Category

January 9, 2018

EC-Council hosted high-profile speakers and attendees at Cloud Con 2017 in Bengaluru, India

Because of the growing adoption and security concerns around cloud technologies, EC Council presented the CLOUD CON 2017 on October 30, 2017 in Bengaluru, India. The conference brought together experts from India and abroad for keynote sessions, panel discussions, and technical presentations on the future and risks associated with cloud innovation and security. With a focus on cloud computing and its potential to transform businesses, Cloud Con 2017 focused on the most pressing security concerns in the wide-spread adoption of cloud technology. Mr. J A Chowdary, IT Advisor and Special Secretary to the Chief Minister, Government of Andhra Pradesh, delivered the opening keynote address which touched on how Andhra Pradesh is aspiring to be the first state in India to move from “Real Time Government to Real Time Governance.” Craig Lim, Head Cloud Security- Asia, Check Point Software Technologies, in his presentation said that “Cloud security should be an enabler, not a hurdle to the adoption of cloud” which was echoed across many other presentations as well throughout the day. Bhavesh Kumar, Head of Engineering & Technology – Data Platform & Analytics, Tesco; lead a panel that covered a mix of areas including IoT and data analytics and their use in a variety of industries including banking, retail, and finance. The panel even spoke about how rural India has been dealing with these challenges. The list of esteemed guests and speakers included luminaries in the cloud security community, including Anshul Srivastav, Chief Information and Digital Officer Union Insurance, UAE; presenting his talk entitled “Reengineer your business with cloud” to a packed room. His presentation was followed by an exemplary session by Winny Patro, Director, APITA, Information Technology, Electronics & communications Department – Government of Andhra Pradesh; speaking about the collaborative ecosystem of cloud computing. Other esteemed speakers included Soo Kiat TEE, Director of Sales Engineering, Asia Pacific & Japan; Gaurav Agarwal, Managing Director, India & SAARC, Symantec; Sudin Baraokar, Head Innovation, State Bank of India; and Suresh Shan, Head of Innovation & Future Technologies, Mahindra Finance. Their talks emphasized the maturity and future of cloud security in India and the global IT industry. The closing panel discussion lead by veteran Sunil Varkey concluded that trust and assurance is the foundation for a sustainable digital economy. Leading cyber security and cloud solution providers like Check Point Software Technologies, Rapid7, Symantec, Qualys, Inc., Fire Compass, Aujas Networks, Grant Thornton India, and The Achilles also partnered with the summit and showcased their latest technologies and solutions to the audience. The end of Cloud Con Summit 2017 also marked the start of the countdown for the second edition of the Fintech Security Summit 2017. The Summit’s theme is “NextGen Cyber Security For Finnovation” and it will be held in Abu Dhabi on December 7, 2017. About EC-Council EC-Council has been the world’s leading information security certification body since the launch of their flagship program, Certified Ethical Hacker (CEH), which created the ethical hacking industry in 2002. Since the launch of CEH, EC-Council has added industry-leading programs to their portfolio to cover all aspects of information security including EC-Council Certified Security Analyst (ECSA), Computer Hacking Forensics Investigator (CHFI), Certified Chief Information Security Officer (CCISO), among others. EC-Council Foundation, the non-profit branch of EC-Council, created Global CyberLympics, the world’s first global hacking competition. EC-Council Foundation also hosts a suite of conferences across the US and around the world including Hacker Halted, Global CISO Forum, TakeDownCon, and CISO Summit. For more information about EC-Council, please see https://staging-new.eccouncil.org.

Read article
EC-Council Lights the Flame of a Cyber Safe Tomorrow with TEK-UP University in Tunisia

Many developing countries have adopted digital technologies, making cyber security a major concern. However, developing countries don’t always have the workforce to effectively protect large infrastructures as technology is rapidly adopted. To counter the threat of a cyber-attack, qualified cybersecurity professionals are more important than ever. Global job predictions suggest the same, as experts predict a shortage of two million cyber security professionals by 2019. Following major cyber threats in the country, Tunisia was one of the first African countries to adopt cyber security as a part of a government sponsored institution in 2004. This partnership gives Tunisia the chance to develop the necessary skills in cybersecurity at the grassroot level, thereby ensuring that cybersecurity skills gain a prominent role in a vulnerable region, while providing TEK-UP a competitive approach over other institutes. Tunisia is an example of a developing country that has strong and well defined cyber laws but the problem of a qualified workforce still exists. EC-Council recently announced a newly formed partnership with TEK-UP University in Tunisia to provide their students with the opportunity to learn ethical hacking – a skill that is fundamental to information security. EC-Council courses will primarily be taught via EC-Council’s online learning solution called iLearn. A TEK-UP university spokesperson stated, “We believe that a partnership with EC-Council will not only help Tunisian students to gain the required skills and to have technical depth, but it will also build a suitable learning environment to brush up on their communication skills, analytical skills, business knowledge, and risk understanding. Acquiring these skills will help students to be ready to face real-world security scenarios in a changing threat landscape and to demonstrate the ability to serve as responders to cybersecurity incidents.” The iLearn platform by EC Council, gives students access to on-demand hands-on training courses. iLearn packages come with one year of access to self-paced streaming video lectures, a certification exam, and access to EC-Council’s online lab platform, iLabs, where students can practice their hacking skills in a safe environment. iLearn – Self-Paced Streaming Video Training iLearn is EC-Council’s self-paced video training option for Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), EC-Council Certified Security Analyst (ECSA), and the rest of EC-Council’s programs. The range of programs available on iLearn starts from the entry level Certified Secure Computer User (CSCU) course and advances all the way to the courses delivered through the Center for Advanced Security Training (CAST). All courses are taught by expert instructors with experience in training high-level organizations like the US DOD, Pentagon, FBI, NSA, and many more. Learn more about iLearn here: https://iclass.eccouncil.org/learning-options/ About TEK-UP TEK-UP is a Private Higher School of Technologies & Engineering founded in September 2014, in Tunisia. TEK-UP University aims to combine theory with practice, offers education accordingly, and prepares its students for the future through a high-quality learning environment. The university awards National Engineering Diploma in Telecommunications and Computer Science. Education at the University covers specific skills and scientific methods that enables graduates to improve their qualifications. Since its launch in 2014, over 150 technical and linguistic certifications were awarded to its students from potential certification bodies as Cisco, Linux Professional Institute, TEKonsult, Oracle etc. Visit TEK-UP to know more: https://tek-up.de/ About EC-Council EC-Council is the world’s largest Certification body for Information Technology & fastest growing vendor neutral programs. It is the owner and developer of the world famous Certified Ethical Hacker course (CEH), Computer Hacking Forensics Investigator program (CHFI), License Penetration Tester program (LPT), and various other programs. EC-Council Foundation, the non-profit branch of EC-Council, created Global CyberLympics, the world’s first global hacking competition. EC-Council Foundation also hosts a suite of conferences across the US and around the world including Hacker Halted, Global CISO Forum, TakeDownCon, and CISO Summit. For more information about EC-Council, visit https://staging-new.eccouncil.org.

Read article
4 Cybersecurity Threats: Not Just a Tech Problem, but a Business Risk

Cybercrime reaches new heights with the average cost of a single data breach hitting $3.62 million USD, making it crystal clear that technological defenses alone are not enough to protect organizations data assets. Cyber criminals are extremely aware of technology loopholes and are constantly driven by motives such as financial gain, espionage, hacktivism, or, even worse, terrorism. From market manipulation to vandalism, it is evident that these threats have become a business risk for the entire organization and not just a problem for the IT department. According to the Global State of Information Security Survey 2017, less than 45% of board members actively participate in the organization’s security strategy. In fact, the Global Enterprise Security Survey by Fortinet shows that less than 50% of board members treat cybersecurity as a top priority. With organizations and individuals moving toward digitization, more devices require enhanced security measures. Even the growth in artificial intelligence and machine learning is a double-edged sword: while they help create better cybersecurity strategies, they can also be used to enhance tools used for malicious cyberattacks. 1. The Active Involvement of Regulatory Agencies Regulatory agencies like the Federal Trade Commission (FTC) and Securities and Exchange Commission (SEC) have filed lawsuits against companies that have failed to take appropriate steps to safeguard their data. Mishandling data can lead to mistrust among customers, ultimately leading to the downfall of a company. When viewed with that perspective, it’s hard to see cybersecurity as anything but a business risk issue. The fear of reputational damage to an organization is slowly forcing company board members to participate more actively in cybersecurity strategies. Although the complete elimination of cyber risk is impossible, it is important for a company to understand the importance of linking cybersecurity and business strategies. This will enable a company to face problems head-on, make better decisions, and provide customers and employees with better disclosure. 2. Increased Expenditure Does Not Equal Better Cybersecurity Increasing expenditure on security is not the only solution to this problem although doing so is a step in the right direction. In 2014, despite spending $250 million per year on cybersecurity, JPMorgan fell victim to an attack that exposed the confidential data of 76 million households and 7 million small businesses, proving that it takes more than just expenditure to prevent malicious cyberattacks. Board members must confront cybersecurity as a business risk to help increase insider safety and contain outside threats. To be able to treat cybersecurity as a business risk, board members and other leaders in the company should have an understanding of what their digital assets are and how any security policy might affect them. 3. Board Members Must Understand Cybersecurity This also means that company leaders must be knowledgeable enough to ask the right questions when meeting with the CISO and CIO to discuss company security strategies. It is incumbent upon the security leaders of the company to provide business leaders with clear, concise, and accurate reporting to ensure they understand their security posture. Understanding the technical jargon of a CISO might be difficult for those business leaders who have limited knowledge in cybersecurity. It is the joint responsibility of the CISO to work to bridge this gap and speak the language of business and the business leaders’ responsibility to educate themselves on the importance of and basics of cybersecurity. This join approach will help the organization create better cybersecurity strategies and implement better ones in the long run. 4. Conducting Cybersecurity Awareness Training Programs Constant cybersecurity awareness training programs for employees and vendors will also help create a safer cyber environment and control insider threats to a great extent. Security awareness training programs such as EC-Council’s Certified Secure Computer User (CSCU) is specifically designed for today’s computer users who rely on the internet extensively to work, study, and play. This course introduces students to security and teaches them how to secure operating systems, internet safety, social network safety, mobile safety, email safety, and data backup and disaster recovery. Cybersecurity is not just the responsibility of the IT department nor is it the responsibility of the board of directors alone. It requires a collective effort from all levels of an organization in order to develop a cyber safe environment. As a professionals in any area of a company, it is your duty to help create a secure cyberspace by attending and understanding awareness training programs. You can also play a bigger role in the cybersecurity industry with the help of EC-Council – the world’s leading information security certification body since the launch of their flagship program, Certified Ethical Hacker (CEH), which created the ethical hacking industry in 2002. EC-Council Foundation, the nonprofit branch of EC-Council, created Global CyberLympics, the world’s first global hacking competition, in order to spread awareness and encourage more professionals in cybersecurity.

Read article
5 Essential Steps to Improve Your Cybersecurity Strategy

Cybersecurity strategies tend to be stable from year to year, changing only to accommodate budget fluctuations. However, cyber threats change much more rapidly to outsmart things like the anti-virus software and malware prevention techniques of last year. In fact, there are approximately 1.4 million phishing websites that are created every month, resulting in an average loss of half a billion dollars per year. A study conducted by The University of Erlangen-Nuremberg showed that at least 45% of respondents fell victim to a phishing email sent by the college. Through gaining access to a user’s login and password details, cyber criminals can gain control of the victim’s social network, email, and online bank accounts. Despite these realities, organizations still rely on firewalls and threat monitoring as the foundation of their security strategies instead of implementing stronger and more advanced cybersecurity strategies. It is important that an organization’s cybersecurity strategy adapts to the threat landscape, even if this means unlearning a few habits from the past. Here are a few essential steps to follow to create a more efficient cybersecurity strategy: 1. IT and Business Needs Must Align According to the Telstra Cyber Security Report 2017, when asked how important cybersecurity within an organization was, 35.5% of board members said that it was very important, 34.9% thought it was important, 22.4% remained neutral, and the remaining board members rated it low. However, only 16.4% of board members have a very high level of involvement in cybersecurity initiatives of the organization. As the involvement of IT in business expands, there is a greater need for organizations to align their IT objectives with their business goals. With the rise in cybercrime costs around the world, the best enterprise leaders are now recognizing that cyber risks are indeed business risks. What board members might find important may not be a priority to information security professionals and vice-versa. This is why communication between board members and cybersecurity professionals is important for proper security and safety of the company. Cybersecurity awareness and involvement ought to be a top priority for board level members. 2. Continuous Cybersecurity Awareness and Training KPMG’s Cybersecurity Benchmark Report 2017 shows that 28% of all companies in the survey stated that security awareness is the most frequent cybersecurity topic in annual reports. Training is more than just checking a compliance box. When done correctly, it can help organizations align its security practices with its business needs. Despite the advancements in artificial intelligence, humans still play the most important role in maintaining a safe and secure cyberspace. This is why cybersecurity awareness ought to be the most important security role within an organization with a focus on training employees, security personnel, privileged users, third-party vendors, and board members alike. A good cybersecurity training program includes focusing on topics such as: The importance of updated software, backup routines, safe social media practices, and familiarity with phishing emails. Knowing how to handle critical situations. Ensuring that the practices and policies being taught are actually followed. 3. Analyze Where Protection is Required Cybercriminals are working at an extremely aggressive pace, always aiming for the organization’s crown jewels— critical assets and sensitive data. Despite the fact that 80% of breaches in an organization involve stolen or weak credentials, only 40% of those companies  provide adequate protection to privileged accounts. In fact, 80% of the companies do not know where this sensitive data is located or how secure it is. An organization’s critical assets can reside anywhere within the virtual world as employees, customers, and company partners turn to cloud-based technologies to access and share business information. To ensure proper protection, organizations must perform and include explicit risk assessments on critical information assets. This will help them develop appropriate tactics to determine how they can achieve continuity and recovery in the event of a data breach. 4.  Monitor and Update Constantly Most companies are able to identify certain vulnerabilities and are able to patch systems to prevent threats from impacting their operations. However, not all companies ensure that their security training investments are functional, let alone that their disaster recovery plan is appropriate to their needs. Although monitoring threat and vulnerability feeds is important, it may not be enough to protect an organization. To improve a company, one must be willing to address the changing threat landscape head-on. Here are a few steps to follow to ensure an effective overall approach: Implement an inventory that regularly scans assets and quickly identifies vulnerabilities. Adapt a mitigation processes to prioritize and remediate vulnerabilities. Consolidate threat intelligence 5. Protect Beyond Your PII There is at least one malware in every 131 emails sent with approximately 230,000 new malware samples being produced on a daily basis. Most of these malware contained ransomware attacks and although people are well aware of the dangers of clicking on unknown links in an email, 78% of people still admitted to doing so. Ransomware attacks have increased by 36% in 2017 alone and are expected to rise even higher in the years to come. The world of cybercrime has advanced to an era of blackmail. Ransomware has become a major threat to privacy and personally identifiable information (PII) data as criminals not only encrypt the data, but also exfiltrate a copy of data from computer systems and mobile devices for use as blackmail. Criminals then use the information to collect a ransom in periodic installments. It is important for organizations to understand the value of employees’, customers’, and the company’s data and to devise ways to manage, track, monitor, and secure personal data interactions and transactions.

Read article
Global Cyber Security Experts participate in a Panel Discussion moderated by Jay Bavisi, CEO, EC-Council and Chairman of the Board, EC-Council University

The Global Conference on Cyber Space (GCCS) 2017, one of the world’s most prestigious conferences, held this year in New Delhi, India, attracted over 3,000 attendees from across the globe to learn from world leaders in cyber security. Attendees included industry and ministerial delegates and included Indian Prime Minister, the Honorable Narendra Modi, who inaugurated the conference. The GCCS event was held in accordance to his vision to transform India into a digitally empowered country. Prime Minister Modi highlighted the importance of cyber security in his speech, which is one of the key points of the GCCS 2017. “The global community needs to approach the issue of cyber-security with confidence, as much as with resolve. Cyberspace technologies must remain an enabler for our people. The quest for an open and accessible internet often leads to vulnerability.” The event revolved around the theme “Cyber4All” with four sub-themes, Cyber4InclusiveGrowth, Cyber4Digitalinclusion, Cyber4Security, and Cyber4Diplomacy. Mr. Jay Bavisi, CEO, EC-Council Group, and Chairman of the Board, EC-Council University, moderated the panel discussion on the topic “Cyber Behaviour: Best Practices for Netizen”, on November 24, 2017. The panel speakers included: Mrs. Aanchal Gupta, Director, Facebook; Mr. Arvind Gupta, Founder, Digital India Foundation; Dr. C. Mohan, IBM Almaden Research Center; Dr. Dorit Dor, Vice President, Check Point Software Technologies; Prof. Jeanne Holm, Chief Technical Officer, City of Los Angeles; and Mr. Richard David Spearman, Director, Vodafone. When asked to elaborate on the best practices that Facebook follows with regard to cybersecurity, Mrs. Aanchal Gupta discussed how Facebook celebrates Cyber Security Month every October. During October, Facebook security teams try to hack users using phishing e-mails and other attacks to test their employees’ cyber security awareness. The discussion also covered issues like quick ways to determine that technology is used and not abused; various trending and emerging cyber practices for large citizen engagement strategies; and the advancement in technology for a hygienic cyberspace. During the discussion, Jay Bavisi emphasized how “Compulsory cyber education from a very early stage (school level) is crucial as a foundation of cyber hygiene of a country.” About EC-Council EC-Council has been the world’s leading information security certification body since the launch of their flagship program, Certified Ethical Hacker (CEH), which created the ethical hacking industry in 2002. Since the launch of CEH, EC-Council has added industry-leading programs to their portfolio to cover all aspects of information security including EC-Council Certified Security Analyst (ECSA), Computer Hacking Forensics Investigator (CHFI), Certified Chief Information Security Officer (CCISO), among others. EC-Council Foundation, the non-profit branch of EC-Council, created Global CyberLympics, the world’s first global hacking competition. EC-Council Foundation also hosts a suite of conferences across the US and around the world including Hacker Halted, Global CISO Forum, TakeDownCon, and CISO Summit. For more information about EC-Council, please see https://staging-new.eccouncil.org.

Read article
EC-Council CEO, and Chairman of the Board, EC-Council University to Keynote FIRST Technical Colloquium 2017

EC-Council CEO, and Chairman of the Board, EC-Council University, Jay Bavisi, will be presenting the opening keynote at the Forum of Incident Response and Security Teams (FIRST) Technical Colloquium in Las Vegas, NV December 5-6. Jay Bavisi, CEO, EC-Council Group and Chairman of the Board, EC-Council University, will deliver the opening keynote address at the Forum of Incident Response and Security Teams (FIRST) Vegas Technical Colloquium, kicking off on December 5, 2017 at the Venetian Resort in Las Vegas, NV. Bavisi is expected to present on a key issue hindering the information security industry: the lack of testing models and useful certifications that verify real-world penetration testing skills. According to Jay Bavisi, “With the recent Equifax incident and the multitude of other data security breaches in recent years, the need for skilled, vetted penetration testers has increased for the world’s organizations.” However, there is an actual need for the continuous improvement of the measurement and validation of penetration testing skills so that the industry has a reliable pool of capable professionals to help defend their organizations from serious breaches. Bavisi’s talk will touch on the lessons learned from the development of the Licensed Penetration Tester (Master) practical exam by EC-Council in the development of the knowledge, skills, and abilities crucial for penetration testers. The LPT (Master) is the capstone to EC-Council’s certification track and brings together the knowledge and skills taught in other EC-Council programs. While the Certified Ethical Hacker Program (CEH) program teaches students the fundamental knowledge they need, the EC-Council Certified Security Analyst (ECSA) Program requires that candidates demonstrate the skills based on the penetration testing framework methodology. The LPT (Master) exam certifies that an individual has and can apply pen testing skills before being a Licensed Penetration Tester. The LPT (Master) certification is a part of EC-Council’s continuous effort to align the skills of penetration testers to the methods of an advanced attacker. The hands-on exam that students must pass to earn the certification offers a challenging environment previously unseen in the market. The exam simulates the complex network of a multinational organization and requires students to test its security before writing a full report. To successfully pass the LPT (Master), candidates are given 18 hours to demonstrate an advanced understanding of testing modern infrastructures. The exam is broken into three levels and each level amounts to six hours of methodical thinking to overcome three strategically planned challenges. After the completion of each level, a thorough report must be submitted to test professionalism, a skill that every organization requires. Candidates must complete the first level to progress to the next level, while a minimum of five challenges out of nine must be completed to become an LPT (Master). Level 1 focuses on Web Application Exploitation, level 2 on Network Level Exploitations, and level 3 is composed of OS Level Exploitations. Visit www.LPTMaster.com for more details. ABOUT FIRST Technical Colloquia & Symposia FIRST Technical Colloquia & Symposia provide a discussion forum for FIRST members (and non-members) and invited guests to share information about security operations, risk management, governance, legal and regulatory implications, vulnerabilities, incidents, tools, and all other issues that affect cybersecurity and incident response teams. The Las Vegas TC intends to have two major conference tracks running together in parallel. The presentations (including several panels) will cover a variety of subjects and industries. Both advanced and novice members of all cybersecurity and incident response teams are welcome to attend and strongly encouraged to submit presentations. About EC-Council EC-Council has been the world’s leading information security certification body since the launch of their flagship program, Certified Ethical Hacker (CEH), which created the ethical hacking industry in 2002. Since the launch of CEH, EC-Council has added industry-leading programs to their portfolio to cover all aspects of information security including EC-Council Certified Security Analyst (ECSA), Computer Hacking Forensics Investigator (CHFI), Certified Chief Information Security Officer (CCISO), among others. EC-Council Foundation, the non-profit branch of EC-Council, created Global CyberLympics, the world’s first global hacking competition. EC-Council Foundation also hosts a suite of conferences across the US and around the world including Hacker Halted, Global CISO Forum, TakeDownCon, and CISO Summit. For more information about EC-Council, please see https://staging-new.eccouncil.org.

Read article
DNeX, the multi-million-dollar technology giant, acquires the exclusive rights to offer EC-Council Global Services (EGS) cyber security services in Malaysia

In a landmark deal, Dagang NeXchange Bhd (DNeX) has through its wholly-owned subsidiary, DNeX Technology Sdn Bhd., signed an exclusive brand license agreement with EC-Council International Ltd to provide consultancy and advisory services based on the delivery model, methodology, and brand of EGS. EC-Council Global Services (EGS), the consulting arm of EC-Council group, recently signed an exclusive brand license agreement with DNeX Technologies, a publicly traded Kuala Lumpur based technology company. The agreement will allow, to provide consultancy and advisory services based on the delivery model, methodology, and brand of EGS. The RM 900 million-valued Dagang NeXchange Bhd, which has interest in oil and gas, power, and technology, is one of the prominent names in Malaysia. As of January 2, 11:37 AM, shares in DNeX were up 3 sen or 6.91% at 51.5 sen, giving it a market capitalization of RM912.79 million. The deal (and the applause from investors of DNeX) proves that the brand of EC-Council has power beyond the cybersecurity certification market and can compete globally in the consultancy industry. The an exclusive brand license agreement with EGS is to provide consultancy and advisory services based on the delivery model, methodology, and brand of EGS. EGS is a division of EC-Council that offers comprehensive services using a four-phased methodology to assess, block, correct, and defend the cyber security of its clients. DNeX Executive Deputy Chairman Datuk Samsul Husin said in a statement today “We are pleased to be working together with EC-Council to provide top notch cyber security consultancy and advisory in an increasingly growing market in the country.” The agreement will give DNeX access to EC-Council’s methodologies, enabling it to learn from cyber security implementation in key global economies. “With this licensing deal, DNeX will offer the holistic approach to cyber security of EGS and develop a cyber security framework that helps in identification, protection, detection, response, and recovery to cyber threats to clients in Malaysia,” said Jay Bavisi, group president of EC-Council. The positive response to the deal not only underlines the potential EC-Council has in other markets, but also indicates an increasingly positive attitude markets have towards the importance of cybersecurity. This turnaround is especially important in Malaysia, which experienced a leak of 46 million mobile users’ data, some leading to the creation of fraudulent profiles to make online purchases back in Oct 2017. Media Coverage: https://www.theedgemarkets.com/article/dnex-acquires-rights-offer-eccouncil-global-services-cyber-security-services-malaysia https://www.thestar.com.my/business/business-news/2018/01/03/dnex-shares-warrants-actively-traded/ https://www.theedgemarkets.com/article/dnex-offer-eccouncil-cybersecurity-services-malaysia https://www.utusan.com.my/bisnes/ekonomi/dnex-ec-council-kerjasama-tingkat-keselamatan-siber-1.583606 https://www.theedgemarkets.com/article/mpcorp-t7-global-mb-world-dnex-rhone-ma-mct-dnonce-bmedia-paramount-alcom-and-prestariang

Read article
Western Nevada College Joins Forces with EC-Council to Transform Cybersecurity in Northern Nevada

Western Nevada College (WNC) has joined forces with the International Council of E-Commerce Consultants (EC-Council) to strengthen the cybersecurity community in Northern Nevada by implementing the EC-Council | Academia series. EC-Council’s Academic channel supports the most prestigious colleges and universities throughout the US and around the world with the most robust cybersecurity programs and offerings. More corporations, individuals, and governments are experiencing cyber-attacks worldwide, boosting high salary career opportunities and demand for skilled professionals. This prompted the college to integrate EC-Council’s certification courses, including: Certified Network Defender (CND), Certified Ethical Hacker (CEH), and Computer Hacking Forensics Investigator (CHFI) into their program. The WNC Cybersecurity degree track now incorporates industry-recognized, stackable credentials, preparing students for both degree completion and to join the workforce post-graduation. EC-Council’s job-focused certifications are known as the most challenging in the industry and they map to the widely recognized National Initiative for Cybersecurity Education (NICE) framework. “We are very excited to partner with Western Nevada College and play a role in strengthening the cybersecurity community in Northern Nevada. Combating the growing cybersecurity threat landscape often starts with higher education communities developing skilled professionals who are ready to make an impact and start their careers. We are confident our partnership with Western Nevada College will highly impact the local community in Northern Nevada” said Wesley Alvarez, Director of Academics, U.S. Anthem, Equifax, Home Depot, and Target are just some of the corporations violated by hackers in recent years, receiving negative press while compromising consumers’ social security, driver’s license, and credit card numbers, as well as other personal information such as birthdates and addresses. Now more than ever there is a need for businesses to protect their customers. That protection comes from information and technology professionals trained in hands-on, tactical cybersecurity. WNC will be able to fill that need in Northern Nevada with plans to launch a robust cybersecurity program using the EC-Council | Academia series. “As we become more technologically bound, securing and defending the critical infrastructure of IT becomes of primary significance,” said Dave Riske, a Computer Information Technology/CISCO Technology/IS instructor at WNC. “Western Nevada College IT Advisory Board members have identified the need for instilling a security mindset in technical employees. Board members have expressed concerns from businesses throughout Nevada.” Through this partnership, Western Nevada College will become the first college in Northern Nevada to offer tactical cybersecurity training and education, helping bridge the wide skill-gap in the area and give their students an added advantage over others in the region. “The goal of this project is to prepare IT professionals for applied security positions able to effect change in their networked computer environment and services,” Riske said. “Current training opportunities in the Northern Nevada area for these skills rely on ‘boot camp’-style training seminars provided by commercial organizations. These training camps are often far more expensive than a college course and focus primarily on certification and less on acquisition of skills and knowledge. By offering an industry-sanctioned curriculum leading to industry certifications recognized by the National Security Agency and the Department of Defense, as well as meeting the Committee on National Security Systems training standards, WNC will be providing a vital training opportunity to today’s IT workforce. This makes EC-Council an ideal partner, providing reputation, longevity, currency and relevance in the Cybersecurity/Information Assurance field,” Riske says. Students who complete this proposed program will be prepared to work in the industry as computer user support specialists, computer network support specialists, forensics analysts, security analysts, network defenders, computer repairers, and many more positions, all priority STEM occupations. Currently, WNC offers Information Technology training leading to IT industry certification opportunities with Cisco, Microsoft, TestOut, Linux Professional Institute, and the Project Management Institute, many of which are on the Nevada Eligible Industry Credentialing List as provided by Office of Workforce Innovation for a New Nevada. These certification opportunities prepare students to demonstrate competence in numerous technical areas. These existing courses and certification programs will provide the foundational background to ensure students are prepared for advanced certifications in cybersecurity and information assurance. Individuals interested in studying cybersecurity at WNC may contact Riske at [email protected]. About WNC Western Nevada College is a comprehensive community college that serves more than 5,000 students each year within a five-county area, spanning more than 10,000 square miles. Since 1971, Western Nevada College has helped students embark on the road to success by preparing them for a variety of careers through associate and bachelor degrees, industry certifications and workforce training. WNC offers exemplary academics, small classes, affordability and student satisfaction. Many Western grads become leaders in their communities and excel in their professions. With campuses in Carson City, Minden, and Fallon, and multiple online degrees and classes, Western is able to meet many students’ needs, whether they are residing in remote parts of Nevada or trying to fit in their education while balancing their commitments to work and family. For more information visit https://www.wnc.edu/. About EC-Council EC-Council has been the world’s leading information security certification body since 2002. EC-Council is a member-based organization that certifies individuals with various information security and e-business skills. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), EC-Council Certified Security Analyst (ECSA), and Licensed Penetration Tester (LPT) programs, and as well as many others programs. EC-Council Foundation, the nonprofit branch of EC-Council, created Global CyberLympics, the world’s first global hacking competition. For more information, https://staging-new.eccouncil.org/academia.

Read article