{"id":79977,"date":"2023-08-18T12:53:57","date_gmt":"2023-08-18T12:53:57","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=79977"},"modified":"2026-03-18T12:37:59","modified_gmt":"2026-03-18T12:37:59","slug":"us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/","title":{"rendered":"US Department of Defense Recognizes Certified Ethical Hacker (CEH) as an Active-Duty Qualification for Cyber Workforce Job Billets Critical to National Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"79977\" class=\"elementor elementor-79977\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dccc447 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dccc447\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-f8462f0\" data-id=\"f8462f0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9c0ee37 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9c0ee37\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0566dac\" data-id=\"0566dac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7913fb8 elementor-widget elementor-widget-image\" data-id=\"7913fb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"528\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-DoD-Recognizes-CEH-for-6-Cyber-Workforce-Job-Billets-Critical-to-National-Security-1024x528.png\" class=\"attachment-large size-large wp-image-79978\" alt=\"CEH recognized as Active Duty Qualification by US Cyberforce\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-DoD-Recognizes-CEH-for-6-Cyber-Workforce-Job-Billets-Critical-to-National-Security-1024x528.png 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-DoD-Recognizes-CEH-for-6-Cyber-Workforce-Job-Billets-Critical-to-National-Security-300x155.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-DoD-Recognizes-CEH-for-6-Cyber-Workforce-Job-Billets-Critical-to-National-Security-768x396.png 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-DoD-Recognizes-CEH-for-6-Cyber-Workforce-Job-Billets-Critical-to-National-Security-1536x792.png 1536w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-DoD-Recognizes-CEH-for-6-Cyber-Workforce-Job-Billets-Critical-to-National-Security-2048x1056.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f575d5b elementor-share-buttons--view-icon elementor-share-buttons--skin-flat elementor-grid-1 elementor-widget__width-auto elementor-fixed elementor-hidden-mobile elementor-share-buttons--shape-square elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"f575d5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;fixed&quot;}\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Share on facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-facebook\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256C504 119 393 8 256 8S8 119 8 256c0 123.78 90.69 226.38 209.25 245V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.28c-30.8 0-40.41 19.12-40.41 38.73V256h68.78l-11 71.69h-57.78V501C413.31 482.38 504 379.78 504 256z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Share on twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-twitter\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Share on linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Share on whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-whatsapp\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M380.9 97.1C339 55.1 283.2 32 223.9 32c-122.4 0-222 99.6-222 222 0 39.1 10.2 77.3 29.6 111L0 480l117.7-30.9c32.4 17.7 68.9 27 106.1 27h.1c122.3 0 224.1-99.6 224.1-222 0-59.3-25.2-115-67.1-157zm-157 341.6c-33.2 0-65.7-8.9-94-25.7l-6.7-4-69.8 18.3L72 359.2l-4.4-7c-18.5-29.4-28.2-63.3-28.2-98.2 0-101.7 82.8-184.5 184.6-184.5 49.3 0 95.6 19.2 130.4 54.1 34.8 34.9 56.2 81.2 56.1 130.5 0 101.8-84.9 184.6-186.6 184.6zm101.2-138.2c-5.5-2.8-32.8-16.2-37.9-18-5.1-1.9-8.8-2.8-12.5 2.8-3.7 5.6-14.3 18-17.6 21.8-3.2 3.7-6.5 4.2-12 1.4-32.6-16.3-54-29.1-75.5-66-5.7-9.8 5.7-9.1 16.3-30.3 1.8-3.7.9-6.9-.5-9.7-1.4-2.8-12.5-30.1-17.1-41.2-4.5-10.8-9.1-9.3-12.5-9.5-3.2-.2-6.9-.2-10.6-.2-3.7 0-9.7 1.4-14.8 6.9-5.1 5.6-19.4 19-19.4 46.3 0 27.3 19.9 53.7 22.6 57.4 2.8 3.7 39.1 59.7 94.8 83.8 35.2 15.2 49 16.5 66.6 13.9 10.7-1.6 32.8-13.4 37.4-26.4 4.6-13 4.6-24.1 3.2-26.4-1.3-2.5-5-3.9-10.5-6.6z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_pinterest\" role=\"button\" tabindex=\"0\" aria-label=\"Share on pinterest\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-pinterest\" viewBox=\"0 0 496 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M496 256c0 137-111 248-248 248-25.6 0-50.2-3.9-73.4-11.1 10.1-16.5 25.2-43.5 30.8-65 3-11.6 15.4-59 15.4-59 8.1 15.4 31.7 28.5 56.8 28.5 74.8 0 128.7-68.8 128.7-154.3 0-81.9-66.9-143.2-152.9-143.2-107 0-163.9 71.8-163.9 150.1 0 36.4 19.4 81.7 50.3 96.1 4.7 2.2 7.2 1.2 8.3-3.3.8-3.4 5-20.3 6.9-28.1.6-2.5.3-4.7-1.7-7.1-10.1-12.5-18.3-35.3-18.3-56.6 0-54.7 41.4-107.6 112-107.6 60.9 0 103.6 41.5 103.6 100.9 0 67.1-33.9 113.6-78 113.6-24.3 0-42.6-20.1-36.7-44.8 7-29.5 20.5-61.3 20.5-82.6 0-19-10.2-34.9-31.4-34.9-24.9 0-44.9 25.7-44.9 60.2 0 22 7.4 36.8 7.4 36.8s-24.5 103.8-29 123.2c-5 21.4-3 51.6-.9 71.2C65.4 450.9 0 361.1 0 256 0 119 111 8 248 8s248 111 248 248z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89d46c6 elementor-widget elementor-widget-heading\" data-id=\"89d46c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">US Department of Defense Recognizes Certified Ethical Hacker (CEH) as an Active-Duty Qualification for Cyber Workforce Job Billets Critical to National Security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d4f2bc elementor-widget-mobile__width-auto elementor-fixed e-transform e-transform elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-button\" data-id=\"2d4f2bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;fixed&quot;,&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:-90,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6Ijc5MTc4IiwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Enquire Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb32e46 elementor-author-box--link-yes elementor-author-box--layout-image-left elementor-author-box--image-valign-top elementor-author-box--align-left hidden elementor-author-box--avatar-yes elementor-author-box--name-yes elementor-author-box--biography-yes elementor-widget elementor-widget-author-box\" data-id=\"eb32e46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\t\t\t\t<div  class=\"elementor-author-box__avatar\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/secure.gravatar.com\/avatar\/12b9c56314a98f7e0b1bb5788a5a7407b66dd2455cd19c3b0be1d54b4ca6d2ce?s=300&#038;d=mm&#038;r=g\" alt=\"Picture of EC-Council\" loading=\"lazy\">\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<h4 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tEC-Council\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-author-box__bio\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a class=\"elementor-author-box__button elementor-button elementor-size-xs\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/author\/ec-council\/\">\n\t\t\t\t\t\tAll posts by this author\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ceb5961 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ceb5961\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-aada3f1\" data-id=\"aada3f1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c7a0fd4 elementor-share-buttons--view-icon elementor-share-buttons--skin-flat elementor-grid-1 elementor-widget__width-auto elementor-fixed elementor-hidden-mobile elementor-share-buttons--shape-square elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"c7a0fd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;fixed&quot;}\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Share on facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-facebook\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256C504 119 393 8 256 8S8 119 8 256c0 123.78 90.69 226.38 209.25 245V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.28c-30.8 0-40.41 19.12-40.41 38.73V256h68.78l-11 71.69h-57.78V501C413.31 482.38 504 379.78 504 256z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Share on twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-twitter\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Share on linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Share on whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-whatsapp\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M380.9 97.1C339 55.1 283.2 32 223.9 32c-122.4 0-222 99.6-222 222 0 39.1 10.2 77.3 29.6 111L0 480l117.7-30.9c32.4 17.7 68.9 27 106.1 27h.1c122.3 0 224.1-99.6 224.1-222 0-59.3-25.2-115-67.1-157zm-157 341.6c-33.2 0-65.7-8.9-94-25.7l-6.7-4-69.8 18.3L72 359.2l-4.4-7c-18.5-29.4-28.2-63.3-28.2-98.2 0-101.7 82.8-184.5 184.6-184.5 49.3 0 95.6 19.2 130.4 54.1 34.8 34.9 56.2 81.2 56.1 130.5 0 101.8-84.9 184.6-186.6 184.6zm101.2-138.2c-5.5-2.8-32.8-16.2-37.9-18-5.1-1.9-8.8-2.8-12.5 2.8-3.7 5.6-14.3 18-17.6 21.8-3.2 3.7-6.5 4.2-12 1.4-32.6-16.3-54-29.1-75.5-66-5.7-9.8 5.7-9.1 16.3-30.3 1.8-3.7.9-6.9-.5-9.7-1.4-2.8-12.5-30.1-17.1-41.2-4.5-10.8-9.1-9.3-12.5-9.5-3.2-.2-6.9-.2-10.6-.2-3.7 0-9.7 1.4-14.8 6.9-5.1 5.6-19.4 19-19.4 46.3 0 27.3 19.9 53.7 22.6 57.4 2.8 3.7 39.1 59.7 94.8 83.8 35.2 15.2 49 16.5 66.6 13.9 10.7-1.6 32.8-13.4 37.4-26.4 4.6-13 4.6-24.1 3.2-26.4-1.3-2.5-5-3.9-10.5-6.6z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_pinterest\" role=\"button\" tabindex=\"0\" aria-label=\"Share on pinterest\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-pinterest\" viewBox=\"0 0 496 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M496 256c0 137-111 248-248 248-25.6 0-50.2-3.9-73.4-11.1 10.1-16.5 25.2-43.5 30.8-65 3-11.6 15.4-59 15.4-59 8.1 15.4 31.7 28.5 56.8 28.5 74.8 0 128.7-68.8 128.7-154.3 0-81.9-66.9-143.2-152.9-143.2-107 0-163.9 71.8-163.9 150.1 0 36.4 19.4 81.7 50.3 96.1 4.7 2.2 7.2 1.2 8.3-3.3.8-3.4 5-20.3 6.9-28.1.6-2.5.3-4.7-1.7-7.1-10.1-12.5-18.3-35.3-18.3-56.6 0-54.7 41.4-107.6 112-107.6 60.9 0 103.6 41.5 103.6 100.9 0 67.1-33.9 113.6-78 113.6-24.3 0-42.6-20.1-36.7-44.8 7-29.5 20.5-61.3 20.5-82.6 0-19-10.2-34.9-31.4-34.9-24.9 0-44.9 25.7-44.9 60.2 0 22 7.4 36.8 7.4 36.8s-24.5 103.8-29 123.2c-5 21.4-3 51.6-.9 71.2C65.4 450.9 0 361.1 0 256 0 119 111 8 248 8s248 111 248 248z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8368e7d elementor-widget-mobile__width-auto elementor-fixed e-transform e-transform elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-button\" data-id=\"8368e7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;fixed&quot;,&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:-90,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6Ijc5MTc4IiwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Enquire Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-170d26a elementor-author-box--link-yes elementor-author-box--layout-image-left elementor-author-box--image-valign-top elementor-author-box--align-left hidden elementor-author-box--avatar-yes elementor-author-box--name-yes elementor-author-box--biography-yes elementor-widget elementor-widget-author-box\" data-id=\"170d26a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\t\t\t\t<div  class=\"elementor-author-box__avatar\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/secure.gravatar.com\/avatar\/12b9c56314a98f7e0b1bb5788a5a7407b66dd2455cd19c3b0be1d54b4ca6d2ce?s=300&#038;d=mm&#038;r=g\" alt=\"Picture of EC-Council\" loading=\"lazy\">\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<h4 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tEC-Council\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-author-box__bio\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<a class=\"elementor-author-box__button elementor-button elementor-size-xs\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/author\/ec-council\/\">\n\t\t\t\t\t\tAll posts by this author\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75e5b1c elementor-widget elementor-widget-text-editor\" data-id=\"75e5b1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With the evolution of cyber threats on a global stage, the United States Cyber Strategy outlines the need to develop capabilities in its cyber security workforce. Under DoD 8140, the Department of Defense has issued mandates to ensure any member of the defense community working in cyber security carry the proper credentials and qualifications to do the job and defend the country.<\/p><p>EC-Council\u2019s <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">Certified Ethical Hacker<\/a> has been approved after rigorous reviews commissioned by the Department of Defense and provides qualification standards at various levels for tactical cyber security roles.<\/p><h2>28 DCWF Job Roles that Recognize EC-Council Certifications.<\/h2><p>Below DoD job roles updated as on May 27<sup>th<\/sup>\u00a02024.<\/p><div class=\"table-responsive\"><table class=\"table1\"><thead><tr><th>EC-Council Certification<\/th><th>DoD 8140 Approved Work Roles<\/th><\/tr><\/thead><tbody><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noopener\">Certified Ethical Hacker (CEH)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>111 &#8211; All-Source Analyst<\/li><li>141 &#8211; Warning Analyst<\/li><li>511 &#8211; Cyber Defense Analyst<\/li><li>531 &#8211; Cyber Defense Incident Responder<\/li><li>541 &#8211; Vulnerability Assessment Analyst<\/li><li>661 &#8211; Research &amp; Development Specialist<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/ceh-master\/\" target=\"_blank\" rel=\"noopener\">CERTIFIED ETHICAL HACKER PRACTICAL (CEH PRACTICAL)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>111 &#8211; All-Source Analyst<\/li><li>141 &#8211; Warning Analyst<\/li><li>511 &#8211; Cyber Defense Analyst<\/li><li>531 &#8211; Cyber Defense Incident Responder<\/li><li>541 &#8211; Vulnerability Assessment Analyst<\/li><li>661 &#8211; Research &amp; Development Specialist<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\" rel=\"noopener\">CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>611 &#8211; Authorizing Official\/Designating Representative<\/li><li>722 &#8211; Information Systems Security Manager<\/li><li>723 &#8211; COMSEC Manager<\/li><li>731 &#8211; Cyber Legal Advisor<\/li><li>801 &#8211; Program Manager<\/li><li>802 &#8211; IT Project Manager<\/li><li>803 &#8211; Product Support Manager<\/li><li>804 &#8211; IT Investment\/Portfolio Manager<\/li><li>805 &#8211; IT Program Auditor<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\" target=\"_blank\" rel=\"noopener\">COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>211 &#8211; Forensics Analyst<\/li><li>212 &#8211; Cyber Defense Forensics Analyst<\/li><li>221 &#8211; Cyber Crime Investigator<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\" rel=\"noopener\">CERTIFIED NETWORK DEFENDER (CND)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>511 &#8211; Cyber Defense Analyst<\/li><li>521 &#8211; Cyber Defense Infrastructure Support Specialist<\/li><li>531 &#8211; Cyber Defense Incident Responder<\/li><\/ul><\/td><\/tr><tr><td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\" target=\"_blank\" rel=\"noopener\">EC-COUNCIL CERTIFIED INCIDENT HANDLER (ECIH)<\/a><\/td><td><ul style=\"list-style-type: none;\"><li>531 \u2013 Cyber Defense Incident Responder<\/li><\/ul><\/td><\/tr><\/tbody><\/table><\/div><p>Individuals working in these roles are critical to national security working across the various armed forces, combatant commands, and DoD departments. From keeping our networks running securely to actively defending from adversaries, supporting critical infrastructure, and proactively identifying vulnerabilities in both offensive and defensive postures, the Certified Ethical Hacker program imparts the knowledge and credentials for our military to methodically evaluate networks for weaknesses and establish countermeasures before disaster strikes.<\/p><h2>What are DoD 8140 and DoDM 8140?<\/h2><p>DoD 8140, known as the Department of Defense Directive 8140, in conjunction with DoDM 8140 and DoDI 8140, collectively lays out the directive, instruction, and manual that govern the classification and qualification requirements for individuals working in cyber security roles within the United States Department of Defense.<\/p><p>Together, these three documents serve the following purposes:<\/p><ul><li>Establish the DoD-wide mandate for the required qualifications of members working in the DoD cyberspace workforce<\/li><li>Identify members of the DoD cyberspace workforce based on the work role(s) of the positions assigned<\/li><li>Implement policies, assign job role-based responsibilities, and prescribe procedures for the qualification of personnel in the DoD cyberspace workforce<\/li><\/ul><p>Moreover, since 2007, EC-Council has obtained multiple approved certifications that impact the training and certification of DoD members globally, contributing to the qualification and capability development of US military forces and DoD components.<\/p><h2>What is the DoD Cyberspace Workforce Framework (DCWF)?<\/h2><p>The DoD Cyberspace Workforce Framework (DCWF) establishes a structured taxonomy for cyberspace work roles, defining associated responsibilities in terms of requirements for tasks, knowledge, and skills. The combination of DoD 8140 and the DCWF establishes specific work role requirements and qualification criteria for members of the DoD Cyber Workforce.<\/p><h2>CEH &#8211; <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\">Certified Ethical Hacker<\/a> : The World\u2019s No. 1 Credential in Ethical Hacking<\/h2><p><strong>About CEH Program:<\/strong><br \/>EC-Council\u2019s flagship program, the CEH, is the world\u2019s leading ethical hacking credential that equips cyber security professionals with the knowledge, skills, and abilities to protect organizations against cyber attacks. Certified Ethical Hackers are trained to follow a rigorous 5-phase approach (Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks) when lawfully breaking into an organization to identify the weakest links, vulnerabilities, and misconfigurations. The program\u2019s unique learn-certify-engage-compete learning framework covers every aspect from training to certification and hones learners\u2019 skills by exposing them to ethical hacking engagements in EC-Council\u2019s live cyber range environment. Candidates then get the opportunity to prove their mettle through a series of Global Ethical Hacking Competitions designed to keep their skills up to date years after achieving the certification. One of the most sought-after certifications globally, the CEH prepares candidates for various lucrative cyber security roles with top companies.<\/p><h3>CEH Program Outline<\/h3><div class=\"table-responsive\"><table class=\"table1\"><tbody><tr><td>Ethical Hacking Introduction<\/td><td>Foot Printing and Reconnaissance<\/td><td>Scanning Networks<\/td><td>Enumeration<\/td><\/tr><tr><td>Vulnerability Analysis<\/td><td>System Hacking<\/td><td>Malware Threats<\/td><td>Sniffing<\/td><\/tr><tr><td>Social Engineering<\/td><td>Denial-of-Service<\/td><td>Session Hijacking<\/td><td>Evading IDS, Firewalls, and Honeypots<\/td><\/tr><tr><td>Hacking Web Servers<\/td><td>Hacking Web Applications<\/td><td>SQL Injection<\/td><td>Hacking Wireless Networks<\/td><\/tr><tr><td>Hacking Mobile Platforms<\/td><td>IoT Hacking<\/td><td>Cloud Computing<\/td><td>Cryptography<\/td><\/tr><\/tbody><\/table><\/div><h3>\u00a0<\/h3><h3>\u00a0<\/h3><h3>CEH is the World\u2019s only <a href=\"https:\/\/www.eccouncil.org\/train-certify\/\" target=\"_blank\" rel=\"noopener\">cybersecurity certification<\/a> program that incorporates a unique 4 phase learning framework of Learn, Certify, Engage and Compete.<\/h3><p>Its a one-of-a-kind training program to teach you everything you need to know about ethical hacking with hands-on training, labs, assessment, a mock engagement (practice), and a global hacking competition.<\/p><h3>The 4-Phase Learning Framework &amp; the Key features of CEH<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b7a3f7a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b7a3f7a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-72a5ab6\" data-id=\"72a5ab6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1558c3a elementor-widget elementor-widget-image\" data-id=\"1558c3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"593\" height=\"461\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Ceh-learn.png\" class=\"attachment-large size-large wp-image-79982\" alt=\"\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Ceh-learn.png 593w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Ceh-learn-300x233.png 300w\" sizes=\"(max-width: 593px) 100vw, 593px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-69e7bc1\" data-id=\"69e7bc1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-028712f elementor-widget elementor-widget-text-editor\" data-id=\"028712f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>CEH Learn (Gain Skills):<\/strong> The CEH training program trains students through a carefully curated training plan that offers prospective ethical hackers core knowledge about the latest operating systems, tools, and techniques. The course is divided into 20 modules and spans 5 days, helping learners get exposed to 3,500 hacking tools and gain skills required to hack multiple operating systems (Windows 11, Windows Servers, Linux, Ubuntu, Android). Through extensive hands-on learning in EC-Council&#8217;s labs, students get the opportunity to hone their practical skills by tackling live challenges.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e819190 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e819190\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-63c5af1\" data-id=\"63c5af1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37bdad7 elementor-widget elementor-widget-image\" data-id=\"37bdad7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"575\" height=\"446\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/ceh-certify.png\" class=\"attachment-large size-large wp-image-79983\" alt=\"\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/ceh-certify.png 575w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/ceh-certify-300x233.png 300w\" sizes=\"(max-width: 575px) 100vw, 575px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5c79c41\" data-id=\"5c79c41\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b2d631b elementor-widget elementor-widget-text-editor\" data-id=\"b2d631b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>CEH Certify (Gain Experience):<\/strong> In this phase, students are evaluated through knowledge-based and application-based questions. The first level assesses candidates on their understanding of ethical hacking domains, and the second level evaluates their practical skills in combatting real-life challenges through 20 scenario-based questions.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-017473d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"017473d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-dcdf26d\" data-id=\"dcdf26d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f2daba elementor-widget elementor-widget-image\" data-id=\"0f2daba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"571\" height=\"443\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Ceh-Engage.png\" class=\"attachment-large size-large wp-image-79984\" alt=\"\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Ceh-Engage.png 571w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Ceh-Engage-300x233.png 300w\" sizes=\"(max-width: 571px) 100vw, 571px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-92a29c8\" data-id=\"92a29c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0249333 elementor-widget elementor-widget-text-editor\" data-id=\"0249333\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh-engage\/\">CEH Engage<\/a><br \/>(Gain Recognition):<\/strong> In this phase, students learn to apply their knowledge of the 5 phases (Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Covering Your Tracks) through real-world ethical hacking engagements.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-32e1814 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"32e1814\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-60407ea\" data-id=\"60407ea\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e98803 elementor-widget elementor-widget-image\" data-id=\"4e98803\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"468\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/ceh-compete.png\" class=\"attachment-large size-large wp-image-79985\" alt=\"\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/ceh-compete.png 602w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/ceh-compete-300x233.png 300w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c4eb21c\" data-id=\"c4eb21c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ce5120d elementor-widget elementor-widget-text-editor\" data-id=\"ce5120d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh-compete\/\">CEH Compete<\/a> (Gain Respect):<\/strong> The CEH training program offers ethical hackers a chance to compete with peers worldwide through the CEH\u2019s monthly global challenges based on current technologies and concepts. Candidates participate in 4-hour capture-the-flag style competitions to hack their way to the top of the leaderboard.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f21e25f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f21e25f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2c96a02\" data-id=\"2c96a02\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b32c3e elementor-widget elementor-widget-text-editor\" data-id=\"2b32c3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>\u00a0<\/h3><h3>CEH Training and Examination information to get certified.<\/h3><p>Please visit the CEH training page, complete the form, and speak with a career advisor to guide you through the certification process and assist you with any other queries regarding the course.<\/p><h4>Training Information<\/h4><p>Training Options: iLearn (Self-Study) \/ iWeek (Live Online) \/ Master Class \/ Training Partner (in person)<\/p><h4>Examination Format<\/h4><p>The CEH examination is conducted in two phases:<\/p><ol><li>CEH\u00ae (MCQ Exam)- This is a 4-hour exam with 125 multiple choice questions, testing candidates\u2019 knowledge of security threats, attack vectors, prevention, procedures, and more.<\/li><li>CEH\u00ae (Practical)- The CEH practical is a 6-hour, 100% hands-on exam conducted in EC-Council\u2019s live cyber range testing candidates\u2019 practical skills in implementing various ethical hacking techniques.<\/li><\/ol><p>For more information, visit: <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-C|EH\/\">CEH training program<\/a><\/p><h2>\u00a0<\/h2><h2>Is the CEH Worth it?<\/h2><h3>CEH Review by Thousands of Seasoned Cyber Security Professionals.<\/h3><p><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/is-ceh-worth-it\/\">Is the CEH worth it?<\/a> Over the course of 25 years, the CEH has consistently proved its value, enabling cyber security experts to reach new heights in both their personal and professional journeys. Here are some highlights from the <a href=\"https:\/\/www.eccouncil.org\/ceh-hall-of-fame-2023\/\">CEH Hall of Fame Report<\/a> in which thousands of seasoned cyber security professionals were surveyed about the program.<\/p><ul><li>Over 1 in every 2 professionals received promotions after the CEH.<\/li><li>97% stated that the skills they acquired during the CEH helped safeguard their organizations.<\/li><li>95% chose the CEH for career growth.<\/li><li>93% said that CEH skills improved their organizational security.<\/li><li>97% found that CEH Labs accurately mimic real-world cyber threats.<\/li><li>92% of hiring managers prefer candidates with the CEH for jobs that require ethical hacking skills.<\/li><li>92% reported that the CEH boosted their self-confidence.<\/li><li>80% started their cyber security careers with the CEH.<\/li><li>88% considered the CEH to be the most comprehensive ethical hacking program in the industry.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-407fae8\" data-id=\"407fae8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-502e7e7 elementor-widget elementor-widget-heading\" data-id=\"502e7e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Recent Articles<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bae0e5 icon-box-vertical-align-top img-align-left image-vertical-align-start slide-h-position-left elementor-widget elementor-widget-the7-elements-simple-posts\" data-id=\"3bae0e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7-elements-simple-posts.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"the7-simple-widget-posts the7-elementor-widget the7-elements-simple-posts-3bae0e5 jquery-filter jquery-filter\" data-post-limit=\"-1\" data-pagination-mode=\"none\" data-scroll-offset=\"\" aria-live=\"assertive\">\t\t\t<div class=\"dt-css-grid custom-pagination-handler\" data-columns=\"{&quot;d&quot;:1,&quot;t&quot;:2,&quot;p&quot;:1,&quot;wd&quot;:&quot;&quot;}\">\n\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-85028 type-post status-publish format-standard has-post-thumbnail category-ai-program-manager\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ai-program-manager\/governance-roi-the-cost-of-noncompliance-versus-the-cost-of-certification\/\"><img decoding=\"async\" width=\"1200\" height=\"628\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%201200%20628&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 1200px) 100vw, 1200px\" style=\"--ratio: 1200 \/ 628;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Cost.webp\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Cost.webp 1200w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Cost-300x157.webp 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Cost-1024x536.webp 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Cost-768x402.webp 768w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h6 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ai-program-manager\/governance-roi-the-cost-of-noncompliance-versus-the-cost-of-certification\/\" rel=\"bookmark\" title=\"Governance ROI: The Cost of Noncompliance Versus the Cost of Certification\" class=\"post-title\">Governance ROI: The Cost of Noncompliance Versus the&hellip;<\/a><\/h6><div class=\"entry-meta\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/2026\/04\/27\/\" title=\"11:16 am\" class=\"meta-item data-link\" rel=\"bookmark\"><time class=\"entry-date updated\" datetime=\"2026-04-27T11:16:37+00:00\">April 27, 2026<\/time><\/a><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84987 type-post status-publish format-standard has-post-thumbnail category-ethical-hacking\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/cybersecurity-certification-roadmap\/\"><img decoding=\"async\" width=\"1200\" height=\"628\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%201200%20628&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 1200px) 100vw, 1200px\" style=\"--ratio: 1200 \/ 628;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/image-14.webp\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/image-14.webp 1200w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/image-14-300x157.webp 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/image-14-1024x536.webp 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/image-14-768x402.webp 768w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h6 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/cybersecurity-certification-roadmap\/\" rel=\"bookmark\" title=\"Cybersecurity Certification Roadmap 2026: What to Learn, When, and Why\" class=\"post-title\">Cybersecurity Certification Roadmap 2026: What to Learn, When,&hellip;<\/a><\/h6><div class=\"entry-meta\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/2026\/04\/24\/\" title=\"6:55 am\" class=\"meta-item data-link\" rel=\"bookmark\"><time class=\"entry-date updated\" datetime=\"2026-04-24T06:55:23+00:00\">April 24, 2026<\/time><\/a><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84897 type-post status-publish format-standard has-post-thumbnail category-penetration-testing tag-bug-bounty tag-ceh tag-cybersecurity tag-iot tag-keywords-cpent tag-penetration-testing tag-reverse-engineering\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/advanced-penetration-testing-with-cpent-an-interview-with-omar-tamer\/\"><img decoding=\"async\" width=\"1080\" height=\"1080\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%201080%201080&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"Advanced Penetration Testing with CPENT: An Interview with Omar Tamer\" sizes=\"(max-width: 1080px) 100vw, 1080px\" style=\"--ratio: 1080 \/ 1080;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Blog-Banners-CPENT-1080x1080e.png\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Blog-Banners-CPENT-1080x1080e.png 1080w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Blog-Banners-CPENT-1080x1080e-300x300.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Blog-Banners-CPENT-1080x1080e-1024x1024.png 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Blog-Banners-CPENT-1080x1080e-150x150.png 150w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Blog-Banners-CPENT-1080x1080e-768x768.png 768w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h6 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/advanced-penetration-testing-with-cpent-an-interview-with-omar-tamer\/\" rel=\"bookmark\" title=\"Advanced Penetration Testing with CPENT: An Interview with Omar Tamer\" class=\"post-title\">Advanced Penetration Testing with CPENT: An Interview with&hellip;<\/a><\/h6><div class=\"entry-meta\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/2026\/04\/07\/\" title=\"9:51 am\" class=\"meta-item data-link\" rel=\"bookmark\"><time class=\"entry-date updated\" datetime=\"2026-04-07T09:51:26+00:00\">April 7, 2026<\/time><\/a><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84804 type-post status-publish format-standard has-post-thumbnail category-offensive-ai-security\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/what-is-adversarial-ai-real-world-attacks-on-modern-ai-systems\/\"><img decoding=\"async\" width=\"1200\" height=\"628\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%201200%20628&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 1200px) 100vw, 1200px\" style=\"--ratio: 1200 \/ 628;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/image-20.png\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/image-20.png 1200w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/image-20-300x157.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/image-20-1024x536.png 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/image-20-768x402.png 768w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h6 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/what-is-adversarial-ai-real-world-attacks-on-modern-ai-systems\/\" rel=\"bookmark\" title=\"What Is Adversarial AI? Real-World Attacks on Modern AI Systems\" class=\"post-title\">What Is Adversarial AI? Real-World Attacks on Modern&hellip;<\/a><\/h6><div class=\"entry-meta\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/2026\/03\/27\/\" title=\"12:01 pm\" class=\"meta-item data-link\" rel=\"bookmark\"><time class=\"entry-date updated\" datetime=\"2026-03-27T12:01:22+00:00\">March 27, 2026<\/time><\/a><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c7a8fe elementor-widget elementor-widget-spacer\" data-id=\"9c7a8fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8517024 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8517024\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-055cb43\" data-id=\"055cb43\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ce7d3b eael-gravity-form-button-custom elementor-widget elementor-widget-eael-gravity-form\" data-id=\"5ce7d3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-gravity-form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"eael-contact-form eael-gravity-form title-description-hide eael-contact-form-align-left\">\n\t\t        \t\t\t\t\t<div class=\"eael-gravity-form-heading\">\n\t\t\t\t        \t\t\t\t        \t\t\t\t\t\t\t<div class=\"eael-contact-form-description eael-gravity-form-description\">\n\t\t\t\t\t\t        Become a <br>Certified Ethical Hacker (CEH<sup>AI<\/sup>)\t\t\t\t\t\t\t<\/div>\n\t\t\t\t        \t\t\t\t\t<\/div>\n\t\t        <script>\nvar gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),document.addEventListener(\"gform\/theme\/scripts_loaded\",function(){gform.themeScriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>\"function\"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn(\"The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1.\"),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener(\"gform_main_scripts_loaded\",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener(\"gform\/theme\/scripts_loaded\",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener(\"DOMContentLoaded\",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook(\"action\",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook(\"filter\",o,r,e,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,r){gform.removeHook(\"action\",o,r)},removeFilter:function(o,r,e){gform.removeHook(\"filter\",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+\"_\"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==r?t.apply(null,e):e[0]=t.apply(null,e)})),\"filter\"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});\n<\/script>\n\n                <div class='gf_browser_gecko gform_wrapper gravity-theme gform-theme--no-framework' data-form-theme='gravity-theme' data-form-index='0' id='gform_wrapper_31' style='display:none'><div id='gf_31' class='gform_anchor' tabindex='-1'><\/div>\n                        <div class='gform_heading'>\n\t\t\t\t\t\t\t<p class='gform_required_legend'>&quot;<span class=\"gfield_required gfield_required_asterisk\">*<\/span>&quot; indicates required fields<\/p>\n                        <\/div><form method='post' enctype='multipart\/form-data'  id='gform_31'  action='\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79977#gf_31' data-formid='31' novalidate>\n                        <div class='gform-body gform_body'><div id='gform_fields_31' class='gform_fields top_label form_sublabel_below description_above validation_below'><fieldset id=\"field_31_35\" class=\"gfield gfield--type-name gfield--input-type-name gfield--width-full gfield_contains_required field_sublabel_hidden_label gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/legend><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_31_35'>\n                            \n                            <span id='input_31_35_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_35.3' id='input_31_35_3' value=''   aria-required='true'   placeholder='First Name *'  \/>\n                                                    <label for='input_31_35_3' class='gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text'>First Name<\/label>\n                                                <\/span>\n                            \n                            <span id='input_31_35_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_35.6' id='input_31_35_6' value=''   aria-required='true'   placeholder='Last Name *'  \/>\n                                                    <label for='input_31_35_6' class='gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text'>Last Name<\/label>\n                                                <\/span>\n                            \n                        <\/div><\/fieldset><div id=\"field_31_52\" class=\"gfield gfield--type-phone gfield--input-type-phone gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label screen-reader-text' for='input_31_52'>Phone Number *<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_phone'><input name='input_52' id='input_31_52' type='tel' value='' class='large'  placeholder='Phone Number *' aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_31_53\" class=\"gfield gfield--type-email gfield--input-type-email gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_31_53'>Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_53' id='input_31_53' type='email' value='' class='large'   placeholder='Email*' aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><fieldset id=\"field_31_51\" class=\"gfield gfield--type-address gfield--input-type-address gfield--width-full gfield_contains_required field_sublabel_hidden_label gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_hidden\"  ><div class=\"admin-hidden-markup\"><i class=\"gform-icon gform-icon--hidden\" aria-hidden=\"true\" title=\"This field is hidden when viewing the form\"><\/i><span>This field is hidden when viewing the form<\/span><\/div><legend class='gfield_label gform-field-label gfield_label_before_complex' >Address<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/legend>    \n                    <div class='ginput_complex ginput_container has_country ginput_container_address gform-grid-row' id='input_31_51' >\n                        <input type='hidden' class='gform_hidden' name='input_51.4' id='input_31_51_4' value=''\/><span class='ginput_left address_country ginput_address_country gform-grid-col' id='input_31_51_6_container' >\n                                        <select name='input_51.6' id='input_31_51_6'   aria-required='true'   autocomplete=\"country-name\" ><option value='' >Country *<\/option><option value='Afghanistan' >Afghanistan<\/option><option value='Albania' >Albania<\/option><option value='Algeria' >Algeria<\/option><option value='American Samoa' >American Samoa<\/option><option value='Andorra' >Andorra<\/option><option value='Angola' >Angola<\/option><option value='Anguilla' >Anguilla<\/option><option value='Antarctica' >Antarctica<\/option><option value='Antigua and Barbuda' >Antigua and Barbuda<\/option><option value='Argentina' >Argentina<\/option><option value='Armenia' >Armenia<\/option><option value='Aruba' >Aruba<\/option><option value='Australia' >Australia<\/option><option value='Austria' >Austria<\/option><option value='Azerbaijan' >Azerbaijan<\/option><option value='Bahamas' >Bahamas<\/option><option value='Bahrain' >Bahrain<\/option><option value='Bangladesh' >Bangladesh<\/option><option value='Barbados' >Barbados<\/option><option value='Belarus' >Belarus<\/option><option value='Belgium' >Belgium<\/option><option value='Belize' >Belize<\/option><option value='Benin' >Benin<\/option><option value='Bermuda' >Bermuda<\/option><option value='Bhutan' >Bhutan<\/option><option value='Bolivia' >Bolivia<\/option><option value='Bonaire, Sint Eustatius and Saba' >Bonaire, Sint Eustatius and Saba<\/option><option value='Bosnia and Herzegovina' >Bosnia and Herzegovina<\/option><option value='Botswana' >Botswana<\/option><option value='Bouvet Island' >Bouvet Island<\/option><option value='Brazil' >Brazil<\/option><option value='British Indian Ocean Territory' >British Indian Ocean Territory<\/option><option value='Brunei Darussalam' >Brunei Darussalam<\/option><option value='Bulgaria' >Bulgaria<\/option><option value='Burkina Faso' >Burkina Faso<\/option><option value='Burundi' >Burundi<\/option><option value='Cabo Verde' >Cabo Verde<\/option><option value='Cambodia' >Cambodia<\/option><option value='Cameroon' >Cameroon<\/option><option value='Canada' >Canada<\/option><option value='Cayman Islands' >Cayman Islands<\/option><option value='Central African Republic' >Central African Republic<\/option><option value='Chad' >Chad<\/option><option value='Chile' >Chile<\/option><option value='China' >China<\/option><option value='Christmas Island' >Christmas Island<\/option><option value='Cocos Islands' >Cocos Islands<\/option><option value='Colombia' >Colombia<\/option><option value='Comoros' >Comoros<\/option><option value='Congo' >Congo<\/option><option value='Congo, Democratic Republic of the' >Congo, Democratic Republic of the<\/option><option value='Cook Islands' >Cook Islands<\/option><option value='Costa Rica' >Costa Rica<\/option><option value='Croatia' >Croatia<\/option><option value='Cuba' >Cuba<\/option><option value='Cura\u00e7ao' >Cura\u00e7ao<\/option><option value='Cyprus' >Cyprus<\/option><option value='Czechia' >Czechia<\/option><option value='C\u00f4te d&#039;Ivoire' >C\u00f4te d&#039;Ivoire<\/option><option value='Denmark' >Denmark<\/option><option value='Djibouti' >Djibouti<\/option><option value='Dominica' >Dominica<\/option><option value='Dominican Republic' >Dominican Republic<\/option><option value='Ecuador' >Ecuador<\/option><option value='Egypt' >Egypt<\/option><option value='El Salvador' >El Salvador<\/option><option value='Equatorial Guinea' >Equatorial Guinea<\/option><option value='Eritrea' >Eritrea<\/option><option value='Estonia' >Estonia<\/option><option value='Eswatini' >Eswatini<\/option><option value='Ethiopia' >Ethiopia<\/option><option value='Falkland Islands' >Falkland Islands<\/option><option value='Faroe Islands' >Faroe Islands<\/option><option value='Fiji' >Fiji<\/option><option value='Finland' >Finland<\/option><option value='France' >France<\/option><option value='French Guiana' >French Guiana<\/option><option value='French Polynesia' >French Polynesia<\/option><option value='French Southern Territories' >French Southern Territories<\/option><option value='Gabon' >Gabon<\/option><option value='Gambia' >Gambia<\/option><option value='Georgia' >Georgia<\/option><option value='Germany' >Germany<\/option><option value='Ghana' >Ghana<\/option><option value='Gibraltar' >Gibraltar<\/option><option value='Greece' >Greece<\/option><option value='Greenland' >Greenland<\/option><option value='Grenada' >Grenada<\/option><option value='Guadeloupe' >Guadeloupe<\/option><option value='Guam' >Guam<\/option><option value='Guatemala' >Guatemala<\/option><option value='Guernsey' >Guernsey<\/option><option value='Guinea' >Guinea<\/option><option value='Guinea-Bissau' >Guinea-Bissau<\/option><option value='Guyana' >Guyana<\/option><option value='Haiti' >Haiti<\/option><option value='Heard Island and McDonald Islands' >Heard Island and McDonald Islands<\/option><option value='Holy See' >Holy See<\/option><option value='Honduras' >Honduras<\/option><option value='Hong Kong' >Hong Kong<\/option><option value='Hungary' >Hungary<\/option><option value='Iceland' >Iceland<\/option><option value='India' >India<\/option><option value='Indonesia' >Indonesia<\/option><option value='Iran' >Iran<\/option><option value='Iraq' >Iraq<\/option><option value='Ireland' >Ireland<\/option><option value='Isle of Man' >Isle of Man<\/option><option value='Israel' >Israel<\/option><option value='Italy' >Italy<\/option><option value='Jamaica' >Jamaica<\/option><option value='Japan' >Japan<\/option><option value='Jersey' >Jersey<\/option><option value='Jordan' >Jordan<\/option><option value='Kazakhstan' >Kazakhstan<\/option><option value='Kenya' >Kenya<\/option><option value='Kiribati' >Kiribati<\/option><option value='Korea, Democratic People&#039;s Republic of' >Korea, Democratic People&#039;s Republic of<\/option><option value='Korea, Republic of' >Korea, Republic of<\/option><option value='Kuwait' >Kuwait<\/option><option value='Kyrgyzstan' >Kyrgyzstan<\/option><option value='Lao People&#039;s Democratic Republic' >Lao People&#039;s Democratic Republic<\/option><option value='Latvia' >Latvia<\/option><option value='Lebanon' >Lebanon<\/option><option value='Lesotho' >Lesotho<\/option><option value='Liberia' >Liberia<\/option><option value='Libya' >Libya<\/option><option value='Liechtenstein' >Liechtenstein<\/option><option value='Lithuania' >Lithuania<\/option><option value='Luxembourg' >Luxembourg<\/option><option value='Macao' >Macao<\/option><option value='Madagascar' >Madagascar<\/option><option value='Malawi' >Malawi<\/option><option value='Malaysia' >Malaysia<\/option><option value='Maldives' >Maldives<\/option><option value='Mali' >Mali<\/option><option value='Malta' >Malta<\/option><option value='Marshall Islands' >Marshall Islands<\/option><option value='Martinique' >Martinique<\/option><option value='Mauritania' >Mauritania<\/option><option value='Mauritius' >Mauritius<\/option><option value='Mayotte' >Mayotte<\/option><option value='Mexico' >Mexico<\/option><option value='Micronesia' >Micronesia<\/option><option value='Moldova' >Moldova<\/option><option value='Monaco' >Monaco<\/option><option value='Mongolia' >Mongolia<\/option><option value='Montenegro' >Montenegro<\/option><option value='Montserrat' >Montserrat<\/option><option value='Morocco' >Morocco<\/option><option value='Mozambique' >Mozambique<\/option><option value='Myanmar' >Myanmar<\/option><option value='Namibia' >Namibia<\/option><option value='Nauru' >Nauru<\/option><option value='Nepal' >Nepal<\/option><option value='Netherlands' >Netherlands<\/option><option value='New Caledonia' >New Caledonia<\/option><option value='New Zealand' >New Zealand<\/option><option value='Nicaragua' >Nicaragua<\/option><option value='Niger' >Niger<\/option><option value='Nigeria' >Nigeria<\/option><option value='Niue' >Niue<\/option><option value='Norfolk Island' >Norfolk Island<\/option><option value='North Macedonia' >North Macedonia<\/option><option value='Northern Mariana Islands' >Northern Mariana Islands<\/option><option value='Norway' >Norway<\/option><option value='Oman' >Oman<\/option><option value='Pakistan' >Pakistan<\/option><option value='Palau' >Palau<\/option><option value='Palestine, State of' >Palestine, State of<\/option><option value='Panama' >Panama<\/option><option value='Papua New Guinea' >Papua New Guinea<\/option><option value='Paraguay' >Paraguay<\/option><option value='Peru' >Peru<\/option><option value='Philippines' >Philippines<\/option><option value='Pitcairn' >Pitcairn<\/option><option value='Poland' >Poland<\/option><option value='Portugal' >Portugal<\/option><option value='Puerto Rico' >Puerto Rico<\/option><option value='Qatar' >Qatar<\/option><option value='Romania' >Romania<\/option><option value='Russian Federation' >Russian Federation<\/option><option value='Rwanda' >Rwanda<\/option><option value='R\u00e9union' >R\u00e9union<\/option><option value='Saint Barth\u00e9lemy' >Saint Barth\u00e9lemy<\/option><option value='Saint Helena, Ascension and Tristan da Cunha' >Saint Helena, Ascension and Tristan da Cunha<\/option><option value='Saint Kitts and Nevis' >Saint Kitts and Nevis<\/option><option value='Saint Lucia' >Saint Lucia<\/option><option value='Saint Martin' >Saint Martin<\/option><option value='Saint Pierre and Miquelon' >Saint Pierre and Miquelon<\/option><option value='Saint Vincent and the Grenadines' >Saint Vincent and the Grenadines<\/option><option value='Samoa' >Samoa<\/option><option value='San Marino' >San Marino<\/option><option value='Sao Tome and Principe' >Sao Tome and Principe<\/option><option value='Saudi Arabia' >Saudi Arabia<\/option><option value='Senegal' >Senegal<\/option><option value='Serbia' >Serbia<\/option><option value='Seychelles' >Seychelles<\/option><option value='Sierra Leone' >Sierra Leone<\/option><option value='Singapore' >Singapore<\/option><option value='Sint Maarten' >Sint Maarten<\/option><option value='Slovakia' >Slovakia<\/option><option value='Slovenia' >Slovenia<\/option><option value='Solomon Islands' >Solomon Islands<\/option><option value='Somalia' >Somalia<\/option><option value='South Africa' >South Africa<\/option><option value='South Georgia and the South Sandwich Islands' >South Georgia and the South Sandwich Islands<\/option><option value='South Sudan' >South Sudan<\/option><option value='Spain' >Spain<\/option><option value='Sri Lanka' >Sri Lanka<\/option><option value='Sudan' >Sudan<\/option><option value='Suriname' >Suriname<\/option><option value='Svalbard and Jan Mayen' >Svalbard and Jan Mayen<\/option><option value='Sweden' >Sweden<\/option><option value='Switzerland' >Switzerland<\/option><option value='Syria Arab Republic' >Syria Arab Republic<\/option><option value='Taiwan' >Taiwan<\/option><option value='Tajikistan' >Tajikistan<\/option><option value='Tanzania, the United Republic of' >Tanzania, the United Republic of<\/option><option value='Thailand' >Thailand<\/option><option value='Timor-Leste' >Timor-Leste<\/option><option value='Togo' >Togo<\/option><option value='Tokelau' >Tokelau<\/option><option value='Tonga' >Tonga<\/option><option value='Trinidad and Tobago' >Trinidad and Tobago<\/option><option value='Tunisia' >Tunisia<\/option><option value='Turkmenistan' >Turkmenistan<\/option><option value='Turks and Caicos Islands' >Turks and Caicos Islands<\/option><option value='Tuvalu' >Tuvalu<\/option><option value='T\u00fcrkiye' >T\u00fcrkiye<\/option><option value='US Minor Outlying Islands' >US Minor Outlying Islands<\/option><option value='Uganda' >Uganda<\/option><option value='Ukraine' >Ukraine<\/option><option value='United Arab Emirates' >United Arab Emirates<\/option><option value='United Kingdom' >United Kingdom<\/option><option value='United States' selected='selected'>United States<\/option><option value='Uruguay' >Uruguay<\/option><option value='Uzbekistan' >Uzbekistan<\/option><option value='Vanuatu' >Vanuatu<\/option><option value='Venezuela' >Venezuela<\/option><option value='Viet Nam' >Viet Nam<\/option><option value='Virgin Islands, British' >Virgin Islands, British<\/option><option value='Virgin Islands, U.S.' >Virgin Islands, U.S.<\/option><option value='Wallis and Futuna' >Wallis and Futuna<\/option><option value='Western Sahara' >Western Sahara<\/option><option value='Yemen' >Yemen<\/option><option value='Zambia' >Zambia<\/option><option value='Zimbabwe' >Zimbabwe<\/option><option value='\u00c5land Islands' >\u00c5land Islands<\/option><\/select>\n                                        <label for='input_31_51_6' id='input_31_51_6_label' class='gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text'>Country<\/label>\n                                    <\/span>\n                    <div class='gf_clear gf_clear_complex'><\/div>\n                <\/div><\/fieldset><div id=\"field_31_61\" class=\"gfield gfield--type-select gfield--input-type-select gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_31_61'>What are you interested in ?<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_select'><select name='input_61' id='input_31_61' class='large gfield_select'    aria-required=\"true\" aria-invalid=\"false\" ><option value='' selected='selected' class='gf_placeholder'>What are you interested in ?<\/option><option value='Cybersecurity Certifications' >Cybersecurity Certifications<\/option><option value='University Degree' >University Degree<\/option><\/select><\/div><\/div><div id=\"field_31_39\" class=\"gfield gfield--type-select gfield--input-type-select gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_31_39'>Select Option<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_select'><select name='input_39' id='input_31_39' class='large gfield_select'    aria-required=\"true\" aria-invalid=\"false\" ><option value='' selected='selected' class='gf_placeholder'>Select Option<\/option><option value='Ethical Hacking' >Ethical Hacking<\/option><option value='AI Program Manager' >AI Program Manager<\/option><option value='Offensive AI Security Professional' >Offensive AI Security Professional<\/option><option value='Responsible AI Governance and Ethics' >Responsible AI Governance and Ethics<\/option><option value='Penetration Testing' >Penetration Testing<\/option><option value='Computer Forensics' >Computer Forensics<\/option><option value='Network Security\/ Network Defense' >Network Security\/ Network Defense<\/option><option value='Incident Handling' >Incident Handling<\/option><option value='SOC Analyst' >SOC Analyst<\/option><option value='Threat Intelligence' >Threat Intelligence<\/option><option value='Executive Management (CCISO)' >Executive Management (CCISO)<\/option><option value='Security Awareness' >Security Awareness<\/option><option value='Cyber Range Challenge' >Cyber Range Challenge<\/option><option value='Secure Coding' >Secure Coding<\/option><option value='Blockchain' >Blockchain<\/option><option value='Disaster Recovery' >Disaster Recovery<\/option><option value='Web Application Security' >Web Application Security<\/option><option value='Cloud Security' >Cloud Security<\/option><option value='Cybersecurity Technician' >Cybersecurity Technician<\/option><option value='Fundamentals' >Fundamentals<\/option><option value='Encryption' >Encryption<\/option><option value='DevSecOps' >DevSecOps<\/option><option value='AI Essentials' >AI Essentials<\/option><\/select><\/div><\/div><div id=\"field_31_62\" class=\"gfield gfield--type-select gfield--input-type-select gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_31_62'>Which degree are you interested in?*<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_select'><select name='input_62' id='input_31_62' class='large gfield_select'    aria-required=\"true\" aria-invalid=\"false\" ><option value='' selected='selected' class='gf_placeholder'>Which degree are you interested in?*<\/option><option value='Master of Science in Cyber Security' >Master of Science in Cyber Security<\/option><option value='Master of Science in Computer Science' >Master of Science in Computer Science<\/option><option value='MBA in Cybersecurity' >MBA in Cybersecurity<\/option><option value='Bachelor of Science in Cyber Security' >Bachelor of Science in Cyber Security<\/option><option value='Graduate Certificate Program' >Graduate Certificate Program<\/option><\/select><\/div><\/div><div id=\"field_31_60\" class=\"gfield gfield--type-textarea gfield--input-type-textarea gfield--width-full commentBox field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label screen-reader-text' for='input_31_60'>Please let us know how we can help!<\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_60' id='input_31_60' class='textarea small'    placeholder='Please let us know how we can help!'  aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><fieldset id=\"field_31_27\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent adv-board-form field_sublabel_below gfield--has-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Agreement<\/legend><div class='ginput_container ginput_container_consent'><input name='input_27.1' id='input_31_27_1' type='checkbox' value='1'  aria-describedby=\"gfield_consent_description_31_27\"  aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_31_27_1' ><\/label><input type='hidden' name='input_27.2' value='' class='gform_hidden' \/><input type='hidden' name='input_27.3' value='14' class='gform_hidden' \/><\/div><div class='gfield_description gfield_consent_description' id='gfield_consent_description_31_27' tabindex='0'> By clicking Submit, I consent to the use of my data for promotional purposes and accept the <a href=\"https:\/\/www.eccouncil.org\/legal\/privacy-policy\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">Privacy Policy<\/a> and <a href=\"https:\/\/www.eccouncil.org\/legal\/terms-of-use\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">Terms<\/a>. <\/div><\/fieldset><div id=\"field_31_10\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_10' id='input_31_10' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='' \/><\/div><\/div><div id=\"field_31_22\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_22' id='input_31_22' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='CEH_Cybersec' \/><\/div><\/div><div id=\"field_31_63\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gfield--width-full gform_hidden field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_63' id='input_31_63' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='United States' \/><\/div><\/div><div id=\"field_31_64\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gfield--width-full gform_hidden field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_64' id='input_31_64' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79977' \/><\/div><\/div><div id=\"field_31_59\" class=\"gfield gfield--type-html gfield--input-type-html gfield--width-full gfield_html gfield_html_formatted gfield_no_follows_desc field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible\"  ><script>\n  document.addEventListener('DOMContentLoaded', function () {\n    const interval = setInterval(function () {\n      const checkbox = document.getElementById('input_31_27_1');\n      if (checkbox) {\n        checkbox.checked = true;\n        clearInterval(interval);\n      }\n    }, 100); \/\/ Check every 100ms until found\n  });\n<\/script><\/div><\/div><\/div>\n        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_31' class='gform_button button gform-button--width-full' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit'  \/> \n            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_31' value='postback' \/>\n            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_31' id='gform_theme_31' value='gravity-theme' \/>\n            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_31' id='gform_style_settings_31' value='' \/>\n            <input type='hidden' class='gform_hidden' name='is_submit_31' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='31' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_31' value='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' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_31' id='gform_target_page_number_31' value='0' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_31' id='gform_source_page_number_31' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div><script>\ngform.initializeOnLoaded( function() {gformInitSpinner( 31, 'https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_31').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_31');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_31').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){form_content.find('form').css('opacity', 0);jQuery('#gform_wrapper_31').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_31').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_31').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/ jQuery(document).scrollTop(500); }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_31').val();gformInitSpinner( 31, 'https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [31, current_page]);window['gf_submitting_31'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_31').replaceWith(confirmation_content);jQuery(document).scrollTop(500);jQuery(document).trigger('gform_confirmation_loaded', [31]);window['gf_submitting_31'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_31').text());}else{jQuery('#gform_31').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger(\"gform_pre_post_render\", [{ formId: \"31\", currentPage: \"current_page\", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( \"gform_wrapper_31\" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( \"span\" );            visibilitySpan.id = \"gform_visibility_test_31\";            gformWrapperDiv.insertAdjacentElement( \"afterend\", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( \"gform_visibility_test_31\" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 31, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} );\n<\/script>\n\t\t\t<\/div>\n\n            <script type=\"text\/javascript\">\n                var gf_global = {\"gf_currency_config\":{\"name\":\"U.S. Dollar\",\"symbol_left\":\"$\",\"symbol_right\":\"\",\"symbol_padding\":\"\",\"thousand_separator\":\",\",\"decimal_separator\":\".\",\"decimals\":2,\"code\":\"USD\"},\"base_url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/plugins\\\/gravityforms\",\"number_formats\":[],\"spinnerUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/plugins\\\/gravityforms\\\/images\\\/spinner.svg\",\"version_hash\":\"9c6c22344d2f330a1b64bc899d4ec8cc\",\"strings\":{\"newRowAdded\":\"New row added.\",\"rowRemoved\":\"Row removed\",\"formSaved\":\"The form has been saved.  The content contains the link to return and complete the form.\"}};\t\t\t\tvar gf_vars = {\"active\":\"Active\",\"inactive\":\"Inactive\",\"save\":\"Save\",\"update\":\"Update\",\"previousLabel\":\"Previous\",\"selectFormat\":\"Select a format\",\"column\":\"Column\",\"editToViewAll\":\"5 of %d items shown. Edit field to view all\",\"selectAll\":\"Select All\",\"enterValue\":\"Enter a value\",\"formTitle\":\"Untitled Form\",\"formDescription\":\"We would love to hear from you! Please fill out this form and we will get in touch with you shortly.\",\"formConfirmationMessage\":\"Thanks for contacting us! We will get in touch with you shortly.\",\"buttonText\":\"Submit\",\"buttonDescription\":\"The submit button for this form\",\"loading\":\"Loading...\",\"thisFieldIf\":\"this field if\",\"thisSectionIf\":\"this section if\",\"thisPage\":\"this page if\",\"thisFormButton\":\"this form button if\",\"show\":\"Show\",\"hide\":\"Hide\",\"enable\":\"Enable\",\"disable\":\"Disable\",\"enabled\":\"Enabled\",\"disabled\":\"Disabled\",\"configure\":\"Configure\",\"conditional_logic_text\":\"Conditional Logic\",\"conditional_logic_desc\":\"Conditional logic allows you to change what the user sees depending on the fields they select.\",\"conditional_logic_a11y\":\"Adding conditional logic to the form submit button could cause usability problems for some users and negatively impact the accessibility of your form. Learn more about button conditional logic in our <a href=\\\"https:\\\/\\\/docs.gravityforms.com\\\/field-accessibility-warning\\\/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">documentation<span class=\\\"screen-reader-text\\\">(opens in a new tab)<\\\/span>&nbsp;<span class=\\\"gform-icon gform-icon--external-link\\\"><\\\/span><\\\/a>.\",\"page\":\"Page\",\"next_button\":\"Next Button\",\"button\":\"Submit Button\",\"all\":\"All\",\"any\":\"Any\",\"ofTheFollowingMatch\":\"of the following match:\",\"is\":\"is\",\"isNot\":\"is not\",\"greaterThan\":\"greater than\",\"lessThan\":\"less than\",\"contains\":\"contains\",\"startsWith\":\"starts with\",\"endsWith\":\"ends with\",\"emptyChoice\":\"Empty (no choices selected)\",\"alertLegacyMode\":\"This form has legacy markup enabled and doesn\\u2019t support field resizing within the editor. Please disable legacy markup in the form settings to enable live resizing.\",\"thisConfirmation\":\"Use this confirmation if\",\"thisNotification\":\"Send this notification if\",\"confirmationSave\":\"Save\",\"confirmationSaving\":\"Saving...\",\"confirmationAreYouSure\":\"Are you sure you wish to cancel these changes?\",\"confirmationIssueSaving\":\"There was an issue saving this confirmation.\",\"confirmationConfirmDelete\":\"Are you sure you wish to delete this confirmation?\",\"confirmationIssueDeleting\":\"There was an issue deleting this confirmation.\",\"confirmationConfirmDiscard\":\"There are unsaved changes to the current confirmation. Would you like to discard these changes?\",\"confirmationDefaultName\":\"Untitled Confirmation\",\"confirmationDefaultMessage\":\"Thanks for contacting us! We will get in touch with you shortly.\",\"confirmationInvalidPageSelection\":\"Please select a page.\",\"confirmationInvalidRedirect\":\"Please enter a URL.\",\"confirmationInvalidName\":\"Please enter a confirmation name.\",\"confirmationDeleteField\":\"Deleting this field will also delete all entry data associated with it. 'Cancel' to abort. 'OK' to delete.\",\"confirmationDeleteDisplayField\":\"You're about to delete this field. 'Cancel' to stop. 'OK' to delete\",\"confirmationDeleteDisplayFieldTitle\":\"Warning\",\"conditionalLogicDependency\":\"This form contains {type} conditional logic dependent upon this field. Deleting this field will deactivate those conditional logic rules and also delete all entry data associated with the field. 'Cancel' to abort. 'OK' to delete.\",\"conditionalLogicDependencyChoice\":\"This form contains {type} conditional logic dependent upon this choice. Are you sure you want to delete this choice? 'Cancel' to abort. 'OK' to delete.\",\"conditionalLogicDependencyChoiceEdit\":\"This form contains {type} conditional logic dependent upon this choice. Are you sure you want to modify this choice? 'Cancel' to abort. 'OK' to continue.\",\"conditionalLogicDependencyAdminOnly\":\"This form contains {type} conditional logic dependent upon this field. Are you sure you want to mark this field as Administrative? 'Cancel' to abort. 'OK' to continue.\",\"conditionalLogicRichTextEditorWarning\":\"This form contains conditional logic dependent upon this field. This will no longer work if the Rich Text Editor is enabled.  Are you sure you want to enable the Rich Text Editor?  'Cancel' to abort. 'OK' to continue.\",\"conditionalLogicTypeButton\":\"button\",\"conditionalLogicTypeConfirmation\":\"confirmation\",\"conditionalLogicTypeNotification\":\"notification\",\"conditionalLogicTypeNoficationRouting\":\"notification routing\",\"conditionalLogicTypeField\":\"field\",\"conditionalLogicTypeFeed\":\"feed\",\"conditionalLogicWarningTitle\":\"Conditional Logic Warning\",\"mergeTagsText\":\"Insert Merge Tags\",\"baseUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/plugins\\\/gravityforms\",\"gf_currency_config\":{\"name\":\"U.S. Dollar\",\"symbol_left\":\"$\",\"symbol_right\":\"\",\"symbol_padding\":\"\",\"thousand_separator\":\",\",\"decimal_separator\":\".\",\"decimals\":2,\"code\":\"USD\"},\"otherChoiceValue\":\"Other\",\"isFormTrash\":false,\"currentlyAddingField\":false,\"visibilityOptions\":[{\"label\":\"Visible\",\"value\":\"visible\",\"description\":\"Default option. The field is visible when viewing the form.\"},{\"label\":\"Hidden\",\"value\":\"hidden\",\"description\":\"The field is hidden when viewing the form. Useful when you require the functionality of this field but do not want the user to be able to see this field.\"},{\"label\":\"Administrative\",\"value\":\"administrative\",\"description\":\"The field is only visible when administering submitted entries. The field is not visible or functional when viewing the form.\"}],\"addFieldFilter\":\"Add a condition\",\"removeFieldFilter\":\"Remove a condition\",\"filterAndAny\":\"{0} of the following match:\",\"customChoices\":\"Custom Choices\",\"predefinedChoices\":\"Predefined Choices\",\"fieldLabelAriaLabel\":\"{field_label} - {field_type}, jump to this field&#039;s settings\",\"fieldCanBeAddedTitle\":\"Field Limit\",\"fieldCanBeAddedCaptcha\":\"A form can only contain one CAPTCHA field.\",\"fieldCanBeAddedShipping\":\"A form can only contain one Shipping field.\",\"fieldCanBeAddedPostContent\":\"A form can only contain one Post Body field.\",\"fieldCanBeAddedPostTitle\":\"A form can only contain one Post Title field.\",\"fieldCanBeAddedPostExcerpt\":\"A form can only contain one Post Excerpt field.\",\"fieldCanBeAddedCreditCard\":\"A form can only contain one Credit Card field.\",\"fieldCanBeAddedProductTitle\":\"Missing Product field\",\"fieldCanBeAddedProduct\":\"You must add a Product field to the form first.\",\"legacyMarkupTitle\":\"Unsupported Markup\",\"fieldCanBeAddedMultipleChoice\":\"You cannot add a Multiple Choice field to a form that uses legacy markup. Please edit the form settings and turn off Legacy Markup.\",\"fieldCanBeAddedImageChoice\":\"You cannot add an Image Choice field to a form that uses legacy markup. Please edit the form settings and turn off Legacy Markup.\",\"FieldAjaxonErrorTitle\":\"Error\",\"StartAddFieldAjaxonError\":\"Ajax error while adding field. Please refresh the page and try again.\",\"StartChangeInputTypeAjaxonError\":\"Ajax error while changing input type. Please refresh the page and try again.\",\"MissingNameCustomChoicesTitle\":\"Missing Name\",\"MissingNameCustomChoices\":\"Please give this custom choice a name.\",\"DuplicateNameCustomChoicesTitle\":\"Duplicate Name\",\"DuplicateNameCustomChoices\":\"This custom choice name is already in use. Please enter another name.\",\"DuplicateTitleMessageTitle\":\"Duplicate Title\",\"DuplicateTitleMessage\":\"The form title you have entered is already taken. Please enter a unique form title.\",\"ValidateFormMissingFormTitleTitle\":\"Missing Form Title\",\"ValidateFormMissingFormTitle\":\"Please enter a Title for this form. When adding the form to a page or post, you will have the option to hide the title.\",\"ValidateFormEmptyPageTitle\":\"Empty Page\",\"ValidateFormEmptyPage\":\"This form currently has one or more pages without any fields. Blank pages are a result of Page Breaks that are positioned as the first or last field in the form or right after each other. Please adjust the Page Breaks.\",\"ValidateFormMissingProductLabelTitle\":\"Missing Product Label\",\"ValidateFormMissingProductLabel\":\"This form has a Product field with a blank label. Please enter a label for every Product field.\",\"ValidateFormMissingProductFieldTitle\":\"Missing Product field\",\"ValidateFormMissingProductField\":\"This form has an Option field without a Product field. You must add a Product field to your form.\",\"FormulaIsValidTitle\":\"Success\",\"FormulaIsValid\":\"The formula appears to be valid.\",\"FormulaIsInvalid\":\"There appears to be a problem with the formula.\",\"DeleteFormTitle\":\"Confirm\",\"DeleteForm\":\"You are about to move this form to the trash. &#039;Cancel&#039; to abort. &#039;OK&#039; to delete.\",\"DeleteCustomChoice\":\"Delete this custom choice list? &#039;Cancel&#039; to abort. &#039;OK&#039; to delete.\",\"FieldAdded\":\"&nbsp;field added to form\",\"nameFieldDefaultPrefixes\":[{\"text\":\"Dr.\",\"value\":\"Dr.\"},{\"text\":\"Miss\",\"value\":\"Miss\"},{\"text\":\"Mr.\",\"value\":\"Mr.\"},{\"text\":\"Mrs.\",\"value\":\"Mrs.\"},{\"text\":\"Ms.\",\"value\":\"Ms.\"},{\"text\":\"Mx.\",\"value\":\"Mx.\"},{\"text\":\"Prof.\",\"value\":\"Prof.\"},{\"text\":\"Rev.\",\"value\":\"Rev.\"}]};\t\t\t<\/script>\n            \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1f1b33 elementor-widget elementor-widget-spacer\" data-id=\"c1f1b33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e04c96 elementor-widget elementor-widget-image\" data-id=\"2e04c96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/staging-deveccouncil.kinsta.cloud\/programs\/certified-ethical-hacker-ceh\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"600\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/ceh-v12-broucher-image.jpg\" class=\"attachment-large size-large wp-image-79736\" alt=\"CEH v13 Brochure\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/ceh-v12-broucher-image.jpg 375w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/ceh-v12-broucher-image-188x300.jpg 188w\" sizes=\"(max-width: 375px) 100vw, 375px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb6f224 elementor-widget elementor-widget-image\" data-id=\"cb6f224\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/staging-deveccouncil.kinsta.cloud\/programs\/certified-ethical-hacker-ceh\/?utm_source=cyberexchange&#038;utm_medium=banner\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"600\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/ethical-hacker-blog-sidebanner.jpg\" class=\"attachment-large size-large wp-image-77836\" alt=\"Become an ethical hacker\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/ethical-hacker-blog-sidebanner.jpg 375w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/ethical-hacker-blog-sidebanner-188x300.jpg 188w\" sizes=\"(max-width: 375px) 100vw, 375px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-482a5f5 elementor-widget elementor-widget-spacer\" data-id=\"482a5f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd1d769 elementor-widget elementor-widget-image\" data-id=\"cd1d769\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.eccouncil.org\/ceh-hall-of-fame-2023\/?utm_source=ceh-blog&#038;utm_medium=banner&#038;utm_campaign=cehhof2023&#038;utm_content=hof2023ceh\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"347\" height=\"556\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/ceh-hof-rhs-banner.jpg\" class=\"attachment-large size-large wp-image-79737\" alt=\"\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/ceh-hof-rhs-banner.jpg 347w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/ceh-hof-rhs-banner-187x300.jpg 187w\" sizes=\"(max-width: 347px) 100vw, 347px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-04b8ee5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"04b8ee5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f9d0623\" data-id=\"f9d0623\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe0e360 elementor-widget elementor-widget-heading\" data-id=\"fe0e360\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why People Love EC-Council <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a8ec21 review arrows-relative-to-box_area bullets-small-dot-stroke elementor-widget elementor-widget-the7_testimonials_carousel\" data-id=\"0a8ec21\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;widget_columns&quot;:3,&quot;widget_columns_tablet&quot;:2,&quot;widget_columns_mobile&quot;:1,&quot;gap_between_posts&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:30,&quot;sizes&quot;:[]},&quot;gap_between_posts_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;gap_between_posts_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"the7_testimonials_carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"disable-arrows-hover-bg owl-carousel testimonials-carousel elementor-owl-carousel-call the7-elementor-widget the7_testimonials_carousel-0a8ec21\" data-scroll-mode=\"1\" data-auto-height=\"false\" data-speed=\"600\" data-autoplay=\"true\" data-autoplay_speed=\"4000\"><div  class=\"dt-owl-item-wrap hide-btn elements-hover\"  ><div class=\"dt-owl-item-inner \"><div  class=\"dt-owl-item-image layzr-bg img-css-resize-wrapper\"> <img decoding=\"async\" width=\"287\" height=\"287\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20287%20287&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 287px) 100vw, 287px\" style=\"--ratio: 287 \/ 287;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Mauricio-Fernandes.jpg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Mauricio-Fernandes.jpg 287w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Mauricio-Fernandes-150x150.jpg 150w\" \/><\/div><h4  class=\"dt-owl-item-heading\">Mauricio Fernandes <\/h4><h6  class=\"dt-owl-item-subtitle\"><span style=\"color:#ff0000;line-height:0px;font-weight:600\">CISCO<\/span><span style=\"line-height:0px\"><br>Systems Architect<\/span><\/span><br><span style=\"color: #999;font-size:14px;font-weight:400\">United States of America<\/span><\/h6><div class=\"dt-owl-item-description\"><img decoding=\"async\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/bxs-quote-alt-left.png\" alt=\"BXS Quote\"><br> CEH program have evolved and are valuable. <br><br><br><br><\/div><\/div><\/div><div  class=\"dt-owl-item-wrap hide-btn elements-hover\"  ><div class=\"dt-owl-item-inner \"><div  class=\"dt-owl-item-image layzr-bg img-css-resize-wrapper\"> <img decoding=\"async\" width=\"411\" height=\"411\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20411%20411&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 411px) 100vw, 411px\" style=\"--ratio: 411 \/ 411;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Robert-Weber.jpg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Robert-Weber.jpg 411w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Robert-Weber-300x300.jpg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Robert-Weber-150x150.jpg 150w\" \/><\/div><h4  class=\"dt-owl-item-heading\">Robert Weber<\/h4><h6  class=\"dt-owl-item-subtitle\"><span style=\"color:#ff0000;line-height:0px;font-weight:600\">Booz Allen Hamilton<\/span><span style=\"line-height:0px\"><br>Senior Cyber Security Engineer and Software Developer<\/span><\/span><br><span style=\"color: #999;font-size:14px;font-weight:400\">United States of America<\/span><\/h6><div class=\"dt-owl-item-description\"><img decoding=\"async\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/bxs-quote-alt-left.png\" alt=\"BXS Quote\"><br>The CEH certification allows me to quickly change gears and move from a software development to cyber compliance automation task and an audit collection task with ease.<\/div><\/div><\/div><div  class=\"dt-owl-item-wrap hide-btn elements-hover\"  ><div class=\"dt-owl-item-inner \"><div  class=\"dt-owl-item-image layzr-bg img-css-resize-wrapper\"> <img decoding=\"async\" width=\"610\" height=\"610\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20610%20610&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 610px) 100vw, 610px\" style=\"--ratio: 610 \/ 610;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Marouane-Balmakhtar.jpg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Marouane-Balmakhtar.jpg 610w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Marouane-Balmakhtar-300x300.jpg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Marouane-Balmakhtar-150x150.jpg 150w\" \/><\/div><h4  class=\"dt-owl-item-heading\">Marouane Balmakhtar<\/h4><h6  class=\"dt-owl-item-subtitle\"><span style=\"color:#ff0000;line-height:0px;font-weight:600\">T-Mobile<\/span><span style=\"line-height:0px\"><br>Security Architect<\/span><\/span><br><span style=\"color: #999;font-size:14px;font-weight:400\">United States of America<\/span><\/h6><div class=\"dt-owl-item-description\"><img decoding=\"async\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/bxs-quote-alt-left.png\" alt=\"BXS Quote\"><br>CEH has helped me identify resources to support Zero Days and Critical High vulnerabilities.<br><br><br><\/div><\/div><\/div><div  class=\"dt-owl-item-wrap hide-btn elements-hover\"  ><div class=\"dt-owl-item-inner \"><div  class=\"dt-owl-item-image layzr-bg img-css-resize-wrapper\"> <img decoding=\"async\" width=\"227\" height=\"227\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20227%20227&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 227px) 100vw, 227px\" style=\"--ratio: 227 \/ 227;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Farzan-Karimi.jpg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Farzan-Karimi.jpg 227w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Farzan-Karimi-150x150.jpg 150w\" \/><\/div><h4  class=\"dt-owl-item-heading\">Farzan Karimi<\/h4><h6  class=\"dt-owl-item-subtitle\"><span style=\"color:#ff0000;line-height:0px;font-weight:600\">Google<\/span><span style=\"line-height:0px\"><br>IT Security Manager<\/span><\/span><br><span style=\"color: #999;font-size:14px;font-weight:400\">United States of America<\/span><\/h6><div class=\"dt-owl-item-description\"><img decoding=\"async\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/bxs-quote-alt-left.png\" alt=\"BXS Quote\"><br>The CEH was my first confidence booster and helped land me a job on a Red Team in the government sector.<br><br><br><\/div><\/div><\/div><div  class=\"dt-owl-item-wrap hide-btn elements-hover\"  ><div class=\"dt-owl-item-inner \"><div  class=\"dt-owl-item-image layzr-bg img-css-resize-wrapper\"> <img decoding=\"async\" width=\"529\" height=\"529\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20529%20529&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 529px) 100vw, 529px\" style=\"--ratio: 529 \/ 529;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Felipe-Munoz.jpg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Felipe-Munoz.jpg 529w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Felipe-Munoz-300x300.jpg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Felipe-Munoz-150x150.jpg 150w\" \/><\/div><h4  class=\"dt-owl-item-heading\">Felipe Munoz <\/h4><h6  class=\"dt-owl-item-subtitle\"><span style=\"color:#ff0000;line-height:0px;font-weight:600\">ORACLE America, Inc.<\/span><span style=\"line-height:0px\"><br>IT Security Director<\/span><\/span><br><span style=\"color: #999;font-size:14px;font-weight:400\">United States of America<\/span><\/h6><div class=\"dt-owl-item-description\"><img decoding=\"async\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/bxs-quote-alt-left.png\" alt=\"BXS Quote\"><br>The CEH develops a \"think outside the box\" approach that you cannot get from other programs.<br><br><br><\/div><\/div><\/div><div  class=\"dt-owl-item-wrap hide-btn elements-hover\"  ><div class=\"dt-owl-item-inner \"><div  class=\"dt-owl-item-image layzr-bg img-css-resize-wrapper\"> <img decoding=\"async\" width=\"351\" height=\"351\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20351%20351&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 351px) 100vw, 351px\" style=\"--ratio: 351 \/ 351;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Roy-Davis.jpg\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Roy-Davis.jpg 351w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Roy-Davis-300x300.jpg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Roy-Davis-150x150.jpg 150w\" \/><\/div><h4  class=\"dt-owl-item-heading\">Roy Davis<\/h4><h6  class=\"dt-owl-item-subtitle\"><span style=\"color:#ff0000;line-height:0px;font-weight:600\">Zoom<\/span><span style=\"line-height:0px\"><br>Security Engineer<\/span><\/span><br><span style=\"color: #999;font-size:14px;font-weight:400\">United States of America<\/span><\/h6><div class=\"dt-owl-item-description\"><img decoding=\"async\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/bxs-quote-alt-left.png\" alt=\"BXS Quote\"><br>Knowledge I gained from the CEH program gave me the confidence I needed to step into a role as a security engineer and penetration tester.<br><br><\/div><\/div><\/div><\/div><div class=\"owl-nav disabled\"><div class=\"owl-prev\" role=\"button\"><svg class=\"e-font-icon-svg e-fas-chevron-left\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M34.52 239.03L228.87 44.69c9.37-9.37 24.57-9.37 33.94 0l22.67 22.67c9.36 9.36 9.37 24.52.04 33.9L131.49 256l154.02 154.75c9.34 9.38 9.32 24.54-.04 33.9l-22.67 22.67c-9.37 9.37-24.57 9.37-33.94 0L34.52 272.97c-9.37-9.37-9.37-24.57 0-33.94z\"><\/path><\/svg><\/div><div class=\"owl-next\" role=\"button\"><svg class=\"e-font-icon-svg e-fas-chevron-right\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f17656 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f17656\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-52c695d\" data-id=\"52c695d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-39a64ae elementor-widget elementor-widget-text-editor\" data-id=\"39a64ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tClick <a href=\"https:\/\/www.eccouncil.org\/success-stories\/is-ceh-worth-it\/\">here<\/a>, To Read More Life Changing Stories. \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-15aa893 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"15aa893\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b2e7872\" data-id=\"b2e7872\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2761cf0 elementor-widget elementor-widget-heading\" data-id=\"2761cf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQs<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46afbda elementor-widget elementor-widget-text-editor\" data-id=\"46afbda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>DoDD 8140 Job Roles Mapped with Certified Ethical Hacker (CEH)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6aebcc1 elementor-widget elementor-widget-accordion\" data-id=\"6aebcc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1121\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1121\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is a Network Operations Specialist? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1121\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1121\">A network operations specialist ensures the smooth operations of networks and manages the organization&#8217;s software and hardware. The average salary for a network operations specialist in the United States is $58,079 annually (Glassdoor, 2023).  <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1122\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1122\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is a Cyber Defense Analyst?  <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1122\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1122\">Cyber defense analysts use defensive tactics to perform the initial triage of security events to protect an organization&#8217;s infrastructure from cyber threats. The average salary for this role is $84,823 per year in the United States (Salary.com).  <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1123\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1123\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is a Cyber Defense Infrastructure Support Specialist? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1123\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1123\">Cyber defense infrastructure support specialists are responsible for testing, deploying, and managing an organization&#8217;s hardware and software systems to ensure the safety of networks and their components. The average salary for this role is $64,711 annually in the US (Glassdoor, 2023).  <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1124\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1124\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is a Vulnerability Assessment Analyst?  <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1124\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1124\">Analysts specializing in vulnerability assessments evaluate potential security flaws in systems and networks so that appropriate preventative measures can be taken. The average salary for this role is $110,280 annually in the US (Salary.com, 2023).  \n\n <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1125\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1125\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is a Cyber Security Researcher?  <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1125\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1125\">Cyber security researchers are the technical experts who monitor industry developments, analyze potential threats, and work with security professionals to develop countermeasures. The average salary for this role in the United States is $111,885 annually (Glassdoor, 2023). <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1126\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1126\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is a System Testing and Evaluation Specialist? <\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1126\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1126\">A system testing and evaluation specialist ensures that system testing is carried out according to the specified requirements and evaluated in compliance with industry standards. The average salary for this profession is $57,815 annually in the US (Glassdoor, 2023). \n\n <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b825cd2 elementor-widget elementor-widget-heading\" data-id=\"b825cd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">References <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be7428d elementor-widget elementor-widget-text-editor\" data-id=\"be7428d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Glassdoor. (2023, June 14). How much does a Cyber Defense Infrastructure Support Specialist make? <em>https:\/\/www.glassdoor.com\/Salaries\/cyber-defense-infrastructure-support-specialist-salary-SRCH_KO0,47.htm# <\/em><\/p><p>Glassdoor. (2023, June 14). How much does a Cyber Security Researcher make? <em>https:\/\/www.glassdoor.com\/Salaries\/cyber-security-researcher-salary-SRCH_KO0,25.htm<\/em><\/p><p>Glassdoor. (2023, June 14). How much does a Network Operations Specialist make? <em>https:\/\/www.glassdoor.com\/Salaries\/united-states-network-operations-specialist-salary-SRCH_IL.0,13_IN1_KO14,43.htm<\/em><\/p><p>Glassdoor. (2023, June 14). How much does a Test &amp; Evaluation Specialist make? <em>https:\/\/www.glassdoor.com\/Salaries\/test-evaluation-specialist-salary-SRCH_KO0,26.htm <\/em><\/p><p>Salary.com. Cyber Defense Analyst Salaries in the United States. <em>https:\/\/www.salary.com\/research\/salary\/position\/cyber-defense-analyst-salary\/<\/em><\/p><p>Salary.com. (2023, July 25). Vulnerability Analyst Salary. <em>https:\/\/www.salary.com\/research\/salary\/recruiting\/vulnerability-analyst-salary<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-edf8b8c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"edf8b8c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6436247\" data-id=\"6436247\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1465493 elementor-widget elementor-widget-heading\" data-id=\"1465493\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Accreditations, Recognitions &amp; Endorsements<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-848f25e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"848f25e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae9a807 elementor-widget elementor-widget-image-carousel\" data-id=\"ae9a807\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;4&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;lazyload&quot;:&quot;yes&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;navigation&quot;:&quot;none&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 6\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/ACE-2.png\" alt=\"ACE-2.png\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 6\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/anab-logo.webp\" alt=\"anab-logo.webp\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 6\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Army-2.png\" alt=\"Army-2.png\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 6\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/NCSC-logo-jpeg-2.png\" alt=\"NCSC-logo-jpeg-2.png\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 6\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/nice_logo_cmyk_high-2.png\" alt=\"nice_logo_cmyk_high-2.png\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 6\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Untitled-1.png\" alt=\"Untitled-1.png\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1d4d8af elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1d4d8af\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ee600a7\" data-id=\"ee600a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bb7d209 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bb7d209\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-87c29fa\" data-id=\"87c29fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a44262 elementor-widget elementor-widget-heading\" data-id=\"2a44262\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Placement. Certified Ethical Hacker<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19cfa36 elementor-widget elementor-widget-heading\" data-id=\"19cfa36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WE DON\u2019T JUST TEACH<br>\nETHICAL HACKING<br>\nWE BUILD CYBER CARRERS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a93c21 elementor-widget elementor-widget-heading\" data-id=\"3a93c21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"> World\u2019s No.1 Ethical Hacking Certification<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Enquire Now Enquire Now With the evolution of cyber threats on a global stage, the United States Cyber Strategy outlines the need to develop capabilities in its cyber security workforce. Under DoD 8140, the Department of Defense has issued mandates to ensure any member of the defense community working in cyber security carry the proper&hellip;<\/p>\n","protected":false},"author":33,"featured_media":80032,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12083],"tags":[],"class_list":{"0":"post-79977","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethical-hacking"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EC-Council&#039;s CEH recognized as Active Duty Qualification by US Cyberforce<\/title>\n<meta name=\"description\" content=\"EC-Council&#039;s Certified Ethical Hacker (C|EH) gets recognized by US Department of Defense DoD 8140 as important certification for national security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"US Department of Defense Recognizes Certified Ethical Hacker (CEH) as an Active-Duty Qualification for Cyber Workforce Job Billets Critical to National Security\" \/>\n<meta property=\"og:description\" content=\"EC-Council&#039;s Certified Ethical Hacker (C|EH) gets recognized by US Department of Defense DoD 8140 as important certification for national security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-18T12:53:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T12:37:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/CEH-US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker.png\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"23 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"US Department of Defense Recognizes Certified Ethical Hacker (CEH) as an Active-Duty Qualification for Cyber Workforce Job Billets Critical to National Security\",\"datePublished\":\"2023-08-18T12:53:57+00:00\",\"dateModified\":\"2026-03-18T12:37:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\\\/\"},\"wordCount\":2487,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg\",\"articleSection\":[\"Ethical Hacking\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\\\/\",\"name\":\"EC-Council's CEH recognized as Active Duty Qualification by US Cyberforce\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg\",\"datePublished\":\"2023-08-18T12:53:57+00:00\",\"dateModified\":\"2026-03-18T12:37:59+00:00\",\"description\":\"EC-Council's Certified Ethical Hacker (C|EH) gets recognized by US Department of Defense DoD 8140 as important certification for national security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg\",\"width\":521,\"height\":521},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ethical Hacking\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"US Department of Defense Recognizes Certified Ethical Hacker (CEH) as an Active-Duty Qualification for Cyber Workforce Job Billets Critical to National Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EC-Council's CEH recognized as Active Duty Qualification by US Cyberforce","description":"EC-Council's Certified Ethical Hacker (C|EH) gets recognized by US Department of Defense DoD 8140 as important certification for national security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/","og_locale":"en_US","og_type":"article","og_title":"US Department of Defense Recognizes Certified Ethical Hacker (CEH) as an Active-Duty Qualification for Cyber Workforce Job Billets Critical to National Security","og_description":"EC-Council's Certified Ethical Hacker (C|EH) gets recognized by US Department of Defense DoD 8140 as important certification for national security.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-08-18T12:53:57+00:00","article_modified_time":"2026-03-18T12:37:59+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/CEH-US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"23 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"US Department of Defense Recognizes Certified Ethical Hacker (CEH) as an Active-Duty Qualification for Cyber Workforce Job Billets Critical to National Security","datePublished":"2023-08-18T12:53:57+00:00","dateModified":"2026-03-18T12:37:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/"},"wordCount":2487,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg","articleSection":["Ethical Hacking"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/","name":"EC-Council's CEH recognized as Active Duty Qualification by US Cyberforce","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg","datePublished":"2023-08-18T12:53:57+00:00","dateModified":"2026-03-18T12:37:59+00:00","description":"EC-Council's Certified Ethical Hacker (C|EH) gets recognized by US Department of Defense DoD 8140 as important certification for national security.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/US-Department-of-Defense-Recognizes-Certified-Ethical-Hacker-CEH-as-an-Active-Duty-Qualification-for-Cyber-Workforce-Job-Billets-Critical-to-National-Security.jpg","width":521,"height":521},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/us-dod-recognizes-ec-council-ceh-as-an-active-duty-qualification-for-cyber-workforce-job-billets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Ethical Hacking","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/"},{"@type":"ListItem","position":4,"name":"US Department of Defense Recognizes Certified Ethical Hacker (CEH) as an Active-Duty Qualification for Cyber Workforce Job Billets Critical to National Security"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=79977"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79977\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80032"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=79977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=79977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=79977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}