{"id":24332,"date":"2019-02-16T13:21:08","date_gmt":"2019-02-16T13:21:08","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=24332"},"modified":"2023-06-05T07:30:05","modified_gmt":"2023-06-05T07:30:05","slug":"understanding-the-white-hat-hacker-and-career-prospects","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/","title":{"rendered":"Understanding the White Hat Hacker and Career Prospects"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24332\" class=\"elementor elementor-24332\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1bad305 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1bad305\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-28607850\" data-id=\"28607850\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-133ec077 elementor-widget elementor-widget-text-editor\" data-id=\"133ec077\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/pic-copy.jpeg.webp\" alt=\"Kris Seeburn\" width=\"200\"><\/p>\n<p><strong>Name:<\/strong> Kris Seeburn<br>\n<strong>Designation:<\/strong> Chief Instructor \u2013 Cybersecurity, Professor \u2013 Cyberwarfare \u2013 National Defence University, Dept. of Justice, FBI<br>\n<strong>Topic:<\/strong> Understanding the White Hat Hacker and Career Prospects<br>\n<strong>Date of Webinar:<\/strong> 2<sup>nd<\/sup> May, 2019<br>\n<strong>Time and Location:<\/strong> 9am EST\/ 6:30pm IST\/ 2pm GMT<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#register\" target=\"_self\">Watch Now<\/a><br>\n<strong><br><\/strong><\/p><p><strong>Speaker Bio:<\/strong> IT\/Cyber Security professional with over 16 years of experience in IT Auditing in numerous industries including Insurance, financial, aviation and healthcare with a proven track record of assessing system\/network availability, security, and data integrity to identify, manage and reduce risks while ensuring global compliance. With added knowledge and evangelist on Blockchain, IoT, AI\/Machine Learning and Analytics. Seasoned Speaker, Writer, Blogger on many cyber and associated regulatory as well as a set of varied topics. Has an in depth knowledge of Digital Forensics and has participated in quite a few Criminal Forensics cases for agencies such as Scotland Yard in UK working towards creation of cell site forensics amongst a few. Head of cyberwarfare and cybersecurity within USA-DOJ. Possess an extensive background in all stages of security audits, including planning, study, evaluation\/testing of controls, reporting and follow up. Possess numerous industry certifications, including but not limited to: CISA, CISSP, CRISC, CEH, CISM and more. Engaged in personal contractual work in consulting, project management and training in Business, IT and IT Security whilst Working on freelance basis on key projects. With 21 years working experience with at least 20 years in Management including high-level positions. Professor in cybersecurity, cyberwarfare and Digital Forensics, Governance and Compliance. EC-Council \u2013 CHFI Advisory Board Member, EC-Council- Knowledge Review Committee Member, Serves on various Professional Committees and Boards. VP (Organizational Operations) &amp; CTO of a Philanthropy organization. Consultant, Trainer, Coach and Mentor with a love of sharing knowledge. ICANN Member (NCUC) Non-Commercial User Constituency. Advisory &amp; Cybercrime committee member New Security Foundation, past chair and ISACA Academic Relations and Liaison to INTOSAI Working Group on IT Audit amongst many roles. Winner of ISACA 2013-Harold Weiss Award for Outstanding Achievement for Contribution to the IT Governance Profession. The overall experience with Academia, Government and Private sectors brings and edge to not only training but understanding of educational delivery.<\/p>\n<p><strong>Topic Abstract:<\/strong> With the rapid development of IT technologies, hackers have become an integral part of this process. We keep hearing about computer security destroyers and the problems they cause from time to time. And these hackers cause much destructive problems making it difficult for other users to use the Internet safely. But have you ever heard of ethical hackers?<br>\nWell, they are hackers\u2026but much more of the \u201cgood guys\u201d than the usual destructive hackers. The ethical hackers are individuals who hack into computer network in order to asses or evaluate its security rather than with an intention for maliciousness or for a criminal act.<\/p>\n<p>They are also known as <strong>white hat hackers<\/strong> who use hacking techniques in a legitimate and lawful manner. While regular hackers also termed as \u2018black hat hackers\u2019 use the process of hacking for a destructive purpose such as for phishing purposes. This is the major difference between an ethical hacker and a computer hacker.<\/p>\n<p>Ethical hackers are hired by companies to hack into their systems and to report back with the weaknesses. This helps the company to learn which precaution to take. There are 5 phases to ethical hacking namely,<\/p>\n<p>a) Reconnaissance<br>\nb) Scanning<br>\nc) Gaining access<br>\nd) Maintaining access and<br>\ne) Covering tracks<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"register\"><\/a><br>\n<iframe src=\"https:\/\/www.youtube.com\/embed\/XfhYMX-Ai1Q\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Name: Kris Seeburn Designation: Chief Instructor \u2013 Cybersecurity, Professor \u2013 Cyberwarfare \u2013 National Defence University, Dept. of Justice, FBI Topic: Understanding the White Hat Hacker and Career Prospects Date of Webinar: 2nd May, 2019 Time and Location: 9am EST\/ 6:30pm IST\/ 2pm GMT Watch Now Speaker Bio: IT\/Cyber Security professional with over 16 years of&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79546,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-24332","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>WHITE HAT HACKER AND CAREER PROSPECTS | EC-COUNCIL UNIVERSITY<\/title>\n<meta name=\"description\" content=\"With the rapid development of IT technologies, hackers have become an integral part of this process. We keep hearing about computer security destroyers and the problems they cause from time to time.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding the White Hat Hacker and Career Prospects\" \/>\n<meta property=\"og:description\" content=\"With the rapid development of IT technologies, hackers have become an integral part of this process. We keep hearing about computer security destroyers and the problems they cause from time to time.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-16T13:21:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:30:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/02\/Kris-Seeburn.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-the-white-hat-hacker-and-career-prospects\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-the-white-hat-hacker-and-career-prospects\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Understanding the White Hat Hacker and Career Prospects\",\"datePublished\":\"2019-02-16T13:21:08+00:00\",\"dateModified\":\"2023-06-05T07:30:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-the-white-hat-hacker-and-career-prospects\\\/\"},\"wordCount\":591,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-the-white-hat-hacker-and-career-prospects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Kris-Seeburn.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-the-white-hat-hacker-and-career-prospects\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-the-white-hat-hacker-and-career-prospects\\\/\",\"name\":\"WHITE HAT HACKER AND CAREER PROSPECTS | EC-COUNCIL UNIVERSITY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-the-white-hat-hacker-and-career-prospects\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-the-white-hat-hacker-and-career-prospects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Kris-Seeburn.jpg\",\"datePublished\":\"2019-02-16T13:21:08+00:00\",\"dateModified\":\"2023-06-05T07:30:05+00:00\",\"description\":\"With the rapid development of IT technologies, hackers have become an integral part of this process. We keep hearing about computer security destroyers and the problems they cause from time to time.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-the-white-hat-hacker-and-career-prospects\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-the-white-hat-hacker-and-career-prospects\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-the-white-hat-hacker-and-career-prospects\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Kris-Seeburn.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/Kris-Seeburn.jpg\",\"width\":465,\"height\":310,\"caption\":\"UNDERSTANDING THE WHITE HAT HACKER AND CAREER PROSPECTS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/understanding-the-white-hat-hacker-and-career-prospects\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Understanding the White Hat Hacker and Career Prospects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"WHITE HAT HACKER AND CAREER PROSPECTS | EC-COUNCIL UNIVERSITY","description":"With the rapid development of IT technologies, hackers have become an integral part of this process. We keep hearing about computer security destroyers and the problems they cause from time to time.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/","og_locale":"en_US","og_type":"article","og_title":"Understanding the White Hat Hacker and Career Prospects","og_description":"With the rapid development of IT technologies, hackers have become an integral part of this process. We keep hearing about computer security destroyers and the problems they cause from time to time.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-02-16T13:21:08+00:00","article_modified_time":"2023-06-05T07:30:05+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/02\/Kris-Seeburn.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Understanding the White Hat Hacker and Career Prospects","datePublished":"2019-02-16T13:21:08+00:00","dateModified":"2023-06-05T07:30:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/"},"wordCount":591,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/02\/Kris-Seeburn.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/","name":"WHITE HAT HACKER AND CAREER PROSPECTS | EC-COUNCIL UNIVERSITY","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/02\/Kris-Seeburn.jpg","datePublished":"2019-02-16T13:21:08+00:00","dateModified":"2023-06-05T07:30:05+00:00","description":"With the rapid development of IT technologies, hackers have become an integral part of this process. We keep hearing about computer security destroyers and the problems they cause from time to time.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/02\/Kris-Seeburn.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/02\/Kris-Seeburn.jpg","width":465,"height":310,"caption":"UNDERSTANDING THE WHITE HAT HACKER AND CAREER PROSPECTS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/understanding-the-white-hat-hacker-and-career-prospects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Understanding the White Hat Hacker and Career Prospects"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=24332"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24332\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79546"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=24332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=24332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=24332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}