{"id":50441,"date":"2020-08-18T09:22:16","date_gmt":"2020-08-18T09:22:16","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=50441"},"modified":"2025-10-22T08:44:13","modified_gmt":"2025-10-22T08:44:13","slug":"benefits-of-a-vendor-neutral-network-security-certification","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/","title":{"rendered":"Benefits of a Vendor- Neutral Network Security Certification"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"50441\" class=\"elementor elementor-50441\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-127f6eb4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"127f6eb4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-49874e4\" data-id=\"49874e4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a233ae5 elementor-widget elementor-widget-text-editor\" data-id=\"7a233ae5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Picture1.jpg.webp\" alt=\"Engr. Ifeanyi Frank Ogochukwu\" width=\"200\" \/><\/p><p><strong>Speaker:<\/strong> Engr. Ifeanyi Frank Ogochukwu,<br \/><strong>Designation:<\/strong> Chief Technology Strategist, Debbie Mishael Group<br \/><strong>Topic:<\/strong> Benefits of a Vendor- Neutral Network Security Certification<br \/><strong>Date of Webinar:<\/strong> 20<sup>th<\/sup> jan, 2021<br \/><strong>Time and Location:<\/strong> 3:00 pm WAT\/ 7:30 pm IST\/ 2:00 pm GMT<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>\u00a0<\/strong><\/p><p><strong>Speaker Bio:<\/strong><\/p><p>\u00acEngr. Ifeanyi, a focused, innovative, passionate, result oriented, highly driven consummate and strategic professional and technocrat infused with both public and private sector experience with multifaceted knowledge, skill and competence in Aviation, ICT, Telecommunications, Cyber Security and Project Management, with proven track record in managing resources, securing digital assets, capacity building and influencing others to create value, driven by the vision of maximising opportunities and bettering people\u2019s lives<\/p><p>Ifeanyi a Licensed Air Traffic Safety Electronics Specialist; is a Certified Information Security Consultant, a Global Advisory Board member of the EC Council, IT Business Manager, Certified Management Trainer, CNS\/ATM Specialist, Fellow of the Nigeria Computer Society, Fellow of Institute of Aviation Management, Fellow Chartered Institute of Information and Strategic Management, Member Computer Professionals of Nigeria, Council of Registered Engineers of Nigeria (COREN), Institute of Management, IT Ambassador \u2013 ICITP, SA; Facilitator, Coach and Public Speaker.<\/p><p>Ifeanyi currently the Chief Technology Strategist for Debbie Mishael Group and an Instructor \u2013 Network and Systems Security at the Digital Bridge Institute, Nigeria; was the pioneer General Manager and Chief Information Officer &#8211; ICT, Nigerian Airspace Management Agency (NAMA). He was also Chairman\/Lead Working Group 4 (WG 4) of the International Telecommunications Union (ITU) Focus Group on Aviation Applications in the cloud for Flight Data Monitoring (FG AC) &#8211; Flight Tracking and Data Streaming. Managed a team comprising of experts from a multi-stakeholder international global aviation &#8211; airlines, telecommunications, and satellites organisations &#8211; focused on &#8220;feasibility of using recent developments in commercial aeronautical data link services, as well as reusing existing infrastructure, for real-time flight data streaming where appropriate\u201d; Project Coordinator, West and Central African Air Transport Safety and Security Programme (WCAATSSP), NAMA PIU. Some other key initiatives undertaken include leading the Nigerian Airspace Management Agency Airspace Vulnerability Security Assessment Audit \u2013 (ICAO Annex 17, Annex 14 and ISO 27001); Microsoft Hero on the security capabilities on Windows Server 2008. He is the Convener \u2013 CIO Masterclass Africa \u2013 an IT Leadership Initiative<\/p><p>Ifeanyi, is an Aeronautical Telecommunications Engineering and Business Administration graduate, a Licensed Air Traffic Safety Electronics specialist also earned with distinction a Master\u2019s Degree inCommunications Management, Masters in Information Technology, a Post Graduate Diploma in Transport Management and a Post Graduate Certificate &#8211; IT and Telecoms Law.<\/p><p><strong>Topic Abstract: <\/strong><br \/>Since tools and technologies keep evolving, professionals in the industry &#8211; have to jump from vendor to vendor, platform to platform. This is where a vendor-neutral <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\">network security certification<\/a> comes in useful because essentially security is way beyond tools and technologies, as it frees them from being chained to one platform.<\/p><p><strong>Key takeaways:<\/strong><br \/>What does the market demand from network security professionals?<\/p><p>With the ever rapidly changing technology landscape &#8211; currently the 4IR with Artificial Intelligence, Automation, Robotics \u2013 digital transformation &#8211; amplified by Covid -19 pandemic \u2013 leading to increased remote working \u2013 the new normal \u2013 it requires flexible adaptive agile security approach to contain potential cyber breaches.<\/p><p>Therefore the market demand from network security professionals are broad based pivotable skills, capabilities and competencies that will provide that assurance and comfort to end users that digital assets and digital transactions that enable businesses and organizations are \u201csafe\u201d inspite of the fast paced evolving landscape and that is essentially what the Certified Network Defender brings to the table, powered by the CND programme.<\/p><p><br \/>How does the CND certification boost careers?<\/p><p>The CND Certification is a globally recognized extensively market researched certification programme that meets the industry security needs for protecting, defending and responding to threats on the network. It is the most comprehensive security training available focusing on the current 14 security domains; patterned after the National Initiative of Cyber Security Education (NICE) framework; mapped to global job roles and responsibilities for Department of Defense (DoD) job roles for system and network administrators and is accredited by the American National Standards Institute (ANSI). With the \u201cGlobal Network Security Market estimated to grow at a substantial CAGR of 4.74% during the period 2017-2022\u201d according to prenewswire.com, this all-star security certification is a prime career booster for any level of security professional.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe src=\"https:\/\/www.youtube.com\/embed\/cNvV-c4GX5g\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker: Engr. Ifeanyi Frank Ogochukwu,Designation: Chief Technology Strategist, Debbie Mishael GroupTopic: Benefits of a Vendor- Neutral Network Security CertificationDate of Webinar: 20th jan, 2021Time and Location: 3:00 pm WAT\/ 7:30 pm IST\/ 2:00 pm GMT Watch Now \u00a0 Speaker Bio: \u00acEngr. Ifeanyi, a focused, innovative, passionate, result oriented, highly driven consummate and strategic professional and&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79299,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-50441","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Become Dynamic with a Vendor-Neutral Network Security Certification<\/title>\n<meta name=\"description\" content=\"Become Dynamic with a Vendor-Neutral Network Security Certification explained by the Engr. Ifeanyi Frank Ogochukwu through ECCU.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Benefits of a Vendor- Neutral Network Security Certification\" \/>\n<meta property=\"og:description\" content=\"Become Dynamic with a Vendor-Neutral Network Security Certification explained by the Engr. Ifeanyi Frank Ogochukwu through ECCU.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T09:22:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-22T08:44:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/ifeanyi-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/benefits-of-a-vendor-neutral-network-security-certification\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/benefits-of-a-vendor-neutral-network-security-certification\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Benefits of a Vendor- Neutral Network Security Certification\",\"datePublished\":\"2020-08-18T09:22:16+00:00\",\"dateModified\":\"2025-10-22T08:44:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/benefits-of-a-vendor-neutral-network-security-certification\\\/\"},\"wordCount\":734,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/benefits-of-a-vendor-neutral-network-security-certification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/ifeanyi-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/benefits-of-a-vendor-neutral-network-security-certification\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/benefits-of-a-vendor-neutral-network-security-certification\\\/\",\"name\":\"Become Dynamic with a Vendor-Neutral Network Security Certification\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/benefits-of-a-vendor-neutral-network-security-certification\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/benefits-of-a-vendor-neutral-network-security-certification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/ifeanyi-1.jpg\",\"datePublished\":\"2020-08-18T09:22:16+00:00\",\"dateModified\":\"2025-10-22T08:44:13+00:00\",\"description\":\"Become Dynamic with a Vendor-Neutral Network Security Certification explained by the Engr. Ifeanyi Frank Ogochukwu through ECCU.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/benefits-of-a-vendor-neutral-network-security-certification\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/benefits-of-a-vendor-neutral-network-security-certification\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/benefits-of-a-vendor-neutral-network-security-certification\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/ifeanyi-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/ifeanyi-1.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/benefits-of-a-vendor-neutral-network-security-certification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Benefits of a Vendor- Neutral Network Security Certification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Become Dynamic with a Vendor-Neutral Network Security Certification","description":"Become Dynamic with a Vendor-Neutral Network Security Certification explained by the Engr. Ifeanyi Frank Ogochukwu through ECCU.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/","og_locale":"en_US","og_type":"article","og_title":"Benefits of a Vendor- Neutral Network Security Certification","og_description":"Become Dynamic with a Vendor-Neutral Network Security Certification explained by the Engr. Ifeanyi Frank Ogochukwu through ECCU.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T09:22:16+00:00","article_modified_time":"2025-10-22T08:44:13+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/ifeanyi-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Benefits of a Vendor- Neutral Network Security Certification","datePublished":"2020-08-18T09:22:16+00:00","dateModified":"2025-10-22T08:44:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/"},"wordCount":734,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/ifeanyi-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/","name":"Become Dynamic with a Vendor-Neutral Network Security Certification","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/ifeanyi-1.jpg","datePublished":"2020-08-18T09:22:16+00:00","dateModified":"2025-10-22T08:44:13+00:00","description":"Become Dynamic with a Vendor-Neutral Network Security Certification explained by the Engr. Ifeanyi Frank Ogochukwu through ECCU.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/ifeanyi-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/ifeanyi-1.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/benefits-of-a-vendor-neutral-network-security-certification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Benefits of a Vendor- Neutral Network Security Certification"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/50441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=50441"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/50441\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79299"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=50441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=50441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=50441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}