Category

EC-Council in News

EC-Council Helps Promote a European Vision of Cybersecurity at 10th Edition of the Forum International of the Cybersecurity

The 10th-anniversary edition of the Forum International of the Cybersecurity (FIC) was hosted on January 23rd and 24th at the Lille Grand Palais, France, where EC-Council participated as the sponsor and official partner at the event for the 6th consecutive time. EC-Council presented its main training and certifications, showing the strength of its network by creating a map covering Europe and Africa.The FIC is part of a process of reflection and exchange aimed at promoting a European vision of cybersecurity. It focuses on breaking down cybersecurity issues by bringing together cybersecurity influencers, accelerating the development of the European cybersecurity market, fostering innovation in digital trust, and building an inclusive approach to cybersecurity in organizational transformation among others. According to the FIC, the world is now entering an era of hyper-connection where machines and individuals are constantly connected and communicating with one another. This brings about an exposure to various vulnerabilities (often mimicking a domino effect), which leads to the question of resilience. EC-Council shared its booth with two other partners at the event—Sysdream and ESAIP. Fifteen other partners, also participating in the event,  demonstrated their exclusive EC-Council partner status through the prestigious ”EC-Council Training Partner” sticker displayed at their booths. As a part of the event, EC-Council partnered and sponsored the Ethical Hacking challenge, which was covered by a French journalist, Damien Bancal, who specializes in IT security. The winners of the challenge were awarded by Claire Kemp, IT-Gnosis CEO and representative of EC-Council, with the CEH training offered by EC-Council in collaboration with Sysdream. The event was also attended by several global leaders, including: Mr. Gerard Collomb, Minister of the Interior; Mrs. Florence Parly, Minister of the Armed Forces; Mr. Mounir Mahjoubi, Minister of State for the Digital Sector; and Mr. Richard Lizurey, General Director of the National Gendarmerie. The conferences, talks, master classes, technical demonstrations, and workshops promoted the theme of the event—Hyper-connection: the Resilience Challenge. Some other topics discussed during the event included: “GDPR: A Few Weeks before Deployment, are the Companies Ready?”; “Cyber Threat Intelligence: What Is Its Real Added Value?”; “How to Secure the Public Cloud? The Answer In 10 Recommendations”; “Warfare And Hacking Democracy Information”; and “Cloud And Encryption: Friends Or Foes?” As the official European EC-Council representative, IT-Gnosis is ready to contribute to the 11th edition of the FIC! About the Forum International of the Cybersecurity The International Cybersecurity Forum is a platform promoting a pan-European vision of cybersecurity, as well as a way to strengthen the fight against cybercrime. In order to do so, it depends upon the trade show’s ability to share knowledge and ideas, recruit new employees and maintain contacts. As well, it depends on the forum to discuss and debate with experts, to gather ideas, and to share professional lessons. As well, the observatory is important in order to continue exchanging views and information after the FIC, to explore topics in greater depth, and to consolidate our network of experts and like-minded individuals throughout the year. For more information visit https://www.forum-fic.com/. About EC-Council EC-Council has been the world’s leading information security certification body since 2002. EC-Council is a member-based organization that certifies individuals with various information security and e-business skills. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), EC-Council Certified Security Analyst (ECSA), and Licensed Penetration Tester (LPT) programs, as well as many others programs. EC-Council Foundation, the nonprofit branch of EC-Council, created Global CyberLympics, the world’s first global hacking competition. For more information, visit https://staging-new.eccouncil.org/.

Read article
Vincennes University Selects EC-Council to Raise Cyber Awareness for Indiana High School Students and Offer College Credit Advances.

Vincennes University’s plan to reduce the risk of cyber-threats to Hoosiers and help strengthen the mission of the Indiana Information Sharing and Analysis Center (IN-ISAC)  will soon become a reality after they selected EC-Council, a world leader in cyber security training and certification to accomplish this mission. Certified Secure Computer User (CSCU), an end-user security course by EC-Council, will be introduced to  secondary-education levels in Indiana via high school students enrolled in VU’s dual credit programs, Project Excel and Early College. In the Fall of 2018, Vincennes University will include the CSCU certification course within Introduction to Computer Concepts (COMP110), a 3-credit-hour course within the Core Transfer Library (CTL) for the state of Indiana. VU is gearing up for this by certifying faculty in CSCU at 12 surrounding high schools in the state of Indiana. VU has also recently launched EC-Council’s globally recognized Certified Ethical Hacker (CEH) certification in their Bachelor’s in Technology degree program, which has a concentration in Information Technology, and their Bachelor’s in Homeland Security degree, which has a concentration in Cybersecurity and Information Technology. Leading these initiatives is Jaci Lee Lederman, a Certified EC-Council Instructor and chair of the Department of Information Technology at VU, and Wesley Alvarez, Director of Academics for the U.S. Academic Division at EC-Council. “Providing high school students access to the CSCU course and certification will expedite the cyber-secure education needed by our future workforce. Cyber-secure work habits can start in high school. After piloting the CSCU course on the VU campus, I see merit in experienced IT students and professionals taking the course. The course is a resource that can help IT students and professionals alike understand what everyday computer users need to know. In the effort to configure the next best system to thwart cybercrime, organizations might overlook educating end users about secure computing,” says Lederman. The purpose of the CSCU course and certification to this three-hundred-year-old organization is to provide individuals with the necessary knowledge and skills to protect their information assets. The skills learned from this course includes identity theft, fraud, phishing scams, virus and backdoors, email hoaxes, online sex offenders, hacking attacks, and social engineering. This will help students take the necessary steps to mitigate their security exposure. After the course, students will also be eligible to attempt the CSCU certification exam and achieve an industry-recognized certification before they graduate high school. “This course highlights the actions we take unknowingly every day on our computer that could put us at risk of losing data as a result of a cyber-attack. As an IT professional, I understand that protecting an organization’s infrastructure is the top priority of any Information Technology department. However, setting up systems to protect an organization’s digital assets is only one part of the effort. The human factor should not be ignored. The everyday computer user must be educated on cybersecurity so that he or she can contribute to the organization’s security efforts,” Lederman said. About Vincennes University VU offers a baccalaureate degree in Technology, including a concentration in Information Technology and in Homeland Security, which comprises a concentration in Cybersecurity and Information Technology. Associate degrees include Information Technology, IT Support and Cyber Security, Computer Programming, Web Design, and Game Development, as well as Law Enforcement, Conservation Law, and Legal Studies. Details are available by contacting Jaci Lederman at [email protected]. More information is available at www.vinu.edu/information-technology and www.vinu.edu/dualcredit. About EC-Council EC-Council has been the world’s leading information security certification body since 2002. EC-Council is a member-based organization that certifies individuals with various information security and e-business skills. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), EC-Council Certified Security Analyst (ECSA), and Licensed Penetration Tester (LPT) programs, as well as many others programs. EC-Council Foundation, the nonprofit branch of EC-Council, created Global CyberLympics, the world’s first global hacking competition. For more information, visit https://staging-new.eccouncil.org/academia.

Read article
EC-Council to train numerous skilled IT professionals from The Netherlands in Cybersecurity in partnership with Vijfhart IT Opleidingen, a leading Dutch IT educator

Summary: Vijfhart IT Opleidingen and EC-Council join hands to provide world-class Cybersecurity training to aspiring and current cybersecurity professionals in the Netherlands With the shortage of Cybersecurity professionals rapidly rising across the globe, EC-Council partenered with Vijfhart IT Opleidingen, one of the Top 5 IT educators in the Netherlands to provide world-class training to aspiring and current cybersecurity professionals— in an online self-paced format, to cater to the busy schedules of these IT professionals. While the need for certified and skilled Cybersecurity professionals is increasing, on the other hand, IT professionals find it difficult to commit disciplined time in a day owing to their pressurizing billable hours at their existing jobs. Vijfhart IT Opleidingen believes that the iLearn stream of learning (EC-Council’s renowned online self-paced training format), combined with practical workshops will be the ultimate solution to this problem. Says Bastiaan Janssen, CEO of Vijfhart IT Opleidingen, “Because of the digital transformation, every company today has become an IT company and with the fast rise of cybersecurity threats, every IT company of today has to be ready for the problems it may face tomorrow. This necessitates that organizations need to put more time and energy into cybersecurity knowledge. Especially because there is already a huge knowledge shortage in the IT and cybersecurity domain.’ Traditionally, Vijfhart IT Opleidingen offers training at various locations in Nieuwegein and Zwolle and with partners. In recent years, the company has invested in offering blended learning— a combination of classroom and digital teaching. In this phenomenal partnership with EC-Council, Vijfhart IT Opleidingen has gone one step ahead to provide entirely online self-paced learning solutions for their students of cybersecurity education. The biggest IT companies in The Netherlands are now focussing more on security, both internally and as a service. This cooperation between EC-Council and Vijfhart is opportune and is a new and exciting step towards an essential broadening of the courses available in The Netherlands. EC-Council’s iLearn format plays an essential role here because of its self-paced format. This format implies that once an eligible user signs-up for a course, he/she has 1 year to complete the course contents and take the necessary examination to secure their certification. The beauty here is that they can manage their time at their own convenience and draft their own strategy to make optimal use of their courseware. In the iLearn package, a user is also provided with iLabs, online simulation that accustoms a user to what a real world cyberattack may look like to prepare them against all odds. Thereby making their learning as practical as possible. Ever since its inception in 2001, EC-Council has single-mindedly focussed on delivering quality courseware to its students and the fact that EC-Council Certified Ethical Hacker is one of the most sought-after courses in the world for kickstarting a career in Cybersecurity is evidence enough of that. They have always endeavoured to be present and ready whenever any organization, military, civilian government body or a Country feels the need to upgrade their cybersecurity skills. The Cybersecurity Assessment Netherlands 2017, stated that “The sense of urgency to invest in cybersecurity is growing in the Dutch society. Nevertheless, we must continue to invest in knowledge and expertise to stay at the top level. That’s why we talk to businesses, education, and representatives from critical infrastructures. We need to work together to keep the Netherlands digitally safe and secure. This cybersecurity assessment confirms that everybody’s cooperation is needed to keep the fast digitizing world safe and secure. Companies, for example, by reserving funds to keep their networks safe and Dutch citizens by purchasing digital secure items.” While the sentiments from Vijfhart can be described as nothing less than excited and optimistic, with the senior management at EC-Council sharing the same enthusiasm. “We’re glad that Vijfhart IT Opleidingen is now authorized to offer globally renowned EC-Council certification courses. We see incredible potential in our partnership, especially with the 35-year-old strong presence that Vijfhart demonstrates in The Netherlands. As organizations, we both believe in spreading education, attaining growth, and caring for our fellow men. With these shared values firmly grounded in our systems, we foresee a host of cybersecurity professionals in the Netherlands, protecting their organizations, the government, and the citizens of this great Nation”, says Jay Bavisi, CEO, EC-Council Group and Chairman of the Board, EC-Council University. With a reach of over 4,000 customers, who are initially intended to be the benefactors of this partnership, EC-Council and Vijfhart are set to take the cybersecurity training industry in the Netherlands by storm. About Vijfhart IT OpleidingenVijfhart was founded in 1984 by Eef Janssen under the motto ‘Do it differently’. Their mission surrounds the Dutch IT training market and focuses on obtaining the best of people, ensuring maximum performance. They offer a familiar working environment where people can develop their talents. Vijfhart offers training for both the IT professional and the IT end user. The wide range ranges from training in software development, big data, business intelligence, cloud computing, and IT security to privacy, project management and methodologies such as agile, Itil, and Togaf. The head office of Vijfhart IT Opleidingen is currently located in Velp (near Arnhem). About EC-CouncilEC-Council has been the world’s leading information security certification body since the launch of their flagship program, Certified Ethical Hacker (CEH), which created the ethical hacking industry in 2002. Since the launch of CEH, EC-Council has added industry-leading programs to their portfolio to cover all aspects of information security including EC-Council Certified Security Analyst (ECSA), Computer Hacking Forensics Investigator (CHFI), Certified Chief Information Security Officer (CCISO), among others. EC-Council Foundation, the nonprofit branch of EC-Council, created Global CyberLympics, the world’s first global hacking competition. EC-Council Foundation also hosts a suite of conferences across the US and around the world including Hacker Halted, Global CISO Forum, TakeDownCon, and CISO Summit.

Read article
“Jewel in the Crown” of Central Europe – Prague Now More Secure with QuBit Cybersecurity Conference & EC-Council

The biggest conference in Central Europe, the Qubit Cybersecurity Conference, strives to bring the latest information from the Western world to the cyber community of Central Europe and to help spread the importance of security, as Internet and IT tools are now accessible to more than 2 billion people worldwide. It should not come as a surprise that EC-Council, the world’s leading cybersecurity training company, would be a part of it. The Qubit Cybersecurity Conference is scheduled on April 18th and 19th at the Hotel International in Prague. It will be a global event that you do not want to miss. Partnering as their training and media partner, EC-Council’s CCISO certification workshop will be held after the event on May 15th– 18th under the tutelage of a world-class EC-Council licensed trainer. EC-Council and the Qubit conference share a common mission: the creation of a quality environment for sharing education and knowledge within the cybersecurity community. Participants can now develop their career as a top cybersecurity professional by following carefully selected speakers (renowned for their knowledge and expertise), experiencing a conference designed to host case studies and real-life experiences, networking with the who’s who of the cybersecurity industry, and, based on eligibility, enrolling for EC-Council’s ANSI-accredited CCISO certification. This event will be attended by top security professionals, CISOs, CXOs, risk managers, risk and compliance consultants, network managers, e-discovery practitioners, lawyers, and leading IT/IT security personnel who command respect globally. The Qubit conference is a unique way of interacting with the best minds in information security across multiple industries and all career levels. “Qubit Conference, already in its fifth year, creates a unique way to meet the best and the brightest minds in the information security fields across multiple industries and all career levels. EC-Council is recognized worldwide and has received endorsements from various government agencies. These two facts are encouraging us to join this strategic partnership in order to contribute even more in the current state of cybersecurity development in the Central and Eastern European region,” says Maria Kalicakova, CEO, Qubit Cybersecurity Conference. The targeted audience for this conference comes from both government and corporate sectors. We provide them with an opportunity to present their insights and advances in cybersecurity. The Qubit conference acts as one of leading educational conferences in cybersecurity. Alumni of EC-Council who have enrolled for the ECE (EC-Council Continuing Education) program are eligible to claim ECE points for attending the Qubit conference; however, the credits are upon request. Attending a conference is one of the most effective ways of educating oneself, promoting one’s company, meeting new partners, and enjoying the vast and varied landscape of like-minded intellectuals who are willing to enjoy, network, and learn at the same time. This year’s venue couldn’t be any better. Prague, a city touted as the “city of a hundred spires” or “the golden city,” always ranks high on travel lists, regardless of whether you’re from Europe or around the globe. About Qubit Conference: The Qubit Cybersecurity Conference strives to bring the latest information to the cyber community of Central Europe from the Western world and to help spread the importance of security, as Internet and IT tools are now accessible to more than 2 billion people worldwide. The Qubit conference creates a unique way to meet the best and the brightest minds in information security across multiple industries and all career levels. Connect with the Qubit conference today and explore the latest innovations and ideas that are influencing the future. About EC-Council: EC-Council has been the world’s leading information security certification body since the launch of their flagship program, Certified Ethical Hacker (CEH), which created the ethical hacking industry in 2002. Since the launch of CEH, EC-Council has added industry-leading programs to their portfolio to cover all aspects of information security including EC-Council Certified Security Analyst (ECSA), Computer Hacking Forensics Investigator (CHFI), Certified Chief Information Security Officer (CCISO), among others. EC-Council Foundation, the non-profit branch of EC-Council, created Global CyberLympics, the world’s first global hacking competition. EC-Council Foundation also hosts a suite of conferences across the U.S. and around the world including Hacker Halted, Global CISO Forum, TakeDownCon, and CISO Summit. For more information about EC-Council, please see https://staging-new.eccouncil.org. About the CCISO Program: The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. A CCISO-certified individual is trained in 5 domains of governance: Security Risk Management, Controls & Audit Management, Security Program Management & Operations, Information Security Core Concepts, and Strategic Planning, Finance & Vendor Management.

Read article
CEH at Gobierno de Aragón

INAEM (Instituto Aragonés de Empleo) – EC-Council partner in Spain EC-Council is proud to announce a partnership with El Centro de Tecnologías Avanzadas de Zaragoza, a public training center in Zaragoza, Spain. The center specializes in ICT, with more than 10,000 inscriptions per year and 2,500 students in official ICT Training from the most relevant IT vendors on the market. The results of these trainings are overwhelmingly positive with job placement rates above 85% in six months and satisfaction rates above 9 out of 10 on average. While cybersecurity is a discipline that has been part of many of the center’s programs, with EC Council as a partner, the Certified Ethical Hacker (CEH) and Computer Hacking Forensic Investigator (CHFI) programs will be their first offerings to focus solely on cybersecurity. CEH and CHFI are two of the programs most in-demand on the market, and will help their students find jobs at even higher rates. Students in the two new classes will be capable of identifying, detecting, preventing, and solving the vulnerabilities of different systems and be prepared for a job in cybersecurity. Feedback from students so far has been great: “The thing I liked the most has been the possibility to be in contact with Ethical Hacking specialized professionals. To be able to listen their experiences, advice, and knowledge help in order to apply the course content to the real world. The labs with real examples are really useful too. “ “For me the most valuable thing is the EC-Council certification and the depth and breadth of the content.”

Read article
12 Data Protection Tips for Businesses and Individuals

With cyber-attacks becoming more oriented toward data theft, it is vital for both businesses and individuals to take extra precautionary methods when it comes to data protection. In order to raise awareness about data protection, the Council of Europe initiated the European Data Protection Day in 2007. In 2009, the United States House of Representatives also recognized this day as National Data Privacy Day or Data Protection Day. With 2017 playing host to some of the biggest data breaches, it has become clear that not only are attacks increasing in number (ransomware rising 2,502% in 2017), they are also becoming more potent. Personal data shared on online portals or saved on devices can include home addresses, bank details, social security numbers, passwords, and other sensitive information that can be used by malicious attackers. Here are a few data protection tips to help spread awareness and create a safe cyberspace: Data Protection Tips for Businesses: With new threats emerging and pressure being placed on organizations and businesses by governments through laws like the EU GDPR, it is time for board members, information security executives, and all employees to adopt certain measures to protect personally identifiable information (PII). Update Your Systems and Software: Stay up to date with the latest operating system and additional software updates. Encryption: Encrypt confidential information shared by employees, partners, and customers. Password Creation: Enforce strong password usage, with a regular change in passwords every few months. No External Connections: Avoid using USBs and other external devices on your office system, which can implement the transfer of data from one device to the other. This also includes using USB portals to charge mobile phones and other electronic devices. Data Backup and Recovery: Consult your information security executives to ensure that you have a strong data backup and recovery procedure that is constantly updated. Abide by the Law: Make an effort to find out the requirements of your local legislation and ensure that your technologies and policies are in alignment with them. Data Protection Tips for Individuals: Families and individuals could also fall prey to malicious cyber-attacks like phishing emails, social engineering, and social media threats. A single click on a link sent by a cyber-criminal could lead to loss of sensitive data or identity theft. Here are a few ways to stay cyber safe: Avoid Unknown Links: Never click on unknown links, even if the email sender or website does not look suspicious to you. Create Different Passwords: Use strong and different passwords on your accounts. It is a common practice to use the same password on various accounts, making it easy for a cyber-criminal to gain access to not just one account, but many. Don’t Share or Store PII: Never store your personal information in your email account or share PII via email, messages, or online applications. Read the Fine Print: Always read the fine print before giving out personal information to any website, especially while making online purchases. Avoid Unnecessary Access: Monitor access given to various applications on your mobile phone before installing it onto your device. Online Precautions: Avoid sharing any personal information on social networking platforms, including your location and email addresses. Cybersecurity training programs––like the Certified Secure Computer User (CSCU) program by EC-Council––will help you gain the necessary knowledge and skills to protect your data assets. This course will help you and your organization’s employees learn the skills necessary to avoid and tackle computer and network security threats such as credit card fraud, virus and backdoors, phishing attacks, hacking attacks, and social engineering. Sources: https://www.carbonblack.com/2017/12/20/carbon-black-2017-threat-report-non-malware-attacks-ransomware-continue-spotlight/

Read article
6 Skills Top Companies Look For When Hiring a Chief Networking Officer

Cyber defense has become very important to organizations of all sizes as cyber breaches can lead to reputational damage and massive financial and data losses. Despite updating programs and cybersecurity strategies, organizations are still falling victim to cybercriminals. To ensure the safety of an organization’s assets, companies must hire trained network defenders who will protect, detect, and respond to the many threats facing the modern business. However, getting a job in networking requires technical and soft skill development in various fields. It is accepted throughout the industry that all network defenders must have a comprehensive understanding of network components like Network Interface Card (NIC), switches, routers, and gateways, as well as the networking basics of TCP/IP, but what other ways are there to help you grow in your career? Here are a few skills that will help you score that interview: 1. Security Threat Analysis It is important for a network defender to know what the different types of network security threats are, how they arise, how they affect organizations, and how to prevent them from compromising a network. By analyzing breaches from the past, a network defender will be able to anticipate certain vulnerabilities that the organization might face if preventative measures are not taken. Understanding the methodology and functions of password attacks, man-in-the-middle attacks, privilege escalation, Distributed Denial of Service (DDoS) attacks, and malware attacks like Trojans, ransomware, spyware, and botnets allows the network defender to provide protection to secure an organization’s data assets. Understanding all possible threats to an organization also gives a better idea of what to look for when scanning for vulnerabilities. 2. Networking Controls and Protocols Network defenders understand the importance of network access controls (NAC) solutions and protocols as well as the access control system which includes administrative, technical, and physical controls. 3. Authentication, Authorization, and Encryption Network defenders often work with Internet Service Providers (ISPs) which require safe, usable connections. Using authentication techniques like the two-factor authentication, password authentication, and smart card authentication ensures that data belonging to an individual is not easily compromised by a third individual. Encryption transforms data so that an unauthorized individual cannot read the transferred data without a decryption key. 4. Operating System (OS) Security Protocols Understanding one or more operating systems such as Windows, Linux, or Mac OS is essential for every network defender. Superficial knowledge is not enough when it comes to operating systems. Knowing how to design, install, configure, maintain, and troubleshoot server installations plays a major role when it comes to network defense. 5. Data Backup and Recovery Managing and optimizing the use of servers while implementing data backups to ensure that there is no loss of any important information is an important part of network defense in today’s world. Malware attacks like ransomware often result in the loss of data or a huge financial payout. Proper backup and recovery will help avoid either situation in the case of a breach. 6. Specialty Skills Certain employers demand extra skills like switching and routing, Storage Area Networking (SAN) skills, switches and firewall installation skills, wireless management, Virtual Private Network (VPN) configuration and management, and Intrusion Detection System (IDS) management and configuration. Having knowledge on these subjects will allow you to grow in your career. With the current job growth for networking officers, it is the perfect time to become a network defender. There are many network security courses on the market, one of which is EC-Council’s Certified Network Defender (CND) Certification program. Through the Certified Network Defender (CND) course, students have the opportunity to learn network security technologies and operations and gain hands-on skills that will provide them with expertise applicable in the real world. Learn more about why you should take EC-Council’s course.

Read article
5 Reasons the Certified Network Defender (CND) Certification Is Not an Ordinary Program

Cyber defense has become the focus of smart organizations everywhere as they try to ward off the financial and reputational damage that modern hacks can cause. Cyber breaches have increased 1,370% over the past 10 years despite an industry’s worth of best efforts to stay ahead of cyber criminals. In fact, many organizations are still struggling to implement many of the basics of information security. According to the 2017 Trustwave Global Security Report, it takes an average of 65 days for an organization to detect a breach. Organizations, as a part of their security strategy, should hire certified network engineers who can protect, detect, and respond to threats on their network. Organizations have a better chance at protecting themselves from malicious outsider and insider attacks with the help of a cyber network defender. Stocked with the right set of skills and competencies, a defensive network administrator will be able to give an organization a better chance at protecting themselves. A network administrator plays a vital role in an organization’s cybersecurity as they are the first line of defense against a cyber-attack. Their role revolves around the maintenance of a system’s infrastructure, with an emphasis on networking. They are well acquainted with network components, network topology, security policies, network traffic, network performance, and many more. Testing the network for weaknesses, installing security programs, evaluating the implemented network, and monitoring the network for new updates are just a part of what they do. Through the Certified Network Defender (CND) course, students have the opportunity to learn network security technologies and operations and gain hands-on skills that will provide them with expertise applicable in the real world. The full course comprises the courseware, access to EC-Council’s hands-on iLab environment, 10GB of resources outlining the best practices in network security, assessments, protection tools, and access to many whitepapers. The CND program focuses on: Network security controls Protocols Devices IDS/IPS technologies, tuning, and configurations Performing risk assessments, vulnerability assessments, and scanning and generating subsequent reports Firewall solutions Network topology Many other necessary skills to become a successful certified cyber network defender.

Read article
EC-Council hosted high-profile speakers and attendees at Cloud Con 2017 in Bengaluru, India

Because of the growing adoption and security concerns around cloud technologies, EC Council presented the CLOUD CON 2017 on October 30, 2017 in Bengaluru, India. The conference brought together experts from India and abroad for keynote sessions, panel discussions, and technical presentations on the future and risks associated with cloud innovation and security. With a focus on cloud computing and its potential to transform businesses, Cloud Con 2017 focused on the most pressing security concerns in the wide-spread adoption of cloud technology. Mr. J A Chowdary, IT Advisor and Special Secretary to the Chief Minister, Government of Andhra Pradesh, delivered the opening keynote address which touched on how Andhra Pradesh is aspiring to be the first state in India to move from “Real Time Government to Real Time Governance.” Craig Lim, Head Cloud Security- Asia, Check Point Software Technologies, in his presentation said that “Cloud security should be an enabler, not a hurdle to the adoption of cloud” which was echoed across many other presentations as well throughout the day. Bhavesh Kumar, Head of Engineering & Technology – Data Platform & Analytics, Tesco; lead a panel that covered a mix of areas including IoT and data analytics and their use in a variety of industries including banking, retail, and finance. The panel even spoke about how rural India has been dealing with these challenges. The list of esteemed guests and speakers included luminaries in the cloud security community, including Anshul Srivastav, Chief Information and Digital Officer Union Insurance, UAE; presenting his talk entitled “Reengineer your business with cloud” to a packed room. His presentation was followed by an exemplary session by Winny Patro, Director, APITA, Information Technology, Electronics & communications Department – Government of Andhra Pradesh; speaking about the collaborative ecosystem of cloud computing. Other esteemed speakers included Soo Kiat TEE, Director of Sales Engineering, Asia Pacific & Japan; Gaurav Agarwal, Managing Director, India & SAARC, Symantec; Sudin Baraokar, Head Innovation, State Bank of India; and Suresh Shan, Head of Innovation & Future Technologies, Mahindra Finance. Their talks emphasized the maturity and future of cloud security in India and the global IT industry. The closing panel discussion lead by veteran Sunil Varkey concluded that trust and assurance is the foundation for a sustainable digital economy. Leading cyber security and cloud solution providers like Check Point Software Technologies, Rapid7, Symantec, Qualys, Inc., Fire Compass, Aujas Networks, Grant Thornton India, and The Achilles also partnered with the summit and showcased their latest technologies and solutions to the audience. The end of Cloud Con Summit 2017 also marked the start of the countdown for the second edition of the Fintech Security Summit 2017. The Summit’s theme is “NextGen Cyber Security For Finnovation” and it will be held in Abu Dhabi on December 7, 2017. About EC-Council EC-Council has been the world’s leading information security certification body since the launch of their flagship program, Certified Ethical Hacker (CEH), which created the ethical hacking industry in 2002. Since the launch of CEH, EC-Council has added industry-leading programs to their portfolio to cover all aspects of information security including EC-Council Certified Security Analyst (ECSA), Computer Hacking Forensics Investigator (CHFI), Certified Chief Information Security Officer (CCISO), among others. EC-Council Foundation, the non-profit branch of EC-Council, created Global CyberLympics, the world’s first global hacking competition. EC-Council Foundation also hosts a suite of conferences across the US and around the world including Hacker Halted, Global CISO Forum, TakeDownCon, and CISO Summit. For more information about EC-Council, please see https://staging-new.eccouncil.org.

Read article
EC-Council Lights the Flame of a Cyber Safe Tomorrow with TEK-UP University in Tunisia

Many developing countries have adopted digital technologies, making cyber security a major concern. However, developing countries don’t always have the workforce to effectively protect large infrastructures as technology is rapidly adopted. To counter the threat of a cyber-attack, qualified cybersecurity professionals are more important than ever. Global job predictions suggest the same, as experts predict a shortage of two million cyber security professionals by 2019. Following major cyber threats in the country, Tunisia was one of the first African countries to adopt cyber security as a part of a government sponsored institution in 2004. This partnership gives Tunisia the chance to develop the necessary skills in cybersecurity at the grassroot level, thereby ensuring that cybersecurity skills gain a prominent role in a vulnerable region, while providing TEK-UP a competitive approach over other institutes. Tunisia is an example of a developing country that has strong and well defined cyber laws but the problem of a qualified workforce still exists. EC-Council recently announced a newly formed partnership with TEK-UP University in Tunisia to provide their students with the opportunity to learn ethical hacking – a skill that is fundamental to information security. EC-Council courses will primarily be taught via EC-Council’s online learning solution called iLearn. A TEK-UP university spokesperson stated, “We believe that a partnership with EC-Council will not only help Tunisian students to gain the required skills and to have technical depth, but it will also build a suitable learning environment to brush up on their communication skills, analytical skills, business knowledge, and risk understanding. Acquiring these skills will help students to be ready to face real-world security scenarios in a changing threat landscape and to demonstrate the ability to serve as responders to cybersecurity incidents.” The iLearn platform by EC Council, gives students access to on-demand hands-on training courses. iLearn packages come with one year of access to self-paced streaming video lectures, a certification exam, and access to EC-Council’s online lab platform, iLabs, where students can practice their hacking skills in a safe environment. iLearn – Self-Paced Streaming Video Training iLearn is EC-Council’s self-paced video training option for Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), EC-Council Certified Security Analyst (ECSA), and the rest of EC-Council’s programs. The range of programs available on iLearn starts from the entry level Certified Secure Computer User (CSCU) course and advances all the way to the courses delivered through the Center for Advanced Security Training (CAST). All courses are taught by expert instructors with experience in training high-level organizations like the US DOD, Pentagon, FBI, NSA, and many more. Learn more about iLearn here: https://iclass.eccouncil.org/learning-options/ About TEK-UP TEK-UP is a Private Higher School of Technologies & Engineering founded in September 2014, in Tunisia. TEK-UP University aims to combine theory with practice, offers education accordingly, and prepares its students for the future through a high-quality learning environment. The university awards National Engineering Diploma in Telecommunications and Computer Science. Education at the University covers specific skills and scientific methods that enables graduates to improve their qualifications. Since its launch in 2014, over 150 technical and linguistic certifications were awarded to its students from potential certification bodies as Cisco, Linux Professional Institute, TEKonsult, Oracle etc. Visit TEK-UP to know more: https://tek-up.de/ About EC-Council EC-Council is the world’s largest Certification body for Information Technology & fastest growing vendor neutral programs. It is the owner and developer of the world famous Certified Ethical Hacker course (CEH), Computer Hacking Forensics Investigator program (CHFI), License Penetration Tester program (LPT), and various other programs. EC-Council Foundation, the non-profit branch of EC-Council, created Global CyberLympics, the world’s first global hacking competition. EC-Council Foundation also hosts a suite of conferences across the US and around the world including Hacker Halted, Global CISO Forum, TakeDownCon, and CISO Summit. For more information about EC-Council, visit https://staging-new.eccouncil.org.

Read article