captchaSiteKey":"","ajaxNonce":"3f9d1e1d83","pageData":"","themeSettings":{"smoothScroll":"off","lazyLoading":false,"desktopHeader":{"height":""},"ToggleCaptionEnabled":"disabled","ToggleCaption":"Navigation","floatingHeader":{"showAfter":94,"showMenu":false,"height":64,"logo":{"showLogo":true,"html":"","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"}},"topLine":{"floatingTopLine":{"logo":{"showLogo":false,"html":""}}},"mobileHeader":{"firstSwitchPoint":1150,"secondSwitchPoint":600,"firstSwitchPointHeight":60,"secondSwitchPointHeight":50,"mobileToggleCaptionEnabled":"right","mobileToggleCaption":"Menu"},"stickyMobileHeaderFirstSwitch":{"logo":{"html":""}},"stickyMobileHeaderSecondSwitch":{"logo":{"html":""}},"sidebar":{"switchPoint":992},"boxedWidth":"1280px"},"elementor":{"settings":{"container_width":1200}}}; var dtShare = {"shareButtonText":{"facebook":"Share on Facebook","twitter":"Share on X","pinterest":"Pin it","linkedin":"Share on Linkedin","whatsapp":"Share on Whatsapp"},"overlayOpacity":"90"}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/above-the-fold.min.js?ver=12.2.0" id="dt-above-fold-js"></script> <script id="ecs_ajax_load-js-extra"> var ecs_ajax_params = {"ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","posts":"{\"page\":0,\"name\":\"what-is-digital-forensics\",\"category_name\":\"computer-forensics\",\"error\":\"\",\"m\":\"\",\"p\":0,\"post_parent\":\"\",\"subpost\":\"\",\"subpost_id\":\"\",\"attachment\":\"\",\"attachment_id\":0,\"pagename\":\"\",\"page_id\":0,\"second\":\"\",\"minute\":\"\",\"hour\":\"\",\"day\":0,\"monthnum\":0,\"year\":0,\"w\":0,\"tag\":\"\",\"cat\":\"\",\"tag_id\":\"\",\"author\":\"\",\"author_name\":\"\",\"feed\":\"\",\"tb\":\"\",\"paged\":0,\"meta_key\":\"\",\"meta_value\":\"\",\"preview\":\"\",\"s\":\"\",\"sentence\":\"\",\"title\":\"\",\"fields\":\"\",\"menu_order\":\"\",\"embed\":\"\",\"category__in\":[],\"category__not_in\":[],\"category__and\":[],\"post__in\":[],\"post__not_in\":[],\"post_name__in\":[],\"tag__in\":[],\"tag__not_in\":[],\"tag__and\":[],\"tag_slug__in\":[],\"tag_slug__and\":[],\"post_parent__in\":[],\"post_parent__not_in\":[],\"author__in\":[],\"author__not_in\":[],\"search_columns\":[],\"post_type\":[\"post\",\"page\",\"e-landing-page\"],\"ignore_sticky_posts\":false,\"suppress_filters\":false,\"cache_results\":true,\"update_post_term_cache\":true,\"update_menu_item_cache\":false,\"lazy_load_term_meta\":true,\"update_post_meta_cache\":true,\"posts_per_page\":10,\"nopaging\":false,\"comments_per_page\":\"50\",\"no_found_rows\":false,\"order\":\"DESC\"}"}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/ele-custom-skin/assets/js/ecs_ajax_pagination.js?ver=3.1.9" id="ecs_ajax_load-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/ele-custom-skin/assets/js/ecs.js?ver=3.1.9" id="ecs-script-js"></script> <link rel="https://api.w.org/" href="https://www.eccouncil.org/cybersecurity-exchange/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://www.eccouncil.org/cybersecurity-exchange/wp-json/wp/v2/posts/81588" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.eccouncil.org/cybersecurity-exchange/xmlrpc.php?rsd" /> <meta name="generator" content="WordPress 6.7.1" /> <link rel='shortlink' href='https://www.eccouncil.org/cybersecurity-exchange/?p=81588' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://www.eccouncil.org/cybersecurity-exchange/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.eccouncil.org%2Fcybersecurity-exchange%2Fcomputer-forensics%2Fwhat-is-digital-forensics%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://www.eccouncil.org/cybersecurity-exchange/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.eccouncil.org%2Fcybersecurity-exchange%2Fcomputer-forensics%2Fwhat-is-digital-forensics%2F&#038;format=xml" /> <meta name="generator" content="Elementor 3.27.2; features: e_font_icon_svg; settings: css_print_method-external, google_font-enabled, font_display-auto"> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-M5VLP9X');</script> <!-- End Google Tag Manager --> <!--<script src="https://www.googleoptimize.com/optimize.js?id=GTM-5ZS5R76"></script>--> <!-- Global site tag (gtag.js) - Google Ads: 1028393842 --> <script async src="https://www.googletagmanager.com/gtag/js?id=AW-1028393842"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'AW-1028393842'); </script> <!--End--> <!-- This site is converting visitors into subscribers and customers with OptinMonster - https://optinmonster.com --> <script>(function(d,u,ac){var s=d.createElement('script');s.type='text/javascript';s.src='https://a.omappapi.com/app/js/api.min.js';s.async=true;s.dataset.user=u;s.dataset.account=ac;d.getElementsByTagName('head')[0].appendChild(s);})(document,159113,172974);</script> <!-- / https://optinmonster.com --> <style> .e-con.e-parent:nth-of-type(n+4):not(.e-lazyloaded):not(.e-no-lazyload), .e-con.e-parent:nth-of-type(n+4):not(.e-lazyloaded):not(.e-no-lazyload) * { background-image: none !important; } @media screen and (max-height: 1024px) { .e-con.e-parent:nth-of-type(n+3):not(.e-lazyloaded):not(.e-no-lazyload), .e-con.e-parent:nth-of-type(n+3):not(.e-lazyloaded):not(.e-no-lazyload) * { background-image: none !important; } } @media screen and (max-height: 640px) { .e-con.e-parent:nth-of-type(n+2):not(.e-lazyloaded):not(.e-no-lazyload), .e-con.e-parent:nth-of-type(n+2):not(.e-lazyloaded):not(.e-no-lazyload) * { background-image: none !important; } } </style> <script type="text/javascript" id="the7-loader-script"> document.addEventListener("DOMContentLoaded", function(event) { var load = document.getElementById("load"); if(!load.classList.contains('loader-removed')){ var removeLoading = setTimeout(function() { load.className += " loader-removed"; }, 300); } }); </script> <link rel="icon" href="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cropped-fav-icon-3-32x32.png" sizes="32x32" /> <link rel="icon" href="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cropped-fav-icon-3-192x192.png" sizes="192x192" /> <link rel="apple-touch-icon" href="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cropped-fav-icon-3-180x180.png" /> <meta name="msapplication-TileImage" content="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2022/04/cropped-fav-icon-3-270x270.png" /> <style id="wp-custom-css"> .eael-grid-post-holder-inner { min-height: 330px; } .elementor-heading-title { line-height: 1.3 !important} .menu-item-text, h5.ele-entry-title{ word-spacing:0 !important; } h5{ word-spacing: 0px; } h6.heading{ word-spacing: 0px !important; } .gform_legacy_markup_wrapper li.hidden_label input{ margin-top:0 !important; } </style> <style id='the7-custom-inline-css' type='text/css'> .sub-nav .menu-item i.fa, .sub-nav .menu-item i.fas, .sub-nav .menu-item i.far, .sub-nav .menu-item i.fab { text-align: center; width: 1.25em; } </style> </head> <body id="the7-body" class="post-template-default single single-post postid-81588 single-format-standard wp-embed-responsive the7-core-ver-2.7.10 no-comments title-off dt-responsive-on right-mobile-menu-close-icon ouside-menu-close-icon mobile-close-right-caption fade-thin-mobile-menu-close-icon fade-medium-menu-close-icon srcset-enabled btn-flat custom-btn-color custom-btn-hover-color first-switch-logo-left first-switch-menu-right second-switch-logo-left second-switch-menu-right right-mobile-menu layzr-loading-on no-avatars popup-message-style the7-ver-12.2.0 dt-fa-compatibility elementor-default elementor-template-full-width elementor-clear-template elementor-kit-19542 elementor-page elementor-page-81588 elementor-page-79875"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M5VLP9X" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- The7 12.2.0 --> <div id="load" class="spinner-loader"> <div class="load-wrap"><style type="text/css"> [class*="the7-spinner-animate-"]{ animation: spinner-animation 1s cubic-bezier(1,1,1,1) infinite; x:46.5px; y:40px; width:7px; height:20px; fill:var(--the7-beautiful-spinner-color2); opacity: 0.2; } .the7-spinner-animate-2{ animation-delay: 0.083s; } .the7-spinner-animate-3{ animation-delay: 0.166s; } .the7-spinner-animate-4{ animation-delay: 0.25s; } .the7-spinner-animate-5{ animation-delay: 0.33s; } .the7-spinner-animate-6{ animation-delay: 0.416s; } .the7-spinner-animate-7{ animation-delay: 0.5s; } .the7-spinner-animate-8{ animation-delay: 0.58s; } .the7-spinner-animate-9{ animation-delay: 0.666s; } .the7-spinner-animate-10{ animation-delay: 0.75s; } .the7-spinner-animate-11{ animation-delay: 0.83s; } .the7-spinner-animate-12{ animation-delay: 0.916s; } @keyframes spinner-animation{ from { opacity: 1; } to{ opacity: 0; } } </style> <svg width="75px" height="75px" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 100 100" preserveAspectRatio="xMidYMid"> <rect class="the7-spinner-animate-1" rx="5" ry="5" transform="rotate(0 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-2" rx="5" ry="5" transform="rotate(30 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-3" rx="5" ry="5" transform="rotate(60 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-4" rx="5" ry="5" transform="rotate(90 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-5" rx="5" ry="5" transform="rotate(120 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-6" rx="5" ry="5" transform="rotate(150 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-7" rx="5" ry="5" transform="rotate(180 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-8" rx="5" ry="5" transform="rotate(210 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-9" rx="5" ry="5" transform="rotate(240 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-10" rx="5" ry="5" transform="rotate(270 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-11" rx="5" ry="5" transform="rotate(300 50 50) translate(0 -30)"></rect> <rect class="the7-spinner-animate-12" rx="5" ry="5" transform="rotate(330 50 50) translate(0 -30)"></rect> </svg></div> </div> <div id="page" > <a class="skip-link screen-reader-text" href="#content">Skip to content</a> <div data-elementor-type="header" data-elementor-id="50845" class="elementor elementor-50845 elementor-location-header" data-elementor-post-type="elementor_library"> <section class="elementor-section elementor-top-section elementor-element elementor-element-968da6e the7-e-sticky-row-yes the7-e-sticky-effect-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="968da6e" data-element_type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;,&quot;the7_sticky_row&quot;:&quot;yes&quot;,&quot;the7_sticky_effects_offset&quot;:30,&quot;the7_sticky_effects&quot;:&quot;yes&quot;,&quot;the7_sticky_effects_devices&quot;:[&quot;desktop&quot;],&quot;the7_sticky_row_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;the7_sticky_row_offset&quot;:0}"> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-49473c7 elementor-hidden-tablet elementor-hidden-mobile" data-id="49473c7" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-fa8bc97 the7-img-sticky-size-effect-yes elementor-widget elementor-widget-image" data-id="fa8bc97" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <a href="https://www.eccouncil.org/cybersecurity-exchange"> <img loading="lazy" width="1087" height="650" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1.png" class="attachment-full size-full wp-image-77272" alt="EC-Council Cybersecurity Exchange Logo" srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1.png 1087w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1-300x179.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1-1024x612.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1-768x459.png 768w" sizes="(max-width: 1087px) 100vw, 1087px" /> </a> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-d76c1a4" data-id="d76c1a4" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-18944c0 items-decoration-yes sub-icon_align-side sub-menu-position-tablet-justify toggle-align-left decoration-downwards decoration-position-top mob-menu-popup elementor-widget__width-inherit show-sub-menu-on-hover horizontal-menu--dropdown-tablet decoration-align-height sub-menu-position-left dt-sub-menu_align-left sub-icon_position-right elementor-widget elementor-widget-the7_horizontal-menu" data-id="18944c0" data-element_type="widget" data-settings="{&quot;dropdown_type&quot;:&quot;popup&quot;,&quot;dropdown&quot;:&quot;tablet&quot;}" data-widget_type="the7_horizontal-menu.default"> <div class="elementor-widget-container"> <div class="horizontal-menu-wrap"><a class="horizontal-menu-toggle hidden-on-load" role="button" tabindex="0" aria-label="Menu Toggle" aria-expanded="false" href="#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6NzM2ODksInRvZ2dsZSI6ZmFsc2V9"><span class="right menu-toggle-icons" aria-hidden="true" role="presentation"></span></a><nav class="dt-nav-menu-horizontal--main dt-nav-menu-horizontal__container justify-content-end widget-divider- indicator-off"><ul class="dt-nav-menu-horizontal d-flex flex-row justify-content-end"><li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-77187 first depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Articles</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-82842 has-children depth-0"><a class='not-clickable-item' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Online Degree</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a><ul class="the7-e-sub-nav horizontal-sub-nav"><li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82845 first depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/master-degree-in-cyber-security-online/?utm_source=ecc&#038;utm_medium=blog-menu-link&#038;utm_campaign=mscs-degree' data-level='2'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Masters of Cyber Security</span></span><span class="submenu-indicator" ><svg aria-hidden="true" class="desktop-menu-icon e-font-icon-svg e-fas-caret-right" viewBox="0 0 192 512" xmlns="http://www.w3.org/2000/svg"><path d="M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z"></path></svg><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82859 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/masters-of-science-in-computer-science-mcs/?utm_source=ecc&#038;utm_medium=blog-menu-link&#038;utm_campaign=mcs-degree' data-level='2'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Master of Science in Computer Science</span></span><span class="submenu-indicator" ><svg aria-hidden="true" class="desktop-menu-icon e-font-icon-svg e-fas-caret-right" viewBox="0 0 192 512" xmlns="http://www.w3.org/2000/svg"><path d="M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z"></path></svg><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82860 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/mba-masters-business-administration/?utm_source=ecc&#038;utm_medium=blog-menu-link&#038;utm_campaign=mba-degree' data-level='2'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Masters In Business Administration</span></span><span class="submenu-indicator" ><svg aria-hidden="true" class="desktop-menu-icon e-font-icon-svg e-fas-caret-right" viewBox="0 0 192 512" xmlns="http://www.w3.org/2000/svg"><path d="M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z"></path></svg><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82844 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/bachelor-of-science-in-cyber-security/?utm_source=ecc&#038;utm_medium=blog-menu-link&#038;utm_campaign=bscs-degree' data-level='2'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Bachelors of Science in Cyber Security</span></span><span class="submenu-indicator" ><svg aria-hidden="true" class="desktop-menu-icon e-font-icon-svg e-fas-caret-right" viewBox="0 0 192 512" xmlns="http://www.w3.org/2000/svg"><path d="M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z"></path></svg><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82843 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/graduate-certificate-program/?utm_source=ecc&#038;utm_medium=blog-menu-link&#038;utm_campaign=graduate-degree' data-level='2'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Graduate Certificate Program</span></span><span class="submenu-indicator" ><svg aria-hidden="true" class="desktop-menu-icon e-font-icon-svg e-fas-caret-right" viewBox="0 0 192 512" xmlns="http://www.w3.org/2000/svg"><path d="M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z"></path></svg><span class="submenu-mob-indicator" ></span></span></span></a></li> </ul></li> <li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-78453 depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/whitepapers/' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Whitepapers</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-79632 depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/cyber-talks/' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Cyber Talks</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-79998 depth-0"><a href='https://www.eccouncil.org/success-stories/is-ceh-worth-it/?utm_source=cyberxchange-homepage&#038;utm_medium=website&#038;utm_campaign=success%20stories' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Success Stories</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a></li> <li class="gcb-btn menu-item menu-item-type-custom menu-item-object-custom menu-item-78176 last has-children depth-0 the7-e-mega-menu"><a href='https://www.eccouncil.org/train-certify/?utm_source=ecc-train-certify&#038;utm_medium=cybersecurity-exchange&#038;utm_campaign=ecc-blog-referral' target='_blank' class='not-clickable-item' data-level='1'><span class="item-content"><span class="menu-item-text "><span class="menu-text">Train &#038; Certify</span></span><span class="submenu-indicator" ><span class="submenu-mob-indicator" ></span></span></span></a><ul class="the7-e-sub-nav the7-e-mega-menu-sub-nav"><li> <div data-elementor-type="the7-mega-menu" data-elementor-id="78556" class="elementor elementor-78556 the7-e-mega-menu-content the7-e-mega-menu-width-full" data-elementor-post-type="elementor_library"> <div class="elementor-section-wrap"> <section class="elementor-section elementor-top-section elementor-element elementor-element-63fedec4 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="63fedec4" data-element_type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}"> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-65a36019" data-id="65a36019" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-2b953b65 elementor-widget elementor-widget-heading" data-id="2b953b65" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Certifications</h2> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-126d7885 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="126d7885" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-5a62212c" data-id="5a62212c" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-49cad7f5 elementor-widget elementor-widget-heading" data-id="49cad7f5" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/ethical-hacking/">ETHICAL HACKING</a></h6> </div> </div> <div class="elementor-element elementor-element-5af40aeb elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5af40aeb" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Ethical Hacker (C|EH)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ceh-master/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">C|EH (MASTER)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-5327f2e4 elementor-widget elementor-widget-heading" data-id="5327f2e4" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <p class="elementor-heading-title elementor-size-default"><a href="/train-certify/executive-management/">EXECUTIVE MANAGEMENT</a></p> </div> </div> <div class="elementor-element elementor-element-7c0f22c3 content-align-left icon-box-vertical-align-top icon-position-left icon-vertical-align-start elementor-widget elementor-widget-the7_icon_box_grid_widget" data-id="7c0f22c3" data-element_type="widget" data-widget_type="the7_icon_box_grid_widget.default"> <div class="elementor-widget-container"> <div class="the7-box-grid-wrapper the7-elementor-widget loading-effect-none the7_icon_box_grid_widget-7c0f22c3"> <div class="dt-css-grid"> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/certified-chief-information-security-officer-cciso/" target="_blank" aria-label="Certified Chief Information Security Officer (C|CISO)"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Certified Chief Information Security Officer (C|CISO) </div> </div> </div> </a> </div> </div> </div> </div> </div> <div class="elementor-element elementor-element-a32c621 content-align-left icon-box-vertical-align-top icon-position-left icon-vertical-align-start elementor-widget elementor-widget-the7_icon_box_grid_widget" data-id="a32c621" data-element_type="widget" data-widget_type="the7_icon_box_grid_widget.default"> <div class="elementor-widget-container"> <div class="the7-box-grid-wrapper the7-elementor-widget loading-effect-none the7_icon_box_grid_widget-a32c621"> <div class="dt-css-grid"> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/associate-cciso/" target="_blank" aria-label="Associate C|CISO"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Associate C|CISO </div> </div> </div> </a> </div> </div> </div> </div> </div> <div class="elementor-element elementor-element-791c93cb elementor-widget elementor-widget-heading" data-id="791c93cb" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/computer-forensics/">COMPUTER FORENSICS</a></h6> </div> </div> <div class="elementor-element elementor-element-277c8451 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="277c8451" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-hacking-forensic-investigator-chfi/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Computer Hacking Forensic Investigator (C|HFI)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-2f9ff8e9 elementor-widget elementor-widget-heading" data-id="2f9ff8e9" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/network-security/">NETWORK SECURITY</a></h6> </div> </div> <div class="elementor-element elementor-element-5cd38d09 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5cd38d09" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-network-security-course/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Network Defender (C|ND)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ics-scada-cybersecurity/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">ICS/SCADA Cybersecurity</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-55ce970e elementor-widget elementor-widget-heading" data-id="55ce970e" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/encryption/">ENCRYPTION</a></h6> </div> </div> <div class="elementor-element elementor-element-5b28a167 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5b28a167" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ec-council-certified-encryption-specialist-eces/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Encryption Specialist (E|CES)</span> </a> </li> </ul> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-54f4d41c" data-id="54f4d41c" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-53c75e7 elementor-widget elementor-widget-heading" data-id="53c75e7" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/pen-testing/">Pen testing</a></h6> </div> </div> <div class="elementor-element elementor-element-7dd26587 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="7dd26587" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-penetration-testing-professional-cpent/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Penetration Testing Professional (C|PENT)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-a086b3d elementor-widget elementor-widget-heading" data-id="a086b3d" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/incident-handling/">INCIDENT HANDLING</a></h6> </div> </div> <div class="elementor-element elementor-element-78ecf7d5 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="78ecf7d5" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ec-council-certified-incident-handler-ecih/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Incident Handler (E|CIH)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-threat-intelligence-analyst-ctia/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Threat Intelligence Analyst (C|TIA)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-soc-analyst-csa/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified SOC Analyst (C|SA)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-1e46b8e5 elementor-widget elementor-widget-heading" data-id="1e46b8e5" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/cloud-security/">CLOUD SECURITY</a></h6> </div> </div> <div class="elementor-element elementor-element-f7377f2 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="f7377f2" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-cloud-security-engineer-course/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Cloud Security Engineer (C|CSE)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-8d4389b elementor-widget elementor-widget-heading" data-id="8d4389b" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/dev-sec-ops/">DevSecOps</a></h6> </div> </div> <div class="elementor-element elementor-element-61a24ab9 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="61a24ab9" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-devsecops-engineer-ecde/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified DevSecOps Engineer (E|CDE)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-6f4a9983 elementor-widget elementor-widget-heading" data-id="6f4a9983" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/cyber-technician/">CYBER TECHNICIAN</a></h6> </div> </div> <div class="elementor-element elementor-element-1132d360 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="1132d360" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-cybersecurity-technician-certification/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Cybersecurity Technician (C|CT)</span> </a> </li> </ul> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-4411e0c2" data-id="4411e0c2" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-325058ee elementor-widget elementor-widget-heading" data-id="325058ee" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/blockchain/">BLOCKCHAIN</a></h6> </div> </div> <div class="elementor-element elementor-element-935b7c2 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="935b7c2" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/blockchain-developer-courses/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Blockchain Developer Certification (B|DC)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/blockchain-fintech-course-bfc/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Blockchain Fintech Certification (B|FC)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/blockchain-business-leader-certification-bblc/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Blockchain Business Leader Certification (B|BLC)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-55d76a6e elementor-widget elementor-widget-heading" data-id="55d76a6e" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/business-continuity-and-disaster-recovery/">BUSINESS CONTINUITY AND DISASTER RECOVERY</a></h6> </div> </div> <div class="elementor-element elementor-element-32df3ae8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="32df3ae8" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/business-continuity-and-disaster-recovery-training/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Disaster Recovery Professional (E|DRP)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-546f6f77 elementor-widget elementor-widget-heading" data-id="546f6f77" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/fundamentals/">FUNDAMENTALS</a></h6> </div> </div> <div class="elementor-element elementor-element-3bff0f8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="3bff0f8" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-secure-computer-user-cscu/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Certified Secure Computer User (C|SCU)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/certified-security-specialist-ecss/" target="_blank"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">EC-Council Certified Security Specialist (E|CSS)</span> </a> </li> </ul> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-36e786e1" data-id="36e786e1" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-40d2e2e2 elementor-widget elementor-widget-heading" data-id="40d2e2e2" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h6 class="elementor-heading-title elementor-size-default"><a href="/train-certify/essentials/">ESSENTIALS SERIES</a></h6> </div> </div> <div class="elementor-element elementor-element-3ea8398 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="3ea8398" data-element_type="widget" data-widget_type="icon-list.default"> <div class="elementor-widget-container"> <ul class="elementor-icon-list-items"> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/network-defense-essentials-nde/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Network Defense Essentials (N|DE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/ethical-hacking-essentials-ehe/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Ethical Hacking Essentials (E|HE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/digital-forensics-essentials-dfe/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Digital Forensics Essentials (D|FE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/devsecops-essentials-dse/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">DevSecOps Essentials (D|SE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/soc-essentials-course-sce/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">SOC Essentials (S|CE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/cloud-security-essentials-cse/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Cloud Security Essentials (C|SE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/iot-security-essentials-ise/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">IoT Security Essentials (I|SE)</span> </a> </li> <li class="elementor-icon-list-item"> <a href="https://www.eccouncil.org/train-certify/threat-intelligence-essentials-tie/"> <span class="elementor-icon-list-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-right" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z"></path></svg> </span> <span class="elementor-icon-list-text">Threat Intelligence Essentials (T|IE)</span> </a> </li> </ul> </div> </div> <div class="elementor-element elementor-element-4278dee2 elementor-widget elementor-widget-heading" data-id="4278dee2" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <p class="elementor-heading-title elementor-size-default"><a href="/train-certify/application-security/">APPLICATION SECURITY</a></p> </div> </div> <div class="elementor-element elementor-element-6907196 content-align-left icon-box-vertical-align-top icon-position-left icon-vertical-align-start elementor-widget elementor-widget-the7_icon_box_grid_widget" data-id="6907196" data-element_type="widget" data-widget_type="the7_icon_box_grid_widget.default"> <div class="elementor-widget-container"> <div class="the7-box-grid-wrapper the7-elementor-widget loading-effect-none the7_icon_box_grid_widget-6907196"> <div class="dt-css-grid"> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-net/" target="_blank" aria-label="Certified Application Security Engineer (C|ASE .NET)"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Certified Application Security Engineer (C|ASE .NET) </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/certified-application-security-engineer-case-java/" target="_blank" aria-label="Certified Application Security Engineer (C|ASE Java)"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Certified Application Security Engineer (C|ASE Java) </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://www.eccouncil.org/train-certify/certified-web-application-security-tester-wahs/" target="_blank" aria-label="Web Application Hacking and Security (W|AHS)"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Web Application Hacking and Security (W|AHS) </div> </div> </div> </a> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4a1b0d3b" data-id="4a1b0d3b" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-77eeb67f elementor-widget elementor-widget-heading" data-id="77eeb67f" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Micro Learning</h2> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-7502e767 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="7502e767" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-228d659b" data-id="228d659b" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-4b39ca95 content-align-left icon-box-vertical-align-top icon-position-left icon-vertical-align-start elementor-widget elementor-widget-the7_icon_box_grid_widget" data-id="4b39ca95" data-element_type="widget" data-widget_type="the7_icon_box_grid_widget.default"> <div class="elementor-widget-container"> <div class="the7-box-grid-wrapper the7-elementor-widget loading-effect-none the7_icon_box_grid_widget-4b39ca95"> <div class="dt-css-grid"> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/python-for-absolute-beginners?utm_source=ecc-website&#038;utm_medium=product-category&#038;utm_campaign=python-for-absolute-beginners" target="_blank" aria-label="Python Programming for Beginners"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Python Programming for Beginners </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/pro?utm_source=ecc-website&#038;utm_medium=product-category&#038;utm_campaign=learn-python-online&#038;logged=false" target="_blank" aria-label="Learn Python Online: From Novice to Pro"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Learn Python Online: From Novice to Pro </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://coderedmarketing.eccouncil.org/python-security-microdegree-program/?utm_source=ecc-website&#038;utm_medium=product-menu&#038;utm_campaign=microdegree-in-python-security" target="_blank" aria-label="Microdegree in Python Security"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Microdegree in Python Security </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://coderedmarketing.eccouncil.org/php-security-microdegree/" target="_blank" aria-label="Microdegree in PHP Security"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Microdegree in PHP Security </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/identity-and-access-management?utm_source=ecc-website&#038;utm_medium=product-category&#038;utm_campaign=identity-and-access-management" target="_blank" aria-label="Identity and Access Management"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Identity and Access Management </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/ubuntu-linux-fundamentals-learn-linux-server-with-ubuntu?utm_source=ecc-website&#038;utm_medium=programs-category&#038;utm_campaign=linux-fundamentals" target="_blank" aria-label="Linux Fundamentals"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Linux Fundamentals </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/linux-server-administration-made-easy-with-hands-on-training?utm_source=ecc-website&#038;utm_medium=product-category&#038;utm_campaign=linux-server-administration-made-easy-with-hands-on-training" target="_blank" aria-label="Linux-Server Administration"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Linux-Server Administration </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/cybersecurity-for-blockchain-from-ground-up?utm_source=ecc-menu&#038;utm_medium=webiste&#038;logged=false" target="_blank" aria-label="Cybersecurity for Blockchain from Ground Up"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Cybersecurity for Blockchain from Ground Up </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/cybersecurity-for-businesses-the-fundamental-edition?utm_source=ecc-website&#038;utm_medium=programs-category&#038;utm_campaign=cybersecurity-for-businesses" target="_blank" aria-label="Cybersecurity for Business"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Cybersecurity for Business </div> </div> </div> </a> </div> <div class="wf-cell shown"> <a class="the7-icon-box-grid box-hover" href="https://codered.eccouncil.org/course/email-phishing?utm_source=ecc-website&#038;utm_medium=programs-category&#038;utm_campaign=email-phishing" target="_blank" aria-label="Email Phishing"> <div class="box-content-wrapper"> <div class="elementor-icon-div"> <div class="elementor-icon"> <svg aria-hidden="true" class="e-font-icon-svg e-fas-angle-right" viewBox="0 0 256 512" xmlns="http://www.w3.org/2000/svg"><path d="M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z"></path></svg> </div> </div> <div class="box-content"> <div class="box-heading"> Email Phishing </div> </div> </div> </a> </div> </div> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </section> </div> </div> </li></ul></li> </ul></nav></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-5a0164f elementor-hidden-desktop" data-id="5a0164f" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-a88f71b elementor-widget elementor-widget-image" data-id="a88f71b" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <a href="https://www.eccouncil.org/cybersecurity-exchange"> <img loading="lazy" width="1087" height="650" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab.png" class="attachment-full size-full wp-image-77265" alt="EC-Council_Cybersecurity-Exchange-tab" srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab.png 1087w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-300x179.png 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-1024x612.png 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2021/12/EC-Council_Cybersecurity-Exchange-tab-768x459.png 768w" sizes="(max-width: 1087px) 100vw, 1087px" /> </a> </div> </div> </div> </div> <div class="elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-3dd1f80" data-id="3dd1f80" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-3a79a7b elementor-widget__width-auto elementor-hidden-desktop elementor-align-center elementor-widget elementor-widget-the7_icon_widget" data-id="3a79a7b" data-element_type="widget" data-widget_type="the7_icon_widget.default"> <div class="elementor-widget-container"> <div class="the7-icon-wrapper the7-elementor-widget"><a class="elementor-icon" href="#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjczNjg5IiwidG9nZ2xlIjpmYWxzZX0%3D"><svg aria-hidden="true" class="e-font-icon-svg e-fas-bars" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M16 132h416c8.837 0 16-7.163 16-16V76c0-8.837-7.163-16-16-16H16C7.163 60 0 67.163 0 76v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16z"></path></svg></a></div> </div> </div> </div> </div> </div> </section> </div> <div id="main" class="sidebar-none sidebar-divider-off"> <div class="main-gradient"></div> <div class="wf-wrap"> <div class="wf-container-main"> <div id="content" class="content" role="main"> <div data-elementor-type="single-post" data-elementor-id="79875" class="elementor elementor-79875 elementor-location-single post-81588 post type-post status-publish format-standard has-post-thumbnail category-computer-forensics" data-elementor-post-type="elementor_library"> <section class="elementor-section elementor-top-section elementor-element elementor-element-40dd92f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="40dd92f9" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-6736252e" data-id="6736252e" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <section class="elementor-section elementor-inner-section elementor-element elementor-element-59b39393 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="59b39393" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-21f8e14b" data-id="21f8e14b" data-element_type="column" id="content-post"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-9922d6a elementor-widget elementor-widget-image" data-id="9922d6a" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <img loading="lazy" width="1024" height="512" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-Is-Digital-Forensics-blog.jpg" class="attachment-large size-large wp-image-81591" alt="" srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-Is-Digital-Forensics-blog.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-Is-Digital-Forensics-blog-300x150.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-Is-Digital-Forensics-blog-768x384.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /> </div> </div> <div class="elementor-element elementor-element-1d52824 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading" data-id="1d52824" data-element_type="widget" data-widget_type="theme-post-title.default"> <div class="elementor-widget-container"> <h1 class="elementor-heading-title elementor-size-default">What is Digital Forensics</h1> </div> </div> <div class="elementor-element elementor-element-69efe99 elementor-widget__width-auto elementor-widget elementor-widget-text-editor" data-id="69efe99" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> March 6, 2024 </div> </div> <div class="elementor-element elementor-element-fb4de51 elementor-widget__width-auto elementor-widget elementor-widget-text-editor" data-id="fb4de51" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> | Computer Forensics </div> </div> <div class="elementor-element elementor-element-9e63698 elementor-share-buttons--view-icon elementor-share-buttons--skin-flat elementor-grid-1 elementor-widget__width-auto elementor-fixed elementor-hidden-mobile elementor-share-buttons--shape-square elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons" data-id="9e63698" data-element_type="widget" data-settings="{&quot;_position&quot;:&quot;fixed&quot;}" data-widget_type="share-buttons.default"> <div class="elementor-widget-container"> <div class="elementor-grid"> <div class="elementor-grid-item"> <div class="elementor-share-btn elementor-share-btn_facebook" role="button" tabindex="0" aria-label="Share on facebook" > <span class="elementor-share-btn__icon"> <svg class="e-font-icon-svg e-fab-facebook" viewBox="0 0 512 512" xmlns="http://www.w3.org/2000/svg"><path d="M504 256C504 119 393 8 256 8S8 119 8 256c0 123.78 90.69 226.38 209.25 245V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.28c-30.8 0-40.41 19.12-40.41 38.73V256h68.78l-11 71.69h-57.78V501C413.31 482.38 504 379.78 504 256z"></path></svg> </span> </div> </div> <div class="elementor-grid-item"> <div class="elementor-share-btn elementor-share-btn_twitter" role="button" tabindex="0" aria-label="Share on twitter" > <span class="elementor-share-btn__icon"> <svg class="e-font-icon-svg e-fab-twitter" viewBox="0 0 512 512" xmlns="http://www.w3.org/2000/svg"><path d="M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z"></path></svg> </span> </div> </div> <div class="elementor-grid-item"> <div class="elementor-share-btn elementor-share-btn_linkedin" role="button" tabindex="0" aria-label="Share on linkedin" > <span class="elementor-share-btn__icon"> <svg class="e-font-icon-svg e-fab-linkedin" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z"></path></svg> </span> </div> </div> <div class="elementor-grid-item"> <div class="elementor-share-btn elementor-share-btn_whatsapp" role="button" tabindex="0" aria-label="Share on whatsapp" > <span class="elementor-share-btn__icon"> <svg class="e-font-icon-svg e-fab-whatsapp" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M380.9 97.1C339 55.1 283.2 32 223.9 32c-122.4 0-222 99.6-222 222 0 39.1 10.2 77.3 29.6 111L0 480l117.7-30.9c32.4 17.7 68.9 27 106.1 27h.1c122.3 0 224.1-99.6 224.1-222 0-59.3-25.2-115-67.1-157zm-157 341.6c-33.2 0-65.7-8.9-94-25.7l-6.7-4-69.8 18.3L72 359.2l-4.4-7c-18.5-29.4-28.2-63.3-28.2-98.2 0-101.7 82.8-184.5 184.6-184.5 49.3 0 95.6 19.2 130.4 54.1 34.8 34.9 56.2 81.2 56.1 130.5 0 101.8-84.9 184.6-186.6 184.6zm101.2-138.2c-5.5-2.8-32.8-16.2-37.9-18-5.1-1.9-8.8-2.8-12.5 2.8-3.7 5.6-14.3 18-17.6 21.8-3.2 3.7-6.5 4.2-12 1.4-32.6-16.3-54-29.1-75.5-66-5.7-9.8 5.7-9.1 16.3-30.3 1.8-3.7.9-6.9-.5-9.7-1.4-2.8-12.5-30.1-17.1-41.2-4.5-10.8-9.1-9.3-12.5-9.5-3.2-.2-6.9-.2-10.6-.2-3.7 0-9.7 1.4-14.8 6.9-5.1 5.6-19.4 19-19.4 46.3 0 27.3 19.9 53.7 22.6 57.4 2.8 3.7 39.1 59.7 94.8 83.8 35.2 15.2 49 16.5 66.6 13.9 10.7-1.6 32.8-13.4 37.4-26.4 4.6-13 4.6-24.1 3.2-26.4-1.3-2.5-5-3.9-10.5-6.6z"></path></svg> </span> </div> </div> <div class="elementor-grid-item"> <div class="elementor-share-btn elementor-share-btn_pinterest" role="button" tabindex="0" aria-label="Share on pinterest" > <span class="elementor-share-btn__icon"> <svg class="e-font-icon-svg e-fab-pinterest" viewBox="0 0 496 512" xmlns="http://www.w3.org/2000/svg"><path d="M496 256c0 137-111 248-248 248-25.6 0-50.2-3.9-73.4-11.1 10.1-16.5 25.2-43.5 30.8-65 3-11.6 15.4-59 15.4-59 8.1 15.4 31.7 28.5 56.8 28.5 74.8 0 128.7-68.8 128.7-154.3 0-81.9-66.9-143.2-152.9-143.2-107 0-163.9 71.8-163.9 150.1 0 36.4 19.4 81.7 50.3 96.1 4.7 2.2 7.2 1.2 8.3-3.3.8-3.4 5-20.3 6.9-28.1.6-2.5.3-4.7-1.7-7.1-10.1-12.5-18.3-35.3-18.3-56.6 0-54.7 41.4-107.6 112-107.6 60.9 0 103.6 41.5 103.6 100.9 0 67.1-33.9 113.6-78 113.6-24.3 0-42.6-20.1-36.7-44.8 7-29.5 20.5-61.3 20.5-82.6 0-19-10.2-34.9-31.4-34.9-24.9 0-44.9 25.7-44.9 60.2 0 22 7.4 36.8 7.4 36.8s-24.5 103.8-29 123.2c-5 21.4-3 51.6-.9 71.2C65.4 450.9 0 361.1 0 256 0 119 111 8 248 8s248 111 248 248z"></path></svg> </span> </div> </div> </div> </div> </div> <div class="elementor-element elementor-element-9bc9d0a elementor-widget elementor-widget-theme-post-content" data-id="9bc9d0a" data-element_type="widget" data-widget_type="theme-post-content.default"> <div class="elementor-widget-container"> <div data-elementor-type="wp-post" data-elementor-id="81588" class="elementor elementor-81588" data-elementor-post-type="post"> <section class="elementor-section elementor-top-section elementor-element elementor-element-3b3cff6 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="3b3cff6" data-element_type="section"> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a24ebee" data-id="a24ebee" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-3913eca elementor-widget elementor-widget-text-editor" data-id="3913eca" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> Digital forensic science is a branch of forensic science that focuses on the recovery and investigation of material found in digital devices related to cybercrime. The term digital forensics was first used as a synonym for computer forensics. Since then, it has expanded to cover the investigation of any devices that can store digital data. Although the first computer crime was reported in 1978, followed by the Florida computers act, it wasn’t until the 1990s that it became a recognized term. It was only in the early 21st century that national policies on digital forensics emerged. Digital forensics is the process of identifying, preserving, analyzing, and documenting digital evidence. This is done in order to present evidence in a court of law when required. </div> </div> <div class="elementor-element elementor-element-eff8123 elementor-widget elementor-widget-text-editor" data-id="eff8123" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <em>“Digital forensics is the process of uncovering and interpreting electronic data. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying, and validating the digital information to reconstruct past events.</em> <em>The context is most often for the usage of data in a court of law, though digital forensics can be used in other instances.”</em> <em><a href="https://www.techopedia.com/definition/27805/digital-forensics" style="text-align:center; color:orange; display:block; padding-top:10px;">-Techopedia</a></em> </div> </div> <div class="elementor-element elementor-element-f27ef6e elementor-widget elementor-widget-heading" data-id="f27ef6e" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">How Well Do You Know Digital Forensics? </h2> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-1520c38 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="1520c38" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b695709" data-id="b695709" data-element_type="column" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-d93e7cf elementor-widget elementor-widget-heading" data-id="d93e7cf" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Steps of Digital Forensics</h2> </div> </div> <div class="elementor-element elementor-element-87c755d elementor-widget elementor-widget-text-editor" data-id="87c755d" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> In order for digital evidence to be accepted in a court of law, it must be handled in a very specific way so that there is no opportunity for cyber criminals to tamper with the evidence. </div> </div> </div> </div> <div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-09ef02a" data-id="09ef02a" data-element_type="column" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-c466c09 elementor-widget elementor-widget-heading" data-id="c466c09" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">1. Identification</h2> </div> </div> <div class="elementor-element elementor-element-59775b2 elementor-widget elementor-widget-text-editor" data-id="59775b2" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> First, find the evidence, noting where it is stored. </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-inner-section elementor-element elementor-element-49c819a elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="49c819a" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e9b989f" data-id="e9b989f" data-element_type="column" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-ef3b289 elementor-widget elementor-widget-heading" data-id="ef3b289" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">2. Preservation</h2> </div> </div> <div class="elementor-element elementor-element-b882697 elementor-widget elementor-widget-text-editor" data-id="b882697" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>Next, isolate, secure, and preserve the data. This includes preventing people from possibly tampering with the evidence.</p> </div> </div> </div> </div> <div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1e92c09" data-id="1e92c09" data-element_type="column" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-1a3a3b7 elementor-widget elementor-widget-heading" data-id="1a3a3b7" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">3. Analysis</h2> </div> </div> <div class="elementor-element elementor-element-fc837bf elementor-widget elementor-widget-text-editor" data-id="fc837bf" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> Next, reconstruct fragments of data and draw conclusions based on the evidence found. </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-inner-section elementor-element elementor-element-33aaa5a elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="33aaa5a" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-38f949e" data-id="38f949e" data-element_type="column" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-1b3f9e2 elementor-widget elementor-widget-heading" data-id="1b3f9e2" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">4. Documentation</h2> </div> </div> <div class="elementor-element elementor-element-79a7b8b elementor-widget elementor-widget-text-editor" data-id="79a7b8b" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> Following that, create a record of all the data to recreate the crime scene. </div> </div> <div class="elementor-element elementor-element-6baa181 elementor-widget elementor-widget-heading" data-id="6baa181" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">When Is Digital Forensics Used in a Business Setting?</h2> </div> </div> </div> </div> <div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b875355" data-id="b875355" data-element_type="column" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-bd7a90d elementor-widget elementor-widget-heading" data-id="bd7a90d" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">5. Presentation</h2> </div> </div> <div class="elementor-element elementor-element-e4b075c elementor-widget elementor-widget-text-editor" data-id="e4b075c" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> Lastly, summarize and draw a conclusion. </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-f749b15 elementor-widget elementor-widget-heading" data-id="f749b15" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">When Is Digital Forensics Used in a Business Setting?</h2> </div> </div> <div class="elementor-element elementor-element-7ea486d elementor-widget elementor-widget-text-editor" data-id="7ea486d" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>For businesses, <a href="https://www.eccouncil.org/train-certify/digital-forensics-essentials-dfe/" target="_blank" rel="noopener">Digital Forensics</a> is an important part of the Incident Response process. Forensic Investigators identify and record details of a criminal incident as evidence to be used for law enforcement. Rules and regulations surrounding this process are often instrumental in proving innocence or guilt in a court of law.</p> </div> </div> <div class="elementor-element elementor-element-0bc80b0 elementor-align-center elementor-widget elementor-widget-button" data-id="0bc80b0" data-element_type="widget" data-widget_type="button.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"> <a class="elementor-button elementor-button-link elementor-size-sm elementor-animation-grow" href="https://www.eccouncil.org/train-certify/computer-hacking-forensic-investigator-chfi/" target="_blank"> <span class="elementor-button-content-wrapper"> <span class="elementor-button-text">Become a Certified Computer Hacking Forensics Investigator</span> </span> </a> </div> </div> </div> <div class="elementor-element elementor-element-036878b elementor-widget elementor-widget-heading" data-id="036878b" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Learn How Important Cyber Forensics Is for a Business</h2> </div> </div> <div class="elementor-element elementor-element-18d7be8 elementor-widget elementor-widget-video" data-id="18d7be8" data-element_type="widget" data-settings="{&quot;youtube_url&quot;:&quot;https:\/\/www.youtube.com\/watch?v=IYnx9ZOILUA&amp;t=202s&amp;ab_channel=ECCouncil&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}" data-widget_type="video.default"> <div class="elementor-widget-container"> <div class="elementor-wrapper elementor-open-inline"> <div class="elementor-video"></div> </div> </div> </div> <div class="elementor-element elementor-element-6866e6e elementor-widget elementor-widget-heading" data-id="6866e6e" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Who Is a Digital Forensics Investigator?</h2> </div> </div> <div class="elementor-element elementor-element-ce83797 elementor-widget elementor-widget-text-editor" data-id="ce83797" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>A Digital Forensics Investigator is someone who has a desire to follow the evidence and solve a crime virtually. Imagine a security breach happens at a company, resulting in stolen data. In this situation, a computer forensic analyst would come in and determine how attackers gained access to the network, where they traversed the network, and what they did on the network, whether they took information or planted malware. Under those circumstances, <a href="https://bestaccreditedcolleges.org/articles/computer-forensics-analyst-job-description-duties-and-requirements.html">a digital forensic investigator’s role</a> is to recover data like documents, photos, and emails from computer hard drives and other data storage devices, such as zip and flash drives, with deleted, damaged, or otherwise manipulated.</p> </div> </div> <div class="elementor-element elementor-element-225e210 elementor-align-center elementor-widget elementor-widget-button" data-id="225e210" data-element_type="widget" data-widget_type="button.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"> <a class="elementor-button elementor-button-link elementor-size-sm elementor-animation-grow" href="/train-certify/computer-hacking-forensic-investigator-chfi/"> <span class="elementor-button-content-wrapper"> <span class="elementor-button-text"> Become a Computer Forensics Investigator</span> </span> </a> </div> </div> </div> <div class="elementor-element elementor-element-d1461a7 elementor-widget elementor-widget-heading" data-id="d1461a7" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">History of Digital Forensics</h2> </div> </div> <div class="elementor-element elementor-element-aa78aab elementor-widget elementor-widget-heading" data-id="aa78aab" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">How Is Digital Forensics Used in an Investigation?</h2> </div> </div> <div class="elementor-element elementor-element-e38a5b3 elementor-widget elementor-widget-text-editor" data-id="e38a5b3" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> Looking back at the history of digital forensics, law enforcement during that age had a minimal understanding of the application of digital forensic techniques. However, during the 1970s and 1980s, the forensics team were mostly representatives of federal law enforcement agencies with a computer background. The first area of concern for law enforcement was data storage, as most documentation happened digitally. Undeniably, seizing, retaining, and analyzing the documentation was a long task for the authorities. In this situation, the FBI launched the Magnet Media program in 1984, which was the first official digital forensics program. Following this, other techniques to identify cybercriminals when they intrude into computer systems were developed. In 1986, <a href="https://www.giac.org/paper/gsec/2300/honeypots-weighing-costs-benefits/103964">Cliff Stoll</a>, a Unix System Administrator at Lawrence Berkeley National Laboratory, created the first honeypot trap. Eventually, digital forensics picked up professionally due to the spread of child pornography online. The war between Iraq and Afghanistan also led to the demand for digital forensic investigation. Concurrently, digital forensics played a major role in extracting the evidential data from the digital assets gathered by the U.S. troops during the war. In 2006, the U.S. implemented a mandatory regime for <a href="https://www.hsdl.org/?view&amp;did=701380">electronic discovery</a> in its Rules for Civil Procedure. </div> </div> <div class="elementor-element elementor-element-0526309 elementor-widget elementor-widget-text-editor" data-id="0526309" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>Digital footprint is the information about a person on the system, such as the webpages they have visited, when they were active, and what device they were using. By following the digital footprints, the investigator will retrieve the data critical to solving the crime case. To name a few –Matt Baker, in 2010, Krenar Lusha, in 2009, and more cases were solved with the help of digital forensics.</p><p>Cyber forensic investigators are experts in investigating encrypted data using various types of software and tools. There are many upcoming techniques that investigators use depending on the type of cybercrime they are dealing with. Cyber investigators’ tasks include recovering deleted files, cracking passwords, and finding the source of the security breach. Once collected, the evidence is then stored and translated to make it presentable before the court of law or for police to examine further. The role of cyber forensics in criminal offenses can be understood with a case study: cold cases and cyber forensics</p> </div> </div> <div class="elementor-element elementor-element-ab21529 elementor-widget elementor-widget-heading" data-id="ab21529" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Recent Case Study –</h2> </div> </div> <div class="elementor-element elementor-element-b1fefa3 elementor-widget elementor-widget-text-editor" data-id="b1fefa3" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p><em>Thousands of digital devices that have been seized by police as evidence for alleged crimes, including terrorism and sexual offenses, are sitting in storage in a growing backlog that investigators are struggling to tackle.</em></p><p>In the lack of efficient resources to analyze the evidence, the PA news agency has found that 12,122 devices (includes phones, tablets, and computers) are awaiting examination across 32 forces. Unlikely, the backlog has remained the same previous year resulting in hampering prosecutors in criminal cases. In another case, a <a href="https://www.thetimes.co.uk/article/backlog-of-devices-awaiting-police-analysis-leaves-trials-facing-collapse-bgb6zft9x">Times investigation</a> from the last year confirmed awaiting examination of 12,667 devices from 33 police forces. The long-pending investigations show how overwhelmed a digital forensic team is due to the sheer volume of digital evidence collected.</p> </div> </div> <div class="elementor-element elementor-element-1a4cc60 elementor-align-center elementor-widget elementor-widget-button" data-id="1a4cc60" data-element_type="widget" data-widget_type="button.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"> <a class="elementor-button elementor-button-link elementor-size-sm elementor-animation-grow" href="https://www.eccouncil.org/get-certified-with-ec-council-with-form/"> <span class="elementor-button-content-wrapper"> <span class="elementor-button-text">GET TRAINING</span> </span> </a> </div> </div> </div> <div class="elementor-element elementor-element-6c72258 elementor-widget elementor-widget-heading" data-id="6c72258" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Phases of Digital Forensics</h2> </div> </div> <div class="elementor-element elementor-element-f537910 elementor-widget elementor-widget-accordion" data-id="f537910" data-element_type="widget" data-widget_type="accordion.default"> <div class="elementor-widget-container"> <div class="elementor-accordion"> <div class="elementor-accordion-item"> <div id="elementor-tab-title-2571" class="elementor-tab-title" data-tab="1" role="button" aria-controls="elementor-tab-content-2571" aria-expanded="false"> <span class="elementor-accordion-icon elementor-accordion-icon-right" aria-hidden="true"> <span class="elementor-accordion-icon-closed"><svg class="e-font-icon-svg e-fas-plus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> <span class="elementor-accordion-icon-opened"><svg class="e-font-icon-svg e-fas-minus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> </span> <a class="elementor-accordion-title" tabindex="0">Phase I – First Response</a> </div> <div id="elementor-tab-content-2571" class="elementor-tab-content elementor-clearfix" data-tab="1" role="region" aria-labelledby="elementor-tab-title-2571">The action performed right after the occurrence of a security incident is known as the first response. It is highly dependent on the nature of the incident.</div> </div> <div class="elementor-accordion-item"> <div id="elementor-tab-title-2572" class="elementor-tab-title" data-tab="2" role="button" aria-controls="elementor-tab-content-2572" aria-expanded="false"> <span class="elementor-accordion-icon elementor-accordion-icon-right" aria-hidden="true"> <span class="elementor-accordion-icon-closed"><svg class="e-font-icon-svg e-fas-plus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> <span class="elementor-accordion-icon-opened"><svg class="e-font-icon-svg e-fas-minus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> </span> <a class="elementor-accordion-title" tabindex="0">Phase II – Search and Seizure</a> </div> <div id="elementor-tab-content-2572" class="elementor-tab-content elementor-clearfix" data-tab="2" role="region" aria-labelledby="elementor-tab-title-2572">Under this phase, the professionals search for the devices involved in carrying out the crime. These devices then carefully seized to extract information out of them.</div> </div> <div class="elementor-accordion-item"> <div id="elementor-tab-title-2573" class="elementor-tab-title" data-tab="3" role="button" aria-controls="elementor-tab-content-2573" aria-expanded="false"> <span class="elementor-accordion-icon elementor-accordion-icon-right" aria-hidden="true"> <span class="elementor-accordion-icon-closed"><svg class="e-font-icon-svg e-fas-plus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> <span class="elementor-accordion-icon-opened"><svg class="e-font-icon-svg e-fas-minus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> </span> <a class="elementor-accordion-title" tabindex="0">Phase III – Collect the Evidence</a> </div> <div id="elementor-tab-content-2573" class="elementor-tab-content elementor-clearfix" data-tab="3" role="region" aria-labelledby="elementor-tab-title-2573">After the search and seizure phase, professionals use the acquired devices to collect data. They have well-defined forensic methods for evidence handling.</div> </div> <div class="elementor-accordion-item"> <div id="elementor-tab-title-2574" class="elementor-tab-title" data-tab="4" role="button" aria-controls="elementor-tab-content-2574" aria-expanded="false"> <span class="elementor-accordion-icon elementor-accordion-icon-right" aria-hidden="true"> <span class="elementor-accordion-icon-closed"><svg class="e-font-icon-svg e-fas-plus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> <span class="elementor-accordion-icon-opened"><svg class="e-font-icon-svg e-fas-minus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> </span> <a class="elementor-accordion-title" tabindex="0">Phase IV- Secure the Evidence</a> </div> <div id="elementor-tab-content-2574" class="elementor-tab-content elementor-clearfix" data-tab="4" role="region" aria-labelledby="elementor-tab-title-2574">The forensic staff should have access to a safe environment where they can secure the evidence. They determine if the collected data is accurate, authentic, and accessible.</div> </div> <div class="elementor-accordion-item"> <div id="elementor-tab-title-2575" class="elementor-tab-title" data-tab="5" role="button" aria-controls="elementor-tab-content-2575" aria-expanded="false"> <span class="elementor-accordion-icon elementor-accordion-icon-right" aria-hidden="true"> <span class="elementor-accordion-icon-closed"><svg class="e-font-icon-svg e-fas-plus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> <span class="elementor-accordion-icon-opened"><svg class="e-font-icon-svg e-fas-minus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> </span> <a class="elementor-accordion-title" tabindex="0">Phase V – Data Acquisition</a> </div> <div id="elementor-tab-content-2575" class="elementor-tab-content elementor-clearfix" data-tab="5" role="region" aria-labelledby="elementor-tab-title-2575">Data acquisition is the process of retrieving Electronically Stored Information (ESI) from suspected digital assets. It helps to gain insights into the incident while an improper process can alter the data, thus, sacrificing the integrity of evidence.</div> </div> <div class="elementor-accordion-item"> <div id="elementor-tab-title-2576" class="elementor-tab-title" data-tab="6" role="button" aria-controls="elementor-tab-content-2576" aria-expanded="false"> <span class="elementor-accordion-icon elementor-accordion-icon-right" aria-hidden="true"> <span class="elementor-accordion-icon-closed"><svg class="e-font-icon-svg e-fas-plus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> <span class="elementor-accordion-icon-opened"><svg class="e-font-icon-svg e-fas-minus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> </span> <a class="elementor-accordion-title" tabindex="0">Phase VI – Data Analysis</a> </div> <div id="elementor-tab-content-2576" class="elementor-tab-content elementor-clearfix" data-tab="6" role="region" aria-labelledby="elementor-tab-title-2576">Under data analysis, the accountable staff scan the acquired data to identify the evidential information that can be presented to the court. This phase is about examining, identifying, separating, converting, and modeling data to transform it into useful information.</div> </div> <div class="elementor-accordion-item"> <div id="elementor-tab-title-2577" class="elementor-tab-title" data-tab="7" role="button" aria-controls="elementor-tab-content-2577" aria-expanded="false"> <span class="elementor-accordion-icon elementor-accordion-icon-right" aria-hidden="true"> <span class="elementor-accordion-icon-closed"><svg class="e-font-icon-svg e-fas-plus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> <span class="elementor-accordion-icon-opened"><svg class="e-font-icon-svg e-fas-minus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> </span> <a class="elementor-accordion-title" tabindex="0">Phase VII – Evidence Assessment</a> </div> <div id="elementor-tab-content-2577" class="elementor-tab-content elementor-clearfix" data-tab="7" role="region" aria-labelledby="elementor-tab-title-2577">The process of evidence assessment relates the evidential data to the security incident. There should be a thorough assessment based on the scope of the case.</div> </div> <div class="elementor-accordion-item"> <div id="elementor-tab-title-2578" class="elementor-tab-title" data-tab="8" role="button" aria-controls="elementor-tab-content-2578" aria-expanded="false"> <span class="elementor-accordion-icon elementor-accordion-icon-right" aria-hidden="true"> <span class="elementor-accordion-icon-closed"><svg class="e-font-icon-svg e-fas-plus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> <span class="elementor-accordion-icon-opened"><svg class="e-font-icon-svg e-fas-minus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> </span> <a class="elementor-accordion-title" tabindex="0">Phase VIII – Documentation and Reporting</a> </div> <div id="elementor-tab-content-2578" class="elementor-tab-content elementor-clearfix" data-tab="8" role="region" aria-labelledby="elementor-tab-title-2578">This is a post-investigation phase that covers reporting and documenting of all the findings. Also, the report should have adequate and acceptable evidence in accordance to the court of law.</div> </div> <div class="elementor-accordion-item"> <div id="elementor-tab-title-2579" class="elementor-tab-title" data-tab="9" role="button" aria-controls="elementor-tab-content-2579" aria-expanded="false"> <span class="elementor-accordion-icon elementor-accordion-icon-right" aria-hidden="true"> <span class="elementor-accordion-icon-closed"><svg class="e-font-icon-svg e-fas-plus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> <span class="elementor-accordion-icon-opened"><svg class="e-font-icon-svg e-fas-minus" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span> </span> <a class="elementor-accordion-title" tabindex="0">Phase IX – Testify as an Expert Witness</a> </div> <div id="elementor-tab-content-2579" class="elementor-tab-content elementor-clearfix" data-tab="9" role="region" aria-labelledby="elementor-tab-title-2579">The forensic investigators should approach the expert witness to affirm the accuracy of evidence. An expert witness is a professional who investigates the crime to retrieve evidence.</div> </div> </div> </div> </div> <div class="elementor-element elementor-element-b7528a5 elementor-widget elementor-widget-heading" data-id="b7528a5" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">What Are Digital Forensics Tools?</h2> </div> </div> <div class="elementor-element elementor-element-88c7419 elementor-widget elementor-widget-text-editor" data-id="88c7419" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> In the 1990s, digital investigations were carried out via live analysis and using the device in question to examine digital media was commonplace. In time, the increasing use of devices packed with huge amounts of information made live analysis inefficient. Eventually, digital forensic tools were created to observe data on a device without damaging it. Presently, digital forensic tools can be classified as digital forensic open source tools, digital forensics hardware tools, and many others. </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-cd3d3de elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="cd3d3de" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-005bc48" data-id="005bc48" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-3ae363e elementor-position-top elementor-widget elementor-widget-image-box" data-id="3ae363e" data-element_type="widget" data-widget_type="image-box.default"> <div class="elementor-widget-container"> <div class="elementor-image-box-wrapper"><figure class="elementor-image-box-img"><img decoding="async" width="161" height="201" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/The-Sleuth-Kit-.png.webp" class="attachment-full size-full wp-image-81594" alt="" /></figure><div class="elementor-image-box-content"><h3 class="elementor-image-box-title">The Sleuth Kit</h3><p class="elementor-image-box-description">The Sleuth Kit (earlier known as TSK) is a collection of Unix- and Windows-based utilities that extract data from computer systems. It is an open-source software that analyzes disk images created by “dd” and recovers data from them. With this software, professionals can gather data during incident response or from live systems. Professionals can integrate TSK with more extensive forensics tools.</p></div></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c9047de" data-id="c9047de" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-088b61f elementor-position-top elementor-widget elementor-widget-image-box" data-id="088b61f" data-element_type="widget" data-widget_type="image-box.default"> <div class="elementor-widget-container"> <div class="elementor-image-box-wrapper"><figure class="elementor-image-box-img"><img decoding="async" width="161" height="201" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/FTK-Imager.png.webp" class="attachment-full size-full wp-image-81595" alt="" /></figure><div class="elementor-image-box-content"><h3 class="elementor-image-box-title">FTK Imager</h3><p class="elementor-image-box-description">FTK Imager is an acquisition and imaging tool responsible for data preview that allows the user to assess the device in question quickly. The tool can also create forensic images (copies) of the device without damaging the original evidence.</p></div></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c41c640" data-id="c41c640" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-d6bc503 elementor-position-top elementor-widget elementor-widget-image-box" data-id="d6bc503" data-element_type="widget" data-widget_type="image-box.default"> <div class="elementor-widget-container"> <div class="elementor-image-box-wrapper"><figure class="elementor-image-box-img"><img decoding="async" width="161" height="201" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/Xplico-2.jpg.webp" class="attachment-full size-full wp-image-81596" alt="" /></figure><div class="elementor-image-box-content"><h3 class="elementor-image-box-title">Xplico</h3><p class="elementor-image-box-description">Xplico is a network forensic analysis tool (NFAT) that helps reconstruct the data acquired using other packet sniffing tools like Wireshark. It is free and open-source software that uses Port Independent Protocol Identification (PIPI) to recognize network protocols. The tool is built on four key components: Decoder Manager, IP Decoder, Data Manipulators, and Visualization System. </p></div></div> </div> </div> </div> </div> </div> </section> <div class="elementor-element elementor-element-52ba8a8 elementor-widget elementor-widget-heading" data-id="52ba8a8" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Here are a few more tools used for Digital Investigation</h2> </div> </div> <div class="elementor-element elementor-element-390f657 elementor-widget elementor-widget-image" data-id="390f657" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <img loading="lazy" loading="lazy" decoding="async" width="1061" height="209" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/Digital-forensic-skills.png.webp" class="attachment-full size-full wp-image-81597" alt="" srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/Digital-forensic-skills.png.webp 1061w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/Digital-forensic-skills.png-300x59.webp 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/Digital-forensic-skills.png-1024x202.webp 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/Digital-forensic-skills.png-768x151.webp 768w" sizes="(max-width: 1061px) 100vw, 1061px" /> </div> </div> <div class="elementor-element elementor-element-fbe8f72 elementor-align-center elementor-widget elementor-widget-button" data-id="fbe8f72" data-element_type="widget" data-widget_type="button.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"> <a class="elementor-button elementor-button-link elementor-size-md elementor-animation-grow" href="https://www.eccouncil.org/train-certify/computer-hacking-forensic-investigator-chfi/"> <span class="elementor-button-content-wrapper"> <span class="elementor-button-text">What you will Learn</span> </span> </a> </div> </div> </div> <div class="elementor-element elementor-element-a5abb8c elementor-widget elementor-widget-heading" data-id="a5abb8c" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Digital Forensics Job Profiles</h2> </div> </div> <div class="elementor-element elementor-element-155c889 elementor-widget elementor-widget-text-editor" data-id="155c889" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p><em>If you have good analytical skills, you can forge a successful career as a forensic<br />computer analyst, tracing the steps of cybercrime</em></p> </div> </div> <div class="elementor-element elementor-element-36c2d30 elementor-widget elementor-widget-text-editor" data-id="36c2d30" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>The role of a forensic computer analyst is to investigate criminal incidents and data breaches. These forensic analysts often work for the police, law enforcement agencies, government, private, or other forensic companies. They use specialized tools and techniques to retrieve, analyze, and store data linked to criminal activity like a breach, fraud, network intrusions, illegal usage, unauthorized access, or terrorist communication.</p> </div> </div> <div class="elementor-element elementor-element-8a6bd55 elementor-align-center elementor-widget elementor-widget-button" data-id="8a6bd55" data-element_type="widget" data-widget_type="button.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"> <a class="elementor-button elementor-button-link elementor-size-sm elementor-animation-grow" href="/train-certify/computer-hacking-forensic-investigator-chfi/"> <span class="elementor-button-content-wrapper"> <span class="elementor-button-text">Career with CHFI</span> </span> </a> </div> </div> </div> <div class="elementor-element elementor-element-db1b0cc elementor-widget elementor-widget-heading" data-id="db1b0cc" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Key Job Roles of a Digital Forensic Investigator</h2> </div> </div> <div class="elementor-element elementor-element-a459dfe elementor-widget elementor-widget-text-editor" data-id="a459dfe" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <ul><li>Cyber Forensic Investigator</li><li>Forensic Analyst, Senior</li><li>Digital Forensics Analyst-Mid-Level</li><li>Senior Digital Forensics and Incident Response</li><li>Senior Consultant, Digital Forensics</li><li>Security Analyst (Blue Team) – Forensic investigation</li><li>Cybersecurity Forensics Consultant</li><li>Senior Associate-Forensic Services-Forensic Technology Solutions</li><li>Computer Forensic Technician</li><li>Digital Forensics Analyst</li><li>Senior Principle, Digital Forensics</li><li>Security Forensics Analyst (SOC)</li><li>Digital Forensics Analyst, Senior</li><li>Forensics Engineer</li></ul> </div> </div> <div class="elementor-element elementor-element-72cec61 elementor-align-center elementor-widget elementor-widget-button" data-id="72cec61" data-element_type="widget" data-widget_type="button.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"> <a class="elementor-button elementor-button-link elementor-size-md elementor-animation-grow" href="https://www.eccouncil.org/get-certified-with-ec-council-with-form/"> <span class="elementor-button-content-wrapper"> <span class="elementor-button-text">Get Certified</span> </span> </a> </div> </div> </div> <div class="elementor-element elementor-element-0b0d47b elementor-widget elementor-widget-heading" data-id="0b0d47b" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Skills Required to Become a Digital Forensic Investigator </h2> </div> </div> <div class="elementor-element elementor-element-104cdad elementor-widget elementor-widget-text-editor" data-id="104cdad" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>Employers look for certified forensic investigators with key digital forensic skills, including: are as follows:</p><ul class="pt-3"><li>Defeating anti-forensic techniques</li><li>Understanding hard disks and file systems</li><li>Operating system forensics</li><li>Cloud forensic in a cloud environment</li><li>Investigating email crimes</li><li>Mobile device forensics</li></ul> </div> </div> <div class="elementor-element elementor-element-089bea2 elementor-widget elementor-widget-video" data-id="089bea2" data-element_type="widget" data-settings="{&quot;youtube_url&quot;:&quot;https:\/\/www.youtube.com\/watch?v=ywP1ukwDQdk&amp;ab_channel=ECCouncil&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}" data-widget_type="video.default"> <div class="elementor-widget-container"> <div class="elementor-wrapper elementor-open-inline"> <div class="elementor-video"></div> </div> </div> </div> <div class="elementor-element elementor-element-ebc1fbe elementor-widget elementor-widget-heading" data-id="ebc1fbe" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">The Average Salary of a Digital Forensics Investigator</h2> </div> </div> <div class="elementor-element elementor-element-750cf72 elementor-widget elementor-widget-text-editor" data-id="750cf72" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <h3>Is Digital Forensics a Good Career?</h3><p>As per <a href="https://www.payscale.com/research/US/Job=Forensic_Computer_Analyst/Salary">Payscale</a>, the average salary of a Digital Forensic Computer Analyst is $72,929</p> </div> </div> <div class="elementor-element elementor-element-181ba10 elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="181ba10" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> <div class="elementor-element elementor-element-5e41ca6 elementor-widget elementor-widget-heading" data-id="5e41ca6" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Requirements to Become a Forensic Expert</h2> </div> </div> <div class="elementor-element elementor-element-c519ed0 elementor-widget elementor-widget-text-editor" data-id="c519ed0" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> The eligibility criteria for a cyber forensic expert can vary widely. Many private firms like to hire candidates with a relevant bachelor’s degree, while law enforcement agencies prioritize hands-on experience. </div> </div> <div class="elementor-element elementor-element-502ba79 elementor-tabs-view-vertical elementor-widget elementor-widget-tabs" data-id="502ba79" data-element_type="widget" data-widget_type="tabs.default"> <div class="elementor-widget-container"> <div class="elementor-tabs"> <div class="elementor-tabs-wrapper" role="tablist" > <div id="elementor-tab-title-8401" class="elementor-tab-title elementor-tab-desktop-title" aria-selected="true" data-tab="1" role="tab" tabindex="0" aria-controls="elementor-tab-content-8401" aria-expanded="false">Degree Requirements</div> <div id="elementor-tab-title-8402" class="elementor-tab-title elementor-tab-desktop-title" aria-selected="false" data-tab="2" role="tab" tabindex="-1" aria-controls="elementor-tab-content-8402" aria-expanded="false">Work Experience</div> <div id="elementor-tab-title-8403" class="elementor-tab-title elementor-tab-desktop-title" aria-selected="false" data-tab="3" role="tab" tabindex="-1" aria-controls="elementor-tab-content-8403" aria-expanded="false">Hard Skills</div> <div id="elementor-tab-title-8404" class="elementor-tab-title elementor-tab-desktop-title" aria-selected="false" data-tab="4" role="tab" tabindex="-1" aria-controls="elementor-tab-content-8404" aria-expanded="false">Soft Skills</div> </div> <div class="elementor-tabs-content-wrapper" role="tablist" aria-orientation="vertical"> <div class="elementor-tab-title elementor-tab-mobile-title" aria-selected="true" data-tab="1" role="tab" tabindex="0" aria-controls="elementor-tab-content-8401" aria-expanded="false">Degree Requirements</div> <div id="elementor-tab-content-8401" class="elementor-tab-content elementor-clearfix" data-tab="1" role="tabpanel" aria-labelledby="elementor-tab-title-8401" tabindex="0" hidden="false"><ul> <li>Bachelor’s degree in Computer Science or Engineering</li> <li><a href="https://www.eccu.edu/academics/bachelor-of-science-in-cyber-security/">Bachelor of Science in Cyber Security</a> (preferred)</li> <li><a href="https://www.eccu.edu/specialization-digital-forensics/">Master of Science in Cyber Security with Digital Forensic specialization</a> (preferred)</li> </ul></div> <div class="elementor-tab-title elementor-tab-mobile-title" aria-selected="false" data-tab="2" role="tab" tabindex="-1" aria-controls="elementor-tab-content-8402" aria-expanded="false">Work Experience</div> <div id="elementor-tab-content-8402" class="elementor-tab-content elementor-clearfix" data-tab="2" role="tabpanel" aria-labelledby="elementor-tab-title-8402" tabindex="0" hidden="hidden"><ul> <li>For Internship – No experience required</li> <li>For Entry-level Forensic Analysts – 1 to 2 years of experience is required</li> <li>For Senior Forensic Analyst – 2 to 3 years of experience is the norm</li> <li>For Managerial level – more than 5 years of experience</li> </ul></div> <div class="elementor-tab-title elementor-tab-mobile-title" aria-selected="false" data-tab="3" role="tab" tabindex="-1" aria-controls="elementor-tab-content-8403" aria-expanded="false">Hard Skills</div> <div id="elementor-tab-content-8403" class="elementor-tab-content elementor-clearfix" data-tab="3" role="tabpanel" aria-labelledby="elementor-tab-title-8403" tabindex="0" hidden="hidden"><ul> <li>Knowledge of computer networks – network protocols, topologies, etc.</li> <li>Knowledge of various operating systems – Unix, Linux, Windows, etc.</li> <li>Familiarity with different computer programming languages – Java, Python, etc.</li> <li>Understanding of computer hardware and software systems</li> <li>Expertise in digital forensic tools – Xplico, EnCase, FTK Imager, and hundreds of others</li> <li>Cloud computing</li> </ul></div> <div class="elementor-tab-title elementor-tab-mobile-title" aria-selected="false" data-tab="4" role="tab" tabindex="-1" aria-controls="elementor-tab-content-8404" aria-expanded="false">Soft Skills</div> <div id="elementor-tab-content-8404" class="elementor-tab-content elementor-clearfix" data-tab="4" role="tabpanel" aria-labelledby="elementor-tab-title-8404" tabindex="0" hidden="hidden"><p>Forensic experts must have <strong>report writing skills </strong>and <strong>critical thinking</strong>.</p></div> </div> </div> </div> </div> <div class="elementor-element elementor-element-51e91b8 elementor-align-center elementor-widget elementor-widget-button" data-id="51e91b8" data-element_type="widget" data-widget_type="button.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"> <a class="elementor-button elementor-button-link elementor-size-md elementor-animation-grow" href="https://www.eccouncil.org/get-certified-with-ec-council-with-form/"> <span class="elementor-button-content-wrapper"> <span class="elementor-button-text">Become a Forensic Expert</span> </span> </a> </div> </div> </div> <div class="elementor-element elementor-element-fd61b3f elementor-widget elementor-widget-heading" data-id="fd61b3f" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">The Life of a Digital Forensic Investigator</h2> </div> </div> <div class="elementor-element elementor-element-afe8de0 elementor-widget elementor-widget-text-editor" data-id="afe8de0" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> Watch this to learn more about what a digital forensics investigator does and how they gather data: </div> </div> <div class="elementor-element elementor-element-6e5c147 elementor-widget elementor-widget-video" data-id="6e5c147" data-element_type="widget" data-settings="{&quot;youtube_url&quot;:&quot;https:\/\/www.youtube.com\/watch?v=2D5wTo1adbg&amp;ab_channel=SheenamArora&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}" data-widget_type="video.default"> <div class="elementor-widget-container"> <div class="elementor-wrapper elementor-open-inline"> <div class="elementor-video"></div> </div> </div> </div> <div class="elementor-element elementor-element-7e5cf77 elementor-widget elementor-widget-heading" data-id="7e5cf77" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">Challenges a Computer Forensic Analyst Faces</h2> </div> </div> <div class="elementor-element elementor-element-4c22beb elementor-widget elementor-widget-text-editor" data-id="4c22beb" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>The most notable challenge digital forensic investigators face today is the cloud environment. While cloud computing is incredibly beneficial to an organization, they are also challenging for forensics investigators. The basic principle that the cloud is somebody else’s computer holds some truth, but huge server farms host most data. Since the cloud is scalable, information can be hosted in different locations, even in different countries. This makes it extremely difficult to gather accurate and trusted evidence in a case because establishing a proper chain of custody becomes nearly impossible. In addition, the <a href="https://searchcloudsecurity.techtarget.com/tip/Digital-forensic-challenges-in-a-cloud-computing-environment">jurisdiction of the data</a> must be considered since different laws apply to depend on where it is located.</p> </div> </div> <div class="elementor-element elementor-element-eaeb35b elementor-widget elementor-widget-video" data-id="eaeb35b" data-element_type="widget" data-settings="{&quot;youtube_url&quot;:&quot;https:\/\/www.youtube.com\/watch?v=zVkCkmG2Uqc&amp;t=314s&amp;ab_channel=ECCouncil&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}" data-widget_type="video.default"> <div class="elementor-widget-container"> <div class="elementor-wrapper elementor-open-inline"> <div class="elementor-video"></div> </div> </div> </div> <div class="elementor-element elementor-element-4cf6dbd elementor-widget elementor-widget-heading" data-id="4cf6dbd" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">How Can CHFI Help You Become a Skilled Cyber Forensic Investigation Analyst?</h2> </div> </div> <div class="elementor-element elementor-element-dd151ef elementor-widget elementor-widget-text-editor" data-id="dd151ef" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>The rising significance of digital forensics is creating an increased demand for computer forensic talent. As the role requires a specific set of skills that can be acquired via formal education and practice, EC-Council has the <a href="/train-certify/computer-hacking-forensic-investigator-chfi/" target="_blank" rel="noopener">Computer Hacking and Forensic Investigator (CHFI)</a> program to offer to those aspiring to become cyber professionals. The CHFI certification will fortify the application knowledge of law enforcement personnel, security officers, network administrators, legal professionals, and anyone concerned about the integrity of the network infrastructure. EC-Council’s CHFI is a vendor-neutral comprehensive program that encapsulates the professional with required digital forensics knowledge.</p> </div> </div> <div class="elementor-element elementor-element-179a770 elementor-widget elementor-widget-heading" data-id="179a770" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h2 class="elementor-heading-title elementor-size-default">10 Reasons Why the CHFI Is Your Go-to for All Things Digital Forensics</h2> </div> </div> <div class="elementor-element elementor-element-4513b51 elementor-widget elementor-widget-heading" data-id="4513b51" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h4 class="elementor-heading-title elementor-size-default">1. Methodological Approach</h4> </div> </div> <div class="elementor-element elementor-element-c8ec8f3 elementor-widget elementor-widget-text-editor" data-id="c8ec8f3" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>CHFI presents a methodological approach to computer forensics, including searching and seizing digital evidence and acquisition, storage, analysis, and reporting of that evidence to serve as a valid piece of information during the investigation. A CHFI can use different methods to discover data from a computer system, cloud service, mobile phone, or other digital devices.</p> </div> </div> <div class="elementor-element elementor-element-29d0c94 elementor-widget elementor-widget-heading" data-id="29d0c94" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h4 class="elementor-heading-title elementor-size-default">2. Comprehensive Online Learning</h4> </div> </div> <div class="elementor-element elementor-element-f0d4442 elementor-widget elementor-widget-text-editor" data-id="f0d4442" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>It is a comprehensive program that comprises 14 modules and 39 lab sessions. The program can be taken completely online with a duration of 40 hours, during which you will be trained on the computer forensics and investigation process. CHFI also helps you understand the law enforcement process and rules that guide you through the legal process of investigation.</p> </div> </div> <div class="elementor-element elementor-element-7a139b4 elementor-widget elementor-widget-heading" data-id="7a139b4" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h4 class="elementor-heading-title elementor-size-default">3. Include Real-Time Forensic Investigation Scenarios</h4> </div> </div> <div class="elementor-element elementor-element-0866a70 elementor-widget elementor-widget-text-editor" data-id="0866a70" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>CHFI includes major real-time forensic investigation cases that were solved through computer forensics. The study enables students to acquire hands-on experience in different forensic investigation techniques that were adopted from real-life scenarios.</p> </div> </div> <div class="elementor-element elementor-element-062108e elementor-widget elementor-widget-heading" data-id="062108e" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h4 class="elementor-heading-title elementor-size-default">4. Pre-Requisite</h4> </div> </div> <div class="elementor-element elementor-element-568b8ab elementor-widget elementor-widget-text-editor" data-id="568b8ab" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> The required skills for being a digital forensic investigator include knowledge of information technology and cybersecurity, but EC-Council does not restrict candidates with pre-requisites, specific qualifications, or experience to join the program. </div> </div> <div class="elementor-element elementor-element-391e32d elementor-widget elementor-widget-heading" data-id="391e32d" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h4 class="elementor-heading-title elementor-size-default">5. ANSI Accreditation</h4> </div> </div> <div class="elementor-element elementor-element-05fe9ad elementor-widget elementor-widget-text-editor" data-id="05fe9ad" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>EC-Council is one of the few organizations that specialize in information security (IS) to achieve ANSI 17024 accreditation. American National Standards Institute (ANSI) is a private non-profit organization that ensures the integrity of the standards as defined by them.</p> </div> </div> <div class="elementor-element elementor-element-a594353 elementor-widget elementor-widget-heading" data-id="a594353" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h4 class="elementor-heading-title elementor-size-default">6. Mapped to NICE</h4> </div> </div> <div class="elementor-element elementor-element-5187d1e elementor-widget elementor-widget-text-editor" data-id="5187d1e" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>CHFI is 100% mapped to the “Protect and Defend” Workforce Framework of NICE (National Institute of Cybersecurity Education), which categorizes and describes cybersecurity job roles.</p> </div> </div> <div class="elementor-element elementor-element-de7bf8a elementor-widget elementor-widget-heading" data-id="de7bf8a" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h4 class="elementor-heading-title elementor-size-default">7. Updated Timely</h4> </div> </div> <div class="elementor-element elementor-element-3ef34c0 elementor-widget elementor-widget-text-editor" data-id="3ef34c0" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> The current CHFI program is version 9, and that means it is continually updated to adhere to evolving forensic tools and methodologies. CHFI is updated with case studies, labs, digital forensic tools, and devices. </div> </div> <div class="elementor-element elementor-element-33475fa elementor-widget elementor-widget-heading" data-id="33475fa" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h4 class="elementor-heading-title elementor-size-default">8. Equipped with Detailed Labs</h4> </div> </div> <div class="elementor-element elementor-element-606112d elementor-widget elementor-widget-text-editor" data-id="606112d" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>The program has detailed labs making up almost 40% of the total training time. CHFI also comes with cloud-based virtual labs that allow the candidate to practice investigation techniques that mirror real-life situations in a simulated environment.</p> </div> </div> <div class="elementor-element elementor-element-92c7e78 elementor-widget elementor-widget-heading" data-id="92c7e78" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h4 class="elementor-heading-title elementor-size-default">9. White Papers and Students Kit</h4> </div> </div> <div class="elementor-element elementor-element-04717fe elementor-widget elementor-widget-text-editor" data-id="04717fe" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>For additional reading, the program comes loaded with many white papers. The student kit also contains various forensic investigation templates for evidence collection, chain-of-custody, investigation reports, and more.</p> </div> </div> <div class="elementor-element elementor-element-2a32817 elementor-widget elementor-widget-heading" data-id="2a32817" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h4 class="elementor-heading-title elementor-size-default">10. Report Writing and Presentation</h4> </div> </div> <div class="elementor-element elementor-element-da4b37e elementor-widget elementor-widget-text-editor" data-id="da4b37e" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>CHFI has a module dedicated to writing a report and presentation that enhances your skills in presenting the authenticity of the evidence collected and analyzed, explaining its significance in solving the case.</p> </div> </div> <div class="elementor-element elementor-element-a3b202a elementor-widget elementor-widget-text-editor" data-id="a3b202a" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> Computer Hacking and Forensic Investigator (CHFI) is the leading training program for anyone aspiring to be a digital forensic investigator. If you are a cybersecurity enthusiast and know information technology, get trained today! </div> </div> </div> </div> </div> </section> </div> </div> </div> <div class="elementor-element elementor-element-f037904 elementor-widget elementor-widget-spacer" data-id="f037904" data-element_type="widget" data-widget_type="spacer.default"> <div class="elementor-widget-container"> <div class="elementor-spacer"> <div class="elementor-spacer-inner"></div> </div> </div> </div> <div class="elementor-element elementor-element-7def9cb4 elementor-widget elementor-widget-heading" data-id="7def9cb4" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h5 class="elementor-heading-title elementor-size-default">Share this Article</h5> </div> </div> <div class="elementor-element elementor-element-40e6cdad elementor-grid-mobile-2 elementor-grid-5 elementor-grid-tablet-5 elementor-widget-mobile__width-inherit elementor-share-buttons--skin-flat elementor-share-buttons--shape-rounded elementor-share-buttons--view-icon-text elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons" data-id="40e6cdad" data-element_type="widget" data-widget_type="share-buttons.default"> <div class="elementor-widget-container"> <div class="elementor-grid"> <div class="elementor-grid-item"> <div class="elementor-share-btn elementor-share-btn_facebook" role="button" tabindex="0" aria-label="Share on facebook" > <span class="elementor-share-btn__icon"> <svg class="e-font-icon-svg e-fab-facebook" viewBox="0 0 512 512" xmlns="http://www.w3.org/2000/svg"><path d="M504 256C504 119 393 8 256 8S8 119 8 256c0 123.78 90.69 226.38 209.25 245V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.28c-30.8 0-40.41 19.12-40.41 38.73V256h68.78l-11 71.69h-57.78V501C413.31 482.38 504 379.78 504 256z"></path></svg> </span> <div class="elementor-share-btn__text"> <span class="elementor-share-btn__title"> Facebook </span> </div> </div> </div> <div class="elementor-grid-item"> <div class="elementor-share-btn elementor-share-btn_twitter" role="button" tabindex="0" aria-label="Share on twitter" > <span class="elementor-share-btn__icon"> <svg class="e-font-icon-svg e-fab-twitter" viewBox="0 0 512 512" xmlns="http://www.w3.org/2000/svg"><path d="M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z"></path></svg> </span> <div class="elementor-share-btn__text"> <span class="elementor-share-btn__title"> Twitter </span> </div> </div> </div> <div class="elementor-grid-item"> <div class="elementor-share-btn elementor-share-btn_linkedin" role="button" tabindex="0" aria-label="Share on linkedin" > <span class="elementor-share-btn__icon"> <svg class="e-font-icon-svg e-fab-linkedin" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z"></path></svg> </span> <div class="elementor-share-btn__text"> <span class="elementor-share-btn__title"> LinkedIn </span> </div> </div> </div> <div class="elementor-grid-item"> <div class="elementor-share-btn elementor-share-btn_whatsapp" role="button" tabindex="0" aria-label="Share on whatsapp" > <span class="elementor-share-btn__icon"> <svg class="e-font-icon-svg e-fab-whatsapp" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M380.9 97.1C339 55.1 283.2 32 223.9 32c-122.4 0-222 99.6-222 222 0 39.1 10.2 77.3 29.6 111L0 480l117.7-30.9c32.4 17.7 68.9 27 106.1 27h.1c122.3 0 224.1-99.6 224.1-222 0-59.3-25.2-115-67.1-157zm-157 341.6c-33.2 0-65.7-8.9-94-25.7l-6.7-4-69.8 18.3L72 359.2l-4.4-7c-18.5-29.4-28.2-63.3-28.2-98.2 0-101.7 82.8-184.5 184.6-184.5 49.3 0 95.6 19.2 130.4 54.1 34.8 34.9 56.2 81.2 56.1 130.5 0 101.8-84.9 184.6-186.6 184.6zm101.2-138.2c-5.5-2.8-32.8-16.2-37.9-18-5.1-1.9-8.8-2.8-12.5 2.8-3.7 5.6-14.3 18-17.6 21.8-3.2 3.7-6.5 4.2-12 1.4-32.6-16.3-54-29.1-75.5-66-5.7-9.8 5.7-9.1 16.3-30.3 1.8-3.7.9-6.9-.5-9.7-1.4-2.8-12.5-30.1-17.1-41.2-4.5-10.8-9.1-9.3-12.5-9.5-3.2-.2-6.9-.2-10.6-.2-3.7 0-9.7 1.4-14.8 6.9-5.1 5.6-19.4 19-19.4 46.3 0 27.3 19.9 53.7 22.6 57.4 2.8 3.7 39.1 59.7 94.8 83.8 35.2 15.2 49 16.5 66.6 13.9 10.7-1.6 32.8-13.4 37.4-26.4 4.6-13 4.6-24.1 3.2-26.4-1.3-2.5-5-3.9-10.5-6.6z"></path></svg> </span> <div class="elementor-share-btn__text"> <span class="elementor-share-btn__title"> WhatsApp </span> </div> </div> </div> <div class="elementor-grid-item"> <div class="elementor-share-btn elementor-share-btn_pinterest" role="button" tabindex="0" aria-label="Share on pinterest" > <span class="elementor-share-btn__icon"> <svg class="e-font-icon-svg e-fab-pinterest" viewBox="0 0 496 512" xmlns="http://www.w3.org/2000/svg"><path d="M496 256c0 137-111 248-248 248-25.6 0-50.2-3.9-73.4-11.1 10.1-16.5 25.2-43.5 30.8-65 3-11.6 15.4-59 15.4-59 8.1 15.4 31.7 28.5 56.8 28.5 74.8 0 128.7-68.8 128.7-154.3 0-81.9-66.9-143.2-152.9-143.2-107 0-163.9 71.8-163.9 150.1 0 36.4 19.4 81.7 50.3 96.1 4.7 2.2 7.2 1.2 8.3-3.3.8-3.4 5-20.3 6.9-28.1.6-2.5.3-4.7-1.7-7.1-10.1-12.5-18.3-35.3-18.3-56.6 0-54.7 41.4-107.6 112-107.6 60.9 0 103.6 41.5 103.6 100.9 0 67.1-33.9 113.6-78 113.6-24.3 0-42.6-20.1-36.7-44.8 7-29.5 20.5-61.3 20.5-82.6 0-19-10.2-34.9-31.4-34.9-24.9 0-44.9 25.7-44.9 60.2 0 22 7.4 36.8 7.4 36.8s-24.5 103.8-29 123.2c-5 21.4-3 51.6-.9 71.2C65.4 450.9 0 361.1 0 256 0 119 111 8 248 8s248 111 248 248z"></path></svg> </span> <div class="elementor-share-btn__text"> <span class="elementor-share-btn__title"> Pinterest </span> </div> </div> </div> </div> </div> </div> <div class="elementor-element elementor-element-66581782 elementor-widget elementor-widget-spacer" data-id="66581782" data-element_type="widget" data-widget_type="spacer.default"> <div class="elementor-widget-container"> <div class="elementor-spacer"> <div class="elementor-spacer-inner"></div> </div> </div> </div> <div class="elementor-element elementor-element-10aa0d72 elementor-author-box--link-yes elementor-author-box--layout-image-left elementor-author-box--image-valign-top elementor-author-box--align-left hidden elementor-author-box--avatar-yes elementor-author-box--name-yes elementor-author-box--biography-yes elementor-widget elementor-widget-author-box" data-id="10aa0d72" data-element_type="widget" data-widget_type="author-box.default"> <div class="elementor-widget-container"> <div class="elementor-author-box"> <div class="elementor-author-box__avatar"> <img src="https://secure.gravatar.com/avatar/1dc910536dd11a6bd6dca70878f1fad6?s=300&#038;d=mm&#038;r=g" alt="Picture of EC-Council" loading="lazy"> </div> <div class="elementor-author-box__text"> <div > <h4 class="elementor-author-box__name"> EC-Council </h4> </div> <div class="elementor-author-box__bio"> </div> <a class="elementor-author-box__button elementor-button elementor-size-xs" href="https://www.eccouncil.org/cybersecurity-exchange/author/eccu-university/"> All posts by this author </a> </div> </div> </div> </div> <div class="elementor-element elementor-element-1462fe59 elementor-widget elementor-widget-spacer" data-id="1462fe59" data-element_type="widget" data-widget_type="spacer.default"> <div class="elementor-widget-container"> <div class="elementor-spacer"> <div class="elementor-spacer-inner"></div> </div> </div> </div> <div class="elementor-element elementor-element-211818eb elementor-widget elementor-widget-heading" data-id="211818eb" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h5 class="elementor-heading-title elementor-size-default">You may also like</h5> </div> </div> <div class="elementor-element elementor-element-6b9e2d42 img-align-top image-vertical-align-center icon-box-vertical-align-top preserve-img-ratio-cover slide-h-position-left elementor-widget elementor-widget-the7-elements-simple-posts" data-id="6b9e2d42" data-element_type="widget" data-widget_type="the7-elements-simple-posts.default"> <div class="elementor-widget-container"> <div class="the7-simple-widget-posts the7-elementor-widget the7-elements-simple-posts-6b9e2d42 jquery-filter jquery-filter" data-post-limit="-1" data-pagination-mode="none" data-scroll-offset="" aria-live="assertive"> <div class="dt-css-grid custom-pagination-handler" data-columns="{&quot;d&quot;:3,&quot;t&quot;:&quot;&quot;,&quot;p&quot;:1,&quot;wd&quot;:&quot;&quot;}"> <div class="wf-cell visible "> <article class="post visible wrapper post-81786 type-post status-publish format-standard has-post-thumbnail category-computer-forensics"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-network-forensics/"><img fetchpriority="high" width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20521%20521&#039;%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="What is Network Forensics" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-is-Network-Forensics-social.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-is-Network-Forensics-social.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-is-Network-Forensics-social-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2024/03/What-is-Network-Forensics-social-150x150.jpg 150w" /><span class="the7-hover-icon"><i aria-hidden="true" class="the7bootstrap- the7-bootstrap-three-dots"></i></span></a> </div> <div class="post-entry-content"> <h6 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/what-is-network-forensics/" rel="bookmark" title="What Is Network Forensics? How to Successfully Examine the Network" class="post-title">What Is Network Forensics? How to Successfully Examine the Network</a></h6><div class="entry-meta"><a href="https://www.eccouncil.org/cybersecurity-exchange/2024/03/20/" title="1:08 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2024-03-20T13:08:43+00:00">March 20, 2024</time></a></div> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-81246 type-post status-publish format-standard has-post-thumbnail category-computer-forensics"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/mobile-device-forensics/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20521%20521&#039;%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="Mobile-Device-Forensics-in-the-Evolving-World-of-Electronics-thumb" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Mobile-Device-Forensics-in-the-Evolving-World-of-Electronics-thumb.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Mobile-Device-Forensics-in-the-Evolving-World-of-Electronics-thumb.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Mobile-Device-Forensics-in-the-Evolving-World-of-Electronics-thumb-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/12/Mobile-Device-Forensics-in-the-Evolving-World-of-Electronics-thumb-150x150.jpg 150w" /><span class="the7-hover-icon"><i aria-hidden="true" class="the7bootstrap- the7-bootstrap-three-dots"></i></span></a> </div> <div class="post-entry-content"> <h6 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/mobile-device-forensics/" rel="bookmark" title="Mobile Device Forensics in the Evolving World of Electronics" class="post-title">Mobile Device Forensics in the Evolving World of Electronics</a></h6><div class="entry-meta"><a href="https://www.eccouncil.org/cybersecurity-exchange/2023/12/15/" title="1:13 pm" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2023-12-15T13:13:26+00:00">December 15, 2023</time></a></div> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-80820 type-post status-publish format-standard has-post-thumbnail category-computer-forensics"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/cybercrime-types-prevention-digital-forensics/"><img width="521" height="521" src="data:image/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20521%20521&#039;%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 521px) 100vw, 521px" style="--ratio: 521 / 521;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/What-Is-Cyber-Crime-thumbnail.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/What-Is-Cyber-Crime-thumbnail.jpg 521w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/What-Is-Cyber-Crime-thumbnail-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/11/What-Is-Cyber-Crime-thumbnail-150x150.jpg 150w" /><span class="the7-hover-icon"><i aria-hidden="true" class="the7bootstrap- the7-bootstrap-three-dots"></i></span></a> </div> <div class="post-entry-content"> <h6 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/computer-forensics/cybercrime-types-prevention-digital-forensics/" rel="bookmark" title="What Is Cyber Crime? What Are the Different Types of Cyber Crime?" class="post-title">What Is Cyber Crime? What Are the Different Types of Cyber Crime?</a></h6><div class="entry-meta"><a href="https://www.eccouncil.org/cybersecurity-exchange/2023/11/07/" title="10:36 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2023-11-07T10:36:38+00:00">November 7, 2023</time></a></div> </div> </div> </article> </div> </div> </div> </div> </div> <div class="elementor-element elementor-element-5990439 elementor-widget elementor-widget-spacer" data-id="5990439" data-element_type="widget" data-widget_type="spacer.default"> <div class="elementor-widget-container"> <div class="elementor-spacer"> <div class="elementor-spacer-inner"></div> </div> </div> </div> </div> </div> </div> </section> </div> </div> <div class="elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-7030fe45" data-id="7030fe45" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-78fce5d6 elementor-widget elementor-widget-heading" data-id="78fce5d6" data-element_type="widget" data-widget_type="heading.default"> <div class="elementor-widget-container"> <h5 class="elementor-heading-title elementor-size-default">Recent Articles</h5> </div> </div> <div class="elementor-element elementor-element-41feccb2 icon-box-vertical-align-top img-align-left image-vertical-align-start preserve-img-ratio-cover slide-h-position-left elementor-widget elementor-widget-the7-elements-simple-posts" data-id="41feccb2" data-element_type="widget" data-widget_type="the7-elements-simple-posts.default"> <div class="elementor-widget-container"> <div class="the7-simple-widget-posts the7-elementor-widget the7-elements-simple-posts-41feccb2 jquery-filter jquery-filter" data-post-limit="-1" data-pagination-mode="none" data-scroll-offset="" aria-live="assertive"> <div class="dt-css-grid custom-pagination-handler" data-columns="{&quot;d&quot;:1,&quot;t&quot;:2,&quot;p&quot;:1,&quot;wd&quot;:&quot;&quot;}"> <div class="wf-cell visible "> <article class="post visible wrapper post-82838 type-post status-publish format-standard has-post-thumbnail category-devsecops"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/devsecops/how-to-become-a-devsecops-consultant-skills-career-path-job-role/"><img width="800" height="800" src="data:image/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20800%20800&#039;%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 800px) 100vw, 800px" style="--ratio: 800 / 800;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-DevSecOps-1080-x-1080-.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-DevSecOps-1080-x-1080-.jpg 800w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-DevSecOps-1080-x-1080--300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-DevSecOps-1080-x-1080--150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-DevSecOps-1080-x-1080--768x768.jpg 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-DevSecOps-1080-x-1080--400x400.jpg 400w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-DevSecOps-1080-x-1080--600x600.jpg 600w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h6 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/devsecops/how-to-become-a-devsecops-consultant-skills-career-path-job-role/" rel="bookmark" title="How to Become a DevSecOps Consultant: Skills, Career Path, and Job Role " class="post-title">How to Become a DevSecOps Consultant: Skills, Career&hellip;</a></h6><div class="entry-meta"><a href="https://www.eccouncil.org/cybersecurity-exchange/2025/02/09/" title="7:48 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2025-02-09T07:48:23+00:00">February 9, 2025</time></a></div> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-82834 type-post status-publish format-standard has-post-thumbnail category-devsecops"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/devsecops/integrating-security-into-devops-course/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%201080%201080&#039;%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_DevSecOps-Integrating-Security-into-DevOps-Course-1080-x-1080.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_DevSecOps-Integrating-Security-into-DevOps-Course-1080-x-1080.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_DevSecOps-Integrating-Security-into-DevOps-Course-1080-x-1080-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_DevSecOps-Integrating-Security-into-DevOps-Course-1080-x-1080-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_DevSecOps-Integrating-Security-into-DevOps-Course-1080-x-1080-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_DevSecOps-Integrating-Security-into-DevOps-Course-1080-x-1080-768x768.jpg 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_DevSecOps-Integrating-Security-into-DevOps-Course-1080-x-1080-400x400.jpg 400w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_DevSecOps-Integrating-Security-into-DevOps-Course-1080-x-1080-600x600.jpg 600w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h6 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/devsecops/integrating-security-into-devops-course/" rel="bookmark" title="DevSecOps: Integrating Security into DevOps Course" class="post-title">DevSecOps: Integrating Security into DevOps Course</a></h6><div class="entry-meta"><a href="https://www.eccouncil.org/cybersecurity-exchange/2025/02/09/" title="7:25 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2025-02-09T07:25:36+00:00">February 9, 2025</time></a></div> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-82854 type-post status-publish format-standard has-post-thumbnail category-cloud-security"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cloud-security/how-to-become-a-cloud-security-architect-career-and-role-guide/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%201080%201080&#039;%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-Cloud-Security-Engineer-1080x1080-1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-Cloud-Security-Engineer-1080x1080-1.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-Cloud-Security-Engineer-1080x1080-1-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-Cloud-Security-Engineer-1080x1080-1-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-Cloud-Security-Engineer-1080x1080-1-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-Cloud-Security-Engineer-1080x1080-1-768x768.jpg 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-Cloud-Security-Engineer-1080x1080-1-400x400.jpg 400w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG_How-to-Become-a-Cloud-Security-Engineer-1080x1080-1-600x600.jpg 600w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h6 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/cloud-security/how-to-become-a-cloud-security-architect-career-and-role-guide/" rel="bookmark" title="How to Become a Cloud Security Architect: Career and Role Guide" class="post-title">How to Become a Cloud Security Architect: Career&hellip;</a></h6><div class="entry-meta"><a href="https://www.eccouncil.org/cybersecurity-exchange/2025/02/07/" title="10:18 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2025-02-07T10:18:27+00:00">February 7, 2025</time></a></div> </div> </div> </article> </div> <div class="wf-cell visible "> <article class="post visible wrapper post-82849 type-post status-publish format-standard has-post-thumbnail category-cloud-security"> <div class="post-content-wrapper"> <div class="the7-simple-post-thumb"> <a class="post-thumbnail-rollover layzr-bg img-css-resize-wrapper" aria-label="Post image" href="https://www.eccouncil.org/cybersecurity-exchange/cloud-security/how-to-become-a-cloud-security-engineer-career-job-role-know-everything/"><img width="1080" height="1080" src="data:image/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%201080%201080&#039;%2F%3E" class="attachment-full size-full preload-me aspect lazy lazy-load" alt="" decoding="async" sizes="(max-width: 1080px) 100vw, 1080px" style="--ratio: 1080 / 1080;" data-src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG-How-to-Become-a-Cloud-Security-Engineer-Career-Insights-and-Job-1080x1080-1.jpg" loading="eager" data-srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG-How-to-Become-a-Cloud-Security-Engineer-Career-Insights-and-Job-1080x1080-1.jpg 1080w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG-How-to-Become-a-Cloud-Security-Engineer-Career-Insights-and-Job-1080x1080-1-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG-How-to-Become-a-Cloud-Security-Engineer-Career-Insights-and-Job-1080x1080-1-1024x1024.jpg 1024w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG-How-to-Become-a-Cloud-Security-Engineer-Career-Insights-and-Job-1080x1080-1-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG-How-to-Become-a-Cloud-Security-Engineer-Career-Insights-and-Job-1080x1080-1-768x768.jpg 768w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG-How-to-Become-a-Cloud-Security-Engineer-Career-Insights-and-Job-1080x1080-1-400x400.jpg 400w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2025/02/BG-How-to-Become-a-Cloud-Security-Engineer-Career-Insights-and-Job-1080x1080-1-600x600.jpg 600w" /><span class="the7-hover-icon"></span></a> </div> <div class="post-entry-content"> <h6 class="heading"><a href="https://www.eccouncil.org/cybersecurity-exchange/cloud-security/how-to-become-a-cloud-security-engineer-career-job-role-know-everything/" rel="bookmark" title="How to Become a Cloud Security Engineer: Career Insights and Job" class="post-title">How to Become a Cloud Security Engineer: Career&hellip;</a></h6><div class="entry-meta"><a href="https://www.eccouncil.org/cybersecurity-exchange/2025/02/07/" title="10:00 am" class="meta-item data-link" rel="bookmark"><time class="entry-date updated" datetime="2025-02-07T10:00:44+00:00">February 7, 2025</time></a></div> </div> </div> </article> </div> </div> </div> </div> </div> <div class="elementor-element elementor-element-46ae4dca elementor-widget elementor-widget-spacer" data-id="46ae4dca" data-element_type="widget" data-widget_type="spacer.default"> <div class="elementor-widget-container"> <div class="elementor-spacer"> <div class="elementor-spacer-inner"></div> </div> </div> </div> <div class="elementor-element elementor-element-7e7bdec eael-gravity-form-button-custom elementor-widget elementor-widget-eael-gravity-form" data-id="7e7bdec" data-element_type="widget" data-settings="{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;sticky_offset&quot;:70,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}" data-widget_type="eael-gravity-form.default"> <div class="elementor-widget-container"> <div class="eael-contact-form eael-gravity-form title-description-hide eael-contact-form-align-left"> <div class="eael-gravity-form-heading"> <div class="eael-contact-form-description eael-gravity-form-description"> <strong>Become a Certified Hacking Forensic Investigator (C|HFI) </strong> </div> </div> <script type="text/javascript"></script> <div class='gf_browser_gecko gform_wrapper gravity-theme gform-theme--no-framework' data-form-theme='gravity-theme' data-form-index='0' id='gform_wrapper_31' ><div id='gf_31' class='gform_anchor' tabindex='-1'></div> <div class='gform_heading'> <p class='gform_required_legend'>&quot;<span class="gfield_required gfield_required_asterisk">*</span>&quot; indicates required fields</p> </div><form method='post' enctype='multipart/form-data' id='gform_31' action='/cybersecurity-exchange/computer-forensics/what-is-digital-forensics/#gf_31' data-formid='31' novalidate><div class='gf_invisible ginput_recaptchav3' data-sitekey='6LdJNX4oAAAAAGWiILMPLCGUp8ALa8TJXIWg55PV' data-tabindex='0'><input id="input_9f172b28165bd48457792874d1867239" class="gfield_recaptcha_response" type="hidden" name="input_9f172b28165bd48457792874d1867239" value=""/></div> <div class='gform-body gform_body'><div id='gform_fields_31' class='gform_fields top_label form_sublabel_below description_above validation_below'><fieldset id="field_31_35" class="gfield gfield--type-name gfield--input-type-name gfield--width-full gfield_contains_required field_sublabel_hidden_label gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_visible" data-js-reload="field_31_35" ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></legend><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_31_35'> <span id='input_31_35_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' > <input type='text' name='input_35.3' id='input_31_35_3' value='' aria-required='true' placeholder='First Name *' /> <label for='input_31_35_3' class='gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text'>First Name</label> </span> <span id='input_31_35_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' > <input type='text' name='input_35.6' id='input_31_35_6' value='' aria-required='true' placeholder='Last Name *' /> <label for='input_31_35_6' class='gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text'>Last Name</label> </span> </div></fieldset><div id="field_31_52" class="gfield gfield--type-phone gfield--input-type-phone gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible" data-js-reload="field_31_52" ><label class='gfield_label gform-field-label screen-reader-text' for='input_31_52'>Phone Number *<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_phone'><input name='input_52' id='input_31_52' type='tel' value='' class='large' placeholder='Phone Number *' aria-required="true" aria-invalid="false" /></div></div><div id="field_31_53" class="gfield gfield--type-email gfield--input-type-email gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_visible" data-js-reload="field_31_53" ><label class='gfield_label gform-field-label' for='input_31_53'>Email<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_email'> <input name='input_53' id='input_31_53' type='email' value='' class='large' placeholder='Email*' aria-required="true" aria-invalid="false" /> </div></div><fieldset id="field_31_51" class="gfield gfield--type-address gfield--input-type-address gfield--width-full gfield_contains_required field_sublabel_hidden_label gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_visible" data-js-reload="field_31_51" ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Address<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></legend> <div class='ginput_complex ginput_container has_country ginput_container_address gform-grid-row' id='input_31_51' > <input type='hidden' class='gform_hidden' name='input_51.4' id='input_31_51_4' value=''/><span class='ginput_left address_country ginput_address_country gform-grid-col' id='input_31_51_6_container' > <select name='input_51.6' id='input_31_51_6' aria-required='true' ><option value='' >Country *</option><option value='Afghanistan' >Afghanistan</option><option value='Albania' >Albania</option><option value='Algeria' >Algeria</option><option value='American Samoa' >American Samoa</option><option value='Andorra' >Andorra</option><option value='Angola' >Angola</option><option value='Anguilla' >Anguilla</option><option value='Antarctica' >Antarctica</option><option value='Antigua and Barbuda' >Antigua and Barbuda</option><option value='Argentina' >Argentina</option><option value='Armenia' >Armenia</option><option value='Aruba' >Aruba</option><option value='Australia' >Australia</option><option value='Austria' >Austria</option><option value='Azerbaijan' >Azerbaijan</option><option value='Bahamas' >Bahamas</option><option value='Bahrain' >Bahrain</option><option value='Bangladesh' >Bangladesh</option><option value='Barbados' >Barbados</option><option value='Belarus' >Belarus</option><option value='Belgium' >Belgium</option><option value='Belize' >Belize</option><option value='Benin' >Benin</option><option value='Bermuda' >Bermuda</option><option value='Bhutan' >Bhutan</option><option value='Bolivia' >Bolivia</option><option value='Bonaire, Sint Eustatius and Saba' >Bonaire, Sint Eustatius and Saba</option><option value='Bosnia and Herzegovina' >Bosnia and Herzegovina</option><option value='Botswana' >Botswana</option><option value='Bouvet Island' >Bouvet Island</option><option value='Brazil' >Brazil</option><option value='British Indian Ocean Territory' >British Indian Ocean Territory</option><option value='Brunei Darussalam' >Brunei Darussalam</option><option value='Bulgaria' >Bulgaria</option><option value='Burkina Faso' >Burkina Faso</option><option value='Burundi' >Burundi</option><option value='Cabo Verde' >Cabo Verde</option><option value='Cambodia' >Cambodia</option><option value='Cameroon' >Cameroon</option><option value='Canada' >Canada</option><option value='Cayman Islands' >Cayman Islands</option><option value='Central African Republic' >Central African Republic</option><option value='Chad' >Chad</option><option value='Chile' >Chile</option><option value='China' >China</option><option value='Christmas Island' >Christmas Island</option><option value='Cocos Islands' >Cocos Islands</option><option value='Colombia' >Colombia</option><option value='Comoros' >Comoros</option><option value='Congo' >Congo</option><option value='Congo, Democratic Republic of the' >Congo, Democratic Republic of the</option><option value='Cook Islands' >Cook Islands</option><option value='Costa Rica' >Costa Rica</option><option value='Croatia' >Croatia</option><option value='Cuba' >Cuba</option><option value='Curaçao' >Curaçao</option><option value='Cyprus' >Cyprus</option><option value='Czechia' >Czechia</option><option value='Côte d&#039;Ivoire' >Côte d&#039;Ivoire</option><option value='Denmark' >Denmark</option><option value='Djibouti' >Djibouti</option><option value='Dominica' >Dominica</option><option value='Dominican Republic' >Dominican Republic</option><option value='Ecuador' >Ecuador</option><option value='Egypt' >Egypt</option><option value='El Salvador' >El Salvador</option><option value='Equatorial Guinea' >Equatorial Guinea</option><option value='Eritrea' >Eritrea</option><option value='Estonia' >Estonia</option><option value='Eswatini' >Eswatini</option><option value='Ethiopia' >Ethiopia</option><option value='Falkland Islands' >Falkland Islands</option><option value='Faroe Islands' >Faroe Islands</option><option value='Fiji' >Fiji</option><option value='Finland' >Finland</option><option value='France' >France</option><option value='French Guiana' >French Guiana</option><option value='French Polynesia' >French Polynesia</option><option value='French Southern Territories' >French Southern Territories</option><option value='Gabon' >Gabon</option><option value='Gambia' >Gambia</option><option value='Georgia' >Georgia</option><option value='Germany' >Germany</option><option value='Ghana' >Ghana</option><option value='Gibraltar' >Gibraltar</option><option value='Greece' >Greece</option><option value='Greenland' >Greenland</option><option value='Grenada' >Grenada</option><option value='Guadeloupe' >Guadeloupe</option><option value='Guam' >Guam</option><option value='Guatemala' >Guatemala</option><option value='Guernsey' >Guernsey</option><option value='Guinea' >Guinea</option><option value='Guinea-Bissau' >Guinea-Bissau</option><option value='Guyana' >Guyana</option><option value='Haiti' >Haiti</option><option value='Heard Island and McDonald Islands' >Heard Island and McDonald Islands</option><option value='Holy See' >Holy See</option><option value='Honduras' >Honduras</option><option value='Hong Kong' >Hong Kong</option><option value='Hungary' >Hungary</option><option value='Iceland' >Iceland</option><option value='India' >India</option><option value='Indonesia' >Indonesia</option><option value='Iran' >Iran</option><option value='Iraq' >Iraq</option><option value='Ireland' >Ireland</option><option value='Isle of Man' >Isle of Man</option><option value='Israel' >Israel</option><option value='Italy' >Italy</option><option value='Jamaica' >Jamaica</option><option value='Japan' >Japan</option><option value='Jersey' >Jersey</option><option value='Jordan' >Jordan</option><option value='Kazakhstan' >Kazakhstan</option><option value='Kenya' >Kenya</option><option value='Kiribati' >Kiribati</option><option value='Korea, Democratic People&#039;s Republic of' >Korea, Democratic People&#039;s Republic of</option><option value='Korea, Republic of' >Korea, Republic of</option><option value='Kuwait' >Kuwait</option><option value='Kyrgyzstan' >Kyrgyzstan</option><option value='Lao People&#039;s Democratic Republic' >Lao People&#039;s Democratic Republic</option><option value='Latvia' >Latvia</option><option value='Lebanon' >Lebanon</option><option value='Lesotho' >Lesotho</option><option value='Liberia' >Liberia</option><option value='Libya' >Libya</option><option value='Liechtenstein' >Liechtenstein</option><option value='Lithuania' >Lithuania</option><option value='Luxembourg' >Luxembourg</option><option value='Macao' >Macao</option><option value='Madagascar' >Madagascar</option><option value='Malawi' >Malawi</option><option value='Malaysia' >Malaysia</option><option value='Maldives' >Maldives</option><option value='Mali' >Mali</option><option value='Malta' >Malta</option><option value='Marshall Islands' >Marshall Islands</option><option value='Martinique' >Martinique</option><option value='Mauritania' >Mauritania</option><option value='Mauritius' >Mauritius</option><option value='Mayotte' >Mayotte</option><option value='Mexico' >Mexico</option><option value='Micronesia' >Micronesia</option><option value='Moldova' >Moldova</option><option value='Monaco' >Monaco</option><option value='Mongolia' >Mongolia</option><option value='Montenegro' >Montenegro</option><option value='Montserrat' >Montserrat</option><option value='Morocco' >Morocco</option><option value='Mozambique' >Mozambique</option><option value='Myanmar' >Myanmar</option><option value='Namibia' >Namibia</option><option value='Nauru' >Nauru</option><option value='Nepal' >Nepal</option><option value='Netherlands' >Netherlands</option><option value='New Caledonia' >New Caledonia</option><option value='New Zealand' >New Zealand</option><option value='Nicaragua' >Nicaragua</option><option value='Niger' >Niger</option><option value='Nigeria' >Nigeria</option><option value='Niue' >Niue</option><option value='Norfolk Island' >Norfolk Island</option><option value='North Macedonia' >North Macedonia</option><option value='Northern Mariana Islands' >Northern Mariana Islands</option><option value='Norway' >Norway</option><option value='Oman' >Oman</option><option value='Pakistan' >Pakistan</option><option value='Palau' >Palau</option><option value='Palestine, State of' >Palestine, State of</option><option value='Panama' >Panama</option><option value='Papua New Guinea' >Papua New Guinea</option><option value='Paraguay' >Paraguay</option><option value='Peru' >Peru</option><option value='Philippines' >Philippines</option><option value='Pitcairn' >Pitcairn</option><option value='Poland' >Poland</option><option value='Portugal' >Portugal</option><option value='Puerto Rico' >Puerto Rico</option><option value='Qatar' >Qatar</option><option value='Romania' >Romania</option><option value='Russian Federation' >Russian Federation</option><option value='Rwanda' >Rwanda</option><option value='Réunion' >Réunion</option><option value='Saint Barthélemy' >Saint Barthélemy</option><option value='Saint Helena, Ascension and Tristan da Cunha' >Saint Helena, Ascension and Tristan da Cunha</option><option value='Saint Kitts and Nevis' >Saint Kitts and Nevis</option><option value='Saint Lucia' >Saint Lucia</option><option value='Saint Martin' >Saint Martin</option><option value='Saint Pierre and Miquelon' >Saint Pierre and Miquelon</option><option value='Saint Vincent and the Grenadines' >Saint Vincent and the Grenadines</option><option value='Samoa' >Samoa</option><option value='San Marino' >San Marino</option><option value='Sao Tome and Principe' >Sao Tome and Principe</option><option value='Saudi Arabia' >Saudi Arabia</option><option value='Senegal' >Senegal</option><option value='Serbia' >Serbia</option><option value='Seychelles' >Seychelles</option><option value='Sierra Leone' >Sierra Leone</option><option value='Singapore' >Singapore</option><option value='Sint Maarten' >Sint Maarten</option><option value='Slovakia' >Slovakia</option><option value='Slovenia' >Slovenia</option><option value='Solomon Islands' >Solomon Islands</option><option value='Somalia' >Somalia</option><option value='South Africa' >South Africa</option><option value='South Georgia and the South Sandwich Islands' >South Georgia and the South Sandwich Islands</option><option value='South Sudan' >South Sudan</option><option value='Spain' >Spain</option><option value='Sri Lanka' >Sri Lanka</option><option value='Sudan' >Sudan</option><option value='Suriname' >Suriname</option><option value='Svalbard and Jan Mayen' >Svalbard and Jan Mayen</option><option value='Sweden' >Sweden</option><option value='Switzerland' >Switzerland</option><option value='Syria Arab Republic' >Syria Arab Republic</option><option value='Taiwan' >Taiwan</option><option value='Tajikistan' >Tajikistan</option><option value='Tanzania, the United Republic of' >Tanzania, the United Republic of</option><option value='Thailand' >Thailand</option><option value='Timor-Leste' >Timor-Leste</option><option value='Togo' >Togo</option><option value='Tokelau' >Tokelau</option><option value='Tonga' >Tonga</option><option value='Trinidad and Tobago' >Trinidad and Tobago</option><option value='Tunisia' >Tunisia</option><option value='Turkmenistan' >Turkmenistan</option><option value='Turks and Caicos Islands' >Turks and Caicos Islands</option><option value='Tuvalu' >Tuvalu</option><option value='Türkiye' >Türkiye</option><option value='US Minor Outlying Islands' >US Minor Outlying Islands</option><option value='Uganda' >Uganda</option><option value='Ukraine' >Ukraine</option><option value='United Arab Emirates' >United Arab Emirates</option><option value='United Kingdom' >United Kingdom</option><option value='United States' >United States</option><option value='Uruguay' >Uruguay</option><option value='Uzbekistan' >Uzbekistan</option><option value='Vanuatu' >Vanuatu</option><option value='Venezuela' >Venezuela</option><option value='Viet Nam' >Viet Nam</option><option value='Virgin Islands, British' >Virgin Islands, British</option><option value='Virgin Islands, U.S.' >Virgin Islands, U.S.</option><option value='Wallis and Futuna' >Wallis and Futuna</option><option value='Western Sahara' >Western Sahara</option><option value='Yemen' >Yemen</option><option value='Zambia' >Zambia</option><option value='Zimbabwe' >Zimbabwe</option><option value='Åland Islands' >Åland Islands</option></select> <label for='input_31_51_6' id='input_31_51_6_label' class='gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text'>Country</label> </span> <div class='gf_clear gf_clear_complex'></div> </div></fieldset><div id="field_31_39" class="gfield gfield--type-select gfield--input-type-select gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible" data-js-reload="field_31_39" ><label class='gfield_label gform-field-label' for='input_31_39'>What are you interested in ?<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_select'><select name='input_39' id='input_31_39' class='large gfield_select' aria-required="true" aria-invalid="false" ><option value='Ethical Hacking' >Ethical Hacking</option><option value='Penetration Testing' >Penetration Testing</option><option value='Computer Forensics' >Computer Forensics</option><option value='Network Security/ Network Defense' >Network Security/ Network Defense</option><option value='Incident Handling' >Incident Handling</option><option value='SOC Analyst' >SOC Analyst</option><option value='Threat Intelligence' >Threat Intelligence</option><option value='Executive Management (CCISO)' >Executive Management (CCISO)</option><option value='Security Awareness' >Security Awareness</option><option value='Cyber Range Challenge' >Cyber Range Challenge</option><option value='Secure Coding' >Secure Coding</option><option value='Blockchain' >Blockchain</option><option value='Disaster Recovery' >Disaster Recovery</option><option value='Web Application Security' >Web Application Security</option><option value='Cloud Security' >Cloud Security</option><option value='Cybersecurity Technician' >Cybersecurity Technician</option><option value='Fundamentals' >Fundamentals</option><option value='Encryption' >Encryption</option><option value='DevSecOps' >DevSecOps</option></select></div></div><fieldset id="field_31_27" class="gfield gfield--type-consent gfield--type-choice gfield--input-type-consent adv-board-form gfield_contains_required field_sublabel_below gfield--has-description field_description_below hidden_label field_validation_below gfield_visibility_visible" data-js-reload="field_31_27" ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Agreement<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></legend><div class='ginput_container ginput_container_consent'><input name='input_27.1' id='input_31_27_1' type='checkbox' value='1' aria-describedby="gfield_consent_description_31_27" aria-required="true" aria-invalid="false" /> <label class="gform-field-label gform-field-label--type-inline gfield_consent_label" for='input_31_27_1' ><span class="gfield_required gfield_required_asterisk">*</span></label><input type='hidden' name='input_27.2' value='' class='gform_hidden' /><input type='hidden' name='input_27.3' value='4' class='gform_hidden' /></div><div class='gfield_description gfield_consent_description' id='gfield_consent_description_31_27'>I agree to the <a href="https://www.eccouncil.org/legal/terms-of-use/">Terms of Use</a> and <a href="https://www.eccouncil.org/legal/privacy-policy/">Privacy Policy</a></div></fieldset><div id="field_31_10" class="gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible" data-js-reload="field_31_10" ><div class='ginput_container ginput_container_text'><input name='input_10' id='input_31_10' type='hidden' class='gform_hidden' aria-invalid="false" value='What is Digital Forensics' /></div></div><div id="field_31_22" class="gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible" data-js-reload="field_31_22" ><div class='ginput_container ginput_container_text'><input name='input_22' id='input_31_22' type='hidden' class='gform_hidden' aria-invalid="false" value='CEH_Cybersec' /></div></div></div></div> <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_31' class='gform_button button gform-button--width-full' onclick='gform.submission.handleButtonClick(this);' value='Submit' /> <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_31' value='postback' /> <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_31' id='gform_theme_31' value='gravity-theme' /> <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_31' id='gform_style_settings_31' value='' /> <input type='hidden' class='gform_hidden' name='is_submit_31' value='1' /> <input type='hidden' class='gform_hidden' name='gform_submit' value='31' /> <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' /> <input type='hidden' class='gform_hidden' name='state_31' value='WyJ7XCIyNy4xXCI6XCJiMDE5ZmY3NGM1ZmEwYmE2ODFkMTQ3OWI3NjgwMTc2YVwiLFwiMjcuMlwiOlwiOTg0NDNlMmQ2YzFkMGRjMTY4NWI3OTJhYmVjYmI3YjdcIixcIjI3LjNcIjpcImQ3MGJmZjk3MjgyMmJjNjBlZDNkYmU5Zjc3MDU2YTNjXCJ9IiwiMzMwMTQ1ZmZhMmE1ZjBhMzc2MTg2Y2VkYjZlYTYxYzMiXQ==' /> <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_31' id='gform_target_page_number_31' value='0' /> <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_31' id='gform_source_page_number_31' value='1' /> <input type='hidden' name='gform_field_values' value='' /> </div> </form> </div><script> gform.initializeOnLoaded( function() {gformInitSpinner( 31, 'https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery('#gform_ajax_frame_31').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_31');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_31').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_31').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_31').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_31').removeClass('gform_validation_error');}setTimeout( function() { /* delay the scroll by 50 milliseconds to fix a bug in chrome */ jQuery(document).scrollTop(500); }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_31').val();gformInitSpinner( 31, 'https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [31, current_page]);window['gf_submitting_31'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_31').replaceWith(confirmation_content);jQuery(document).scrollTop(500);jQuery(document).trigger('gform_confirmation_loaded', [31]);window['gf_submitting_31'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_31').text());}else{jQuery('#gform_31').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger("gform_pre_post_render", [{ formId: "31", currentPage: "current_page", abort: function() { this.preventDefault(); } }]); if (event && event.defaultPrevented) { return; } const gformWrapperDiv = document.getElementById( "gform_wrapper_31" ); if ( gformWrapperDiv ) { const visibilitySpan = document.createElement( "span" ); visibilitySpan.id = "gform_visibility_test_31"; gformWrapperDiv.insertAdjacentElement( "afterend", visibilitySpan ); } const visibilityTestDiv = document.getElementById( "gform_visibility_test_31" ); let postRenderFired = false; function triggerPostRender() { if ( postRenderFired ) { return; } postRenderFired = true; jQuery( document ).trigger( 'gform_post_render', [31, current_page] ); gform.utils.trigger( { event: 'gform/postRender', native: false, data: { formId: 31, currentPage: current_page } } ); gform.utils.trigger( { event: 'gform/post_render', native: false, data: { formId: 31, currentPage: current_page } } ); if ( visibilityTestDiv ) { visibilityTestDiv.parentNode.removeChild( visibilityTestDiv ); } } function debounce( func, wait, immediate ) { var timeout; return function() { var context = this, args = arguments; var later = function() { timeout = null; if ( !immediate ) func.apply( context, args ); }; var callNow = immediate && !timeout; clearTimeout( timeout ); timeout = setTimeout( later, wait ); if ( callNow ) func.apply( context, args ); }; } const debouncedTriggerPostRender = debounce( function() { triggerPostRender(); }, 200 ); if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) { const observer = new MutationObserver( ( mutations ) => { mutations.forEach( ( mutation ) => { if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) { debouncedTriggerPostRender(); observer.disconnect(); } }); }); observer.observe( document.body, { attributes: true, childList: false, subtree: true, attributeFilter: [ 'style', 'class' ], }); } else { triggerPostRender(); } } );} ); </script> </div> </div> </div> </div> </div> </div> </section> </div> </div><!-- #content --> </div><!-- .wf-container --> </div><!-- .wf-wrap --> </div><!-- #main --> <!-- !Footer --> <footer id="footer" class="footer solid-bg elementor-footer"> <div class="wf-wrap"> <div class="wf-container-footer"> <div class="wf-container"> <div data-elementor-type="footer" data-elementor-id="21569" class="elementor elementor-21569 elementor-location-footer" data-elementor-post-type="elementor_library"> <section class="elementor-section elementor-top-section elementor-element elementor-element-99e335b elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="99e335b" data-element_type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}"> <div class="elementor-container elementor-column-gap-wider"> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-979bda7" data-id="979bda7" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-adef294 elementor-widget elementor-widget-image" data-id="adef294" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <img loading="lazy" width="200" height="42" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/EC-Council-logo-footer.png" class="attachment-full size-full wp-image-79960" alt="EC-Council Logo" /> </div> </div> </div> </div> <div class="elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-47645cf" data-id="47645cf" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-dc04426 elementor-shape-circle elementor-grid-6 e-grid-align-right e-grid-align-mobile-center elementor-widget elementor-widget-social-icons" data-id="dc04426" data-element_type="widget" data-widget_type="social-icons.default"> <div class="elementor-widget-container"> <div class="elementor-social-icons-wrapper elementor-grid"> <span class="elementor-grid-item"> <a class="elementor-icon elementor-social-icon elementor-social-icon-linkedin-in elementor-repeater-item-0224fa5" href="https://www.linkedin.com/company/ec-council" target="_blank"> <span class="elementor-screen-only">Linkedin-in</span> <svg class="e-font-icon-svg e-fab-linkedin-in" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"></path></svg> </a> </span> <span class="elementor-grid-item"> <a class="elementor-icon elementor-social-icon elementor-social-icon-twitter elementor-repeater-item-fe64f2d" href="https://twitter.com/ECCOUNCIL" target="_blank"> <span class="elementor-screen-only">Twitter</span> <svg class="e-font-icon-svg e-fab-twitter" viewBox="0 0 512 512" xmlns="http://www.w3.org/2000/svg"><path d="M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z"></path></svg> </a> </span> <span class="elementor-grid-item"> <a class="elementor-icon elementor-social-icon elementor-social-icon-facebook-f elementor-repeater-item-50aa484" href="https://www.facebook.com/ECCouncil" target="_blank"> <span class="elementor-screen-only">Facebook-f</span> <svg class="e-font-icon-svg e-fab-facebook-f" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M279.14 288l14.22-92.66h-88.91v-60.13c0-25.35 12.42-50.06 52.24-50.06h40.42V6.26S260.43 0 225.36 0c-73.22 0-121.08 44.38-121.08 124.72v70.62H22.89V288h81.39v224h100.17V288z"></path></svg> </a> </span> <span class="elementor-grid-item"> <a class="elementor-icon elementor-social-icon elementor-social-icon-youtube elementor-repeater-item-e0f6049" href="https://www.youtube.com/user/eccouncilusa" target="_blank"> <span class="elementor-screen-only">Youtube</span> <svg class="e-font-icon-svg e-fab-youtube" viewBox="0 0 576 512" xmlns="http://www.w3.org/2000/svg"><path d="M549.655 124.083c-6.281-23.65-24.787-42.276-48.284-48.597C458.781 64 288 64 288 64S117.22 64 74.629 75.486c-23.497 6.322-42.003 24.947-48.284 48.597-11.412 42.867-11.412 132.305-11.412 132.305s0 89.438 11.412 132.305c6.281 23.65 24.787 41.5 48.284 47.821C117.22 448 288 448 288 448s170.78 0 213.371-11.486c23.497-6.321 42.003-24.171 48.284-47.821 11.412-42.867 11.412-132.305 11.412-132.305s0-89.438-11.412-132.305zm-317.51 213.508V175.185l142.739 81.205-142.739 81.201z"></path></svg> </a> </span> </div> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-top-section elementor-element elementor-element-e154a21 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default" data-id="e154a21" data-element_type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}"> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6daae7a" data-id="6daae7a" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <section class="elementor-section elementor-inner-section elementor-element elementor-element-8104121 elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="8104121" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-3ccdafa" data-id="3ccdafa" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-23a6ff3 elementor-widget__width-auto elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor" data-id="23a6ff3" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>© 2024 EC-Council</p> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-5103789" data-id="5103789" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-b2cb538 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="b2cb538" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/cybersecurity-exchange/whitepaper/securing-the-future-of-finance-top-cybersecurity-best-practices-for-financial-institutions/" target="_blank" class="box-button elementor-button elementor-size-xs"> Get Training</a></div> </div> </div> <div class="elementor-element elementor-element-4e28cf5 elementor-widget__width-initial elementor-hidden-tablet elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="4e28cf5" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-0d906de" data-id="0d906de" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-848d4d8 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="848d4d8" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/partner-with-us/" target="_blank" class="box-button elementor-button elementor-size-xs">Partner With Us</a></div> </div> </div> <div class="elementor-element elementor-element-8a377c0 elementor-widget__width-initial elementor-hidden-tablet elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="8a377c0" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-56ba32b" data-id="56ba32b" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-6910c36 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget elementor-widget-the7_button_widget" data-id="6910c36" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/terms-of-use/" target="_blank" class="box-button elementor-button elementor-size-xs">Terms Of Use</a></div> </div> </div> <div class="elementor-element elementor-element-66ff94b elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="66ff94b" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-3ba6b66" data-id="3ba6b66" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-71f5d85 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget elementor-widget-the7_button_widget" data-id="71f5d85" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/privacy-policy/" target="_blank" class="box-button elementor-button elementor-size-xs">Privacy Policy</a></div> </div> </div> <div class="elementor-element elementor-element-f090837 elementor-widget__width-initial elementor-hidden-tablet elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="f090837" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-01b2bf0" data-id="01b2bf0" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-b66dc68 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="b66dc68" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/errata/" target="_blank" class="box-button elementor-button elementor-size-xs">Report Issue</a></div> </div> </div> <div class="elementor-element elementor-element-43ed683 elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="43ed683" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-dddc90d" data-id="dddc90d" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-84f4523 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="84f4523" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://eccouncil.org/cybersecurity-exchange/publishing-guidelines/" class="box-button elementor-button elementor-size-xs">Publishing Guidelines</a></div> </div> </div> <div class="elementor-element elementor-element-d42b0f1 elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="d42b0f1" data-element_type="widget" data-widget_type="divider.default"> <div class="elementor-widget-container"> <div class="elementor-divider"> <span class="elementor-divider-separator"> </span> </div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-e1824d6" data-id="e1824d6" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-8c1fed7 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-the7_button_widget" data-id="8c1fed7" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/sitemap/" target="_blank" class="box-button elementor-button elementor-size-xs">Sitemap</a></div> </div> </div> </div> </div> </div> </section> <section class="elementor-section elementor-inner-section elementor-element elementor-element-bf9859a elementor-hidden-desktop elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="bf9859a" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-0125d26" data-id="0125d26" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-2995b92 elementor-widget__width-auto elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor" data-id="2995b92" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>© 2024 EC-Council</p> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-68fddc8" data-id="68fddc8" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-07f3308 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="07f3308" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/get-certified-with-ec-council-with-form/" class="box-button elementor-button elementor-size-xs"> Get training</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-cfcdc94" data-id="cfcdc94" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-0e24fb8 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="0e24fb8" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/partner-with-us/" class="box-button elementor-button elementor-size-xs">Partner With Us</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-657bb74" data-id="657bb74" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-5799907 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="5799907" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/terms-of-use/" class="box-button elementor-button elementor-size-xs">Terms Of Use</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-a99c553" data-id="a99c553" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-53822b5 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="53822b5" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/privacy-policy/" class="box-button elementor-button elementor-size-xs">Privacy Policy</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-19cbe1c" data-id="19cbe1c" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-8ba50f8 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="8ba50f8" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/errata/" class="box-button elementor-button elementor-size-xs">Report Issue</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-bd8a105" data-id="bd8a105" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-465c68e elementor-align-left elementor-mobile-align-center elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="465c68e" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://eccouncil.org/cybersecurity-exchange/publishing-guidelines/" class="box-button elementor-button elementor-size-xs">Publishing Guidelines</a></div> </div> </div> </div> </div> <div class="elementor-column elementor-col-12 elementor-inner-column elementor-element elementor-element-e54f023" data-id="e54f023" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-2b562b1 elementor-align-left elementor-widget__width-initial elementor-mobile-align-center elementor-widget-mobile__width-inherit elementor-widget elementor-widget-the7_button_widget" data-id="2b562b1" data-element_type="widget" data-widget_type="the7_button_widget.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"><a href="https://www.eccouncil.org/sitemap/" class="box-button elementor-button elementor-size-xs">Sitemap</a></div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </section> </div> </div><!-- .wf-container --> </div><!-- .wf-container-footer --> </div><!-- .wf-wrap --> </footer><!-- #footer --> <a href="#" class="scroll-top"><svg version="1.1" id="Layer_1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 16 16" style="enable-background:new 0 0 16 16;" xml:space="preserve"> <path d="M11.7,6.3l-3-3C8.5,3.1,8.3,3,8,3c0,0,0,0,0,0C7.7,3,7.5,3.1,7.3,3.3l-3,3c-0.4,0.4-0.4,1,0,1.4c0.4,0.4,1,0.4,1.4,0L7,6.4 V12c0,0.6,0.4,1,1,1s1-0.4,1-1V6.4l1.3,1.3c0.4,0.4,1,0.4,1.4,0C11.9,7.5,12,7.3,12,7S11.9,6.5,11.7,6.3z"/> </svg><span class="screen-reader-text">Go to Top</span></a> </div><!-- #page --> <div data-elementor-type="popup" data-elementor-id="73689" class="elementor elementor-73689 elementor-location-popup" data-elementor-settings="{&quot;entrance_animation&quot;:&quot;fadeInLeft&quot;,&quot;exit_animation&quot;:&quot;fadeInLeft&quot;,&quot;entrance_animation_duration&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.3,&quot;sizes&quot;:[]},&quot;a11y_navigation&quot;:&quot;yes&quot;,&quot;timing&quot;:[]}" data-elementor-post-type="elementor_library"> <section class="elementor-section elementor-top-section elementor-element elementor-element-53c57074 elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="53c57074" data-element_type="section"> <div class="elementor-container elementor-column-gap-wider"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7121ae2a" data-id="7121ae2a" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-6b9c16b widget-divider-yes dt-nav-menu_align-left dt-sub-menu_align-left elementor-widget elementor-widget-the7_nav-menu" data-id="6b9c16b" data-element_type="widget" data-settings="{&quot;submenu_display&quot;:&quot;on_click&quot;}" data-widget_type="the7_nav-menu.default"> <div class="elementor-widget-container"> <nav class="dt-nav-menu--main dt-nav-menu__container dt-sub-menu-display-on_click dt-icon-align-side dt-icon-position-right dt-sub-icon-position-right dt-sub-icon-align-side first-item-border-hide last-item-border-hide"><ul class="dt-nav-menu"><li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-77187 first depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Articles</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-has-children menu-item-82842 has-children depth-0"><a data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Online Degree</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a><ul class="the7-e-sub-nav vertical-sub-nav hover-style-bg"><li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82845 first depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/master-degree-in-cyber-security-online/?utm_source=ecc&#038;utm_medium=blog-menu-link&#038;utm_campaign=mscs-degree' data-level='2'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Masters of Cyber Security</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82859 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/masters-of-science-in-computer-science-mcs/?utm_source=ecc&#038;utm_medium=blog-menu-link&#038;utm_campaign=mcs-degree' data-level='2'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Master of Science in Computer Science</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82860 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/mba-masters-business-administration/?utm_source=ecc&#038;utm_medium=blog-menu-link&#038;utm_campaign=mba-degree' data-level='2'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Masters In Business Administration</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82844 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/bachelor-of-science-in-cyber-security/?utm_source=ecc&#038;utm_medium=blog-menu-link&#038;utm_campaign=bscs-degree' data-level='2'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Bachelors of Science in Cyber Security</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-82843 depth-1"><a href='https://www.eccu.edu/online-cyber-security-degrees/graduate-certificate-program/?utm_source=ecc&#038;utm_medium=blog-menu-link&#038;utm_campaign=graduate-degree' data-level='2'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Graduate Certificate Program</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> </ul></li> <li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-78453 depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/whitepapers/' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Whitepapers</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-79632 depth-0"><a href='https://www.eccouncil.org/cybersecurity-exchange/cyber-talks/' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Cyber Talks</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="menu-item menu-item-type-custom menu-item-object-custom menu-item-79998 depth-0"><a href='https://www.eccouncil.org/success-stories/is-ceh-worth-it/?utm_source=cyberxchange-homepage&#038;utm_medium=website&#038;utm_campaign=success%20stories' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Success Stories</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> <li class="gcb-btn menu-item menu-item-type-custom menu-item-object-custom menu-item-78176 last depth-0"><a href='https://www.eccouncil.org/train-certify/?utm_source=ecc-train-certify&#038;utm_medium=cybersecurity-exchange&#038;utm_campaign=ecc-blog-referral' target='_blank' data-level='1'><span class="item-content"><span class="menu-item-text"><span class="menu-text">Train &#038; Certify</span></span></span><span class="right next-level-button" data-icon = "fas fa-angle-up"><svg aria-hidden="true" class="open-button e-font-icon-svg e-fas-angle-down" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z"></path></svg> <svg aria-hidden="true" class="icon-active e-font-icon-svg e-fas-angle-up" viewBox="0 0 320 512" xmlns="http://www.w3.org/2000/svg"><path d="M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z"></path></svg></span></a></li> </ul></nav> </div> </div> </div> </div> </div> </section> </div> <div data-elementor-type="popup" data-elementor-id="80080" class="elementor elementor-80080 elementor-location-popup" data-elementor-settings="{&quot;entrance_animation&quot;:&quot;fadeInDown&quot;,&quot;entrance_animation_duration&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1.2,&quot;sizes&quot;:[]},&quot;a11y_navigation&quot;:&quot;yes&quot;,&quot;triggers&quot;:{&quot;page_load_delay&quot;:1.3,&quot;page_load&quot;:&quot;yes&quot;},&quot;timing&quot;:[]}" data-elementor-post-type="elementor_library"> <section class="elementor-section elementor-top-section elementor-element elementor-element-25e3a262 elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="25e3a262" data-element_type="section"> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6ff9ebcb" data-id="6ff9ebcb" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-11a0c7e5 elementor-widget elementor-widget-image" data-id="11a0c7e5" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <a href="https://campaigns.eccouncil.org/cyber-career-starter-scholarship?utm_source=cybersecurity-exchange&#038;utm_medium=pop-up&#038;utm_campaign=cct-global-scholarship"> <img loading="lazy" width="1000" height="1000" src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/CCT-Scholarship-Revised-Pop-up-June.jpg" class="attachment-large size-large wp-image-82049" alt="" srcset="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/CCT-Scholarship-Revised-Pop-up-June.jpg 1000w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/CCT-Scholarship-Revised-Pop-up-June-300x300.jpg 300w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/CCT-Scholarship-Revised-Pop-up-June-150x150.jpg 150w, https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/2023/08/CCT-Scholarship-Revised-Pop-up-June-768x768.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /> </a> </div> </div> <section class="elementor-section elementor-inner-section elementor-element elementor-element-5fbdc76 elementor-section-full_width elementor-section-height-default elementor-section-height-default" data-id="5fbdc76" data-element_type="section"> <div class="elementor-container elementor-column-gap-no"> <div class="elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-24084ff" data-id="24084ff" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-0eb1749 elementor-align-center elementor-widget elementor-widget-button" data-id="0eb1749" data-element_type="widget" data-widget_type="button.default"> <div class="elementor-widget-container"> <div class="elementor-button-wrapper"> <a class="elementor-button elementor-button-link elementor-size-sm" href="https://campaigns.eccouncil.org/cyber-career-starter-scholarship?utm_source=cybersecurity-exchange&#038;utm_medium=pop-up&#038;utm_campaign=cct-global-scholarship"> <span class="elementor-button-content-wrapper"> <span class="elementor-button-text">YES, I WANT TO APPLY!</span> </span> </a> </div> </div> </div> </div> </div> </div> </section> </div> </div> </div> </section> </div> <script> const lazyloadRunObserver = () => { const lazyloadBackgrounds = document.querySelectorAll( `.e-con.e-parent:not(.e-lazyloaded)` ); const lazyloadBackgroundObserver = new IntersectionObserver( ( entries ) => { entries.forEach( ( entry ) => { if ( entry.isIntersecting ) { let lazyloadBackground = entry.target; if( lazyloadBackground ) { lazyloadBackground.classList.add( 'e-lazyloaded' ); } lazyloadBackgroundObserver.unobserve( entry.target ); } }); }, { rootMargin: '200px 0px 200px 0px' } ); lazyloadBackgrounds.forEach( ( lazyloadBackground ) => { lazyloadBackgroundObserver.observe( lazyloadBackground ); } ); }; const events = [ 'DOMContentLoaded', 'elementor/lazyload/observe', ]; events.forEach( ( event ) => { document.addEventListener( event, lazyloadRunObserver ); } ); </script> <link rel='stylesheet' id='elementor-post-78556-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-78556.css?ver=1735024235' media='all' /> <link rel='stylesheet' id='widget-icon-list-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/css/widget-icon-list.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='the7-icon-box-grid-widget-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-icon-box-grid-widget.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='gform_basic-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityforms/assets/css/dist/basic.min.css?ver=2.9.1' media='all' /> <link rel='stylesheet' id='gform_theme_components-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityforms/assets/css/dist/theme-components.min.css?ver=2.9.1' media='all' /> <link rel='stylesheet' id='gform_theme-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityforms/assets/css/dist/theme.min.css?ver=2.9.1' media='all' /> <link rel='stylesheet' id='elementor-post-73689-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/elementor/css/post-73689.css?ver=1739290173' media='all' /> <link rel='stylesheet' id='the7-vertical-menu-widget-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/css/compatibility/elementor/the7-vertical-menu-widget.min.css?ver=12.2.0' media='all' /> <link rel='stylesheet' id='e-animation-fadeInLeft-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/lib/animations/styles/fadeInLeft.min.css?ver=3.27.2' media='all' /> <link rel='stylesheet' id='e-sticky-css' href='https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/css/modules/sticky.min.css?ver=3.25.5' media='all' /> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/frontend-common.min.js?ver=12.2.0" id="the7-elementor-frontend-common-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/main.min.js?ver=12.2.0" id="dt-main-js"></script> <script id="afl-wc-utm-public-js-extra"> var afl_wc_utm_public = {"ajax_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","action":"afl_wc_utm_view","nonce":"","cookie_prefix":"afl_wc_utm_","cookie_expiry":{"days":90},"cookie_renewal":"force","cookie_consent_category":"statistics","domain_info":{"domain":"www.eccouncil.org","path":"\/"},"last_touch_window":"1800","wp_consent_api_enabled":"","user_has_active_attribution":"0"}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/afl-wc-utm/public/js/afl-wc-utm-public.min.js?ver=2.4.12" id="afl-wc-utm-public-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/the7-horizontal-menu.min.js?ver=12.2.0" id="the7_horizontal-menu-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/lib/jquery-sticky/jquery-sticky.min.js?ver=12.2.0" id="the7-e-sticky-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/sticky-effects.min.js?ver=12.2.0" id="the7-e-sticky-effect-js"></script> <script id="eael-general-js-extra"> var localize = {"ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","nonce":"cfecd3c697","i18n":{"added":"Added ","compare":"Compare","loading":"Loading..."},"eael_translate_text":{"required_text":"is a required field","invalid_text":"Invalid","billing_text":"Billing","shipping_text":"Shipping","fg_mfp_counter_text":"of"},"page_permalink":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/what-is-digital-forensics\/","cart_redirectition":"no","cart_page_url":"","el_breakpoints":{"mobile":{"label":"Mobile Portrait","value":767,"default_value":767,"direction":"max","is_enabled":true},"mobile_extra":{"label":"Mobile Landscape","value":880,"default_value":880,"direction":"max","is_enabled":false},"tablet":{"label":"Tablet Portrait","value":1024,"default_value":1024,"direction":"max","is_enabled":true},"tablet_extra":{"label":"Tablet Landscape","value":1200,"default_value":1200,"direction":"max","is_enabled":false},"laptop":{"label":"Laptop","value":1366,"default_value":1366,"direction":"max","is_enabled":false},"widescreen":{"label":"Widescreen","value":2400,"default_value":2400,"direction":"min","is_enabled":false}}}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/essential-addons-for-elementor-lite/assets/front-end/js/view/general.min.js?ver=6.1.1" id="eael-general-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/uploads/essential-addons-elementor/eael-79875.js?ver=1724154211" id="eael-79875-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/the7-simple-posts.min.js?ver=12.2.0" id="the7-elements-simple-posts-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/lib/sticky/jquery.sticky.min.js?ver=3.25.5" id="e-sticky-js"></script> <script id="gforms_recaptcha_recaptcha-js-extra"> var gforms_recaptcha_recaptcha_strings = {"site_key":"6LdJNX4oAAAAAGWiILMPLCGUp8ALa8TJXIWg55PV","ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","nonce":"471e67795e"}; </script> <script src="https://www.google.com/recaptcha/api.js?render=6LdJNX4oAAAAAGWiILMPLCGUp8ALa8TJXIWg55PV&amp;ver=1.6.0" id="gforms_recaptcha_recaptcha-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/legacy.min.js?ver=12.2.0" id="dt-legacy-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/lib/jquery-mousewheel/jquery-mousewheel.min.js?ver=12.2.0" id="jquery-mousewheel-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/lib/custom-scrollbar/custom-scrollbar.min.js?ver=12.2.0" id="the7-custom-scrollbar-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/dt-the7-core/assets/js/post-type.min.js?ver=2.7.10" id="the7-core-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/dist/dom-ready.min.js?ver=f77871ff7694fffea381" id="wp-dom-ready-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/dist/hooks.min.js?ver=4d63a3d491d11ffd8ac6" id="wp-hooks-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/dist/i18n.min.js?ver=5e580eb46a90c2b997e6" id="wp-i18n-js"></script> <script id="wp-i18n-js-after"> wp.i18n.setLocaleData( { 'text direction\u0004ltr': [ 'ltr' ] } ); </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/dist/a11y.min.js?ver=3156534cc54473497e14" id="wp-a11y-js"></script> <script defer='defer' src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityforms/js/jquery.json.min.js?ver=2.9.1" id="gform_json-js"></script> <script id="gform_gravityforms-js-extra"> var gform_i18n = {"datepicker":{"days":{"monday":"Mo","tuesday":"Tu","wednesday":"We","thursday":"Th","friday":"Fr","saturday":"Sa","sunday":"Su"},"months":{"january":"January","february":"February","march":"March","april":"April","may":"May","june":"June","july":"July","august":"August","september":"September","october":"October","november":"November","december":"December"},"firstDay":1,"iconText":"Select date"}}; var gf_legacy_multi = []; var gform_gravityforms = {"strings":{"invalid_file_extension":"This type of file is not allowed. Must be one of the following:","delete_file":"Delete this file","in_progress":"in progress","file_exceeds_limit":"File exceeds size limit","illegal_extension":"This type of file is not allowed.","max_reached":"Maximum number of files reached","unknown_error":"There was a problem while saving the file on the server","currently_uploading":"Please wait for the uploading to complete","cancel":"Cancel","cancel_upload":"Cancel this upload","cancelled":"Cancelled"},"vars":{"images_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/gravityforms\/images"}}; var gf_global = {"gf_currency_config":{"name":"U.S. Dollar","symbol_left":"$","symbol_right":"","symbol_padding":"","thousand_separator":",","decimal_separator":".","decimals":2,"code":"USD"},"base_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/gravityforms","number_formats":[],"spinnerUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/gravityforms\/images\/spinner.svg","version_hash":"529cc364e8a9cc07a3b8133df3c47be4","strings":{"newRowAdded":"New row added.","rowRemoved":"Row removed","formSaved":"The form has been saved. The content contains the link to return and complete the form."}}; </script> <script defer='defer' src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityforms/js/gravityforms.min.js?ver=2.9.1" id="gform_gravityforms-js"></script> <script defer='defer' src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityforms/js/placeholders.jquery.min.js?ver=2.9.1" id="gform_placeholder-js"></script> <script defer='defer' src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityforms/assets/js/dist/utils.min.js?ver=501a987060f4426fb517400c73c7fc1e" id="gform_gravityforms_utils-js"></script> <script defer='defer' src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityforms/assets/js/dist/vendor-theme.min.js?ver=ddd2702ee024d421149a5e61416f1ff5" id="gform_gravityforms_theme_vendors-js"></script> <script id="gform_gravityforms_theme-js-extra"> var gform_theme_config = {"common":{"form":{"honeypot":{"version_hash":"529cc364e8a9cc07a3b8133df3c47be4"},"ajax":{"ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","ajax_submission_nonce":"39850c30ea","i18n":{"step_announcement":"Step %1$s of %2$s, %3$s","unknown_error":"There was an unknown error processing your request. Please try again."}}}},"hmr_dev":"","public_path":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/gravityforms\/assets\/js\/dist\/","config_nonce":"1f07fb4051"}; </script> <script defer='defer' src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityforms/assets/js/dist/scripts-theme.min.js?ver=434d0c7a9798b432de24db888073c55f" id="gform_gravityforms_theme-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/gravityformsrecaptcha/js/frontend.min.js?ver=1.6.0" id="gforms_recaptcha_frontend-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/themes/dt-the7/js/compatibility/elementor/the7-vertical-menu.min.js?ver=12.2.0" id="the7_nav-menu-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/js/webpack-pro.runtime.min.js?ver=3.25.5" id="elementor-pro-webpack-runtime-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/js/webpack.runtime.min.js?ver=3.27.2" id="elementor-webpack-runtime-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/js/frontend-modules.min.js?ver=3.27.2" id="elementor-frontend-modules-js"></script> <script id="elementor-pro-frontend-js-before"> var ElementorProFrontendConfig = {"ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","nonce":"262f2515b0","urls":{"assets":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/elementor-pro\/assets\/","rest":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/"},"settings":{"lazy_load_background_images":true},"popup":{"hasPopUps":true},"shareButtonsNetworks":{"facebook":{"title":"Facebook","has_counter":true},"twitter":{"title":"Twitter"},"linkedin":{"title":"LinkedIn","has_counter":true},"pinterest":{"title":"Pinterest","has_counter":true},"reddit":{"title":"Reddit","has_counter":true},"vk":{"title":"VK","has_counter":true},"odnoklassniki":{"title":"OK","has_counter":true},"tumblr":{"title":"Tumblr"},"digg":{"title":"Digg"},"skype":{"title":"Skype"},"stumbleupon":{"title":"StumbleUpon","has_counter":true},"mix":{"title":"Mix"},"telegram":{"title":"Telegram"},"pocket":{"title":"Pocket","has_counter":true},"xing":{"title":"XING","has_counter":true},"whatsapp":{"title":"WhatsApp"},"email":{"title":"Email"},"print":{"title":"Print"},"x-twitter":{"title":"X"},"threads":{"title":"Threads"}}, "facebook_sdk":{"lang":"en_US","app_id":""},"lottie":{"defaultAnimationUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/elementor-pro\/modules\/lottie\/assets\/animations\/default.json"}}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/js/frontend.min.js?ver=3.25.5" id="elementor-pro-frontend-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-includes/js/jquery/ui/core.min.js?ver=1.13.3" id="jquery-ui-core-js"></script> <script id="elementor-frontend-js-before"> var elementorFrontendConfig = {"environmentMode":{"edit":false,"wpPreview":false,"isScriptDebug":false},"i18n":{"shareOnFacebook":"Share on Facebook","shareOnTwitter":"Share on Twitter","pinIt":"Pin it","download":"Download","downloadImage":"Download image","fullscreen":"Fullscreen","zoom":"Zoom","share":"Share","playVideo":"Play Video","previous":"Previous","next":"Next","close":"Close","a11yCarouselPrevSlideMessage":"Previous slide","a11yCarouselNextSlideMessage":"Next slide","a11yCarouselFirstSlideMessage":"This is the first slide","a11yCarouselLastSlideMessage":"This is the last slide","a11yCarouselPaginationBulletMessage":"Go to slide"},"is_rtl":false,"breakpoints":{"xs":0,"sm":480,"md":768,"lg":1025,"xl":1440,"xxl":1600},"responsive":{"breakpoints":{"mobile":{"label":"Mobile Portrait","value":767,"default_value":767,"direction":"max","is_enabled":true},"mobile_extra":{"label":"Mobile Landscape","value":880,"default_value":880,"direction":"max","is_enabled":false},"tablet":{"label":"Tablet Portrait","value":1024,"default_value":1024,"direction":"max","is_enabled":true},"tablet_extra":{"label":"Tablet Landscape","value":1200,"default_value":1200,"direction":"max","is_enabled":false},"laptop":{"label":"Laptop","value":1366,"default_value":1366,"direction":"max","is_enabled":false},"widescreen":{"label":"Widescreen","value":2400,"default_value":2400,"direction":"min","is_enabled":false}}, "hasCustomBreakpoints":false},"version":"3.27.2","is_static":false,"experimentalFeatures":{"e_font_icon_svg":true,"e_swiper_latest":true,"e_onboarding":true,"theme_builder_v2":true,"home_screen":true,"landing-pages":true,"editor_v2":true,"link-in-bio":true,"floating-buttons":true},"urls":{"assets":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/elementor\/assets\/","ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","uploadUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads"},"nonces":{"floatingButtonsClickTracking":"843129edce"},"swiperClass":"swiper","settings":{"page":[],"editorPreferences":[]},"kit":{"viewport_mobile":767,"viewport_tablet":1024,"active_breakpoints":["viewport_mobile","viewport_tablet"],"global_image_lightbox":"yes","lightbox_enable_counter":"yes","lightbox_enable_fullscreen":"yes","lightbox_enable_zoom":"yes","lightbox_enable_share":"yes","lightbox_title_src":"title","lightbox_description_src":"description"},"post":{"id":81588,"title":"What%20is%20Digital%20Forensics%20%7C%20Phases%20of%20Digital%20Forensics%20%7C%20EC-Council","excerpt":"","featuredImage":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/What-Is-Digital-Forensics-thumb.jpg"}}; </script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor/assets/js/frontend.min.js?ver=3.27.2" id="elementor-frontend-js"></script> <script src="https://www.eccouncil.org/cybersecurity-exchange/wp-content/plugins/elementor-pro/assets/js/elements-handlers.min.js?ver=3.25.5" id="pro-elements-handlers-js"></script> <script> jQuery(document).ready(function(){ jQuery('article.type-post .post-entry-content a, article.type-post .the7-simple-post-thumb a, article.type-post .post-thumbnail-wrap a').attr('target','_blank'); }); </script> <script> jQuery(document).ready(function () { var country = { "BD": "Bangladesh", "BE": "Belgium", "BF": "Burkina Faso", "BG": "Bulgaria", "BA": "Bosnia and Herzegovina", "BB": "Barbados", "WF": "Wallis and Futuna", "BL": "Saint Barthelemy", "BM": "Bermuda", "BN": "Brunei", "BO": "Bolivia", "BH": "Bahrain", "BI": "Burundi", "BJ": "Benin", "BT": "Bhutan", "JM": "Jamaica", "BV": "Bouvet Island", "BW": "Botswana", "WS": "Samoa", "BQ": "Bonaire, Saint Eustatius and Saba ", "BR": "Brazil", "BS": "Bahamas", "JE": "Jersey", "BY": "Belarus", "BZ": "Belize", "RU": "Russia", "RW": "Rwanda", "RS": "Serbia", "TL": "East Timor", "RE": "Reunion", "TM": "Turkmenistan", "TJ": "Tajikistan", "RO": "Romania", "TK": "Tokelau", "GW": "Guinea-Bissau", "GU": "Guam", "GT": "Guatemala", "GS": "South Georgia and the South Sandwich Islands", "GR": "Greece", "GQ": "Equatorial Guinea", "GP": "Guadeloupe", "JP": "Japan", "GY": "Guyana", "GG": "Guernsey", "GF": "French Guiana", "GE": "Georgia", "GD": "Grenada", "GB": "United Kingdom", "GA": "Gabon", "SV": "El Salvador", "GN": "Guinea", "GM": "Gambia", "GL": "Greenland", "GI": "Gibraltar", "GH": "Ghana", "OM": "Oman", "TN": "Tunisia", "JO": "Jordan", "HR": "Croatia", "HT": "Haiti", "HU": "Hungary", "HK": "Hong Kong", "HN": "Honduras", "HM": "Heard Island and McDonald Islands", "VE": "Venezuela", "PR": "Puerto Rico", "PS": "Palestinian Territory", "PW": "Palau", "PT": "Portugal", "SJ": "Svalbard and Jan Mayen", "PY": "Paraguay", "IQ": "Iraq", "PA": "Panama", "PF": "French Polynesia", "PG": "Papua New Guinea", "PE": "Peru", "PK": "Pakistan", "PH": "Philippines", "PN": "Pitcairn", "PL": "Poland", "PM": "Saint Pierre and Miquelon", "ZM": "Zambia", "EH": "Western Sahara", "EE": "Estonia", "EG": "Egypt", "ZA": "South Africa", "EC": "Ecuador", "IT": "Italy", "VN": "Vietnam", "SB": "Solomon Islands", "ET": "Ethiopia", "SO": "Somalia", "ZW": "Zimbabwe", "SA": "Saudi Arabia", "ES": "Spain", "ER": "Eritrea", "ME": "Montenegro", "MD": "Moldova", "MG": "Madagascar", "MF": "Saint Martin", "MA": "Morocco", "MC": "Monaco", "UZ": "Uzbekistan", "MM": "Myanmar", "ML": "Mali", "MO": "Macao", "MN": "Mongolia", "MH": "Marshall Islands", "MK": "Macedonia", "MU": "Mauritius", "MT": "Malta", "MW": "Malawi", "MV": "Maldives", "MQ": "Martinique", "MP": "Northern Mariana Islands", "MS": "Montserrat", "MR": "Mauritania", "IM": "Isle of Man", "UG": "Uganda", "TZ": "Tanzania", "MY": "Malaysia", "MX": "Mexico", "IL": "Israel", "FR": "France", "IO": "British Indian Ocean Territory", "SH": "Saint Helena", "FI": "Finland", "FJ": "Fiji", "FK": "Falkland Islands", "FM": "Micronesia", "FO": "Faroe Islands", "NI": "Nicaragua", "NL": "Netherlands", "NO": "Norway", "NA": "Namibia", "VU": "Vanuatu", "NC": "New Caledonia", "NE": "Niger", "NF": "Norfolk Island", "NG": "Nigeria", "NZ": "New Zealand", "NP": "Nepal", "NR": "Nauru", "NU": "Niue", "CK": "Cook Islands", "XK": "Kosovo", "CI": "Ivory Coast", "CH": "Switzerland", "CO": "Colombia", "CN": "China", "CM": "Cameroon", "CL": "Chile", "CC": "Cocos Islands", "CA": "Canada", "CG": "Republic of the Congo", "CF": "Central African Republic", "CD": "Democratic Republic of the Congo", "CZ": "Czech Republic", "CY": "Cyprus", "CX": "Christmas Island", "CR": "Costa Rica", "CW": "Curacao", "CV": "Cape Verde", "CU": "Cuba", "SZ": "Swaziland", "SY": "Syria", "SX": "Sint Maarten", "KG": "Kyrgyzstan", "KE": "Kenya", "SS": "South Sudan", "SR": "Suriname", "KI": "Kiribati", "KH": "Cambodia", "KN": "Saint Kitts and Nevis", "KM": "Comoros", "ST": "Sao Tome and Principe", "SK": "Slovakia", "KR": "South Korea", "SI": "Slovenia", "KP": "North Korea", "KW": "Kuwait", "SN": "Senegal", "SM": "San Marino", "SL": "Sierra Leone", "SC": "Seychelles", "KZ": "Kazakhstan", "KY": "Cayman Islands", "SG": "Singapore", "SE": "Sweden", "SD": "Sudan", "DO": "Dominican Republic", "DM": "Dominica", "DJ": "Djibouti", "DK": "Denmark", "VG": "British Virgin Islands", "DE": "Germany", "YE": "Yemen", "DZ": "Algeria", "US": "United States", "UY": "Uruguay", "YT": "Mayotte", "UM": "United States Minor Outlying Islands", "LB": "Lebanon", "LC": "Saint Lucia", "LA": "Laos", "TV": "Tuvalu", "TW": "Taiwan", "TT": "Trinidad and Tobago", "TR": "Turkey", "LK": "Sri Lanka", "LI": "Liechtenstein", "LV": "Latvia", "TO": "Tonga", "LT": "Lithuania", "LU": "Luxembourg", "LR": "Liberia", "LS": "Lesotho", "TH": "Thailand", "TF": "French Southern Territories", "TG": "Togo", "TD": "Chad", "TC": "Turks and Caicos Islands", "LY": "Libya", "VA": "Vatican", "VC": "Saint Vincent and the Grenadines", "AE": "United Arab Emirates", "AD": "Andorra", "AG": "Antigua and Barbuda", "AF": "Afghanistan", "AI": "Anguilla", "VI": "U.S. Virgin Islands", "IS": "Iceland", "IR": "Iran", "AM": "Armenia", "AL": "Albania", "AO": "Angola", "AQ": "Antarctica", "AS": "American Samoa", "AR": "Argentina", "AU": "Australia", "AT": "Austria", "AW": "Aruba", "IN": "India", "AX": "Aland Islands", "AZ": "Azerbaijan", "IE": "Ireland", "ID": "Indonesia", "UA": "Ukraine", "QA": "Qatar", "MZ": "Mozambique" } jQuery.getJSON('https://ipinfo.io/?token=0bf8c6f3cbc2ca', function (data) { countryName = data.country; var cntry = country[countryName]; jQuery("#input_30_6_6 option[value='" + cntry + "']").attr("selected", "selected"); jQuery("#input_31_51_6 option[value='" + cntry + "']").attr("selected", "selected"); //input_30_6_6 }); // Disable Form on submit jQuery(".gform_button").click(function () { jQuery(document).ready(function () { jQuery(':input[type="submit"]').prop('disabled', true); jQuery('input[type="text"]').keyup(function () { if (jQuery(this).val() != '') { Query(':input[type="submit"]').prop('disabled', false); } }); }); }) }); </script> <script>var localize ={"ajaxurl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-admin\/admin-ajax.php","nonce":"cfecd3c697","i18n":{"added":"Added ","compare":"Compare","loading":"Loading..."},"eael_translate_text":{"required_text":"is a required field","invalid_text":"Invalid","billing_text":"Billing","shipping_text":"Shipping","fg_mfp_counter_text":"of"},"page_permalink":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/what-is-digital-forensics\/","cart_redirectition":"no","cart_page_url":"","el_breakpoints":{"mobile":{"label":"Mobile Portrait","value":767,"default_value":767,"direction":"max","is_enabled":true},"mobile_extra":{"label":"Mobile Landscape","value":880,"default_value":880,"direction":"max","is_enabled":false},"tablet":{"label":"Tablet Portrait","value":1024,"default_value":1024,"direction":"max","is_enabled":true},"tablet_extra":{"label":"Tablet Landscape","value":1200,"default_value":1200,"direction":"max","is_enabled":false},"laptop":{"label":"Laptop","value":1366,"default_value":1366,"direction":"max","is_enabled":false},"widescreen":{"label":"Widescreen","value":2400,"default_value":2400,"direction":"min","is_enabled":false}}}</script><script id="eael-inline-js">jQuery(document).ready(function(){ jQuery("select option[value='Computer Forensics']").attr("selected","selected"); jQuery('[name="input_22"]').val("CHFI_Cybersec"); });;</script><script> gform.initializeOnLoaded( function() { jQuery(document).on('gform_post_render', function(event, formId, currentPage){if(formId == 31) {if(typeof Placeholders != 'undefined'){ Placeholders.enable(); }} } );jQuery(document).on('gform_post_conditional_logic', function(event, formId, fields, isInit){} ) } ); </script> <script> gform.initializeOnLoaded( function() {jQuery(document).trigger("gform_pre_post_render", [{ formId: "31", currentPage: "1", abort: function() { this.preventDefault(); } }]); if (event && event.defaultPrevented) { return; } const gformWrapperDiv = document.getElementById( "gform_wrapper_31" ); if ( gformWrapperDiv ) { const visibilitySpan = document.createElement( "span" ); visibilitySpan.id = "gform_visibility_test_31"; gformWrapperDiv.insertAdjacentElement( "afterend", visibilitySpan ); } const visibilityTestDiv = document.getElementById( "gform_visibility_test_31" ); let postRenderFired = false; function triggerPostRender() { if ( postRenderFired ) { return; } postRenderFired = true; jQuery( document ).trigger( 'gform_post_render', [31, 1] ); gform.utils.trigger( { event: 'gform/postRender', native: false, data: { formId: 31, currentPage: 1 } } ); gform.utils.trigger( { event: 'gform/post_render', native: false, data: { formId: 31, currentPage: 1 } } ); if ( visibilityTestDiv ) { visibilityTestDiv.parentNode.removeChild( visibilityTestDiv ); } } function debounce( func, wait, immediate ) { var timeout; return function() { var context = this, args = arguments; var later = function() { timeout = null; if ( !immediate ) func.apply( context, args ); }; var callNow = immediate && !timeout; clearTimeout( timeout ); timeout = setTimeout( later, wait ); if ( callNow ) func.apply( context, args ); }; } const debouncedTriggerPostRender = debounce( function() { triggerPostRender(); }, 200 ); if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) { const observer = new MutationObserver( ( mutations ) => { mutations.forEach( ( mutation ) => { if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) { debouncedTriggerPostRender(); observer.disconnect(); } }); }); observer.observe( document.body, { attributes: true, childList: false, subtree: true, attributeFilter: [ 'style', 'class' ], }); } else { triggerPostRender(); } } ); </script> <div class="pswp" tabindex="-1" role="dialog" aria-hidden="true"> <div class="pswp__bg"></div> <div class="pswp__scroll-wrap"> <div class="pswp__container"> <div class="pswp__item"></div> <div class="pswp__item"></div> <div class="pswp__item"></div> </div> <div class="pswp__ui pswp__ui--hidden"> <div class="pswp__top-bar"> <div class="pswp__counter"></div> <button class="pswp__button pswp__button--close" title="Close (Esc)" aria-label="Close (Esc)"></button> <button class="pswp__button pswp__button--share" title="Share" aria-label="Share"></button> <button class="pswp__button pswp__button--fs" title="Toggle fullscreen" aria-label="Toggle fullscreen"></button> <button class="pswp__button pswp__button--zoom" title="Zoom in/out" aria-label="Zoom in/out"></button> <div class="pswp__preloader"> <div class="pswp__preloader__icn"> <div class="pswp__preloader__cut"> <div class="pswp__preloader__donut"></div> </div> </div> </div> </div> <div class="pswp__share-modal pswp__share-modal--hidden pswp__single-tap"> <div class="pswp__share-tooltip"></div> </div> <button class="pswp__button pswp__button--arrow--left" title="Previous (arrow left)" aria-label="Previous (arrow left)"> </button> <button class="pswp__button pswp__button--arrow--right" title="Next (arrow right)" aria-label="Next (arrow right)"> </button> <div class="pswp__caption"> <div class="pswp__caption__center"></div> </div> </div> </div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10