CINXE.COM

Announcements | ASPEN

<!DOCTYPE html> <html> <head> <meta charset="utf-8" /> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>Announcements | ASPEN</title> <meta name="description" content="ASPEN | EC-Council"> <meta name="author" content="EC-Council"> <meta name='robots' content='noindex, nofollow' /> <meta name="google-site-verification" content="W2g-z-dKvSbdXtkgBZJftezREfoO1z8Eu9sZhIfPMnI" /> <meta name="referrer" content="Same-origin" /> <!-- Devices Meta --> <meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1"> <!-- Include intl-tel-input CSS --> <link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/intl-tel-input@24.4.0/build/css/intlTelInput.css"> <!-- Put favicon.ico and apple-touch-icon(s).png in the images folder --> <link rel="shortcut icon" href="/Content/assets/images/favicon.png"> <link href='https://fonts.googleapis.com/css?family=Oswald:400,100,300,500,700%7CLato:400,300,700,900&subset=latin,latin-ext' rel='stylesheet' type='text/css'> <!-- Plugins CSS files --> <link rel="stylesheet" href="/Content/assets/css/assets.css"> <!-- REVOLUTION SLIDER STYLES --> <link rel="stylesheet" href="/Content/assets/revolution/fonts/pe-icon-7-stroke/css/pe-icon-7-stroke.css" type="text/css"> <link rel="stylesheet" href="/Content/assets/revolution/css/settings.css" type="text/css"> <link rel="stylesheet" href="/Content/assets/revolution/css/navigation.css" type="text/css"> <!-- Template CSS files --> <link rel="stylesheet" href="/Content/assets/css/style.css"> <link rel="stylesheet" href="/Content/assets/css/shortcodes.css"> <link id="theme_css" rel="stylesheet" href="/Content/assets/css/light.css"> <link id="skin_css" rel="stylesheet" href="/Content/assets/css/skins/default.css"> <link href="/Content/assets/css/shop.css" rel="stylesheet" /> <link href="/Content/assets/css/mystyle.css" rel="stylesheet" /> <script src="/Scripts/CustomScripts/jquery-3.7.1.min.js"></script> <link href="/Content/assets/css/pickmeup.css" rel="stylesheet" /> <link href="/Content/jquery1.9.2.css" rel="stylesheet" /> <link href="/Content/skins/flat/blue.css" rel="stylesheet" /> <style> html, body { margin: 0; padding: 0; height: 100% !important; } #m-container { min-height: 100% !important; position: relative !important; } #content { padding-bottom: 60px !important; } #footer2 { position: absolute !important; bottom: 0 !important; width: 100% !important; height: 60px !important; } .pickmeup { border-width: medium; border-style: double; border-color: #1d98e6; } .no-padding { padding: 0px !important; } .fnt { font-weight: 400; font-family: 'Oswald', sans-serif; font-size: 17px; } .white-tr-bg { background-color: rgba(245, 245, 247,0.4); } .my-btntext { font-size: 14px; font-weight: bold; } .my-btntext:hover { color: #f00 !important; } .icon-box.lg-icon1 i { margin: auto; margin-bottom: 10px; position: relative; font-weight: normal; box-shadow: 0px 20px 21px -12px rgba(0,0,0,.2); -webkit-box-shadow: 0px 20px 21px -12px rgba(0,0,0,.2); width: 50px !important; height: 30px !important; line-height: 30px !important; overflow: hidden; font-size: 20px !important; } .icon-box.lg-icon1 i:before { position: relative; z-index: 2; transform: rotate(-26deg); -webkit-transform: rotate(-26deg); display: block; bottom: -7px; -webkit-transition: all 600ms ease; transition: all 600ms ease; } .dropdown-menu { border: 1px solid #f00 !important; background-color: #ffffff; -webkit-border-radius: 15px; -moz-border-radius: 15px; border-radius: 15px; min-width: 335px; box-shadow: 0px 0px 15px rgba(0,0,0,0.15), 0px 0px 1px 1px rgba(0,0,0,0.1); } @media only screen and (max-width: 768px) { .dropdown-menu { min-width: 160px !important; height: 400px !important; overflow-y: scroll; overflow-x: hidden; } .icon-box.simple, .icon-box-2, .icon-box { margin-bottom: 20px !important; } } } </style> <script id="ze-snippet" src="https://static.zdassets.com/ekr/snippet.js?key=f11242c3-ae26-40dc-80d1-6117c3b21e5e"></script> <script type="text/javascript">(function (w, d, s, r, k, h, m) { if (w.performance && w.performance.timing && w.performance.navigation) { w[r] = w[r] || function () { (w[r].q = w[r].q || []).push(arguments) }; h = d.createElement('script'); h.async = true; h.setAttribute('src', s + k); d.getElementsByTagName('head')[0].appendChild(h); (m = window.onerror), (window.onerror = function (b, c, d, f, g) { m && m(b, c, d, f, g), g || (g = new Error(b)), (w[r].q = w[r].q || []).push(["captureException", g]); }) } })(window, document, '//static.site24x7rum.com/beacon/site24x7rum-min.js?appKey=', 's247r', '879509dd69e5f1cd53bd37521f755b9d');</script> <script src="/Scripts/cookie-consent.js"></script> <script type="text/javascript" charset="UTF-8"> document.addEventListener('DOMContentLoaded', function () { cookieconsent.run({ "notice_banner_type": "simple", "consent_type": "express", "palette": "light", "language": "en", "page_load_consent_levels": ["strictly-necessary"], "notice_banner_reject_button_hide": true, "preferences_center_close_button_hide": false, "website_name": "ASPEN", }); }); </script> </head> <body> <!-- Global site tag (gtag.js) - Google Analytics --> <script async src="https://www.googletagmanager.com/gtag/js?id=UA-123768072-1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-123768072-1'); </script> <!-- site preloader start --> <div class="page-loader"></div> <!-- site preloader end --> <div id="m-container" class="pageWrapper"> <!-- Header start --> <div class="top-bar top-grey-bg"> <div class="container"> <ul class="top-info f-left"> <li style="font-size:13px;font-weight:600;"><i class="fa fa-envelope main-color"></i><b class="main-color"></b> <a href="/cdn-cgi/l/email-protection#d3a0a6a3a3bca1a793b6b0b0bca6bdb0babffdbca1b4" class="clr-white"><span class="__cf_email__" data-cfemail="2a595f5a5a45585e6a4f4949455f444943460445584d">[email&#160;protected]</span> </a></li> <li style="font-size:13px;font-weight:600;"><i class="fa fa-phone main-color"></i><b class="main-color"></b><a href="tel:18445504357" class="clr-white"> +1 844 662 3509</a></li> </ul> <div class="f-right social-list"> <a href="/Account/Login"> <span class="lbl-txt main-color clr-white" style="font-size:13px;font-weight:600;"><b>Login</b></span> </a> <span class="lbl-txt"><b>|</b></span> <a href="/Account/Register"><span class="lbl-txt main-color clr-white" style="font-size:13px;font-weight:600;"><b>Register</b></span></a> </div> </div> </div> <header class="top-head minimal no-border bg-black"> <div class="container plr-15"> <!-- Logo start --> <div class="logo"> <a href="/Home" title="Home"> <img alt="" src="/Content/assets/images/aspen-logo-white.png" /> </a> </div> <!-- Logo end --> <!-- top navigation menu start --> <div class="responsive-nav"> <nav class="top-nav" id="divmenu"> <ul> <li id="hme"><a href="/Home"><span style="line-height: 79px;">Home</span></a></li> <li id="training" class="hasChildren"> <a><span style="line-height: 79px;">Training</span></a> <ul> <li><a href="https://iclass.eccouncil.org/" target="_blank">On-Demand</a></li> <li><a href="/Home/FindTraining" target="_blank">Live</a></li> <li><a href="https://eccu.edu" target="_blank">EC-Council University</a></li> </ul> </li> <li id="trngpartner" class="hasChildren"> <a><span style="line-height: 79px;">Training Partner</span></a> <ul> <li><a href="/BecomeAnATC"><span>Accredited Training Center</span></a></li> </ul> </li> <li id="instructr" class="hasChildren"> <a><span style="line-height: 79px;">Instructor</span></a> <ul> <li><a href="/BecomeACEI"><span>Certified EC-Council Instructor</span></a></li> </ul> </li> <li><a href="https://codered.eccouncil.org/?utm_source=aspen&utm_medium=header&utm_campaign=navigation" target="_blank"><span style="line-height:79px;">Codered</span></a></li> <li class="hasChildren" id="about"> <a><span>About</span></a> <ul> <li><a href="/Home/Announcements">Announcements</a></li> <li class="hasChildren"> <a href="#">EC-Council Events</a> <ul> <li><a href="http://www.hackerhalted.com/" target="_blank">Hackerhalted </a></li> <li><a href="http://www.takedowncon.com/" target="_blank">Takedowncon</a></li> <li><a href="https://www.cyberlympics.org/" target="_blank">Global Cyberlympics</a></li> <li><a href="https://ciso.eccouncil.org/ciso-events/" target="_blank">CISO SUMMIT</a></li> </ul> </li> <li><a href="https://blog.eccouncil.org/members-feedback/?utm_source=aspen&utm_medium=testimonials" target="_blank">Testimonials</a></li> <li><a href="/Home/Contributions">Contributions</a></li> <li><a href="/Home/Helpdesk">Self Help</a></li> <li><a href="https://www.eccouncil.org/submit-your-request" target="_blank">Raise Service Request</a></li> </ul> </li> </ul> </nav> </div> <!-- top navigation menu end --> </div> </header> <!-- Header start --> <!-- Content start --> <div id="content" class="pageContent"> <!-- Popup for Customer support start --> <div class="modal fade" id="customerSupportModalPopup" tabindex="-1" role="dialog" aria-labelledby="customerSupportModalPopupTitle"> <div class="modal-dialog modal-dialog-centered" role="document"> <div class="modal-content" style="overflow:visible"> <div class="modal-header main-bg"> <h4 class="modal-title" id="modalheader">Need Customer Support?</h4> </div> <div class="modal-body"> <p style="font-weight:600">Our dedicated support team is here to help you. Please provide your name and phone number below, and one of our agents will call you back as soon as possible.</p> <div class="mb-3" style="margin-top:5px;"> <label for="Name" class="form-label" style="font-weight:700">Your Name <span style="color:red;font-size:15px">*</span></label> <input class="form-control" id="txtName" placeholder="Enter your name" required> </div> <div class="mb-3" style=" display: flex; margin-top: 15px; flex-direction: column;"> <label for="phoneNumber" class="form-label" style="font-weight:700">Your Phone Number <span style="color:red">*</span></label> <input class="form-control" type="tel" id="txtphonenumber" name="txtphonenumber" placeholder="Enter your phone number" required> </div> <br /> <div id="responseMessage"></div> </div> <div class="modal-footer"> <button type="button" class="btn btn-danger" data-dismiss="modal">Close</button> <button type="button" id="btnRequestCall" class="btn btn-success">Request a call</button> </div> </div> </div> </div> <div class="sm-padding"> <div class="container"> <div class="col-md-12"> <div class="heading main m-b-0"> <h4> <span class="main-color">Announcements</span><span class="pull-right gd-clr"></span> </h4><b class="head-sep"><u></u></b> </div> <div class="tabs bordered gr-bg vertical"> <ul class="nav nav-tabs" style="width: 25%;"> <li class="active" style="margin-bottom: 5px;"><a title="Cyber Talks Calendar" href="#Cybtalkscal" data-toggle="tab"><i class="fa fa-star main-color"></i>Cyber Talks Calendar</a></li> <li style="margin-bottom: 5px;"><a href="https://cert.eccouncil.org/announcements.html" target="_blank"><i class="fa fa-bookmark main-color"></i>Certifications Announcement</a></li> <li style="margin-bottom: 5px;"><a title="Digital Badges" href="#DigitalBadges" data-toggle="tab"><i class="fa fa-star main-color"></i>Digital Badges</a></li> <li style="margin-bottom: 5px;"><a href="#tabBluePrint" title="CEH BLUEPRINT CHANGE ANNOUNCEMENT" data-toggle="tab"><i class="fa fa-flag main-color"></i>CEH BLUEPRINT CHANGE ANNOUNCEMENT</a></li> <li style="margin-bottom: 5px;"><a href="#crmWebToEntityForm" title="Announcements" data-toggle="tab"><i class="fa fa-users main-color"></i>EC-Council Mega Launch</a></li> <li style="margin-bottom: 5px;"><a href="#tabCISOCert" data-toggle="tab" title="EC-Council's C|CISO Program"><i class="fa fa-cloud-download main-color"></i>EC-Council's C|CISO Program</a></li> <li style="margin-bottom: 5px;"><a href="#tabLPTMasterExam" title="LPT Master Exam" data-toggle="tab"><i class="fa fa-briefcase main-color"></i>LPT Master Exam</a></li> <li style="margin-bottom: 5px;"><a href="#tabCertifiedDigitalMarketerCertification" title="Certified Digital Marketer Certification" data-toggle="tab"><i class="fa fa-code-fork main-color"></i>Certified Digital Marketer (C|DM)</a></li> <li style="margin-bottom: 5px;"><a href="#tabECCouncilDisasterRecoveryProfessionalv3" title="EC-Council Disaster Recovery Professional v3" data-toggle="tab"><i class="fa fa-cubes main-color"></i>EC-Council Disaster Recovery Professional v3</a></li> <li style="margin-bottom: 5px;"><a href="#tabComputerHackingForensicInvestigator" title="Computer Hacking Forensic Investigator (CHFI) v9" data-toggle="tab"><i class="fa fa-child main-color"></i>Computer Hacking Forensic Investigator (CHFI) v9</a></li> <li style="margin-bottom: 5px;"><a title="Certified Network Defense Architect program" href="#tabCertifiedNetworkDefenseArchitectprogram" data-toggle="tab"><i class="fa fa-bookmark main-color"></i>Certified Network Defense Architect program</a></li> <li style="margin-bottom: 5px;"><a title="Certified Network Defender (CND) Skillset" href="#tabCertifiedNetworkDefender" data-toggle="tab"><i class="fa fa-cubes main-color"></i>Certified Network Defender (CND) Skillset</a> </li> <li style="margin-bottom: 5px;"><a title="EC-Council Membership Notification" href="#tabECCouncilMembershipNotification" data-toggle="tab"> <i class="fa fa-database main-color"></i> EC-Council Membership Notification </a></li> </ul> <div class="tab-content" style="margin-left: 25%;"> <div class="tab-pane fade in active font-16" id="Cybtalkscal" style="min-height: 800px;"> <div class="tabs-content table-res"> <table class="table table-bordered table-hover"> <tbody> <tr> <th>Speaker</th> <th>Webinar</th> <th>Organization</th> <th>Designation</th> <th>Date</th> <th>Time</th> <th>Topic</th> <th>GTW Link</th> </tr> <tr> <td>Kris Seeburn</td> <td>Cyber Talks</td> <td>NA</td> <td>Chief Instructor – Cybersecurity, Professor – Cyberwarfare – National Defence University, Dept. of Justice, FBI</td> <td>2nd May</td> <td>9am EST/ 6:30pm IST/ 2pm GMT</td> <td>Understanding the White hat hacker and career prospects</td> <td><a class="btn btn-square main-bg" target="_blank" href="https://attendee.gotowebinar.com/register/5005856936942898443?source=aspen">Register</a></td> </tr> <tr> <td>Tom Bretti</td> <td>Cyber Talks</td> <td>BSI Cybersecurity and Information Resilience</td> <td>Training Portfolio Manager</td> <td>7th May</td> <td>3pm IST/ 9:30am GMT/ 6:00pm SGT</td> <td>Learn the 5 phases of Ethical Hacking</td> <td><a class="btn btn-square main-bg" target="_blank" href="https://attendee.gotowebinar.com/register/8328404054803876876?source=aspen">Register</a></td> </tr> <tr> <td>Sean Duca</td> <td>Cyber Talks</td> <td>Palo Alto</td> <td>Vice President, Regional Chief Security Officer </td> <td>16th May</td> <td>9am EST/ 6:30pm IST/ 11pm GMT</td> <td>Supply chain, the weakest link in cybersecurity</td> <td><a class="btn btn-square main-bg" target="_blank" href="https://attendee.gotowebinar.com/register/7460160404587599628?source=aspen">Register</a></td> </tr> <tr> <td>Steve Tcherchian </td> <td>Cyber Talks</td> <td>McAfee</td> <td>Chief Product Officer and CISO XYPRO Technology</td> <td>20th May</td> <td>8:00 am PST/8:30 pm IST/ 5 pm GMT</td> <td>Security Contextualization – Combating Risk with Actionable Data</td> <td><a class="btn btn-square main-bg" target="_blank" href="https://attendee.gotowebinar.com/register/9204834669322384397?source=aspen">Register</a></td> </tr> <tr> <td>Raj Samani/Lee Munson </td> <td>Cyber Talks</td> <td>McAfee</td> <td>Chief Scientist/Senior Technical Writer </td> <td>29th May</td> <td>1:00 pm GMT/ 6:30pm IST/ 9am EST</td> <td>The Rise, Death and Resurrection of Ransomware.</td> <td><a class="btn btn-square main-bg" target="_blank" href="https://attendee.gotowebinar.com/register/8342638332596829964?source=aspen">Register</a></td> </tr> </tbody> </table> </div> </div> <div class="tab-pane fade font-16" id="tabBluePrint" style="min-height: 800px;"> <div class="tabs-content"> <h3><b>CERTIFIED ETHICAL HACKER (CEH), BLUEPRINT CHANGE ANNOUNCEMENT</b></h3> <p style="text-align:justify;">Effective <strong>Oct 1st, 2018</strong>, EC-Council will be introducing a new version of the <strong>CEH</strong> exam blueprint.</p> <p style="text-align:justify;">An exam blueprint is a framework that helps break down the sections of the test making it easier for the test taker to focus his/ her study as they prepare for the exam. It dictates how many questions in various areas of practice should go on an exam.</p> <p style="text-align:justify;">As a reputed certification body, we always strive to keep updated of the latest technological advancements in the field of ethical hacking and information system security audits. Our new exam blueprint is an outcome of the same effort.</p> <p><strong>For those who are scheduled to take the CEH exam on or after Oct 1st, 2018</strong> here are the major changes you can expect to see:</p> <ul style="list-style-image:url('../../Content/assets/images/list-icon.png')"> <li>New segmentation of topics among exam domains</li> <li>Removal and addition of some key topics</li> </ul><br> <h3><b>Summary of the updated blueprint:</b></h3> <div class="table-res"> <table class="table table-bordered table-hover table-striped"> <tr> <th></th> <th style="font-size:12px">Portion of Total Test</th> <th style="font-size:12px">Total Number Items Per Domain</th> <th style="font-size:12px">Sub-Domains</th> <th style="font-size:12px">Total Number Items Per Sub-Domain</th> </tr> <tbody> <tr> <td>Background </td> <td class="t-center">21.79%</td> <td class="t-center">27</td> <td class="has-table"> <table class="inner-table"> <tbody> <tr> <td>Network and Communication Technologies</td> </tr> <tr> <td><br /></td> </tr> <tr> <td>Information Security Threats and Attack Vector</td> </tr> <tr> <td><br /></td> </tr> <tr> <td>Information Security Technologies</td> </tr> </tbody> </table> </td> <td class="has-table"> <table class="inner-table"> <tbody class="t-center"> <tr> <td class="p-b-2">10</td> </tr> <tr> <td class="p-t-3"></td> </tr> <tr> <td class="p-b-2">9</td> </tr> <tr> <td class="p-t-3"></td> </tr> <tr> <td>8</td> </tr> </tbody> </table> </td> </tr> <tr> <td>Analysis/Assessment </td> <td class="t-center">12.73%</td> <td class="t-center">16</td> <td class="has-table"> <table class="inner-table"> <tbody> <tr> <td>Information Security Assessment and Analysis</td> </tr> <tr> <td><br /></td> </tr> <tr> <td>Information Security Assessment Process</td> </tr> </tbody> </table> </td> <td class="has-table"> <table class="inner-table"> <tbody class="t-center"> <tr> <td class="p-b-2">8</td> </tr> <tr> <td class="p-t-3"></td> </tr> <tr> <td class="p-b-2">8</td> </tr> </tbody> </table> </td> </tr> <tr> <td>Security</td> <td class="t-center">23.73%</td> <td class="t-center">30</td> <td class="has-table"> <table class="inner-table"> <tbody> <tr> <td>Information Security Controls</td> </tr> <tr> <td><br /></td> </tr> <tr> <td>Information Security Attack Detection</td> </tr> <tr> <td><br /></td> </tr> <tr> <td>Information Security Attack Prevention</td> </tr> </tbody> </table> </td> <td class="has-table"> <table class="inner-table"> <tbody class="t-center"> <tr> <td class="p-b-2">15</td> </tr> <tr> <td class="p-t-1"></td> </tr> <tr> <td class="p-b-2">9</td> </tr> <tr> <td class="p-t-2"></td> </tr> <tr> <td class="p-b-2">6</td> </tr> </tbody> </table> </td> </tr> <tr> <td>Tools / Systems / Programs</td> <td class="t-center">28.91%</td> <td class="t-center">36</td> <td class="has-table"> <table class="inner-table"> <tbody> <tr> <td>Information Security Systems</td> </tr> <tr> <td><br /></td> </tr> <tr> <td>Information Security Programs</td> </tr> <tr> <td><br /></td> </tr> <tr> <td>Information Security Tools</td> </tr> </tbody> </table> </td> <td class="has-table"> <table class="inner-table"> <tbody class="t-center"> <tr> <td class="p-b-2">7</td> </tr> <tr> <td class="p-t-1"></td> </tr> <tr> <td class="p-b-2">5</td> </tr> <tr> <td class="p-t-2"></td> </tr> <tr> <td class="p-b-2">24</td> </tr> </tbody> </table> </td> </tr> <tr> <td>Procedures / Methodology</td> <td class="t-center">8.77%</td> <td class="t-center">11</td> <td class="has-table"> <table class="inner-table"> <tbody> <tr> <td>Information Security Procedures</td> </tr> <tr> <td><br /></td> </tr> <tr> <td>Information Security Assessment Methodologies</td> </tr> </tbody> </table> </td> <td class="has-table"> <table class="inner-table"> <tbody class="t-center"> <tr> <td class="p-b-2">5</td> </tr> <tr> <td class="p-t-3"></td> </tr> <tr> <td class="p-b-2">6</td> </tr> </tbody> </table> </td> </tr> <tr> <td>Regulation / Policy</td> <td class="t-center">1.90%</td> <td class="t-center">2</td> <td class="has-table"> <table class="inner-table"> <tbody> <tr> <td>Information Security Policies/Laws/Acts</td> </tr> </tbody> </table> </td> <td class="has-table"> <table class="inner-table"> <tbody class="t-center"> <tr> <td>2</td> </tr> </tbody> </table> </td> </tr> <tr> <td>Ethics</td> <td class="text-center">2.17%</td> <td class="text-center">3</td> <td class="has-table"> <table class="inner-table"> <tbody> <tr> <td>Ethics of Information Security</td> </tr> </tbody> </table> </td> <td class="has-table"> <table class="inner-table"> <tbody class="t-center"> <tr> <td>3</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </div> <p>You can find the existing exam blueprint <strong><a href="https://cert.eccouncil.org/images/doc/CEH-Exam-Blueprint-v2.0.pdf" target="_blank" style="color:deepskyblue">HERE</a></strong>; the current blueprint is valid till September 30th 2018.</p> <p><strong>Note:</strong> This announcement is limited to the CEH <strong style="color:black;font-size:16px;"> multiple choice exam</strong> and there are no changes to any other aspect of the exam such as the eligibility criteria, exam duration or exam availability.</p> <p style="padding-top: 6px">Should you have any further questions you can write to <strong><a href="/cdn-cgi/l/email-protection#e3808691978e828d82848691a38680808c968d808a8fcd8c9184"><span class="main-color"><span class="__cf_email__" data-cfemail="66050314120b07080701031426030505091308050f0a48091401">[email&#160;protected]</span></span></a></strong></p> </div> </div> <div class="tab-pane fade font-16" id='crmWebToEntityForm' style="height:auto;"> <div class="tabs-content"> <a class="btn btn-square main-bg" href="https://www.youtube.com/watch?v=MEYjyr65bJE" target="_blank">Mega Launch Video</a> <br /><br /> <h3><b>Powerful and Practical- EC-Council’s New Learning Track Launched Globally</b></h3> <p>March 14, Albuquerque, New Mexico City, USA</p> <p style="text-align:justify;"> EC Council, the world’s leading provider of certifications and training in the information security domain, today announced the release of five core programs and certifications to create an <a href="https://www.eccouncil.org/practical/" target="_blank">all-new learning track.</a> These programs and their ensuing qualifications will prepare quality, skills attested, respected, capable cyber-manpower that is in demand by the global workforce. It is a big step forward towards EC-Council’s commitment in Bringing <b>Workforce Development Training and Certification Programs that Measure Industry Readiness.</b> </p> <p style="text-align:justify;"> In today’s world, hackers are using sophisticated malware techniques to inflict intellectual and financial losses to their target, while organizations depend heavily on information technology to protect their vital information. The ability to harness new technology to bring value to an organization is critical to any organization’s growth matched with the ability to deploy these safely without over burdening the organizations risks posture. </p> <p style="text-align:justify;"> In response to the growing threats, EC-Council has addressed the root of the problem – the lack of cybersecurity professionals skilled in ethical hacking, security analysis, and penetration testing. </p> <p><b>Biggest Leap Since the Original</b></p> <p style="text-align:justify;"> EC-Council raises the bar again for ethical hacking training and certification programs through the <a href="https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/" target="_blank">Certified Ethical Hacker (CEH) v10</a> program, which is in compliance with the NICE framework’s Protect and Defend specialty area. In order to meet the rising demands of employers across the world, the program now includes IoT hacking, vulnerability analysis, static and dynamic malware analysis, and emerging attack vectors on cloud, artificial intelligence, and machine learning. </p> <p style="text-align:justify;"> CEH is used as a hiring standard and is a core sought after certification by many organizations, governments, cybersecurity practices, and is a cyber staple in many of the top universities around the globe. </p> <p><b>Exam Sanctity</b></p> <p style="text-align:justify;"> “The biggest issue for CISO’s is the need to differentiate candidates that have the knowledge and candidates that actually have the skills and abilities to do the job. Abilities that represent true technical and security challenges faced at the workplace today and every day. Many Fortune 500 companies developed creative ways to find and hire those that could actually do the job…They spent millions of dollars and countless amount of time and management to achieve that annually. Today, we offer a solution to this problem,” said Jay Bavisi, CEO of EC-Council Group and Chairman of the Board, EC-Council University. </p> <p style="text-align:justify;"> Ethical hackers from around the world will now be able validate their skills in a new exam format launched by EC-Council. </p> <p style="text-align:justify;"> The all-new <a href="https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/" target="_blank">C<span>|</span>EH (Practical) certification exam</a> will be delivered as a secure, remotely-proctored, hands-on, live certification test that can be taken anytime, anywhere. The exam is a six hour practical exam built by subject matter experts in the ethical hacking field, that will test the candidate against 20 real-life scenarios. </p> <p style="text-align:justify;"> The combined benefit of a practical exam, proctored anywhere in the world will allow organizations to quickly train, test, and deploy their cyber-ready workforce. </p> <p><b>A Progression From the Former</b></p> <p style="text-align:justify;"> Continuing where the CEH program left off, is the enhanced <a href="https://www.eccouncil.org/programs/certified-security-analyst-ecsa/" target="_blank">ECSA v10</a> program that includes a new comprehensive step-by-step penetration testing methodology that improves upon the best from ISO 27001, OSSTMM, and NIST Standards. This program is 100% compliant to the new NICE 2.0 framework and CREST framework, bringing real tangible benefits to employers including helping them assess their cybersecurity workforce, identify critical gaps in cybersecurity staffing, help their cyber workforce explore tasks and work roles, and assist with understanding the KSAs that are recognized by employers for in-demand cybersecurity roles. </p> <p style="text-align:justify;"> The program includes a new comprehensive social engineering penetration testing methodology and has increased its focus on methodology for perimeter devices (IDS/Firewall), database, wireless, and cloud penetration testing, using both manual and automated penetration testing approaches, along with many other major improvements. </p> <p><b>Application of Methodology</b></p> <p style="text-align:justify;"> After a successful completion of the ECSA v10 credential, certified members can now attempt the brand-new <a href="https://www.eccouncil.org/programs/ecsa-practical/" target="_blank"> ECSA (Practical) certification exam</a> — a 12 hour practical, fully proctored, live online exam, built on EC-Council’s cyber-range, simulating real-life environments. The exam will test the candidate on their application of penetration testing methodologies to perform a comprehensive security audit of an organization. </p> <p style="text-align:justify;"> The ECSA (Practical) will test your ability to perform threat and exploit research, understand exploits in the wild, write exploits, customize payloads, and make critical decisions at different phases of a penetration testing engagement. The candidate will also be required to create a professional pen testing report with essential elements and guidance for the organization in the scenario to act on. </p> <p style="text-align:justify;"> An ECSA Practical credential will provide the assurance that the candidate possesses the skills required while on the field and will stand as a testimony to their ability to undergo the rigor of the profession. </p> <p><b>100% Practicality into Training Sessions</b></p> <p style="text-align:justify;"> The all-new EC-Council learning track would not be complete without a penetration testing program. </p> <p style="text-align:justify;"> Following the launch of the LPT (Master) program at the Hacker Halted Conference 2017, came a flood of requests for an advanced penetration testing course, in order to help professionals be better prepared for the LPT (Master) test. Since then, EC-Council began working on a course that could resolve the problems faced by cybersecurity professionals and hiring managers, alike, bringing forth EC-Council’s <a href="https://www.eccouncil.org/programs/licensed-penetration-tester-lpt-master/" target="_blank">Advanced Penetration Testing program </a> </p> <p style="text-align:justify;"> The Advanced Penetration Testing Course was created as the next level progression after the ECSA to prepare you for the challenges that the LPT (Master) examination presents. This program is designed to demonstrate the advanced concepts of penetration testing, bringing 100% practicality into the training sessions to provide professional skills that demonstrate how professional pen testers will determine the attack surface of targets within a required time frame to gain access to the machines and escalate privileges. </p> <p style="text-align:justify;"> The course is designed to show the advanced concepts of scanning against defenses, pivoting between networks, deploying proxy chains, and using web shells. The last module of the course includes an SOW for each of the various networks we have created for the course. This, combined with the composition of various ranges, mimics a professional penetration test. </p> <p style="text-align:justify;"> Upon completion of the Advanced Penetration Testing program, candidates will challenge the LPT (Master) exam, the world’s first fully online, remotely-proctored LPT practical exam, that offers a challenge like no other by simulating a complex network of a multinational organization in real time. The candidates will also have to demonstrate an advanced understanding of testing modern infrastructures by completing a professional penetration test report to be evaluated by EC-Council experts for completeness and professionalism. </p> <p> For more information on these courses, visit <a href="https://www.eccouncil.org/" target="_blank"><span class="main-color">www.eccouncil.org</span></a> </p> </div> </div> <div class="tab-pane fade font-16" id="tabCISOCert" style="height:800px;"> <div class="tabs-content"> <h3> <b> EC-Council's C|CISO Program officially accredited by ANSI </b> </h3> <p style="margin-top: 0px; text-align: justify;"> EC-Council is proud to announce that the Certified CISO Program has officially been accredited by the American National Standards Institute (ANSI) to meet the ANSI/ISO/IEC 17024 Personnel Certification Accreditation standard for its C|CISO certification! <br /><br /> The American National Standards Institute (ANSI) is a private non-profit organization that administers and coordinates the U.S. voluntary standardization and conformity assessment system. ANSI is the official U.S. representative to the International Organization for Standardization (ISO) and, via the U.S. National Committee, the International Electrotechnical Commission (IEC). ANSI is also a member of the International Accreditation Forum (IAF). <br /><br /> To award the accreditation, ANSI conducted a verification process to ensure that EC-Council is impartial and objective as a certification body. It also confirmed that EC-Council’s certification process is conducted in a consistent, comparable, and reliable manner. This process required rigorous quality reviews of EC-Council and the Certified CISO (C|CISO) program. <br /><br /> All CCISOs who took the version of the exam that was certified by ANSI will now have the ANSI logo on their electronic certification. If you have any questions about this program, please contact <a href="/cdn-cgi/l/email-protection#d3b0b0baa0bc93b6b0b0bca6bdb0babffdbca1b4" target="_blank"><span class="main-color"><span class="__cf_email__" data-cfemail="3350505a405c735650505c465d505a5f1d5c4154">[email&#160;protected]</span></span></a>. </p> </div> </div> <div class="tab-pane fade font-16" id="tabLPTMasterExam" style="height:auto;"> <div class="tabs-content"> <h3> <b> EC-Council Announces the World’s First Fully Online, Remotely Proctored Hands-On Penetration Testing Exam </b> </h3> <a href="https://www.youtube.com/user/eccouncilusa" target="_blank"> <img src="/Content/Images/LPT-Announcement.jpg" style="width: 100%;" /> </a> <br /> <br /> <br /> <p style="margin-top: 0px; text-align: justify;"> EC-Council today announced the release of the new, fully-proctored Licensed Penetration Tester (LPT) certification, which will be launched at Hacker Halted, 2017. The new LPT (Master) certification exam is the first globally accepted, hands-on penetration testing certification exam administered in a fully proctored environment. </p><br /> <p style="margin-top: 0px; text-align: justify;"> Penetration testing professionals around the world will be able validate their skills in this new exam format launched by EC-Council. The new LPT (Master) certification exam will be delivered as a secure, fully-proctored, live certification test that can be taken anytime, anywhere by busy professionals. </p><br /> <p style="margin-top: 0px; text-align: justify;"> Jay Bavisi, the president and CEO of EC-Council, commented &quot;With the increase in the sophistication of cyber-attacks and with ever growing security needs, today's digital enterprises are looking for experts that have proven abilities to function as competent penetration testers in order to secure their operations. The fully proctored, hands-on LPT (Master) certification exam combines effectiveness with convenience to deliver a highest standard of exam that enables the candidates to demonstrate expertise in applying their skills in a hands-on environment.&quot; </p><br /> <p style="margin-top: 0px; text-align: justify;"> The exam provides a level playing field where candidates are challenged to prove their skills as expert-level penetration testers. Bavisi added &quot;In the real world, penetration testers go through a strenuous, arduous and laborious process to keep their clients and organizations secure. This exam is meant to mimic the real-world environment and is meant to stress, burden and ardently push the candidates to their limits to test their actual abilities in penetration testing.&quot; </p><br /> <p style="margin-top: 0px; text-align: justify;"> The new LPT (Master) certification is the crown jewel of the EC-Council penetration testing track. It challenges candidates through a grueling 18 hours of hands-on exam categorized into three practical tests for six hour intervals, each of which provide a multidisciplinary approach for targeting and compromising high security environments. Upon completion of the exam, candidates will have to demonstrate an advanced understanding of testing modern infrastructures by completing a professional penetration test report to be evaluated by EC-Council experts for completeness and professionalism. </p> </div> </div> <div id="tabCertifiedDigitalMarketerCertification" style="height:auto;" class="tab-pane fade font-16"> <div class="tabs-content"> <img src="/Content/Images/CDM-Announcement.png" class="img-responsive" /><br /> <br /> <h3 style="margin-top: 0px; text-align: justify;"> <b>EC-Council announces the official launch of IIB Council (formerly known as Institute of iBusiness) and Certified Digital Marketer Certification (C|DM).</b> </h3> <p style="margin-top: 0px; text-align: justify; font-style: italic"> -From the pioneer in Information Security Certified Training and the creator of Ethical Hacking Program, EC-Council introduces IIB Council, the Business Technology division and creator of Corporate Growth Hacking Trainings- </p> <p style="margin-top: 0px; text-align: justify;"> The brainchild of EC-Council, the Institute of iBusiness Council (IIB Council) is formed with the aspiration to create groundbreaking certification and training programs in the business technology sector. The programs teach students the fundamentals of accelerating corporate growth and fostering sustainable development across organizations. To transform organizations into smart, adaptive, digital enterprises, IIB Council programs focus on aligning industry requirements and business goals with the latest technology trends </p> <div class="col-sm-12"> <div class="col-sm-6"> <p> <b>Welcoming the first </b> <br /> <br /> <b>Business Technology Programs </b> <br /> <br /> <b>for Corporate Growth Hacking</b> </p> </div> <div class="col-sm-6" style="border:1px solid #000;"> <p><b>C<span style="color: red">|</span>DM</b> (Certified Digital Marketer)</p> <p><b>C<span style="color: red">|</span>PM </b>(Certified Project Manager)</p> <p><b>C<span style="color: red">|</span>CRM</b> (Certified Customer Relationship Manager)</p> <p></p> </div> </div> <div> <p> The IIB programs invite aspiring or current business professionals to get one step ahead of competition by utilizing brand-new technologies and smart digital practices to achieve goals and better results. The training material enriches digital skills that are congruent with the principles of <b>Business Analytics, Intelligence, Automation and Optimization.</b> Students will be furnished with real-world scenarios and case studies and 100% hands-on lab challenges that exploit the latest, best available tools and teach relevant, contemporary, directly implementable and practical skills. </p> <br /> <p> Certified Digital Marketer is the 1st Certification Course of Business Technology Certification line to be introduced by IIB Council (former Institute of iBusiness) on June 5th 2017. Current EC-Council partners may register for the Global Launch Webinar here:<a href="https://www.dropbox.com/sh/uomf2n1s0w5ckid/AACpzY1P2wRCI6EbG5OnZZ74a?dl=0" target="_blank"><span class="main-color"><u>https://www.dropbox.com/sh/uomf2n1s0w5ckid/AACpzY1P2wRCI6EbG5OnZZ74a?dl=0</u></span></a> </p> <br /> <p style="margin-top: 0px; text-align: justify;"> Certified Digital Marketer (<b>C<span style="color: red">|</span>DM</b>) (formerly known as CIMP <span>- </span>Certified Internet Marketing Practitioner) is re-launched under a revised approach to address the increasing demand for Growth Hackers; the skillful marketers that possess both the technical skills and the creative skills to drive profitable marketing campaigns. </p> </div> <div class="col-sm-12" style="border:1px solid #000;"> <p style="margin-top: 0px; text-align: justify;"><b>C<span style="color: red">|</span>DM is aimed at those interested in leading Digital Marketing Strategies at a corporate level.</b> </p> <p style="margin-top: 0px; text-align: justify; font-style: italic"> A C|DM turns Marketing Spending into Investment- </p> </div> <div class="col-sm-12 m-t-2 p-a-0"> <div class="col-sm-8"> <p style="margin-top: 0px; text-align: justify;"> C|DM is a Certification Program in Digital Marketing aimed at current or aspiring Digital Marketing Managers. IIB Certified Digital Marketers have extensive hands-on experience in the disciplines of Integrated Digital Marketing with a strategic focus on multi-channel marketing and cross-medium communications. A C|DM certified is able to demonstrate mastery in analytical skills and critical thinking using a combination of diachronic/old-time classic marketing principles and the latest digital concepts to obtain extremely accurate market insights and in-depth knowledge of their target audience key-drives. </p> </div> <div class="col-sm-4"> <img src="/Content/Images/CDM-Announcement.png" class="img-responsive" /> </div> <div class="col-sm-12"> <p style="margin-top: 0px; text-align: justify;"> The Certified Digital Marketer (C|DM) Program is developed in line with the latest industry trends to help current and aspiring Digital Marketers to achieve their marketing objectives and business goals through integrated marketing strategies including digital and physical platforms </p> <p style="margin-top: 0px; text-align: justify;"> Contrary to CIMP, C|DM covers the modules of Programmatic Marketing and Marketing Automation as well as the revolutionized approach of Video & Mobile Marketing. In the advent of Augmented Virtual Reality and Live Streaming, below-the-line marketing (point of purchase marketing) re-emerges from the ashes of 2000s to use real-time personalized communications and become one of the most sales-effective and influential techniques ever known. </p> <p style="margin-top: 0px; text-align: justify;"> The course that teaches students how to enable marketing activities, achieve profitable acquisitions and customer retentions through a well-thought automated buying process and customer lifecycle is now available worldwide through EC-Council iClass (online training) or live at any of our 700 partners. </p> <p style="margin-top: 0px; text-align: justify;"> <b>Important Notes:</b> </p> <p style="margin-top: 0px; text-align: justify;"> CIMP is set of Retirement on Dec 31st, 2017 </p> <p style="margin-top: 0px; text-align: justify;"> AIPs can exchange CIMP kits for FREE till 31st of July 2017, post that exchange requests will be not processed. </p> <p style="margin-top: 0px; text-align: justify; font-style: italic"> More information at <a href="https://www.iibcouncil.org" target="_blank"><span class="main-color">www.iibcouncil.org</span></a> </p> </div> </div> <div class="clearfix"></div> </div> </div> <div class="tab-pane fade font-16" id="tabECCouncilDisasterRecoveryProfessionalv3" style="min-height: 800px;"> <div class="tabs-content"> <img src="/Content/Images/EDRP-Announcement.png" style="width: 100%;" /><br /> <br /> <p style="margin-top: 0px; text-align: justify;">EC-Council is pleased to announce the launch of the all new EC-Council Disaster Recovery Professional v3 program. </p> <p style="margin-top: 0px; text-align: justify;">The EDRPv3 program is a completely redesigned program combining Business Continuity (BC) and Disaster Recovery (DR) domains into a unified and fluent program aimed at providing end to end BC/DR solutions to enterprises and professionals.</p> <p style="margin-top: 0px; text-align: justify;">EDRP provides critical templates and step by step instructions that bring practicality and skills orientation to students enabling them to tackle their BC/DR challenges quickly and effectively. This is an industry first!</p> </div> </div> <div class="tab-pane fade font-16" id="tabComputerHackingForensicInvestigator" style="height:auto;"> <table> <tr style="margin-top: 0px;"> <td> <h3><b>EC-Council Announces Release of version 9 of its leading forensics certification, CHFI</b></h3> <p> EC-Council's leading digital forensics certification program, Computer Hacking Forensic Investigator (CHFI), has been updated to meet the new challenges faced by information security professionals that specialize in cyber forensics. CHFIv9 builds on the outstanding success of previous versions and adds coverage of the latest digital forensics techniques, digital forensics laws and standards updates, as well as immersive lab exercises to help students learn to defeat anti-forensics techniques, conducting database forensics, cloud forensics investigations, and malware forensics. These updates are necessary to keep pace with a rapidly changing industry. The latest operating systems are covered in the new material via 39 updated lab modules intended to challenge students to apply their knowledge and reinforce skills. </p> <p> To ensure this latest version is in line with the real-world requirements of working digital forensic professionals, EC-Council assembled various subject matter experts and professionals from law enforcement, criminal investigation, defense, and highly technical security professionals to contribute to the new content. Developed by a panel of subject matter experts and industry specialists, the updated certification sets the global standards for computer forensics best practices. </p> <p> Cyber forensics is a very important and in-demand subset of the larger information security industry. Digital forensics has evolved over the past 10 years to encompass a variety of critical roles well beyond cyber incidents. Digital forensics has become a key role in many demanding IT departments providing reliable, evidence based validation of enterprise systems. Per the market research report published by IndustryARC, by 2020, the digital forensics market will reach 4.8 billion USD. The major drivers for this growth are the increase in threats from cybercrime and terrorist attacks. Only 22% of companies are even fully prepared to deal with cybersecurity incidents and forensics plays a huge role in incident response. </p> <p> "With this growth, the industry is struggling to find quality digital forensics recourses, creating a rise in demand within the already underserved job markets. As a result, there is a market need for a certification based on a single, universal body of knowledge," said EC-Council President, Jay Bavisi. </p> <p> The CHFIv9 training program enables information security professionals to meet the challenges of digital forensics as well as potentially add a specialty to their skillset that could bolster their careers tremendously. Foote Partners, which tracks information technology jobs across all skill levels, projects the global demand for cybersecurity talent to rise to six million positions by 2019 with an expected shortfall of 1.5 million professionals. </p> <p> Professionals with CHFIv9 on their resumes will be well-suited to meet this demand not only because they have demonstrated their mastery of the subject matter by passing the certification exam, but because of the hours of work requiring hands-on, real world application of the skills in the lab environment created to accompany the course. The labs are an immersive environment where students practice applying their skills and reinforcing their learning. The labs also help students adapt very quickly to unfamiliar environments as they learn digital forensics skills not just in theory, but in practice. </p> </td> </tr> </table> </div> <div class="tab-pane fade font-16" id="tabCertifiedNetworkDefenseArchitectprogram" style="min-height: 800px;"> <table> <tr style="margin-top: 0px; text-align: justify;"> <td> <h3><b>Invitation to apply for the celebrated Certified Network Defense Architect program</b></h3> <p> Maintaining the integrity and authenticity of the network in an organisation is critical to the organisation's health. The criticality increases all the more with Defence and government organisations. EC-Council understands the importance that networks and network defenders play in these coveted organisations and respect their responsibility. </p> <p> It is with this perspective that EC-Council is inviting its CEH member group who also serve the Government organisations to apply for the coveted Certified Network Defense Architect program to get certified on the same. </p> <p>If this invitation interests you and if you meet the requirements then write to us at <a href="cnda@eccouncil.org"><span class="main-color"><span class="__cf_email__" data-cfemail="94f7faf0f5d4f1f7f7fbe1faf7fdf8bafbe6f3">[email&#160;protected]</span></span></a> </p> </td> </tr> </table> </div> <div class="tab-pane fade font-16" id="tabCertifiedNetworkDefender" style="height:auto;"> <table> <tbody> <tr> <td style="margin-top: 0px; text-align: justify;"> <h3><b>EC-Council is excited to announce the launch of the all-new certification Certified Network Defender (CND), which was launched globally on September 14th, 2016.</b></h3> <p>The new certification is designed to be a game changer in the network defence domain.The past few years had seen the disastrous consequences of cyber-crime, which made cybersecurity one of the key aspects of agenda in the Board Room discussions. Studies point out that, professionals handling the Organisation's networks are not amply equipped to protect their networks from evolving cyber threats like Advanced Persistent Threats (APTs), sophisticated botnet C&C, Insiders to mention a few. Cyber criminals see this as an opportunity to hack the system compromising on important information. The R&D teams at EC-Council have extensively conducted technology surveys, community engagements, market analysis and SME consultations to develop the CND skillset that will enable networking professionals to protect, detect and respond to cybersecurity threats.</p> <p>A thorough job task analysis along with research, market analysis, surveys, community engagement activities, consultation and advice from Subject Matter Experts, has ensured that the CND design is based on cybersecurity frameworks such as NICE and is in sync with the current markets trends. CND is designed in a manner that it imparts the necessary skillset to the Network Administrator on the nuances of Network Security whether it is designing the Organisation's network security controls, firewall systems, IDS/IPS systems, policies and procedures, DLP and etc. It also ensures that the personnel handling the network can detect network security breaches at an early stage, and also respond to the same. A deeper analysis of the situation brings to the fore, the larger goals of the organisation being met. Ensuring that information, the key component of the organisation is safe will ensure business continuity, better ROIs on security investment and lesser impact on incidents on Information System Resources. What makes CND different from the other programmes is that CND covers network defence from a Defence perspective going beyond the traditional security solutions and appliances. Also, the CND programme includes operational security aspects such as designing and deploying security policies, network monitoring, vulnerability management, incident handling and response and etc.</p> <p>EC-Council recommends that companies facing a shortage of qualified security practitioners or companies that cannot afford to hire specialized information security professionals consider adding information security duties to their existing system and network administrator job roles. The fastest way to accomplish this would be to send their employees to the only program on the market designed to teach network and system administrator information security skills: CND.</p> <p>For further information, please visit <a href="https://www.eccouncil.org/programs/certified-network-defender-cnd/" target="_blank"><span class="main-color">https://www.eccouncil.org/programs/certified-network-defender-cnd/</span></a></p> </td> </tr> </tbody> </table> </div> <div class="tab-pane fade font-16" id="tabECCouncilMembershipNotification" style="height:auto;"> <table border="0" align="center" cellpadding="0" cellspacing="0" bgcolor="#ffffff"> <tr> <td align="center"> <div style="margin-top: 0px; text-align: left;"> <p style="margin-top: 0px; text-align: justify;"> Dear Certified Members and Partners, <br /> <br /> Please be advised, effective January 1, 2016, EC-Council will be initiating the requirement for Membership fees for all certified members holding EC-Council certifications. In the year 2012, EC-Council had announced that it would be initiating this membership fee structure in 2016. We are proud to say our certification membership base continues to grow at a steady rate and the cybersecurity field is growing as a whole. <br /> <br /> Just this year, EC-Council has received "<b>cybersecurity Company of the year award</b>" The year before, we received the "<b>DHS/NSA Industry Achievement Award</b>" at the CISSE Colloquium for advances in cybersecurity professionalization. These awards received are evidence of the work we continue to do to add tangible industry recognition and value in our certification programs. We also now have a fully accredited online University- EC-Council University, which produces Cyber Leaders of the future. We are proud to maintain our ANSI 17024 status. We are proud to be one of the world's largest technical InfoSec certification bodies with over <b>140,000</b> certified members in 140 countries across the globe <br /> <br /> Holding a certification from EC-Council comes with many benefits and advantages but comes at an immense cost of maintenance to EC-Council. To continue to provide these benefits and elevate the value of EC-Council Certifications in the market, EC-Council has no choice but to implement a certification maintenance fee of $80.00 per annum. <br /> <br /> The EC-Council Continuing Education requirements, which calls for the maintenance of certification through Continuing education credits is still in effect and it is important you maintain currency in the profession. <br /> <br /> Members are also eligible to receive exclusive discounts to attend EC-Council Foundation Events such as Hacker Halted and Take Down Con as well as a discounts on additional EC-Council certification programs and material. <br /> <br /> Certified Members will be notified via their Aspen accounts. <br /> <br /> We thank you for your ongoing support towards EC-Council, should you have any questions, please write back to us.<br /> For partners <a href="/cdn-cgi/l/email-protection#85e6e0f7f1e8e4ebe4e2e0f7c5e0e6e6eaf0ebe6ece9abeaf7e2"><span class="main-color"><span class="__cf_email__" data-cfemail="345751464059555a55535146745157575b415a575d581a5b4653">[email&#160;protected]</span></span></a> For certified members <a href="/cdn-cgi/l/email-protection#ea878f87888f98999f9a9a85989eaa8f8989859f84898386c485988d"><span class="main-color"><span class="__cf_email__" data-cfemail="b3ded6ded1d6c1c0c6c3c3dcc1c7f3d6d0d0dcc6ddd0dadf9ddcc1d4">[email&#160;protected]</span></span></a> <br /> Please <a href="https://cert.eccouncil.org/membership.html" target="_blank"><span class="main-color">Click here</span></a> for more details. <br /> <br /> Respectfully,<br /> <b>EC-Council Certification</b> </p> </div> </td> </tr> </table> </div> <div id="DigitalBadges" class="tab-pane fade font-16" style="height:auto;text-align:justify"> <img src="https://www.eccouncil.org/wp-content/uploads/2016/07/DigitalBadging-2.jpg" width="100%" /> <br /> <h3><b>Dear EC-Council Partners, Members, and Friends</b></h3> <p> EC-Council is pleased to announce the formal introduction of Digital Badges for all of its active members, without any additional fee whatsoever. A digital badge is a validated indicator of achievement to highlight a skill or quality. EC-Council will now offer digital badges post successful completion of our modules, courses, and certification exams. These visual tokens of achievement will now allow students to showcase their efforts and success across the world! </p> <h3><b>How Do Digital Badges Work?</b></h3> <p> Upon registering for a course, students can access EC-Council course content via the ASPEN portal. They will now be rewarded with digital badges upon completion of each module, or upon successfully passing an EC-Council certification exam. These digital badges can be collected and shared with colleagues, added to resumes, social media outlets, and other avenues, serving as skills validators. Digital Badges will be available to download from the ASPEN portal. </p> <p> As we continue to face a growing threat landscape and a cybersecurity industry, hungry for qualified candidates, digital badges will become paramount to enhancing the exposure of EC-Council certified members. </p> <p> As we continue our digital journey, commencing January 1st, 2019, EC-Council will no longer ship out physical certificates. EC-Council certified members can continue to download their e-Certificates from the ASPEN portal. Certified members who still wish to receive a physical certificate may <a href="https://cert.eccouncil.org/physical-certificate-printing.html" target="_blank"><span class="main-color">request a physical certificate here.</span></a> </p> <p> We thank you for your on-going support. For more information on our digital badges and supporting processes, please contact: <a href="/cdn-cgi/l/email-protection#94f7f1e6e0f9f5faf5f3f1e6d4f1f7f7fbe1faf7fdf8bafbe6f3"><span class="main-color"><span class="__cf_email__" data-cfemail="1a797f686e777b747b7d7f685a7f7979756f747973763475687d">[email&#160;protected]</span></span></a>. </p> Thank you! </div> </div> </div> </div> </div> </div> <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.7.1/jquery.min.js"></script> <script> $(document).ready(function () { hidemenu(); $("ul #about").addClass("selected"); }); function hidemenu() { $("ul #hme").removeClass("selected"); $("ul #training").removeClass("selected"); $("ul #mycourse").removeClass("selected"); $("ul #trngpartner").removeClass("selected"); $("ul #store").removeClass("selected"); $("ul #ciso").removeClass("selected"); $("ul #instructr").removeClass("selected"); } </script> </div> <input type="hidden" id="forgeryToken" value="zF3R06nACnYljDWIDyfV2-VhHkFHTidBQHnCBAdCmzFvYs-T_0zs36zKd-Eu5AQLZJYkfw2,euI8wgTwgsH_-VO1Rg5vtrimBsyRjK_36-F0eIElef0DknecNp2Idgj6lPBy8yyZhtN7zg2" /> <input type="hidden" id="cptn" /> <!-- Content start --> <!-- Footer start --> <footer id="footer2"> <!-- footer bottom bar start --> <div class="footer-bottom"> <div class="container"> <div class="row"> <!-- footer copyrights left cell --> <div class="copyrights col-md-6">© Copyrights <b class="main-color">EC-COUNCIL</b> 2024. All rights reserved.<a href="/Terms"><span class="main-color">Terms Of Use</span></a> | <a href="/Privacy"><span class="main-color">Privacy Policy</span></a> | <a id="footerPrivacy" href="/Confidentiality-Terms"><span class="main-color">Confidentiality Terms</span></a></div> </div> </div> </div> <!-- footer bottom bar end --> </footer> <!-- Footer end --> </div> <!-- Back to top Link --> <a id="to-top" href="#"><span class="fa fa fa-angle-up"></span></a> <!-- Api call for request a call --> <script type="text/javascript"> $(document).ready(function () { var input = document.querySelector("#txtphonenumber"); var iti = intlTelInput(input,{ initialCountry: "auto", geoIpLookup: function (callback) { $.get('https://ipinfo.io', function () { }, "jsonp").always(function (resp) { var countryCode = (resp && resp.country) ? resp.country : "US"; callback(countryCode); }); }, utilsScript: "https://cdn.jsdelivr.net/npm/intl-tel-input@24.4.0/build/js/utils.js" }); $('#customerSupportModalPopup').on('hidden.bs.modal', function (e) { $('#txtName').val(''); $('#txtphonenumber').val(''); $("#responseMessage").html(''); }); $("#btnRequestCall").click(function () { //debugger; $("#responseMessage").html(''); if ($('#txtphonenumber').val() == "" && $('#txtName').val().trim() == "") { $("#responseMessage").html('<div class="alert alert-danger"><i class="fa fa-exclamation-triangle"></i>Required Name and Phone Number.</div>'); return false; } if ($('#txtName').val().trim() == "") { $("#responseMessage").html('<div class="alert alert-danger"><i class="fa fa-exclamation-triangle"></i>Required Name.</div>'); return false; } if ($('#txtphonenumber').val() == "") { $("#responseMessage").html('<div class="alert alert-danger"><i class="fa fa-exclamation-triangle"></i>Required Phone Number.</div>'); return false; } var fullphonenumber = iti.getNumber(); var countryData = iti.getSelectedCountryData(); var dialCode = countryData.dialCode; if (dialCode == null || dialCode == "") { $("#responseMessage").html('<div class="alert alert-danger"><i class="fa fa-exclamation-triangle"></i>Required Country Code.</div>'); return false; } if (fullphonenumber.startsWith('+' + dialCode)) { fullphonenumber = fullphonenumber; } else { fullphonenumber = '+' + dialCode + fullphonenumber; } //console.log("New Full phone number : " + fullphonenumber); if (!/^[A-Za-z\s]+$/.test($('#txtName').val())) { $("#responseMessage").html('<div class="alert alert-danger"><i class="fa fa-exclamation-triangle"></i>Invalid Name (Only letters and spaces are allowed).</div>'); return false; } if (!/^\+?\d{3,16}$/.test(fullphonenumber)) { $("#responseMessage").html('<div class="alert alert-danger"><i class="fa fa-exclamation-triangle"></i>Enter a valid phone number.</div>'); return false; } var name = $("#txtName").val(); var requestdata = { "campaignName": "Progressive_918047761675", "phoneNumber": fullphonenumber, "Name": name, "action": "START", "checkDuplicate": "TRUE", "userName": "e_commerce" }; $.ajax({ type: "POST", url: "https://in1-ccaas-api.ozonetel.com/ca_apis/AddCampaignData", headers: { 'apiKey': 'KKf82076faf47855982b07ef946cb64289' }, contentType: "application/json", dataType: "json", data: JSON.stringify(requestdata), success: function (data) { if (data.status == "Success" || data.status == "SUCCESS") { $("#responseMessage").html('<div class="alert alert-success" id="messageStatus"><i class="fa fa-check"></i>We will call you back at the number you provided.</div>'); $('#txtName').val(''); $('#txtphonenumber').val(''); } else { $("#responseMessage").html('<div class="alert alert-danger"><i class="fa fa-exclamation-triangle"></i> Error occured,Try again.</div>'); } }, error: function (xhr, status, error) { $("#responseMessage").html('<div class="alert alert-danger"><i class="fa fa-exclamation-triangle"></i> Error occured,Try again.</div>'); } }); }); }); </script> <!-- Include intl-tel-input JS --> <script src="https://cdn.jsdelivr.net/npm/intl-tel-input@24.4.0/build/js/intlTelInput.min.js"></script> <!-- Load JS plugins <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.7.1/jquery.min.js"></script> <script type="text/javascript" src="/Content/assets/js/assets.js"></script> --> <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.7.1/jquery.min.js"></script> <script type="text/javascript" src="/Content/assets/js/customjquery.js"></script> <script type="text/javascript" src="/Content/assets/js/assets.js"></script> <!-- SLIDER REVOLUTION --> <script type="text/javascript" src="/Content/assets/revolution/js/jquery.themepunch.tools.min.js"> </script> <script type="text/javascript" src="/Content/assets/revolution/js/jquery.themepunch.revolution.min.js"></script> <!-- SLIDER REVOLUTION 5.0 EXTENSIONS (Load Extensions only on Local File Systems ! + The following part can be removed on Server for On Demand Loading) --> <script type="text/javascript" src="/Content/assets/revolution/js/extensions/revolution.extension.actions.min.js"></script> <script type="text/javascript" src="/Content/assets/revolution/js/extensions/revolution.extension.carousel.min.js"></script> <script type="text/javascript" src="/Content/assets/revolution/js/extensions/revolution.extension.kenburn.min.js"></script> <script type="text/javascript" src="/Content/assets/revolution/js/extensions/revolution.extension.layeranimation.min.js"></script> <script type="text/javascript" src="/Content/assets/revolution/js/extensions/revolution.extension.migration.min.js"></script> <script type="text/javascript" src="/Content/assets/revolution/js/extensions/revolution.extension.navigation.min.js"></script> <script type="text/javascript" src="/Content/assets/revolution/js/extensions/revolution.extension.parallax.min.js"></script> <script type="text/javascript" src="/Content/assets/revolution/js/extensions/revolution.extension.slideanims.min.js"></script> <script type="text/javascript" src="/Content/assets/revolution/js/extensions/revolution.extension.video.min.js"></script> <!-- END SLIDER REVOLUTION 5.0 EXTENSIONS --> <!-- general script file --> <script type="text/javascript" src="/Content/assets/js/script.js"></script> <script type="text/javascript" src="/Content/assets/js/custom.js"></script> <script type="text/javascript" src="/Content/Js/jquery.pickmeup.min.js"></script> <script src="https://www.google.com/recaptcha/api.js?render=6Lf7IT4aAAAAAORKG7pSbWLc-cnC-ThFBZCxkZcN"></script> <script> $(document).ajaxStart(function () { $("body").append('<div id="loader" style="height:100%;width:100%;top:0px;bottom:0px;left:0px;right:0px;position:fixed;background-color:rgba(0,0,0,0.3);z-index:75;"><div style="margin-left:45%;margin-top:18%;"><img src="../Content/Images/ajax-loader.gif" alt="Loading...." <="" div="" style="border-radius: 100%;"></div></div>'); }).ajaxStop(function () { $("#loader").remove(); }).ajaxError(function () { $("#loader").remove(); }); window.onerror = function (message, source, lineno, colno, error) { $("#loader").remove(); } //restrict special characters start $("input[type='text'],textarea").on("paste", function (e) { if (e.target.id != "txtPassword") { var data = e.originalEvent.clipboardData.getData('Text'); var b = data.replace(/[^a-z 0-9-_.,@$]/gi, ''); $(this).val(b); return false; } }); $("input[type='text'],textarea").keypress(function (e) { if (e.target.id != "txtPassword") { var keyCode = e.keyCode == 0 ? e.charCode : e.keyCode; //32 Space, //46 . //45 - //44 , //95 _ //64 @ //36 $ //backspace var ret = ((keyCode >= 48 && keyCode <= 57) || (keyCode >= 65 && keyCode <= 90) || (keyCode >= 97 && keyCode <= 122) || keyCode == 32 || keyCode == 46 || keyCode == 45 || keyCode == 44 || keyCode == 95 || keyCode == 64 || keyCode == 8); return ret; } }); //restrict special characters end $(".date").pickmeup({ format: 'm-d-Y' }); $(".pickmeup").on("click", ".pmu-days .pmu-button", function () { $(".pickmeup").hide(); }); $(function () { var controls = $(".disable"); controls.bind("paste", function () { return false; }); controls.bind("drop", function () { return false; }); controls.bind("cut", function () { return false; }); controls.bind("copy", function () { return false; }); }); //recaptcha v3 loadcaptchav3(); function loadcaptchav3() { grecaptcha.ready(function () { grecaptcha.execute('6Lf7IT4aAAAAAORKG7pSbWLc-cnC-ThFBZCxkZcN', { action: 'submit' }) .then(function (token) { $("#cptn").val(token); }); }); } </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10