Despite all elementary security measures, organizations are still facing challenges to mitigate cyberattacks. An effective incident handling and response program ensures quick healing by reducing the time spent on containment and aims to reinsta
Read articleCategory
March 2019
Ngee Ann Polytechnic Holds Certified Ethical Hacker Award Session For The Inaugural Group of Students
Ngee Ann Polytechnic, the first EC-Council Academia Partner in Singapore using the new EC-Council Academia Series had their first cohort of students taking Certified Ethical Hacker (CEH). Th
Read articleMRGT announces its partnership with EC-Council and offers advanced training in E|CIH v2: EC-Council Incident Handler in Pakistan!
Mature Resources Global Technologies Pvt. Ltd. (MRGT) invite you to take an advantage of our training programs, which are specially designed to provide training services to achieve international standards, and
Read articleEC-Council and Strategic Partner PT MItra Integrasi Informatika Successfully Conduct the First CISO Executive Forum in Jakarta
The CISO Executive Forum 2019 successfully held by PT MItra Integrasi Informatika (MII) in collaboration with EC-Council on February 21, 2019, following the theme “Enhancing Organizational Cyber Security Maturity.” The e
Read articleOverNet Education is the first EC-Council Italian partner to offer new version of EC-Council Incident Handler Program!
OverNet Education is the first EC-Council Italian partner to offer the new version of the ECIH program – EC-Council Incident Handler! As a preview, the Italian Experience Class will take place in Milan, from March 20th to 22nd, 2019, in Overnet’s facilities. This course is exceptionally offered at 1250€, instead of 2500€! OverNet Education is…
Read articleEC-Council Sponsors e-Iraq and Cybersecurity Event
Summary: On 5th March 2019, EC-Council, world’s leading cybersecurity credentialing body, sponsors conference “E-Iraq and Cyber Security” in Baghdad, organized by RMD company. The conference aimed at upgrading and innovating strategic and tactical cybersecurity operati
Read article