{"id":82512,"date":"2024-11-21T05:53:03","date_gmt":"2024-11-21T05:53:03","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82512"},"modified":"2025-09-25T07:44:17","modified_gmt":"2025-09-25T07:44:17","slug":"what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/","title":{"rendered":"What is NIS2? NIS 2 Directive? Guide to EC-Council Certifications mapped to Nis2"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82512\" class=\"elementor elementor-82512\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-01c972e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"01c972e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7a1baca\" data-id=\"7a1baca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b9881c elementor-widget elementor-widget-image\" data-id=\"8b9881c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Blog-w-1024x512.jpg\" class=\"attachment-large size-large wp-image-82514\" alt=\"What is NIS2? EC-Council Certifications Mapped to NIS 2 Directive Guide\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Blog-w-1024x512.jpg 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Blog-w-300x150.jpg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Blog-w-768x384.jpg 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Blog-w.jpg 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a36b0b3 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"a36b0b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">What is NIS2? NIS 2 Directive? Guide to EC-Council Certifications mapped to Nis2<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cc73ad elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"4cc73ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tNovember 21, 2024\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02fa341 elementor-widget__width-auto elementor-widget elementor-widget-text-editor\" data-id=\"02fa341\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t| Ethical Hacking\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06659eb elementor-widget elementor-widget-text-editor\" data-id=\"06659eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In today\u2019s highly connected world, safeguarding essential infrastructure and digital services has become more important than ever. As cyber threats grow in complexity, the strategies and regulations aimed at reducing these risks must evolve accordingly. The European Union\u2019s NIS2 Directive introduces a strengthened cybersecurity framework, enhancing defenses across various sectors through legal provisions. Let\u2019s explore the topic in more detail.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e04a64 elementor-widget elementor-widget-text-editor\" data-id=\"4e04a64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>What is Nis2?<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/h2><p><span data-contrast=\"auto\">The Network &amp; Information Security Directive (NIS2) was signed by both EU co-legislators, the European Parliament and the Council of the European Union, on 14 December 2022, and the Member States have time until 17 October 2024 to transpose its measures into national law.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">The Directive aims to build cybersecurity capabilities across the European Union, mitigate threats to network and information systems used to provide essential services in key sectors and ensure the continuity of such services when facing incidents, thus contributing to the Union\u2019s security and the effective functioning of its economy and society. It outlines stringent requirements for both public and private organizations to improve the cybersecurity posture of critical sectors across the EU, ensuring a high common level of cybersecurity across the Union.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<br \/><\/span><\/p><p>NIS2 was officially adopted by both the EU co-legislators, the European Parliament and the Council of the European Union on December 14, 2022. The Member States have until October 17, 2024, to transpose its measures into national law.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b6106f elementor-widget elementor-widget-html\" data-id=\"2b6106f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<table style=\"width: 100%; \" border=2>\r\n   \r\n    <tbody>\r\n        <tr>\r\n            <td ><div class=\"col text-center\">\r\n                <h3><strong>160K+<\/strong><\/h3>\r\n                <p>Estimated companies affected by NIS2<\/p>\r\n            <\/div><\/td>\r\n            <td><div class=\"col text-center\">\r\n                <h3><strong>\u20ac10MM <\/strong><\/h3>\r\n                <p>Maximum fine for NIS2 non-compliance <\/p>\r\n            <\/div><\/td>\r\n            <td><div class=\"col text-center\">\r\n                <h3><strong>15<\/strong><\/h3>\r\n                <p>Number of sectors covered by NIS2 Directive <\/p>\r\n            <\/div><\/td>\r\n        <\/tr>\r\n        \r\n    <\/tbody>\r\n<\/table>\r\n\r\n<p>Source: <a href=\"https:\/\/nis2directive.eu\/\" target=\"_blank\">NIS2 Directive<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-531ca21 elementor-widget elementor-widget-text-editor\" data-id=\"531ca21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Impact on Organizations<\/h2><p>The NIS2 Directive brings both challenges and opportunities for organizations, requiring them to elevate their cybersecurity posture to meet the new standards. This affects various aspects of how businesses operate and manage their security. The overall impact revolves around:<\/p><ul><li data-leveltext=\"\uf0a7\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[9642],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0a7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Operational Changes:<\/span><\/b><span data-contrast=\"auto\"> Companies will need to adopt new procedures and technologies to meet the directive\u2019s requirements, potentially leading to significant changes in operational processes.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0a7\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[9642],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0a7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Increased Accountability:<\/span><\/b><span data-contrast=\"auto\"> NIS2 imposes greater accountability on senior management, who must ensure that cybersecurity is integrated into the organizational strategy and that compliance is maintained.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0a7\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[9642],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0a7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Risk of Penalties:<\/span><\/b><span data-contrast=\"auto\"> Non-compliance with NIS2 can result in substantial fines, making it crucial for organizations to prioritize adherence to the directive.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0a7\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[9642],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0a7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Enhanced Security:<\/span><\/b><span data-contrast=\"auto\"> While the directive poses challenges, it also benefits organizations by encouraging stronger cybersecurity practices, which can protect against the rising number of cyber threats and reduce the potential for damaging incidents.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">Learn more at <\/span><a href=\"https:\/\/nis2directive.eu\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">NIS2 Directive | Prepare Your Organization Now<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8236137 elementor-widget elementor-widget-html\" data-id=\"8236137\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<table style=\"width: 100%; \" border=2>\r\n   \r\n    <tbody>\r\n        <tr>\r\n            <td >\r\n              <div class=\"col \">\r\n                <p style=\"font-style:italic\">\u201cWe must bolster the collective resilience of the critical systems underpinning our way of life.\u201d <\/p>\r\n                <p><strong>Michael \u0160ime\u010dka<br>\r\nMember of the European Parliament \r\n<\/strong><br>\r\n(<a href=\"https:\/\/www.europarl.europa.eu\/news\/en\/press-room\/20221118IPR55705\/meps-approve-new-rules-to-protect-essential-infrastructure\" target=\"_blank\">Source<\/a>) <\/p>\r\n            <\/div>\r\n            <\/td>\r\n            <td>\r\n              <div class=\"col \">\r\n                <p style=\"font-style:italic\">\u201cThis European directive is going to help around 160,000 entities tighten their grip on security.\u201d <\/p>\r\n                <p><strong>Bart Groothuis<br>\r\nMember of the European Parliament \r\n<\/strong><br>\r\n(<a href=\"https:\/\/www.europarl.europa.eu\/news\/en\/press-room\/20221107IPR49608\/cybersecurity-parliament-adopts-new-law-to-strengthen-eu-wide-resilience\" target=\"_blank\">Source<\/a>) <\/p>\r\n            <\/div>\r\n            <\/td>\r\n            \r\n        <\/tr>\r\n        \r\n    <\/tbody>\r\n<\/table>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2632ba elementor-widget elementor-widget-text-editor\" data-id=\"a2632ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>How Can EC-Council Help You with Your NIS2 Compliance?<\/h2><p>Essential entities must comply with NIS2 by implementing appropriate and proportional technical, operational, and organizational measures to protect their networks, information systems, and physical infrastructure against incidents.<\/p><p>EC-Council\u2019s certifications align with NIS2 baseline measures and are tailored to different roles, from entry-level to senior leadership, ensuring employees gain the necessary expertise for compliance. These certifications equip organizations to handle key tasks such as risk analysis, incident management, and business continuity planning\u2014critical components of NIS2 compliance\u2014while also helping organizations strengthen cybersecurity and avoid non-compliance penalties.<\/p><p>The table below maps EC-Council\u2019s certifications to NIS2, helping organizations choose the appropriate certifications based on staff roles and experience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf9f4bb elementor-widget elementor-widget-html\" data-id=\"bf9f4bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\r\n    table .red-border {\r\n        \/*border: 1.5px solid red !important;*\/\r\n        text-align: center;\r\n    }\r\n    \r\n    \/*.table tbody td:not(:first-child) {*\/\r\n    \/*    background-color: grey; *\/\r\n    \/*    color: white; *\/\r\n    \/*}*\/\r\n    \/*.table tbody td:first-child {*\/\r\n    \/*    background-color: blue;*\/\r\n    \/*    color:white;*\/\r\n    \/*}*\/\r\n    .table th {\r\n       \/\/ background-color: blue;\r\n        color: black;\r\n        border-bottom: 1px solid black;\r\n    }\r\n   @media only screen and (max-width: 768px) {\r\n  .table-responsive { overflow-x: scroll;\r\n}\r\n  }\r\n<\/style>\r\n<div class=\"table-responsive\">\r\n\t<table class=\"table mt-3\" border=\"2\">\r\n\t\t<thead>\r\n\t\t\t<tr>\r\n    \t\t\t<th>\r\n    \t\t\t\t<th colspan=\"5\" class=\"text-center\">EC-Council Certifications Mapped to NIS2 Directive\t\r\n    \t\t\t<\/th>\r\n\t\t\t<\/tr>\r\n\t\t\t<tr>\r\n\t\t\t\t<th rowspan=\"3\">NIS2 Directive - Cybersecurity Risk-Management Baseline Measures<\/th>\r\n\t\t\t<\/tr>\r\n\t\t\t<tr>\r\n\t\t\t\t<th class=\"red-border\">Knowledge Workers<\/th>\r\n\t\t\t\t<th class=\"red-border\">Cyber Technicians<\/th>\r\n\t\t\t\t<th class=\"red-border\">Core Technical Work Roles<\/th>\r\n\t\t\t\t<th class=\"red-border\">Technical Specialized Work Roles<\/th>\r\n\t\t\t\t<th class=\"red-border\">Cyber Leadership<\/th>\r\n\t\t\t<\/tr>\r\n\t\t\t<tr>\r\n\t\t\t\t<th>No experience required<\/th>\r\n\t\t\t\t<th>0 - 2 years<\/th>\r\n\t\t\t\t<th>More than 2 years<\/th>\r\n\t\t\t\t<th>More than 2 years<\/th>\r\n\t\t\t\t<th>5 years or more<\/th>\r\n\t\t\t<\/tr>\r\n\t\t<\/thead>\r\n\t\t<tbody>\r\n\t\t\t<tr>\r\n\t\t\t\t<td>(a) Policies on risk analysis and information system security<\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-secure-computer-user-cscu\/\" target=\"_blank\">CSCU Aware<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-cybersecurity-technician-certification\/\" target=\"_blank\">CCT<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\">CND<\/a><\/td>\r\n\t\t\t\t<td><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\">CCISO<\/a><\/td>\r\n\t\t\t<\/tr>\r\n\t\t\t<tr>\r\n\t\t\t\t<td>(b) A plan for handling security incidents<\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-secure-computer-user-cscu\/\" target=\"_blank\">CSCU Aware<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-cybersecurity-technician-certification\/\" target=\"_blank\">CCT<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/soc-essentials-course-sce\/\" target=\"_blank\">SCE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/threat-intelligence-essentials-tie\/\" target=\"_blank\">TIE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/digital-forensics-essentials-dfe\/\" target=\"_blank\">DFE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/cloud-security-essentials-cse\/\" target=\"_blank\">CSE<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\">CND<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/\" target=\"_blank\">ECIH<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-soc-analyst-csa\/\" target=\"_blank\">CSA<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-soc-analyst-csa\/\" target=\"_blank\">CCSE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/\" target=\"_blank\">CHFI<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-threat-intelligence-analyst-ctia\/\" target=\"_blank\">CTIA<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\">CCISO<\/a><\/td>\r\n\t\t\t<\/tr>\r\n\t\t\t<tr>\r\n\t\t\t\t<td>(c) Business continuity, such as backup management and disaster recovery, and crisis management<\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-secure-computer-user-cscu\/\" target=\"_blank\">CSCU Aware<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-cybersecurity-technician-certification\/\" target=\"_blank\">CCT<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/network-defense-essentials-nde\/\" target=\"_blank\">NDE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/cloud-security-essentials-cse\/\" target=\"_blank\">CSE<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\">CND<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/business-continuity-and-disaster-recovery-training\/\" target=\"_blank\">EDRP<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-soc-analyst-csa\/\" target=\"_blank\">CCSE<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\">CCISO<\/a><\/td>\r\n\t\t\t<\/tr>\r\n\t\t\t<tr>\r\n\t\t\t\t<td>(d) Supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers<\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-secure-computer-user-cscu\/\" target=\"_blank\">CSCU Aware<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-cybersecurity-technician-certification\/\" target=\"_blank\">CCT<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/ethical-hacking-essentials-ehe\/\" target=\"_blank\">EHE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/network-defense-essentials-nde\/\" target=\"_blank\">NDE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/threat-intelligence-essentials-tie\/\" target=\"_blank\">TIE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/devsecops-essentials-dse\/\" target=\"_blank\"><a href=\"https:\/\/www.eccouncil.org\/train-certify\/devsecops-essentials-dse\/\" target=\"_blank\">DSE<\/a><\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\">CND<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\">CEH<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\">CEH Practical<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-penetration-testing-professional-cpent\/\" target=\"_blank\">CPENT<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-devsecops-engineer-ecde\/\" target=\"_blank\">ECDE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-threat-intelligence-analyst-ctia\/\" target=\"_blank\">CTIA<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-web-application-security-tester-wahs\/\" target=\"_blank\">WAHS<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\">CCISO<\/a><\/td>\r\n\t\t\t<\/tr>\r\n\t\t\t<tr>\r\n\t\t\t\t<td>(e) Security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure<\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-secure-computer-user-cscu\/\" target=\"_blank\">CSCU Aware<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-cybersecurity-technician-certification\/\" target=\"_blank\">CCT<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/ethical-hacking-essentials-ehe\/\" target=\"_blank\">EHE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/network-defense-essentials-nde\/\" target=\"_blank\">NDE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/iot-security-essentials-ise\/\" target=\"_blank\">ISE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/devsecops-essentials-dse\/\" target=\"_blank\">DSE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/cloud-security-essentials-cse\/\" target=\"_blank\">CSE<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\">CND<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\">CEH<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\">CEH Practical<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-penetration-testing-professional-cpent\/\" target=\"_blank\">CPENT<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-soc-analyst-csa\/\" target=\"_blank\">CCSE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-devsecops-engineer-ecde\/\" target=\"_blank\">ECDE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-web-application-security-tester-wahs\/\" target=\"_blank\">WAHS<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\">CCISO<\/a><\/td>\r\n\t\t\t<\/tr>\r\n\t\t\t<tr>\r\n\t\t\t\t<td>(f) Policies and procedures to assess the effectiveness of cybersecurity risk-management measures<\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-secure-computer-user-cscu\/\" target=\"_blank\">CSCU Aware<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-cybersecurity-technician-certification\/\" target=\"_blank\">CCT<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/ethical-hacking-essentials-ehe\/\" target=\"_blank\">EHE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/network-defense-essentials-nde\/\" target=\"_blank\">NDE<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\">CND<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\">CEH<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\">CEH Practical<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-penetration-testing-professional-cpent\/\" target=\"_blank\">CPENT<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-web-application-security-tester-wahs\/\" target=\"_blank\">WAHS<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\">CCISO<\/a><\/td>\r\n\t\t\t<\/tr> \r\n\t\t\t<tr>\r\n\t\t\t\t<td>(g) Basic cyber hygiene practices and cybersecurity training<\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-secure-computer-user-cscu\/\" target=\"_blank\">CSCU Aware<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-cybersecurity-technician-certification\/\" target=\"_blank\">CCT<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/ethical-hacking-essentials-ehe\/\" target=\"_blank\">EHE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/digital-forensics-essentials-dfe\/\" target=\"_blank\">DFE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/network-defense-essentials-nde\/\" target=\"_blank\">NDE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/threat-intelligence-essentials-tie\/\" target=\"_blank\">TIE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/cloud-security-essentials-cse\/\" target=\"_blank\">CSE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/soc-essentials-course-sce\/\" target=\"_blank\">SCE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/devsecops-essentials-dse\/\" target=\"_blank\">DSE<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/iot-security-essentials-ise\/\" target=\"_blank\">ISE<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\">CND<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\">CEH<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\">CEH Practical<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\">CCISO<\/a><\/td>\r\n\t\t\t<\/tr> \r\n\t\t\t<tr>\r\n\t\t\t\t<td>(h) Policies and procedures regarding the use of cryptography and, where appropriate, encryption<\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-secure-computer-user-cscu\/\" target=\"_blank\">CSCU Aware<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-cybersecurity-technician-certification\/\" target=\"_blank\">CCT<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-encryption-specialist-eces\/\" target=\"_blank\">ECES<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\">CND<\/a>, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\">CEH<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\">CEH Practical<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\">CCISO<\/a><\/td>\r\n\t\t\t<\/tr>\r\n\t\t\t<tr>\r\n\t\t\t\t<td>(i) Human resources security, access control policies and asset management<\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-secure-computer-user-cscu\/\" target=\"_blank\">CSCU Aware<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-cybersecurity-technician-certification\/\" target=\"_blank\">CCT<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\">CND<\/a><\/td>\r\n\t\t\t\t<td><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\">CCISO<\/a><\/td>\r\n\t\t\t<\/tr>\r\n\t\t\t<tr>\r\n\t\t\t\t<td>(j) The use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured emergency communication systems within the entity, where appropriate<\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-secure-computer-user-cscu\/\" target=\"_blank\">CSCU Aware<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-cybersecurity-technician-certification\/\" target=\"_blank\">CCT<\/a><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\">CND<\/a><\/td>\r\n\t\t\t\t<td><\/td>\r\n\t\t\t\t<td><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\" target=\"_blank\">CCISO<\/a><\/td>\r\n\t\t\t<\/tr>\r\n\t\t<\/tbody> \r\n\t<\/table> \r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e8577b elementor-widget elementor-widget-text-editor\" data-id=\"7e8577b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Requirements for Compliance with NIS2<\/h2><p>Organizations covered by the directive must adhere to its regulations; those that do not comply may face severe repercussions, including substantial fines and corrective actions. Therefore, to comply, organizations must fulfill a range of requirements which include:<\/p><ul><li><strong>Implementing Security Measures<\/strong>: Organizations need to implement relevant technical and organizational measures to manage <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/executive-management\/effective-cybersecurity-risk-management-checklist\/\" target=\"_blank\" rel=\"noopener\">cybersecurity risks<\/a>. These measures should be based on risk assessment outcomes and revised regularly to address new threats.<\/li><li><strong>Reporting Incidents<\/strong>: Organizations should report significant cyber incidents to competent authorities within set timeframes based on their severity. The report must provide comprehensive details about the incident, its effects, and the corrective actions implemented to address it.<\/li><li><strong>Ensuring Supply Chain Security<\/strong>: Supplier enterprises also need to assess their vendors&#8217; cybersecurity practices and ensure that third-party vendors follow similar high standards. This entails regularly auditing supplier security practices and assessments.<\/li><li><strong>Responsibility and Accountability<\/strong>: Top management should be on the frontline in managing cybersecurity activities in the company. This entails developing distinct functions for information security and providing sufficient finance to counter attacks.<\/li><li><strong>Education and Sensitization<\/strong>: Companies must educate their employees on cybercrime so that they know how to protect themselves from the latest threats and mitigate them.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e54d835 elementor-widget elementor-widget-text-editor\" data-id=\"e54d835\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Preparing for NIS2 Compliance<\/h2><p>As regulatory emphasis on cybersecurity continues to grow, it is crucial for organizations to take proactive steps to comply with the NIS2 Directive. Below are the essential steps to guide organizations through the process:<\/p><ol><li><strong>Execute a Risk Analysis<\/strong>: Start by executing a detailed risk analysis to uncover possible cybersecurity dangers and vulnerabilities. The evaluation should include a comprehensive review of the entire supply chain as well as an examination of internal security practices.<\/li><li><strong>Implement Security Measures<\/strong>: Depending on the result of the risk assessment, appropriate technical and organizational measures should be taken to manage cybersecurity risks. This may involve adopting new technologies and implementing best practices.<\/li><li><strong>Establish an Incident Response Strategy<\/strong>: It is vital to formulate a comprehensive incident response strategy that specifies the actions required when facing a cybersecurity incident. This should include procedures for notifying authorities of incidents and mitigating their negative outcomes.<\/li><li><strong>Correspond with Suppliers<\/strong>: Collaborate with suppliers to ensure that they adhere to the same high cybersecurity standards. This might involve periodic audits and appraisals of the suppliers&#8217; security methodologies.<\/li><li><strong>Provide Training and Awareness<\/strong>: Regularly train all staff members on cyber security, helping them understand threats from recent attacks and the most effective means of averting such occurrences.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f270a7 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-html\" data-id=\"0f270a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n<style>\r\n    #dynamic-content {\r\n    margin: 15px 0;\r\n}\r\n\r\n.level {\r\n    padding-bottom: 10px;\r\n    \/* padding: 10px;  *\/\r\n    \/* margin-bottom: 20px;  *\/\r\n    position: relative; \r\n}\r\n\r\n.level-title {\r\n    display: inline-block;\r\n    font-size: 13px;\r\n    font-family: Poppins, Bold;\r\n    text-align: left;\r\n    padding: 12px 12px; \r\n    border-radius: 3px; \r\n    color: white; \r\n}\r\n\r\n.level ul::before{\r\n    content: '';\r\n    position: absolute;\r\n    left: 16px;\r\n     top: 10px;\r\n    bottom: 0px;\r\n    height:auto;\r\n    width: 1px;\r\n    z-index: 1;\r\n}\r\n\r\n\/* Level colors *\/\r\n.foundation-level .title_background {\r\n    background-color: #AF526B;\r\n    height: max-content;\r\n}\r\n\r\n.entry-level .title_background {\r\n    background-color: #F38079; \r\n    height: max-content;\r\n}\r\n\r\n.core .title_background {\r\n    background-color: #FCBB7C; \r\n    height: max-content;\r\n}\r\n\r\n.specialization .title_background {\r\n    background-color: #958F3A;\r\n    height: max-content; \r\n}\r\n\r\n.executive-leadership .title_background{\r\n    background-color: #8BAC8C; \r\n    height: max-content;\r\n}\r\n\r\n.level ul {\r\n    list-style-type: none; \r\n    padding-left: 0; \r\n    margin: 0; \r\n}\r\n\r\n.level li {\r\n    display: flex;\r\n    \/* align-items: center; *\/\r\n    margin-top: 15px;\r\n    margin-bottom: 10px; \r\n    position: relative;\r\n    padding-left: 11px;\r\n    font-family: 'Poppins';\r\n    font-size: 13px;\r\n    font-weight: 700;\r\n}\r\n\r\n\/* Apply color based on level class *\/\r\n.foundation-level ul::before {\r\n    background-color: #AF526B; \r\n}\r\n\r\n.entry-level ul::before {\r\n    background-color: #F38079; \r\n}\r\n\r\n.core ul::before {\r\n    background-color: #FCBB7C; \r\n}\r\n\r\n.specialization ul::before {\r\n    background-color: #958F3A;\r\n}\r\n\r\n.executive-leadership ul::before {\r\n    background-color: #8BAC8C; \r\n}\r\n\r\n\r\n\/* Circle styles matching level colors *\/\r\n.circle {\r\n    margin-top: 6px;\r\n    width: 10px;\r\n    height: 10px;\r\n    border-radius: 50%;\r\n    margin-right: 10px; \r\n}\r\n\r\n\/* Circle colors matching level box colors *\/\r\n.foundation-level li .circle {\r\n    background-color: #AF526B;\r\n}\r\n\r\n.entry-level li .circle {\r\n    background-color: #F38079;\r\n}\r\n\r\n.core li .circle {\r\n    background-color: #FCBB7C;\r\n}\r\n\r\n.specialization li .circle {\r\n    background-color: #958F3A;\r\n}\r\n\r\n.executive-leadership li .circle{\r\n    background-color: #8BAC8C; \r\n}\r\n.level-title-description {\r\n    display: flex;\r\n    align-items: center; \r\n    justify-content: space-between; \r\n    flex-wrap: wrap; \r\n}\r\n\r\n.level-title-description .level-title {\r\n    margin-right: 10px;\r\n    white-space: nowrap; \r\n}\r\n\r\n.level-title-description p {\r\n    flex: 1;\r\n    margin: 0;\r\n}\r\n\r\n.level .row {\r\n    display: flex;\r\n    \/* min-height: 50px; *\/\r\n}\r\n\r\n.custom-col {\r\n    width: 50%; \r\n    float: left; \r\n    box-sizing: border-box;\r\n    z-index: 5;\r\n    border-radius: 4px;\r\n}\r\n.desc_mob{\r\n    padding-left: 10px;\r\n    font-size:12px;\r\n    font-family: Poppins, Regular;\r\n}\r\n\r\n@media (max-width: 768px) {\r\n\r\n\r\n    .level-title-description {\r\n        flex-direction: column; \r\n        align-items: flex-start;\r\n    }\r\n\r\n    .level-title-description p {\r\n        margin-top: 10px;\r\n    }\r\n}\r\n\r\n#experience_mob {\r\n    margin-bottom: 1rem!important;\r\n    width: 90%;\r\n}\r\n\r\n#career_mob {\r\n    margin-bottom: 1rem!important;\r\n    width: 90%;\r\n}\r\n\r\n#mob_label {\r\n    font-weight: 700;\r\n}\r\n\r\n.mob_roadmap{\r\n    font-family: 'Poppins';\r\n    font-size: 17px;\r\n    font-weight: bolder;\r\n    text-align: center;\r\n}\r\n@media (max-width: 768px) {\r\n    .level-title-description {\r\n        flex-direction: column; \r\n        align-items: flex-start;\r\n    }\r\n\r\n    .level-title-description p {\r\n        margin-top: 10px;\r\n    }\r\n}\r\n<\/style>\r\n\r\n<h2 class=\"mob_roadmap\">EC-Council Certification Road Map<\/h2>\r\n<br>\r\n <div class=\"container\">\r\n            <label for=\"experience_mob\" id=\"mob_label\">Select Your Experience Level<\/label>\r\n <\/br>\r\n            <select id=\"experience_mob\" class=\"form-control mb-3\" onchange=\"getRoadMap();\">\r\n                <option value=\"0\">0 year<\/option>\r\n                <option value=\"1\">1 year<\/option>\r\n                <option value=\"2\">1-2 years<\/option>\r\n            <\/select>\r\n        <\/br>\r\n            <label for=\"career_mob\" id=\"mob_label\">Select Your Career Path<\/label>\r\n        <\/br>\r\n            <select id=\"career_mob\" class=\"form-control mb-3\" onchange=\"getRoadMap();\">\r\n                <!-- <option selected value=\"null\">Select<\/option> -->\r\n                <option value=\"Cloud_Security_Specialist\" selected>Cloud Security Specialist \/ Engineer<\/option>\r\n                <option value=\"Security_Architect\">Security Architect<\/option>\r\n                <option value=\"Security_Consultant\">Security Consultant<\/option>\r\n                <option value=\"Application_Security_Engineer\">Application Security Engineer<\/option>\r\n                <option value=\"Incident_Responder\">Incident Responder<\/option>\r\n                <option value=\"Threat_Intelligence_Analyst\">Threat Intelligence Analyst<\/option>\r\n                <option value=\"Blue_Team\">Blue Team<\/option>\r\n                <option value=\"Security_Analyst\">Security Analyst<\/option>\r\n                <option value=\"Network_Security_Engineer\">Network Security Engineer<\/option>\r\n                <option value=\"Cloud_Security_Engineer\">Cloud Security Engineer<\/option>\r\n                <option value=\"DFIR\">DFIR<\/option>\r\n                <option value=\"SOC_Team\">SOC Team<\/option>\r\n                <option value=\"DevSecOps_Engineer\">DevSecOps Engineer<\/option>\r\n                <option value=\"Security_Automation_Engineer\">Security Automation Engineer<\/option>\r\n                <option value=\"VAPT\">VAPT<\/option>\r\n                <option value=\"Red_Team\">Red Team \/ Penetration Tester<\/option>\r\n                <option value=\"Malware_Analyst\">Malware Analyst<\/option>\r\n                <option value=\"CISO\">CISO<\/option>\r\n            <\/select>\r\n       \r\n    <div id=\"dynamic-content\" class=\"mt-4\"><\/div>\r\n<\/div>\r\n\r\n<script>\r\njQuery(document).ready(function($) {\r\n    var data; \r\n\r\n\r\njQuery.getJSON('\/roadmap_mob.json', function(response) {\r\n    data = response;\r\n    getRoadMap(); \r\n});\r\n\r\n\r\n    window.getRoadMap = function() {\r\n        var experience = $('#experience_mob').val();\r\n        var career = $('#career_mob').val();\r\n        \r\n        if (data && data.experienceLevels[experience] && data.experienceLevels[experience][career]) {\r\n            var content = '';\r\n            $.each(data.experienceLevels[experience][career], function(level, values) {\r\n                content +='<div class=\"level ' + level.replace(\/\\s+\/g, '-').toLowerCase() + '\">'+\r\n                            '<div class=\"row\">' +\r\n                                '<div class=\"custom-col title_background\">'+\r\n                                    '<strong class=\"level-title\">' + level + '<\/strong>' +\r\n                                '<\/div>'+\r\n                                '<div class=\"custom-col\">' +\r\n                                    '<p class=\"desc_mob\">' + data.description[level] + '<\/p>' +\r\n                                '<\/div>'+\r\n                            '<\/div><ul>';\r\n                \r\n                \/\/ Add each value to the list\r\n                $.each(values, function(index, value) {\r\n                    content += '<li><span class=\"circle\"><\/span> ' + value + '<\/li>';\r\n                });\r\n                \r\n                content += '<\/ul><\/div>';\r\n            });\r\n            $('#dynamic-content').html(content);\r\n        } else {\r\n            $('#dynamic-content').html('');\r\n        }\r\n    }\r\n});\r\n\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2587b72 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-text-editor\" data-id=\"2587b72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The NIS2 Directive stands out as a crucial framework that strengthens cybersecurity for essential and digital service providers. By adhering to NIS2 standards, organizations can enhance their security measures and become more resilient against upcoming cyberthreats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-41406e8\" data-id=\"41406e8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d0276c3 elementor-widget elementor-widget-heading\" data-id=\"d0276c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Recent Articles<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2c2d34 elementor-share-buttons--view-icon elementor-share-buttons--skin-flat elementor-grid-1 elementor-widget__width-auto elementor-fixed elementor-hidden-mobile elementor-share-buttons--shape-square elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"a2c2d34\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;fixed&quot;}\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Share on facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-facebook\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256C504 119 393 8 256 8S8 119 8 256c0 123.78 90.69 226.38 209.25 245V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.28c-30.8 0-40.41 19.12-40.41 38.73V256h68.78l-11 71.69h-57.78V501C413.31 482.38 504 379.78 504 256z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Share on twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-twitter\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Share on linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Share on whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-whatsapp\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M380.9 97.1C339 55.1 283.2 32 223.9 32c-122.4 0-222 99.6-222 222 0 39.1 10.2 77.3 29.6 111L0 480l117.7-30.9c32.4 17.7 68.9 27 106.1 27h.1c122.3 0 224.1-99.6 224.1-222 0-59.3-25.2-115-67.1-157zm-157 341.6c-33.2 0-65.7-8.9-94-25.7l-6.7-4-69.8 18.3L72 359.2l-4.4-7c-18.5-29.4-28.2-63.3-28.2-98.2 0-101.7 82.8-184.5 184.6-184.5 49.3 0 95.6 19.2 130.4 54.1 34.8 34.9 56.2 81.2 56.1 130.5 0 101.8-84.9 184.6-186.6 184.6zm101.2-138.2c-5.5-2.8-32.8-16.2-37.9-18-5.1-1.9-8.8-2.8-12.5 2.8-3.7 5.6-14.3 18-17.6 21.8-3.2 3.7-6.5 4.2-12 1.4-32.6-16.3-54-29.1-75.5-66-5.7-9.8 5.7-9.1 16.3-30.3 1.8-3.7.9-6.9-.5-9.7-1.4-2.8-12.5-30.1-17.1-41.2-4.5-10.8-9.1-9.3-12.5-9.5-3.2-.2-6.9-.2-10.6-.2-3.7 0-9.7 1.4-14.8 6.9-5.1 5.6-19.4 19-19.4 46.3 0 27.3 19.9 53.7 22.6 57.4 2.8 3.7 39.1 59.7 94.8 83.8 35.2 15.2 49 16.5 66.6 13.9 10.7-1.6 32.8-13.4 37.4-26.4 4.6-13 4.6-24.1 3.2-26.4-1.3-2.5-5-3.9-10.5-6.6z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_pinterest\" role=\"button\" tabindex=\"0\" aria-label=\"Share on pinterest\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-pinterest\" viewBox=\"0 0 496 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M496 256c0 137-111 248-248 248-25.6 0-50.2-3.9-73.4-11.1 10.1-16.5 25.2-43.5 30.8-65 3-11.6 15.4-59 15.4-59 8.1 15.4 31.7 28.5 56.8 28.5 74.8 0 128.7-68.8 128.7-154.3 0-81.9-66.9-143.2-152.9-143.2-107 0-163.9 71.8-163.9 150.1 0 36.4 19.4 81.7 50.3 96.1 4.7 2.2 7.2 1.2 8.3-3.3.8-3.4 5-20.3 6.9-28.1.6-2.5.3-4.7-1.7-7.1-10.1-12.5-18.3-35.3-18.3-56.6 0-54.7 41.4-107.6 112-107.6 60.9 0 103.6 41.5 103.6 100.9 0 67.1-33.9 113.6-78 113.6-24.3 0-42.6-20.1-36.7-44.8 7-29.5 20.5-61.3 20.5-82.6 0-19-10.2-34.9-31.4-34.9-24.9 0-44.9 25.7-44.9 60.2 0 22 7.4 36.8 7.4 36.8s-24.5 103.8-29 123.2c-5 21.4-3 51.6-.9 71.2C65.4 450.9 0 361.1 0 256 0 119 111 8 248 8s248 111 248 248z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ca29f1 icon-box-vertical-align-top img-align-left image-vertical-align-start preserve-img-ratio-cover slide-h-position-left elementor-widget elementor-widget-the7-elements-simple-posts\" data-id=\"5ca29f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7-elements-simple-posts.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"the7-simple-widget-posts the7-elementor-widget the7-elements-simple-posts-5ca29f1 jquery-filter jquery-filter\" data-post-limit=\"-1\" data-pagination-mode=\"none\" data-scroll-offset=\"\" aria-live=\"assertive\">\t\t\t<div class=\"dt-css-grid custom-pagination-handler\" data-columns=\"{&quot;d&quot;:1,&quot;t&quot;:2,&quot;p&quot;:1,&quot;wd&quot;:&quot;&quot;}\">\n\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84804 type-post status-publish format-standard has-post-thumbnail category-offensive-ai-security\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/what-is-adversarial-ai-real-world-attacks-on-modern-ai-systems\/\"><img decoding=\"async\" width=\"628\" height=\"628\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20628%20628&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 628px) 100vw, 628px\" style=\"--ratio: 628 \/ 628;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/image-28.png\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/image-28.png 628w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/image-28-300x300.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/image-28-150x150.png 150w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h6 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/offensive-ai-security\/what-is-adversarial-ai-real-world-attacks-on-modern-ai-systems\/\" rel=\"bookmark\" title=\"What Is Adversarial AI? Real-World Attacks on Modern AI Systems\" class=\"post-title\">What Is Adversarial AI? Real-World Attacks on Modern&hellip;<\/a><\/h6><div class=\"entry-meta\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/2026\/03\/27\/\" title=\"12:01 pm\" class=\"meta-item data-link\" rel=\"bookmark\"><time class=\"entry-date updated\" datetime=\"2026-03-27T12:01:22+00:00\">March 27, 2026<\/time><\/a><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84803 type-post status-publish format-standard has-post-thumbnail category-whitepaper tag-ai-operations tag-ai-security tag-architecture-security tag-artificial-intelligence tag-compliance tag-cybersecurity tag-governance\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/security-implementation-for-responsible-ai\/\"><img decoding=\"async\" width=\"1080\" height=\"1080\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%201080%201080&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"Privacy, trust, safety and ethical controls in responsible AI security implementation\" sizes=\"(max-width: 1080px) 100vw, 1080px\" style=\"--ratio: 1080 \/ 1080;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/CRAGE-4-Whitepaper-Banner-1080x1080-1.png\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/CRAGE-4-Whitepaper-Banner-1080x1080-1.png 1080w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/CRAGE-4-Whitepaper-Banner-1080x1080-1-300x300.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/CRAGE-4-Whitepaper-Banner-1080x1080-1-1024x1024.png 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/CRAGE-4-Whitepaper-Banner-1080x1080-1-150x150.png 150w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/CRAGE-4-Whitepaper-Banner-1080x1080-1-768x768.png 768w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h6 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/security-implementation-for-responsible-ai\/\" rel=\"bookmark\" title=\"Privacy, Trust, Safety &amp; Ethical Controls: Security Grade Implementation for Responsible AI\" class=\"post-title\">Privacy, Trust, Safety &amp; Ethical Controls: Security Grade&hellip;<\/a><\/h6><div class=\"entry-meta\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/2026\/03\/27\/\" title=\"11:45 am\" class=\"meta-item data-link\" rel=\"bookmark\"><time class=\"entry-date updated\" datetime=\"2026-03-27T11:45:07+00:00\">March 27, 2026<\/time><\/a><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84443 type-post status-publish format-standard has-post-thumbnail category-cyber-talks category-recent-cybertalks\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/\"><img decoding=\"async\" width=\"969\" height=\"646\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20969%20646&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 969px) 100vw, 969px\" style=\"--ratio: 969 \/ 646;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/26-march_465x310-Without-RN-1.png\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/26-march_465x310-Without-RN-1.png 969w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/26-march_465x310-Without-RN-1-300x200.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/26-march_465x310-Without-RN-1-768x512.png 768w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h6 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/\" rel=\"bookmark\" title=\"AI Risk in the Boardroom: Women Driving Responsible AI Decisions\" class=\"post-title\">AI Risk in the Boardroom: Women Driving Responsible&hellip;<\/a><\/h6><div class=\"entry-meta\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/2026\/03\/27\/\" title=\"9:25 am\" class=\"meta-item data-link\" rel=\"bookmark\"><time class=\"entry-date updated\" datetime=\"2026-03-27T09:25:41+00:00\">March 27, 2026<\/time><\/a><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t\t\t<div class=\"wf-cell visible \">\n\t\t\t\t\t\t<article class=\"post visible wrapper post-84438 type-post status-publish format-standard has-post-thumbnail category-cyber-talks category-recent-cybertalks\">\n\n\t\t\t\t\t\t\t<div class=\"post-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"the7-simple-post-thumb\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"post-thumbnail-rollover layzr-bg img-css-resize-wrapper\" aria-label=\"Post image\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-leading-ai-cybersecurity-securing-intelligent-systems\/\"><img decoding=\"async\" width=\"969\" height=\"646\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039;%20viewBox%3D&#039;0%200%20969%20646&#039;%2F%3E\" class=\"attachment-full size-full preload-me aspect lazy lazy-load\" alt=\"\" sizes=\"(max-width: 969px) 100vw, 969px\" style=\"--ratio: 969 \/ 646;\" data-src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/24-march_465x310-Without-RN.png\" loading=\"eager\" data-srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/24-march_465x310-Without-RN.png 969w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/24-march_465x310-Without-RN-300x200.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/24-march_465x310-Without-RN-768x512.png 768w\" \/><span class=\"the7-hover-icon\"><\/span><\/a>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"post-entry-content\">\n\t\t\t\t\t\t\t\t\t<h6 class=\"heading\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-leading-ai-cybersecurity-securing-intelligent-systems\/\" rel=\"bookmark\" title=\"Women Leading AI Cybersecurity: Securing Intelligent Systems\" class=\"post-title\">Women Leading AI Cybersecurity: Securing Intelligent Systems<\/a><\/h6><div class=\"entry-meta\"><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/2026\/03\/24\/\" title=\"6:04 am\" class=\"meta-item data-link\" rel=\"bookmark\"><time class=\"entry-date updated\" datetime=\"2026-03-24T06:04:54+00:00\">March 24, 2026<\/time><\/a><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/article>\n\t\t\t\t\t<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-459c529 elementor-widget elementor-widget-spacer\" data-id=\"459c529\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff38772 eael-gravity-form-button-custom elementor-widget elementor-widget-eael-gravity-form\" data-id=\"ff38772\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;sticky_offset&quot;:70,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\" data-widget_type=\"eael-gravity-form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"eael-contact-form eael-gravity-form title-description-hide eael-contact-form-align-left\">\n\t\t        \t\t\t\t\t<div class=\"eael-gravity-form-heading\">\n\t\t\t\t        \t\t\t\t        \t\t\t\t\t\t\t<div class=\"eael-contact-form-description eael-gravity-form-description\">\n\t\t\t\t\t\t        <strong>Become A<br>\nCertified Ethical Hacker (CEH<sup>AI<\/sup>)                           <\/strong>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t        \t\t\t\t\t<\/div>\n\t\t        <script>\nvar gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),document.addEventListener(\"gform\/theme\/scripts_loaded\",function(){gform.themeScriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>\"function\"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn(\"The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1.\"),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener(\"gform_main_scripts_loaded\",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener(\"gform\/theme\/scripts_loaded\",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener(\"DOMContentLoaded\",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook(\"action\",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook(\"filter\",o,r,e,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,r){gform.removeHook(\"action\",o,r)},removeFilter:function(o,r,e){gform.removeHook(\"filter\",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+\"_\"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==r?t.apply(null,e):e[0]=t.apply(null,e)})),\"filter\"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});\n<\/script>\n\n                <div class='gf_browser_gecko gform_wrapper gravity-theme gform-theme--no-framework' data-form-theme='gravity-theme' data-form-index='0' id='gform_wrapper_31' style='display:none'><div id='gf_31' class='gform_anchor' tabindex='-1'><\/div>\n                        <div class='gform_heading'>\n\t\t\t\t\t\t\t<p class='gform_required_legend'>&quot;<span class=\"gfield_required gfield_required_asterisk\">*<\/span>&quot; indicates required fields<\/p>\n                        <\/div><form method='post' enctype='multipart\/form-data'  id='gform_31'  action='\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82512#gf_31' data-formid='31' novalidate>\n                        <div class='gform-body gform_body'><div id='gform_fields_31' class='gform_fields top_label form_sublabel_below description_above validation_below'><fieldset id=\"field_31_35\" class=\"gfield gfield--type-name gfield--input-type-name gfield--width-full gfield_contains_required field_sublabel_hidden_label gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/legend><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_31_35'>\n                            \n                            <span id='input_31_35_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_35.3' id='input_31_35_3' value=''   aria-required='true'   placeholder='First Name *'  \/>\n                                                    <label for='input_31_35_3' class='gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text'>First Name<\/label>\n                                                <\/span>\n                            \n                            <span id='input_31_35_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_35.6' id='input_31_35_6' value=''   aria-required='true'   placeholder='Last Name *'  \/>\n                                                    <label for='input_31_35_6' class='gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text'>Last Name<\/label>\n                                                <\/span>\n                            \n                        <\/div><\/fieldset><div id=\"field_31_52\" class=\"gfield gfield--type-phone gfield--input-type-phone gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label screen-reader-text' for='input_31_52'>Phone Number *<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_phone'><input name='input_52' id='input_31_52' type='tel' value='' class='large'  placeholder='Phone Number *' aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_31_53\" class=\"gfield gfield--type-email gfield--input-type-email gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_31_53'>Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_53' id='input_31_53' type='email' value='' class='large'   placeholder='Email*' aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><fieldset id=\"field_31_51\" class=\"gfield gfield--type-address gfield--input-type-address gfield--width-full gfield_contains_required field_sublabel_hidden_label gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_hidden\"  ><div class=\"admin-hidden-markup\"><i class=\"gform-icon gform-icon--hidden\" aria-hidden=\"true\" title=\"This field is hidden when viewing the form\"><\/i><span>This field is hidden when viewing the form<\/span><\/div><legend class='gfield_label gform-field-label gfield_label_before_complex' >Address<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/legend>    \n                    <div class='ginput_complex ginput_container has_country ginput_container_address gform-grid-row' id='input_31_51' >\n                        <input type='hidden' class='gform_hidden' name='input_51.4' id='input_31_51_4' value=''\/><span class='ginput_left address_country ginput_address_country gform-grid-col' id='input_31_51_6_container' >\n                                        <select name='input_51.6' id='input_31_51_6'   aria-required='true'   autocomplete=\"country-name\" ><option value='' >Country *<\/option><option value='Afghanistan' >Afghanistan<\/option><option value='Albania' >Albania<\/option><option value='Algeria' >Algeria<\/option><option value='American Samoa' >American Samoa<\/option><option value='Andorra' >Andorra<\/option><option value='Angola' >Angola<\/option><option value='Anguilla' >Anguilla<\/option><option value='Antarctica' >Antarctica<\/option><option value='Antigua and Barbuda' >Antigua and Barbuda<\/option><option value='Argentina' >Argentina<\/option><option value='Armenia' >Armenia<\/option><option value='Aruba' >Aruba<\/option><option value='Australia' >Australia<\/option><option value='Austria' >Austria<\/option><option value='Azerbaijan' >Azerbaijan<\/option><option value='Bahamas' >Bahamas<\/option><option value='Bahrain' >Bahrain<\/option><option value='Bangladesh' >Bangladesh<\/option><option value='Barbados' >Barbados<\/option><option value='Belarus' >Belarus<\/option><option value='Belgium' >Belgium<\/option><option value='Belize' >Belize<\/option><option value='Benin' >Benin<\/option><option value='Bermuda' >Bermuda<\/option><option value='Bhutan' >Bhutan<\/option><option value='Bolivia' >Bolivia<\/option><option value='Bonaire, Sint Eustatius and Saba' >Bonaire, Sint Eustatius and Saba<\/option><option value='Bosnia and Herzegovina' >Bosnia and Herzegovina<\/option><option value='Botswana' >Botswana<\/option><option value='Bouvet Island' >Bouvet Island<\/option><option value='Brazil' >Brazil<\/option><option value='British Indian Ocean Territory' >British Indian Ocean Territory<\/option><option value='Brunei Darussalam' >Brunei Darussalam<\/option><option value='Bulgaria' >Bulgaria<\/option><option value='Burkina Faso' >Burkina Faso<\/option><option value='Burundi' >Burundi<\/option><option value='Cabo Verde' >Cabo Verde<\/option><option value='Cambodia' >Cambodia<\/option><option value='Cameroon' >Cameroon<\/option><option value='Canada' >Canada<\/option><option value='Cayman Islands' >Cayman Islands<\/option><option value='Central African Republic' >Central African Republic<\/option><option value='Chad' >Chad<\/option><option value='Chile' >Chile<\/option><option value='China' >China<\/option><option value='Christmas Island' >Christmas Island<\/option><option value='Cocos Islands' >Cocos Islands<\/option><option value='Colombia' >Colombia<\/option><option value='Comoros' >Comoros<\/option><option value='Congo' >Congo<\/option><option value='Congo, Democratic Republic of the' >Congo, Democratic Republic of the<\/option><option value='Cook Islands' >Cook Islands<\/option><option value='Costa Rica' >Costa Rica<\/option><option value='Croatia' >Croatia<\/option><option value='Cuba' >Cuba<\/option><option value='Cura\u00e7ao' >Cura\u00e7ao<\/option><option value='Cyprus' >Cyprus<\/option><option value='Czechia' >Czechia<\/option><option value='C\u00f4te d&#039;Ivoire' >C\u00f4te d&#039;Ivoire<\/option><option value='Denmark' >Denmark<\/option><option value='Djibouti' >Djibouti<\/option><option value='Dominica' >Dominica<\/option><option value='Dominican Republic' >Dominican Republic<\/option><option value='Ecuador' >Ecuador<\/option><option value='Egypt' >Egypt<\/option><option value='El Salvador' >El Salvador<\/option><option value='Equatorial Guinea' >Equatorial Guinea<\/option><option value='Eritrea' >Eritrea<\/option><option value='Estonia' >Estonia<\/option><option value='Eswatini' >Eswatini<\/option><option value='Ethiopia' >Ethiopia<\/option><option value='Falkland Islands' >Falkland Islands<\/option><option value='Faroe Islands' >Faroe Islands<\/option><option value='Fiji' >Fiji<\/option><option value='Finland' >Finland<\/option><option value='France' >France<\/option><option value='French Guiana' >French Guiana<\/option><option value='French Polynesia' >French Polynesia<\/option><option value='French Southern Territories' >French Southern Territories<\/option><option value='Gabon' >Gabon<\/option><option value='Gambia' >Gambia<\/option><option value='Georgia' >Georgia<\/option><option value='Germany' >Germany<\/option><option value='Ghana' >Ghana<\/option><option value='Gibraltar' >Gibraltar<\/option><option value='Greece' >Greece<\/option><option value='Greenland' >Greenland<\/option><option value='Grenada' >Grenada<\/option><option value='Guadeloupe' >Guadeloupe<\/option><option value='Guam' >Guam<\/option><option value='Guatemala' >Guatemala<\/option><option value='Guernsey' >Guernsey<\/option><option value='Guinea' >Guinea<\/option><option value='Guinea-Bissau' >Guinea-Bissau<\/option><option value='Guyana' >Guyana<\/option><option value='Haiti' >Haiti<\/option><option value='Heard Island and McDonald Islands' >Heard Island and McDonald Islands<\/option><option value='Holy See' >Holy See<\/option><option value='Honduras' >Honduras<\/option><option value='Hong Kong' >Hong Kong<\/option><option value='Hungary' >Hungary<\/option><option value='Iceland' >Iceland<\/option><option value='India' >India<\/option><option value='Indonesia' >Indonesia<\/option><option value='Iran' >Iran<\/option><option value='Iraq' >Iraq<\/option><option value='Ireland' >Ireland<\/option><option value='Isle of Man' >Isle of Man<\/option><option value='Israel' >Israel<\/option><option value='Italy' >Italy<\/option><option value='Jamaica' >Jamaica<\/option><option value='Japan' >Japan<\/option><option value='Jersey' >Jersey<\/option><option value='Jordan' >Jordan<\/option><option value='Kazakhstan' >Kazakhstan<\/option><option value='Kenya' >Kenya<\/option><option value='Kiribati' >Kiribati<\/option><option value='Korea, Democratic People&#039;s Republic of' >Korea, Democratic People&#039;s Republic of<\/option><option value='Korea, Republic of' >Korea, Republic of<\/option><option value='Kuwait' >Kuwait<\/option><option value='Kyrgyzstan' >Kyrgyzstan<\/option><option value='Lao People&#039;s Democratic Republic' >Lao People&#039;s Democratic Republic<\/option><option value='Latvia' >Latvia<\/option><option value='Lebanon' >Lebanon<\/option><option value='Lesotho' >Lesotho<\/option><option value='Liberia' >Liberia<\/option><option value='Libya' >Libya<\/option><option value='Liechtenstein' >Liechtenstein<\/option><option value='Lithuania' >Lithuania<\/option><option value='Luxembourg' >Luxembourg<\/option><option value='Macao' >Macao<\/option><option value='Madagascar' >Madagascar<\/option><option value='Malawi' >Malawi<\/option><option value='Malaysia' >Malaysia<\/option><option value='Maldives' >Maldives<\/option><option value='Mali' >Mali<\/option><option value='Malta' >Malta<\/option><option value='Marshall Islands' >Marshall Islands<\/option><option value='Martinique' >Martinique<\/option><option value='Mauritania' >Mauritania<\/option><option value='Mauritius' >Mauritius<\/option><option value='Mayotte' >Mayotte<\/option><option value='Mexico' >Mexico<\/option><option value='Micronesia' >Micronesia<\/option><option value='Moldova' >Moldova<\/option><option value='Monaco' >Monaco<\/option><option value='Mongolia' >Mongolia<\/option><option value='Montenegro' >Montenegro<\/option><option value='Montserrat' >Montserrat<\/option><option value='Morocco' >Morocco<\/option><option value='Mozambique' >Mozambique<\/option><option value='Myanmar' >Myanmar<\/option><option value='Namibia' >Namibia<\/option><option value='Nauru' >Nauru<\/option><option value='Nepal' >Nepal<\/option><option value='Netherlands' >Netherlands<\/option><option value='New Caledonia' >New Caledonia<\/option><option value='New Zealand' >New Zealand<\/option><option value='Nicaragua' >Nicaragua<\/option><option value='Niger' >Niger<\/option><option value='Nigeria' >Nigeria<\/option><option value='Niue' >Niue<\/option><option value='Norfolk Island' >Norfolk Island<\/option><option value='North Macedonia' >North Macedonia<\/option><option value='Northern Mariana Islands' >Northern Mariana Islands<\/option><option value='Norway' >Norway<\/option><option value='Oman' >Oman<\/option><option value='Pakistan' >Pakistan<\/option><option value='Palau' >Palau<\/option><option value='Palestine, State of' >Palestine, State of<\/option><option value='Panama' >Panama<\/option><option value='Papua New Guinea' >Papua New Guinea<\/option><option value='Paraguay' >Paraguay<\/option><option value='Peru' >Peru<\/option><option value='Philippines' >Philippines<\/option><option value='Pitcairn' >Pitcairn<\/option><option value='Poland' >Poland<\/option><option value='Portugal' >Portugal<\/option><option value='Puerto Rico' >Puerto Rico<\/option><option value='Qatar' >Qatar<\/option><option value='Romania' >Romania<\/option><option value='Russian Federation' >Russian Federation<\/option><option value='Rwanda' >Rwanda<\/option><option value='R\u00e9union' >R\u00e9union<\/option><option value='Saint Barth\u00e9lemy' >Saint Barth\u00e9lemy<\/option><option value='Saint Helena, Ascension and Tristan da Cunha' >Saint Helena, Ascension and Tristan da Cunha<\/option><option value='Saint Kitts and Nevis' >Saint Kitts and Nevis<\/option><option value='Saint Lucia' >Saint Lucia<\/option><option value='Saint Martin' >Saint Martin<\/option><option value='Saint Pierre and Miquelon' >Saint Pierre and Miquelon<\/option><option value='Saint Vincent and the Grenadines' >Saint Vincent and the Grenadines<\/option><option value='Samoa' >Samoa<\/option><option value='San Marino' >San Marino<\/option><option value='Sao Tome and Principe' >Sao Tome and Principe<\/option><option value='Saudi Arabia' >Saudi Arabia<\/option><option value='Senegal' >Senegal<\/option><option value='Serbia' >Serbia<\/option><option value='Seychelles' >Seychelles<\/option><option value='Sierra Leone' >Sierra Leone<\/option><option value='Singapore' >Singapore<\/option><option value='Sint Maarten' >Sint Maarten<\/option><option value='Slovakia' >Slovakia<\/option><option value='Slovenia' >Slovenia<\/option><option value='Solomon Islands' >Solomon Islands<\/option><option value='Somalia' >Somalia<\/option><option value='South Africa' >South Africa<\/option><option value='South Georgia and the South Sandwich Islands' >South Georgia and the South Sandwich Islands<\/option><option value='South Sudan' >South Sudan<\/option><option value='Spain' >Spain<\/option><option value='Sri Lanka' >Sri Lanka<\/option><option value='Sudan' >Sudan<\/option><option value='Suriname' >Suriname<\/option><option value='Svalbard and Jan Mayen' >Svalbard and Jan Mayen<\/option><option value='Sweden' >Sweden<\/option><option value='Switzerland' >Switzerland<\/option><option value='Syria Arab Republic' >Syria Arab Republic<\/option><option value='Taiwan' >Taiwan<\/option><option value='Tajikistan' >Tajikistan<\/option><option value='Tanzania, the United Republic of' >Tanzania, the United Republic of<\/option><option value='Thailand' >Thailand<\/option><option value='Timor-Leste' >Timor-Leste<\/option><option value='Togo' >Togo<\/option><option value='Tokelau' >Tokelau<\/option><option value='Tonga' >Tonga<\/option><option value='Trinidad and Tobago' >Trinidad and Tobago<\/option><option value='Tunisia' >Tunisia<\/option><option value='Turkmenistan' >Turkmenistan<\/option><option value='Turks and Caicos Islands' >Turks and Caicos Islands<\/option><option value='Tuvalu' >Tuvalu<\/option><option value='T\u00fcrkiye' >T\u00fcrkiye<\/option><option value='US Minor Outlying Islands' >US Minor Outlying Islands<\/option><option value='Uganda' >Uganda<\/option><option value='Ukraine' >Ukraine<\/option><option value='United Arab Emirates' >United Arab Emirates<\/option><option value='United Kingdom' >United Kingdom<\/option><option value='United States' selected='selected'>United States<\/option><option value='Uruguay' >Uruguay<\/option><option value='Uzbekistan' >Uzbekistan<\/option><option value='Vanuatu' >Vanuatu<\/option><option value='Venezuela' >Venezuela<\/option><option value='Viet Nam' >Viet Nam<\/option><option value='Virgin Islands, British' >Virgin Islands, British<\/option><option value='Virgin Islands, U.S.' >Virgin Islands, U.S.<\/option><option value='Wallis and Futuna' >Wallis and Futuna<\/option><option value='Western Sahara' >Western Sahara<\/option><option value='Yemen' >Yemen<\/option><option value='Zambia' >Zambia<\/option><option value='Zimbabwe' >Zimbabwe<\/option><option value='\u00c5land Islands' >\u00c5land Islands<\/option><\/select>\n                                        <label for='input_31_51_6' id='input_31_51_6_label' class='gform-field-label gform-field-label--type-sub hidden_sub_label screen-reader-text'>Country<\/label>\n                                    <\/span>\n                    <div class='gf_clear gf_clear_complex'><\/div>\n                <\/div><\/fieldset><div id=\"field_31_61\" class=\"gfield gfield--type-select gfield--input-type-select gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_31_61'>What are you interested in ?<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_select'><select name='input_61' id='input_31_61' class='large gfield_select'    aria-required=\"true\" aria-invalid=\"false\" ><option value='' selected='selected' class='gf_placeholder'>What are you interested in ?<\/option><option value='Cybersecurity Certifications' >Cybersecurity Certifications<\/option><option value='University Degree' >University Degree<\/option><\/select><\/div><\/div><div id=\"field_31_39\" class=\"gfield gfield--type-select gfield--input-type-select gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_31_39'>Select Option<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_select'><select name='input_39' id='input_31_39' class='large gfield_select'    aria-required=\"true\" aria-invalid=\"false\" ><option value='' selected='selected' class='gf_placeholder'>Select Option<\/option><option value='Ethical Hacking' >Ethical Hacking<\/option><option value='AI Program Manager' >AI Program Manager<\/option><option value='Offensive AI Security Professional' >Offensive AI Security Professional<\/option><option value='Responsible AI Governance and Ethics' >Responsible AI Governance and Ethics<\/option><option value='Penetration Testing' >Penetration Testing<\/option><option value='Computer Forensics' >Computer Forensics<\/option><option value='Network Security\/ Network Defense' >Network Security\/ Network Defense<\/option><option value='Incident Handling' >Incident Handling<\/option><option value='SOC Analyst' >SOC Analyst<\/option><option value='Threat Intelligence' >Threat Intelligence<\/option><option value='Executive Management (CCISO)' >Executive Management (CCISO)<\/option><option value='Security Awareness' >Security Awareness<\/option><option value='Cyber Range Challenge' >Cyber Range Challenge<\/option><option value='Secure Coding' >Secure Coding<\/option><option value='Blockchain' >Blockchain<\/option><option value='Disaster Recovery' >Disaster Recovery<\/option><option value='Web Application Security' >Web Application Security<\/option><option value='Cloud Security' >Cloud Security<\/option><option value='Cybersecurity Technician' >Cybersecurity Technician<\/option><option value='Fundamentals' >Fundamentals<\/option><option value='Encryption' >Encryption<\/option><option value='DevSecOps' >DevSecOps<\/option><option value='AI Essentials' >AI Essentials<\/option><\/select><\/div><\/div><div id=\"field_31_62\" class=\"gfield gfield--type-select gfield--input-type-select gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_above hidden_label field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_31_62'>Which degree are you interested in?*<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_asterisk\">*<\/span><\/span><\/label><div class='ginput_container ginput_container_select'><select name='input_62' id='input_31_62' class='large gfield_select'    aria-required=\"true\" aria-invalid=\"false\" ><option value='' selected='selected' class='gf_placeholder'>Which degree are you interested in?*<\/option><option value='Master of Science in Cyber Security' >Master of Science in Cyber Security<\/option><option value='Master of Science in Computer Science' >Master of Science in Computer Science<\/option><option value='MBA in Cybersecurity' >MBA in Cybersecurity<\/option><option value='Bachelor of Science in Cyber Security' >Bachelor of Science in Cyber Security<\/option><option value='Graduate Certificate Program' >Graduate Certificate Program<\/option><\/select><\/div><\/div><div id=\"field_31_60\" class=\"gfield gfield--type-textarea gfield--input-type-textarea gfield--width-full commentBox field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label screen-reader-text' for='input_31_60'>Please let us know how we can help!<\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_60' id='input_31_60' class='textarea small'    placeholder='Please let us know how we can help!'  aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><fieldset id=\"field_31_27\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent adv-board-form field_sublabel_below gfield--has-description field_description_below hidden_label field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Agreement<\/legend><div class='ginput_container ginput_container_consent'><input name='input_27.1' id='input_31_27_1' type='checkbox' value='1'  aria-describedby=\"gfield_consent_description_31_27\"  aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_31_27_1' ><\/label><input type='hidden' name='input_27.2' value='' class='gform_hidden' \/><input type='hidden' name='input_27.3' value='14' class='gform_hidden' \/><\/div><div class='gfield_description gfield_consent_description' id='gfield_consent_description_31_27' tabindex='0'> By clicking Submit, I consent to the use of my data for promotional purposes and accept the <a href=\"https:\/\/www.eccouncil.org\/legal\/privacy-policy\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">Privacy Policy<\/a> and <a href=\"https:\/\/www.eccouncil.org\/legal\/terms-of-use\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">Terms<\/a>. <\/div><\/fieldset><div id=\"field_31_10\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_10' id='input_31_10' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='' \/><\/div><\/div><div id=\"field_31_22\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gform_hidden field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_22' id='input_31_22' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='CEH_Cybersec' \/><\/div><\/div><div id=\"field_31_63\" class=\"gfield gfield--type-hidden gfield--input-type-hidden gfield--width-full gform_hidden field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible\"  ><div class='ginput_container ginput_container_text'><input name='input_63' id='input_31_63' type='hidden' class='gform_hidden'  aria-invalid=\"false\" value='United States' \/><\/div><\/div><div id=\"field_31_59\" class=\"gfield gfield--type-html gfield--input-type-html gfield--width-full gfield_html gfield_html_formatted gfield_no_follows_desc field_sublabel_below gfield--no-description field_description_above field_validation_below gfield_visibility_visible\"  ><script>\n  document.addEventListener('DOMContentLoaded', function () {\n    const interval = setInterval(function () {\n      const checkbox = document.getElementById('input_31_27_1');\n      if (checkbox) {\n        checkbox.checked = true;\n        clearInterval(interval);\n      }\n    }, 100); \/\/ Check every 100ms until found\n  });\n<\/script><\/div><\/div><\/div>\n        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_31' class='gform_button button gform-button--width-full' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit'  \/> \n            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_31' value='postback' \/>\n            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_31' id='gform_theme_31' value='gravity-theme' \/>\n            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_31' id='gform_style_settings_31' value='' \/>\n            <input type='hidden' class='gform_hidden' name='is_submit_31' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='31' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_31' value='WyJ7XCI2MVwiOltcImRlYmUwN2M0NjhkNDEwNjE0ZjFjYmZmY2RiODc0ZjUwXCIsXCJlOGI1MzEzZjM4Njc2N2ZjMDc0OGFlNWYwYzU3YjczZVwiXSxcIjYyXCI6W1wiMmNkYmQ3ZmJiYmY2MzA2ZTU2N2VlNTk0ZTBiNzk4ODRcIixcImUxOTFmMTdjYmJmNzZhNDFhNGRkMzBkZWM4M2YyZTM4XCIsXCI2ZDZiY2Q3ZDhkMmVlOWIxYmVjMTc1MzdlNDNjOWVkOFwiLFwiMTQzYjg2NDJjMTMwNDM2ZTM1ZmUwNzkyMDZiNTNjNmFcIixcImI0MGJlOWFkYzg1NGNiN2YyZjg1YmJlZDI5MTM0MDJhXCJdLFwiMjcuMVwiOlwiYjAxOWZmNzRjNWZhMGJhNjgxZDE0NzliNzY4MDE3NmFcIixcIjI3LjJcIjpcIjk4NDQzZTJkNmMxZDBkYzE2ODViNzkyYWJlY2JiN2I3XCIsXCIyNy4zXCI6XCI3NzZlZjRkNDFhZjUxM2Q2OTZjYjg3ODJkZjJmOTk4NlwifSIsIjA3ZTdiNmM1NzU4MjFjZDQ1ZjI2MGFlZmU4NTgyOGNlIl0=' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_31' id='gform_target_page_number_31' value='0' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_31' id='gform_source_page_number_31' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div><script>\ngform.initializeOnLoaded( function() {gformInitSpinner( 31, 'https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_31').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_31');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_31').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){form_content.find('form').css('opacity', 0);jQuery('#gform_wrapper_31').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_31').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_31').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/ jQuery(document).scrollTop(500); }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_31').val();gformInitSpinner( 31, 'https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [31, current_page]);window['gf_submitting_31'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_31').replaceWith(confirmation_content);jQuery(document).scrollTop(500);jQuery(document).trigger('gform_confirmation_loaded', [31]);window['gf_submitting_31'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_31').text());}else{jQuery('#gform_31').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger(\"gform_pre_post_render\", [{ formId: \"31\", currentPage: \"current_page\", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( \"gform_wrapper_31\" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( \"span\" );            visibilitySpan.id = \"gform_visibility_test_31\";            gformWrapperDiv.insertAdjacentElement( \"afterend\", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( \"gform_visibility_test_31\" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 31, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} );\n<\/script>\n\t\t\t<\/div>\n\n            <script type=\"text\/javascript\">\n                var gf_global = {\"gf_currency_config\":{\"name\":\"U.S. Dollar\",\"symbol_left\":\"$\",\"symbol_right\":\"\",\"symbol_padding\":\"\",\"thousand_separator\":\",\",\"decimal_separator\":\".\",\"decimals\":2,\"code\":\"USD\"},\"base_url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/plugins\\\/gravityforms\",\"number_formats\":[],\"spinnerUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/plugins\\\/gravityforms\\\/images\\\/spinner.svg\",\"version_hash\":\"9c6c22344d2f330a1b64bc899d4ec8cc\",\"strings\":{\"newRowAdded\":\"New row added.\",\"rowRemoved\":\"Row removed\",\"formSaved\":\"The form has been saved.  The content contains the link to return and complete the form.\"}};\t\t\t\tvar gf_vars = {\"active\":\"Active\",\"inactive\":\"Inactive\",\"save\":\"Save\",\"update\":\"Update\",\"previousLabel\":\"Previous\",\"selectFormat\":\"Select a format\",\"column\":\"Column\",\"editToViewAll\":\"5 of %d items shown. Edit field to view all\",\"selectAll\":\"Select All\",\"enterValue\":\"Enter a value\",\"formTitle\":\"Untitled Form\",\"formDescription\":\"We would love to hear from you! Please fill out this form and we will get in touch with you shortly.\",\"formConfirmationMessage\":\"Thanks for contacting us! We will get in touch with you shortly.\",\"buttonText\":\"Submit\",\"buttonDescription\":\"The submit button for this form\",\"loading\":\"Loading...\",\"thisFieldIf\":\"this field if\",\"thisSectionIf\":\"this section if\",\"thisPage\":\"this page if\",\"thisFormButton\":\"this form button if\",\"show\":\"Show\",\"hide\":\"Hide\",\"enable\":\"Enable\",\"disable\":\"Disable\",\"enabled\":\"Enabled\",\"disabled\":\"Disabled\",\"configure\":\"Configure\",\"conditional_logic_text\":\"Conditional Logic\",\"conditional_logic_desc\":\"Conditional logic allows you to change what the user sees depending on the fields they select.\",\"conditional_logic_a11y\":\"Adding conditional logic to the form submit button could cause usability problems for some users and negatively impact the accessibility of your form. Learn more about button conditional logic in our <a href=\\\"https:\\\/\\\/docs.gravityforms.com\\\/field-accessibility-warning\\\/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">documentation<span class=\\\"screen-reader-text\\\">(opens in a new tab)<\\\/span>&nbsp;<span class=\\\"gform-icon gform-icon--external-link\\\"><\\\/span><\\\/a>.\",\"page\":\"Page\",\"next_button\":\"Next Button\",\"button\":\"Submit Button\",\"all\":\"All\",\"any\":\"Any\",\"ofTheFollowingMatch\":\"of the following match:\",\"is\":\"is\",\"isNot\":\"is not\",\"greaterThan\":\"greater than\",\"lessThan\":\"less than\",\"contains\":\"contains\",\"startsWith\":\"starts with\",\"endsWith\":\"ends with\",\"emptyChoice\":\"Empty (no choices selected)\",\"alertLegacyMode\":\"This form has legacy markup enabled and doesn\\u2019t support field resizing within the editor. Please disable legacy markup in the form settings to enable live resizing.\",\"thisConfirmation\":\"Use this confirmation if\",\"thisNotification\":\"Send this notification if\",\"confirmationSave\":\"Save\",\"confirmationSaving\":\"Saving...\",\"confirmationAreYouSure\":\"Are you sure you wish to cancel these changes?\",\"confirmationIssueSaving\":\"There was an issue saving this confirmation.\",\"confirmationConfirmDelete\":\"Are you sure you wish to delete this confirmation?\",\"confirmationIssueDeleting\":\"There was an issue deleting this confirmation.\",\"confirmationConfirmDiscard\":\"There are unsaved changes to the current confirmation. Would you like to discard these changes?\",\"confirmationDefaultName\":\"Untitled Confirmation\",\"confirmationDefaultMessage\":\"Thanks for contacting us! We will get in touch with you shortly.\",\"confirmationInvalidPageSelection\":\"Please select a page.\",\"confirmationInvalidRedirect\":\"Please enter a URL.\",\"confirmationInvalidName\":\"Please enter a confirmation name.\",\"confirmationDeleteField\":\"Deleting this field will also delete all entry data associated with it. 'Cancel' to abort. 'OK' to delete.\",\"confirmationDeleteDisplayField\":\"You're about to delete this field. 'Cancel' to stop. 'OK' to delete\",\"confirmationDeleteDisplayFieldTitle\":\"Warning\",\"conditionalLogicDependency\":\"This form contains {type} conditional logic dependent upon this field. Deleting this field will deactivate those conditional logic rules and also delete all entry data associated with the field. 'Cancel' to abort. 'OK' to delete.\",\"conditionalLogicDependencyChoice\":\"This form contains {type} conditional logic dependent upon this choice. Are you sure you want to delete this choice? 'Cancel' to abort. 'OK' to delete.\",\"conditionalLogicDependencyChoiceEdit\":\"This form contains {type} conditional logic dependent upon this choice. Are you sure you want to modify this choice? 'Cancel' to abort. 'OK' to continue.\",\"conditionalLogicDependencyAdminOnly\":\"This form contains {type} conditional logic dependent upon this field. Are you sure you want to mark this field as Administrative? 'Cancel' to abort. 'OK' to continue.\",\"conditionalLogicRichTextEditorWarning\":\"This form contains conditional logic dependent upon this field. This will no longer work if the Rich Text Editor is enabled.  Are you sure you want to enable the Rich Text Editor?  'Cancel' to abort. 'OK' to continue.\",\"conditionalLogicTypeButton\":\"button\",\"conditionalLogicTypeConfirmation\":\"confirmation\",\"conditionalLogicTypeNotification\":\"notification\",\"conditionalLogicTypeNoficationRouting\":\"notification routing\",\"conditionalLogicTypeField\":\"field\",\"conditionalLogicTypeFeed\":\"feed\",\"conditionalLogicWarningTitle\":\"Conditional Logic Warning\",\"mergeTagsText\":\"Insert Merge Tags\",\"baseUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/plugins\\\/gravityforms\",\"gf_currency_config\":{\"name\":\"U.S. Dollar\",\"symbol_left\":\"$\",\"symbol_right\":\"\",\"symbol_padding\":\"\",\"thousand_separator\":\",\",\"decimal_separator\":\".\",\"decimals\":2,\"code\":\"USD\"},\"otherChoiceValue\":\"Other\",\"isFormTrash\":false,\"currentlyAddingField\":false,\"visibilityOptions\":[{\"label\":\"Visible\",\"value\":\"visible\",\"description\":\"Default option. The field is visible when viewing the form.\"},{\"label\":\"Hidden\",\"value\":\"hidden\",\"description\":\"The field is hidden when viewing the form. Useful when you require the functionality of this field but do not want the user to be able to see this field.\"},{\"label\":\"Administrative\",\"value\":\"administrative\",\"description\":\"The field is only visible when administering submitted entries. The field is not visible or functional when viewing the form.\"}],\"addFieldFilter\":\"Add a condition\",\"removeFieldFilter\":\"Remove a condition\",\"filterAndAny\":\"{0} of the following match:\",\"customChoices\":\"Custom Choices\",\"predefinedChoices\":\"Predefined Choices\",\"fieldLabelAriaLabel\":\"{field_label} - {field_type}, jump to this field&#039;s settings\",\"fieldCanBeAddedTitle\":\"Field Limit\",\"fieldCanBeAddedCaptcha\":\"A form can only contain one CAPTCHA field.\",\"fieldCanBeAddedShipping\":\"A form can only contain one Shipping field.\",\"fieldCanBeAddedPostContent\":\"A form can only contain one Post Body field.\",\"fieldCanBeAddedPostTitle\":\"A form can only contain one Post Title field.\",\"fieldCanBeAddedPostExcerpt\":\"A form can only contain one Post Excerpt field.\",\"fieldCanBeAddedCreditCard\":\"A form can only contain one Credit Card field.\",\"fieldCanBeAddedProductTitle\":\"Missing Product field\",\"fieldCanBeAddedProduct\":\"You must add a Product field to the form first.\",\"legacyMarkupTitle\":\"Unsupported Markup\",\"fieldCanBeAddedMultipleChoice\":\"You cannot add a Multiple Choice field to a form that uses legacy markup. Please edit the form settings and turn off Legacy Markup.\",\"fieldCanBeAddedImageChoice\":\"You cannot add an Image Choice field to a form that uses legacy markup. Please edit the form settings and turn off Legacy Markup.\",\"FieldAjaxonErrorTitle\":\"Error\",\"StartAddFieldAjaxonError\":\"Ajax error while adding field. Please refresh the page and try again.\",\"StartChangeInputTypeAjaxonError\":\"Ajax error while changing input type. Please refresh the page and try again.\",\"MissingNameCustomChoicesTitle\":\"Missing Name\",\"MissingNameCustomChoices\":\"Please give this custom choice a name.\",\"DuplicateNameCustomChoicesTitle\":\"Duplicate Name\",\"DuplicateNameCustomChoices\":\"This custom choice name is already in use. Please enter another name.\",\"DuplicateTitleMessageTitle\":\"Duplicate Title\",\"DuplicateTitleMessage\":\"The form title you have entered is already taken. Please enter a unique form title.\",\"ValidateFormMissingFormTitleTitle\":\"Missing Form Title\",\"ValidateFormMissingFormTitle\":\"Please enter a Title for this form. When adding the form to a page or post, you will have the option to hide the title.\",\"ValidateFormEmptyPageTitle\":\"Empty Page\",\"ValidateFormEmptyPage\":\"This form currently has one or more pages without any fields. Blank pages are a result of Page Breaks that are positioned as the first or last field in the form or right after each other. Please adjust the Page Breaks.\",\"ValidateFormMissingProductLabelTitle\":\"Missing Product Label\",\"ValidateFormMissingProductLabel\":\"This form has a Product field with a blank label. Please enter a label for every Product field.\",\"ValidateFormMissingProductFieldTitle\":\"Missing Product field\",\"ValidateFormMissingProductField\":\"This form has an Option field without a Product field. You must add a Product field to your form.\",\"FormulaIsValidTitle\":\"Success\",\"FormulaIsValid\":\"The formula appears to be valid.\",\"FormulaIsInvalid\":\"There appears to be a problem with the formula.\",\"DeleteFormTitle\":\"Confirm\",\"DeleteForm\":\"You are about to move this form to the trash. &#039;Cancel&#039; to abort. &#039;OK&#039; to delete.\",\"DeleteCustomChoice\":\"Delete this custom choice list? &#039;Cancel&#039; to abort. &#039;OK&#039; to delete.\",\"FieldAdded\":\"&nbsp;field added to form\",\"nameFieldDefaultPrefixes\":[{\"text\":\"Dr.\",\"value\":\"Dr.\"},{\"text\":\"Miss\",\"value\":\"Miss\"},{\"text\":\"Mr.\",\"value\":\"Mr.\"},{\"text\":\"Mrs.\",\"value\":\"Mrs.\"},{\"text\":\"Ms.\",\"value\":\"Ms.\"},{\"text\":\"Mx.\",\"value\":\"Mx.\"},{\"text\":\"Prof.\",\"value\":\"Prof.\"},{\"text\":\"Rev.\",\"value\":\"Rev.\"}]};\t\t\t<\/script>\n            \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dbac8a elementor-widget elementor-widget-image\" data-id=\"8dbac8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/?utm_source=cyberexchange&#038;utm_medium=side-banner&#038;utm_campaign=ecc-blog\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"375\" height=\"600\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/ethical-hacking-brochure-image.jpg\" class=\"attachment-large size-large wp-image-82382\" alt=\"Ethical Hacking CEH v13 Brochure\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/ethical-hacking-brochure-image.jpg 375w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/ethical-hacking-brochure-image-188x300.jpg 188w\" sizes=\"(max-width: 375px) 100vw, 375px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca22e9b elementor-widget elementor-widget-spacer\" data-id=\"ca22e9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fa6789 elementor-widget elementor-widget-image\" data-id=\"0fa6789\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/?utm_source=cyberexchange&#038;utm_medium=side-bottom-banner&#038;utm_campaign=ecc-blog\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"375\" height=\"600\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/04\/ethical-hacker-blog-sidebanner.jpg\" class=\"attachment-large size-large wp-image-77418\" alt=\"Become an ethical hacker\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/04\/ethical-hacker-blog-sidebanner.jpg 375w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/04\/ethical-hacker-blog-sidebanner-188x300.jpg 188w\" sizes=\"(max-width: 375px) 100vw, 375px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-83bb707 elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"83bb707\" data-element_type=\"section\" data-e-type=\"section\" id=\"certificationRoadmap\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-af0075a\" data-id=\"af0075a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b40accb elementor-widget elementor-widget-heading\" data-id=\"b40accb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">EC-Council Certifications Roadmap<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f3bff81 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f3bff81\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1c8b374\" data-id=\"1c8b374\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-72f9353 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"72f9353\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Select Your Experience<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ba852a elementor-widget__width-auto elementor-widget elementor-widget-html\" data-id=\"3ba852a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<select id=\"roadmapExp\" class=\"careers_map\">\n    <option selected  value=\"null\">Select Your Experience<\/option>\n    <option  value=\"0\">0 Year<\/option>\n    <option value=\"1\">1-2 Year<\/option>\n    <option value=\"2\">More than 2 years<\/option>\n<\/select>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-36912ef\" data-id=\"36912ef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-49e9e08 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"49e9e08\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f58a750\" data-id=\"f58a750\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-541483d marginZero elementor-widget elementor-widget-image-box\" data-id=\"541483d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Job Roles<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7a1477b\" data-id=\"7a1477b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-dcf00b3 elementor-hidden-mobile cstdividercolor elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dcf00b3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-84134ec\" data-id=\"84134ec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ec2b816 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ec2b816\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0321d3 marginZero elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-image-box\" data-id=\"f0321d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Careers<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e92d05e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e92d05e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-1e76de0\" data-id=\"1e76de0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f0b35d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1f0b35d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8f10bf elementor-widget elementor-widget-image-box\" data-id=\"f8f10bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Foundational Level<\/h3><p class=\"elementor-image-box-description\">No Experience Required<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9d2aed elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a9d2aed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-688b0bf\" data-id=\"688b0bf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-283b29d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"283b29d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a29cde elementor-widget elementor-widget-image-box\" data-id=\"7a29cde\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Entry Level<\/h3><p class=\"elementor-image-box-description\">1-2 years Basic Computer knowledge<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14cc979 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"14cc979\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-e2c96b1\" data-id=\"e2c96b1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-367e2f8 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"367e2f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4d7a47 elementor-widget elementor-widget-image-box\" data-id=\"d4d7a47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Core<\/h3><p class=\"elementor-image-box-description\">More than 2 years Networking Knowledge<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95df696 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"95df696\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-efb0135\" data-id=\"efb0135\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d886374 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d886374\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-621a9aa marginZero elementor-widget elementor-widget-image-box\" data-id=\"621a9aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Specialisations<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbf07cf elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"cbf07cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-16 elementor-inner-column elementor-element elementor-element-6a95aae\" data-id=\"6a95aae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20b3790 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"20b3790\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb22dbe elementor-widget elementor-widget-image-box\" data-id=\"bb22dbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Executive Leadership<\/h3><p class=\"elementor-image-box-description\">5 years<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-059a673 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"059a673\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d8f2f78 elementor-section-full_width imgBox elementor-hidden-mobile elementor-section-height-default elementor-section-height-default\" data-id=\"d8f2f78\" data-element_type=\"section\" data-e-type=\"section\" id=\"certRoadmap\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-inner-column elementor-element elementor-element-fdf1b69\" data-id=\"fdf1b69\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d719cde elementor-align-start careersList elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"d719cde\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_offset&quot;:13,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cloud Security Specialist \/ Engineer<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security Architect<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security Consultant<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Application Security Engineer<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Incident Responder<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat Intelligence Analyst<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security Analyst<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Network Security Engineer<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cloud Security Engineer<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">DevSecOps Engineer<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security Automation Engineer<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Red Team \/ Penetration Tester<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Malware Analyst<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">CISO<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Careers<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Blue Team<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">DFIR<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">SOC Team<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">VAPT<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-inner-column elementor-element elementor-element-7bbf4aa\" data-id=\"7bbf4aa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-890c804 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"890c804\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tNDE\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tNetwork Security\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/network-defense-essentials-nde\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tNetwork Defense Essential (NDE)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d82f2d elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"9d82f2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tEHE\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tEthical Hacking\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/ethical-hacking-essentials-ehe\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tEthical Hacking Essentials (EHE)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce504b7 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"ce504b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tDSE\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tDevSecOps\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/devsecops-essentials-dse\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tDevSecOps Essentials (DSE)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64ce908 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"64ce908\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tSCE\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tSOC\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/soc-essentials-course-sce\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tSOC Essentials Course (SCE)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0523e3 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"b0523e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tCSE\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tCloud Security\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/cloud-security-essentials-cse\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tCloud Security Essentials (CSE)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c44a042 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"c44a042\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tISE\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tIoT Security\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/iot-security-essentials-ise\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tIoT Security Essentials (ISE)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37fefa8 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"37fefa8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tTIE\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tThreat Intelligence\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/threat-intelligence-essentials-tie\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tThreat Intelligence Essentials (TIE)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-inner-column elementor-element elementor-element-f6c6fe0\" data-id=\"f6c6fe0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-487f331 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"487f331\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tCCT\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tTechnician\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"#bannerSection\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tCertified Cybersecurity Technician (CCT)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8a4cbf elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"e8a4cbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tDFE\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tDigital Forensics\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/digital-forensics-essentials-dfe\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tDigital Forensics Essentials (DFE)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-inner-column elementor-element elementor-element-51d60fd\" data-id=\"51d60fd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ebb386 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"2ebb386\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tCND\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tNetwork Security\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tCertified Network Defender (CND)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b026399 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"b026399\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tCEH Master\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tCEH + CEH Practical\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tCEH Master <br>\nCEH + CEH Practical\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-inner-column elementor-element elementor-element-f50314d\" data-id=\"f50314d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ddefff3 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"ddefff3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tCPENT\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tPenetration Testing\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-penetration-testing-professional-cpent\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tCertified Penetration Testing Professional (CPENT)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4e0033 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"b4e0033\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tCSA\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tSOC Analyst\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-soc-analyst-csa\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tCertified SOC Analyst (CSA)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45092c5 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"45092c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tICS \/ SCADA\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tIndustrial Control Systems\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/ics-scada-cybersecurity\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tIndustrial Control Systems (ICS \/ SCADA)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b54cb1 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"7b54cb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tCHFI\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tDigital Forensics\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/computer-hacking-forensic-investigator-chfi\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tComputer Hacking Forensic Investigator (CHFI)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fb7862 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"2fb7862\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tEDRP\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tDisaster Recovery\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/business-continuity-and-disaster-recovery-training\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tDisaster Recovery Professional (EDRP)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6990667 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"6990667\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tECDE\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tDevSecOps\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-devsecops-engineer-ecde\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tCertified DevSecOps Engineer (ECDE)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b75a4d elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"2b75a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tBFC\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tBlockchain Finance\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/blockchain-fintech-course-bfc\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tBlockchain Fintech Certification (BFC)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-inner-column elementor-element elementor-element-b0b387e\" data-id=\"b0b387e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-641e21f elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"641e21f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tWAHS\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tWeb App Hacking\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-web-application-security-tester-wahs\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tWeb Application Hacking and Security (WAHS)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7a6766 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"e7a6766\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tCCSE\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tCloud Security\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-cloud-security-engineer-course\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tCertified Cloud Security Engineer (CCSE)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd76329 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"cd76329\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tCTIA\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tThreat Intelligence\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-threat-intelligence-analyst-ctia\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tCertified Threat Intelligence Analyst (CTIA)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a523611 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"a523611\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tECIH\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tIncident Handling\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tCertified Incident Handler (ECIH)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a62d3f9 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"a62d3f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tCASE.Java\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tApplication Security\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-application-security-engineer-case-java\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tCertified Application Security Engineer (CASE Java)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b6d9b1 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"8b6d9b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tCASE.Net\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tApplication Security\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-application-security-engineer-case-net\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tCertified Application Security Engineer (CASE .NET)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5dbf5ee elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"5dbf5ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tBBLC\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tBlockchain Leaders\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/blockchain-business-leader-certification-bblc\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tBlockchain Business Leader Certification (BBLC)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f64a8e4 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"f64a8e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tBDC\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tBlockchain Developers\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/blockchain-developer-courses\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tBlockchain Developer Certification (BDC)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-inner-column elementor-element elementor-element-1f65416\" data-id=\"1f65416\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4158d95 elementor-flip-box--effect-fade elementor-widget elementor-widget-flip-box\" data-id=\"4158d95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__image\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"8\" height=\"8\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Rectangle-52-1-1.svg\" class=\"attachment-full size-full wp-image-82532\" alt=\"EC-Council Certifications Roadmap\" \/>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tCCISO\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\t\tChief Information Security Officer\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<a class=\"elementor-flip-box__layer elementor-flip-box__back\" href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/?utm_source=cct-product&#038;utm_medium=internal_linking&#038;utm_campaign=ecc-products\" target=\"_blank\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tCertified Chief Information Security Officer (CCISO)\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb4e1a6 elementor-hidden-mobile elementor-widget elementor-widget-html\" data-id=\"fb4e1a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script>\r\njQuery(document).ready(function(){\r\n    jQuery('#certRoadmap .careersList ul li').each(function(key){\r\n        const columns = jQuery('#certRoadmap .elementor-column');\r\n        let newColor;\r\n\r\n        jQuery(this).hover(function(e){\r\n            e.preventDefault();\r\n            switch (key){\r\n                case 0: \/\/ Cloud Security Specialist \/ Engineer\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[0, 1, 4],\r\n                        2:['all'],\r\n                        3:['all'],\r\n                        5:[1]\r\n                    }, '#ffffff');\r\n                break;\r\n\r\n                case 1: \/\/ Security Architect\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[0, 1],\r\n                        2:['all'],\r\n                        3:['all'],\r\n                        6:['all']\r\n                    }, '#ffffff');\r\n                break;\r\n\r\n                case 2: \/\/ Security Consultant\r\n                    newColor = changeBgColor(jQuery(this));\r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[1],\r\n                        2:['all'],\r\n                        3:[1],\r\n                        4:[1, 2]\r\n                    }, '#ffffff'); \r\n                break;\r\n\r\n                case 3: \/\/ Application Security Engineer\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[0, 1],\r\n                        2:['all'],\r\n                        3:['all'],\r\n                        4:[6],\r\n                        5:[4, 5]\r\n                    }, '#ffffff'); \r\n                break;\r\n\r\n                case 4: \/\/ Incident Responder\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[1, 7],\r\n                        2:['all'],\r\n                        3:[1],\r\n                        5:[2, 3]\r\n                    }, '#ffffff'); \r\n                break;\r\n\r\n                case 5: \/\/ Threat Intelligence Analyst\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[0, 1, 7],\r\n                        2:['all'],\r\n                        3:['all'],\r\n                        5:[2]\r\n                    }, '#ffffff');\r\n                break;\r\n\r\n                case 6: \/\/ Security Analyst\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[0, 1],\r\n                        2:['all'],\r\n                        3:['all'],\r\n                        5:[2, 3]\r\n                    }, '#ffffff');\r\n                break;\r\n\r\n                case 7: \/\/ Network Security Engineer\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[0, 1],\r\n                        2:['all'],\r\n                        3:['all']\r\n                    }, '#ffffff');\r\n                break;\r\n\r\n                case 8: \/\/ Cloud Security Engineer\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[1],\r\n                        2:['all'],\r\n                        3:[1],\r\n                        4:[5],\r\n                        5:[1]\r\n                    }, '#ffffff');\r\n                break;\r\n\r\n                case 9: \/\/ DevSecOps Engineer\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[0, 1, 3],\r\n                        2:['all'],\r\n                        3:['all'],\r\n                        4:[5]\r\n                    }, '#ffffff');\r\n                break;\r\n\r\n                case 10: \/\/ Security Automation Engineer\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[1, 3, 4],\r\n                        2:['all'],\r\n                        3:[1],\r\n                        4:[1, 5]\r\n                    }, '#ffffff');\r\n                break;\r\n\r\n                case 11: \/\/ Red Team \/ Penetration Tester\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[1],\r\n                        2:['all'],\r\n                        3:[1],\r\n                        4:[0]\r\n                    }, '#ffffff');\r\n                break;\r\n\r\n                case 12: \/\/ Malware Analyst\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[1, 7],\r\n                        2:['all'],\r\n                        3:[1],\r\n                        5:[2, 3]\r\n                    }, '#ffffff');\r\n                break;\r\n\r\n                case 13: \/\/ CISO\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[0, 1],\r\n                        2:['all'],\r\n                        3:['all'],\r\n                        6:['all']\r\n                    }, '#ffffff');\r\n                break;\r\n            \r\n                {\/* case 14: \/\/ Careers\r\n                break *\/}\r\n\r\n                case 15: \/\/ Blue Team\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[0],\r\n                        2:['all'],\r\n                        3:[0],\r\n                        4:[1, 4],\r\n                        5:[2]\r\n                    }, '#ffffff');\r\n                break;\r\n\r\n                case 16: \/\/ DFIR\r\n                newColor = changeBgColor(jQuery(this)); \r\n                columnHoverBox(columns, newColor, {\r\n                    1:[1, 2],\r\n                    2:['all'],\r\n                    3:[1],\r\n                    4:[3],\r\n                    5:[3]\r\n                }, '#ffffff');\r\n                break;\r\n\r\n                case 17: \/\/ SOC Team\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[0, 1, 4, 7],\r\n                        2:['all'],\r\n                        3:[1],\r\n                        4:[1],\r\n                        5:[2, 3],\r\n                        6:['all']\r\n                    }, '#ffffff');\r\n                break;\r\n\r\n                case 18: \/\/ VAPT\r\n                    newColor = changeBgColor(jQuery(this)); \r\n                    columnHoverBox(columns, newColor, {\r\n                        1:[0, 1],\r\n                        2:['all'],\r\n                        3:['all'],\r\n                        4:[0],\r\n                        5:[0]\r\n                    }, '#ffffff');\r\n                break;\r\n\r\n                default:\r\n                break;\r\n            }\r\n        }, function(){\r\n            \/\/ remove blur to all other columns\r\n            jQuery(columns).find('.elementor-element .elementor-flip-box__front').removeAttr('style'); \r\n\r\n            jQuery(columns).find('.elementor-element .elementor-flip-box__back').css({'background-color': '', 'transition': 'all 0s', 'opacity': ''});\r\n            jQuery(columns).find('.elementor-element .elementor-flip-box__back .elementor-flip-box__layer__description').removeAttr('style');\r\n        });\r\n    });\r\n});\r\n\r\n\/\/ take hovered color\r\nfunction changeBgColor(activeColor){\r\n    let rgbValues;\r\n    let currentColor; \r\n    currentColor = activeColor.css('background-color');\r\n    \/\/ convert rgb To Hex\r\n    rgbValues = currentColor.match(\/\\d+\/g).map(Number);\r\n    return `#${rgbValues.map(value => value.toString(16).padStart(2, '0').toUpperCase()).join('')}`;\r\n}\r\n\r\n\/\/ \r\nfunction columnHoverBox(columns, newColor, colElements, descriptionColor){\r\n    \/\/ let targetedCols = Object.keys(colElements);\r\n    let targetedColElements = Object.entries(colElements);\r\n    let roadmapExp = document.getElementById(\"roadmapExp\").value;\r\n    \r\n    \/\/ \r\n    targetedColElements.forEach(([index, elements]) => {\r\n        \r\n        \/\/ apply blur to all other columns\r\n        jQuery(columns).not(jQuery(columns).filter(`:eq(${index})`)).find('.elementor-element .elementor-flip-box__front').css({'filter': 'blur(3px)', 'transition': 'all 1s'}); \r\n        \r\n        \/\/ Skip this iteration : roadmapExperience\r\n        if(roadmapExp == 1 && index == 1 || roadmapExp == 2 && index == 1 || roadmapExp == 2 && index == 2){\r\n            return;\r\n        }\r\n\r\n        if(elements != 'all'){\r\n            \/\/ specific\r\n            jQuery(columns).filter(`:eq(${index})`).find('.elementor-element').filter(elements.map(index => `:eq(${index})`).join(', ')).find('.elementor-flip-box__back').css({'background-color': newColor, 'transition': 'all 0s', 'opacity': '9'});\r\n        }else{\r\n            \/\/ all\r\n            jQuery(columns).filter(`:eq(${index})`).find('.elementor-element .elementor-flip-box__back').css({'background-color': newColor, 'transition': 'all 0s', 'opacity': '9'});\r\n        }\r\n    }); \r\n\r\n    \/\/ Description color\r\n    if(descriptionColor && descriptionColor.length > 0){\r\n        jQuery(columns).find('.elementor-element .elementor-flip-box__back .elementor-flip-box__layer__description').css({'color': descriptionColor, 'font-weight': '500', 'transition': 'all 0s'});\r\n    }else{\r\n        jQuery(columns).find('.elementor-element .elementor-flip-box__back .elementor-flip-box__layer__description').css({'color': '#000000', 'font-weight': '500', 'transition': 'all 0s'});\r\n    }\r\n}\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3316f60 elementor-widget elementor-widget-spacer\" data-id=\"3316f60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a9314f elementor-widget elementor-widget-text-editor\" data-id=\"8a9314f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The NIS2 Directive stands out as a crucial framework that strengthens cybersecurity for essential and digital service providers. By adhering to NIS2 standards, organizations can enhance their security measures and become more resilient against upcoming cyberthreats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8270b6f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8270b6f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5282f3e\" data-id=\"5282f3e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-938d3b5 elementor-widget elementor-widget-spacer\" data-id=\"938d3b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cac58d4 elementor-widget elementor-widget-heading\" data-id=\"cac58d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Share this Article<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b9e250 elementor-grid-mobile-2 elementor-grid-5 elementor-grid-tablet-5 elementor-widget-mobile__width-inherit elementor-share-buttons--skin-flat elementor-share-buttons--shape-rounded elementor-share-buttons--view-icon-text elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"4b9e250\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\" role=\"button\" tabindex=\"0\" aria-label=\"Share on facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-facebook\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256C504 119 393 8 256 8S8 119 8 256c0 123.78 90.69 226.38 209.25 245V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.28c-30.8 0-40.41 19.12-40.41 38.73V256h68.78l-11 71.69h-57.78V501C413.31 482.38 504 379.78 504 256z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tFacebook\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\" role=\"button\" tabindex=\"0\" aria-label=\"Share on twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-twitter\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tTwitter\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\" role=\"button\" tabindex=\"0\" aria-label=\"Share on linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tLinkedIn\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_whatsapp\" role=\"button\" tabindex=\"0\" aria-label=\"Share on whatsapp\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-whatsapp\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M380.9 97.1C339 55.1 283.2 32 223.9 32c-122.4 0-222 99.6-222 222 0 39.1 10.2 77.3 29.6 111L0 480l117.7-30.9c32.4 17.7 68.9 27 106.1 27h.1c122.3 0 224.1-99.6 224.1-222 0-59.3-25.2-115-67.1-157zm-157 341.6c-33.2 0-65.7-8.9-94-25.7l-6.7-4-69.8 18.3L72 359.2l-4.4-7c-18.5-29.4-28.2-63.3-28.2-98.2 0-101.7 82.8-184.5 184.6-184.5 49.3 0 95.6 19.2 130.4 54.1 34.8 34.9 56.2 81.2 56.1 130.5 0 101.8-84.9 184.6-186.6 184.6zm101.2-138.2c-5.5-2.8-32.8-16.2-37.9-18-5.1-1.9-8.8-2.8-12.5 2.8-3.7 5.6-14.3 18-17.6 21.8-3.2 3.7-6.5 4.2-12 1.4-32.6-16.3-54-29.1-75.5-66-5.7-9.8 5.7-9.1 16.3-30.3 1.8-3.7.9-6.9-.5-9.7-1.4-2.8-12.5-30.1-17.1-41.2-4.5-10.8-9.1-9.3-12.5-9.5-3.2-.2-6.9-.2-10.6-.2-3.7 0-9.7 1.4-14.8 6.9-5.1 5.6-19.4 19-19.4 46.3 0 27.3 19.9 53.7 22.6 57.4 2.8 3.7 39.1 59.7 94.8 83.8 35.2 15.2 49 16.5 66.6 13.9 10.7-1.6 32.8-13.4 37.4-26.4 4.6-13 4.6-24.1 3.2-26.4-1.3-2.5-5-3.9-10.5-6.6z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tWhatsApp\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_pinterest\" role=\"button\" tabindex=\"0\" aria-label=\"Share on pinterest\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-pinterest\" viewBox=\"0 0 496 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M496 256c0 137-111 248-248 248-25.6 0-50.2-3.9-73.4-11.1 10.1-16.5 25.2-43.5 30.8-65 3-11.6 15.4-59 15.4-59 8.1 15.4 31.7 28.5 56.8 28.5 74.8 0 128.7-68.8 128.7-154.3 0-81.9-66.9-143.2-152.9-143.2-107 0-163.9 71.8-163.9 150.1 0 36.4 19.4 81.7 50.3 96.1 4.7 2.2 7.2 1.2 8.3-3.3.8-3.4 5-20.3 6.9-28.1.6-2.5.3-4.7-1.7-7.1-10.1-12.5-18.3-35.3-18.3-56.6 0-54.7 41.4-107.6 112-107.6 60.9 0 103.6 41.5 103.6 100.9 0 67.1-33.9 113.6-78 113.6-24.3 0-42.6-20.1-36.7-44.8 7-29.5 20.5-61.3 20.5-82.6 0-19-10.2-34.9-31.4-34.9-24.9 0-44.9 25.7-44.9 60.2 0 22 7.4 36.8 7.4 36.8s-24.5 103.8-29 123.2c-5 21.4-3 51.6-.9 71.2C65.4 450.9 0 361.1 0 256 0 119 111 8 248 8s248 111 248 248z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tPinterest\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e97926d elementor-widget elementor-widget-spacer\" data-id=\"e97926d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74ee7a6 elementor-widget elementor-widget-heading\" data-id=\"74ee7a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">You may also like<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In today\u2019s highly connected world, safeguarding essential infrastructure and digital services has become more important than ever. As cyber threats grow in complexity, the strategies and regulations aimed at reducing these risks must evolve accordingly. The European Union\u2019s NIS2 Directive introduces a strengthened cybersecurity framework, enhancing defenses across various sectors through legal provisions. Let\u2019s explore&hellip;<\/p>\n","protected":false},"author":77,"featured_media":82513,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12083],"tags":[],"class_list":{"0":"post-82512","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethical-hacking"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is NIS2? EC-Council Certifications Mapped to NIS 2 Directive Guide<\/title>\n<meta name=\"description\" content=\"Discover the Network &amp; Information Security (NIS2) Directive and its impact on cybersecurity. Learn how EC-Council certifications align with NIS2 requirements to boost your security expertise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is NIS2? EC-Council Certifications Mapped to NIS 2 Directive Guide\" \/>\n<meta property=\"og:description\" content=\"Discover the Network &amp; Information Security (NIS2) Directive and its impact on cybersecurity. Learn how EC-Council certifications align with NIS2 requirements to boost your security expertise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-21T05:53:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-25T07:44:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What is NIS2? EC-Council Certifications Mapped to NIS 2 Directive Guide\" \/>\n<meta name=\"twitter:description\" content=\"Discover the Network &amp; Information Security (NIS2) Directive and its impact on cybersecurity. Learn how EC-Council certifications align with NIS2 requirements to boost your security expertise.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"21 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\"},\"headline\":\"What is NIS2? NIS 2 Directive? Guide to EC-Council Certifications mapped to Nis2\",\"datePublished\":\"2024-11-21T05:53:03+00:00\",\"dateModified\":\"2025-09-25T07:44:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\\\/\"},\"wordCount\":2290,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Blog.jpg\",\"articleSection\":[\"Ethical Hacking\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\\\/\",\"name\":\"What is NIS2? EC-Council Certifications Mapped to NIS 2 Directive Guide\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Blog.jpg\",\"datePublished\":\"2024-11-21T05:53:03+00:00\",\"dateModified\":\"2025-09-25T07:44:17+00:00\",\"description\":\"Discover the Network & Information Security (NIS2) Directive and its impact on cybersecurity. Learn how EC-Council certifications align with NIS2 requirements to boost your security expertise.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Blog.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Blog.jpg\",\"width\":1080,\"height\":1080,\"caption\":\"What is NIS2? EC-Council Certifications Mapped to NIS 2 Directive Guide\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ethical Hacking\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/ethical-hacking\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"What is NIS2? NIS 2 Directive? Guide to EC-Council Certifications mapped to Nis2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is NIS2? EC-Council Certifications Mapped to NIS 2 Directive Guide","description":"Discover the Network & Information Security (NIS2) Directive and its impact on cybersecurity. Learn how EC-Council certifications align with NIS2 requirements to boost your security expertise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/","og_locale":"en_US","og_type":"article","og_title":"What is NIS2? EC-Council Certifications Mapped to NIS 2 Directive Guide","og_description":"Discover the Network & Information Security (NIS2) Directive and its impact on cybersecurity. Learn how EC-Council certifications align with NIS2 requirements to boost your security expertise.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-11-21T05:53:03+00:00","article_modified_time":"2025-09-25T07:44:17+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Blog.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"What is NIS2? EC-Council Certifications Mapped to NIS 2 Directive Guide","twitter_description":"Discover the Network & Information Security (NIS2) Directive and its impact on cybersecurity. Learn how EC-Council certifications align with NIS2 requirements to boost your security expertise.","twitter_misc":{"Written by":"EC-Council","Est. reading time":"21 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f"},"headline":"What is NIS2? NIS 2 Directive? Guide to EC-Council Certifications mapped to Nis2","datePublished":"2024-11-21T05:53:03+00:00","dateModified":"2025-09-25T07:44:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/"},"wordCount":2290,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Blog.jpg","articleSection":["Ethical Hacking"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/","name":"What is NIS2? EC-Council Certifications Mapped to NIS 2 Directive Guide","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Blog.jpg","datePublished":"2024-11-21T05:53:03+00:00","dateModified":"2025-09-25T07:44:17+00:00","description":"Discover the Network & Information Security (NIS2) Directive and its impact on cybersecurity. Learn how EC-Council certifications align with NIS2 requirements to boost your security expertise.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Blog.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/Blog.jpg","width":1080,"height":1080,"caption":"What is NIS2? EC-Council Certifications Mapped to NIS 2 Directive Guide"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/what-is-nis2-nis-2-directive-guide-to-ec-council-certifications-mapped-to-nis2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Ethical Hacking","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/"},{"@type":"ListItem","position":4,"name":"What is NIS2? NIS 2 Directive? Guide to EC-Council Certifications mapped to Nis2"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82512"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82512\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82513"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}