00:03
So October is National Security Awareness Month. I think that's such a great opportunity to put some time aside right now to really dive into that talk fake that subject. The industry career opportunities.
00:20
So welcome today's webinar is called cyber security career advancement and protecting organizations from attack.
00:30
This webinar is presented by Todd York partner development manager at EC Council.
00:37
EC Council has certified security professionals from leading organizations across the globe, including the US Army, the FBI Microsoft, IBM and the United Nations.
00:51
EC councils flagship course certified ethical hacker set the standard for what the world has come to expect from Ethical Hacking IT security courses.
01:03
They are recognized leader for information network computer and internet security training and certification in today's session. Todd will discuss certification based cyber security training courses offered by EC council and how these courses can quickly advance your careers.
01:24
During the webinar. Everyone's phones will be muted. So if you have any questions, feel free to enter them either in the Q AMP a box or the chat window at the bottom of your screen.
01:37
At the end of our webinar we will dive into those questions during the dedicated Q AMP a session.
01:45
If you enjoy the presentation today. And if you're interested in learning more about training anywhere with our interactive virtual platform that we call I MVP, please visit our website or contact us.
01:59
Today's webinar is recorded, and I'm going to send each and every one of you a copy of that recording
02:06
So without further ado, Todd. Let's take it away.
default user avatar Todd York
02:11
Alright, Michelle, thank you very much. Hi, everybody. Thank you for taking the time to join the webinar. My name is Todd York I am partner development manager here at EC Council located in the Tampa office. And again, thanks for joining and we'll go ahead and get started.
02:28
So today I want to talk to you guys about EC council and give you the who, what, and why. So who is EC council. What do we do, and, and why do we do it.
02:39
So EC council. We're really our official title is International Council of e commerce consultants, otherwise known as EC Council.
02:50
But if you say certified ethical hacker, then people really know who we are. So our company was started back in 2001 when our owner and CEO J BBC
03:03
Kind of recognized that after 911 that the next major attack may be cyber related. And again, this is back in 2001 so cyber, you know, really wasn't a household term.
03:16
So he came out with certified ethical hacker back then. The term ethical hacker was kind of frowned upon. Actually, we were talking with the
03:29
Department of Defense. The Pentagon at the time and they actually made us change the name of Certified ethical hacker to certified network defense architect or c n da
03:42
This is actually death by acronym today so but yeah so ethical hacker, we actually coined that name. And that's really what we're known for. So we're an international company. We've got offices in Malaysia, Singapore. I'm here in Tampa.
03:58
We have offices in Albuquerque, New Mexico, London Australia.
04:02
Certified. A lot of people in cyber security and a lot of different countries.
04:09
So we have over 2700 training partners training and education partners so we we work with training centers like
04:19
Exit certified tech data and some other training centers where students can go and get hands on training. We also have 2000 certified instructors 350 subject matter experts at thousand tools. So we've been doing this for quite a while.
04:40
So what we do at EC Council is we create hands on tactical offensive defensive cyber security training courses and we kind of consider ourselves the tip of the spear because our focus is only in cybersecurity.
04:57
So our courses are vendor neutral and they are not policy based that's a little bit different than some others that you will see
05:05
vendor neutral means it doesn't matter what software, hardware you're running
05:10
Policy based means we're not here to talk to you about the policy of security. We're not here to give you definitions of security. What is a router. What is an IP address. That is not what we're here for.
05:23
If you think of it in an analogy as when you buy a home so you buy a home, you need to secure your home. So you need to secure that with door locks and alarm system security cameras that certain type, you know, certain type of window.
05:39
That's the policy of securing your home vendor specific would mean an ADT alarm system, a specific brand of video cameras.
05:49
At EC council. Our job is to smashing the front door smashing the windows until the homeowner what worked and what didn't work and why
06:02
So again, we've been around for for since 2001 around for quite a, quite a while. We have some national recognition. Again, we're a global organization. We've been on all of the major
06:17
television networks.
06:19
That back in 2010 that pentagon invited us there to teach their staff, how to defend their networks so
06:31
It, it just kind of leads to the the weight of our brand, this is not, this is not really to fly Ireland flag, but I just want to kind of let you guys know who we are and what it would mean to you to hold certifications from EC Council.
06:48
So some accreditation and recognition. We are recognized and work directly with the NSA. We are antsy certified. That's the American National Standards Institute. That's for all of our courses. This is rather important because it's not easy to get antsy accreditation.
07:08
That means that we have to go through job task analysis knowledge, skills, and abilities mapping to job roles that's extremely extensive, quite frankly, expensive. So every single one of our courses are NC certified
07:25
We work directly with the Department of Defense.
07:28
The Department of Defense has a chart that's called the d o d directive 8570 or is now being called at 140 that chart says if you're in any branch of the military and you're going to be in cyber or interested in cyber on this chart or the courses you will take period.
07:49
So certified ethical hacker is on that chart.
07:53
They actually had to build a new category for that certification because it didn't quite fit in the other more baseline training courses.
08:03
Now as a couple of months ago.
08:06
Two more of our courses have been added, and any day now another one of our courses is going to be added.
08:13
That's really big, for a few reasons. Again, it's it's brand recognition. If the do T is using it, then that's great for all industries.
08:27
So some of our customers. We have a few different divisions within EC Council, we have an enterprise division and that's more consulting. So if somebody needs help, right, if they need somebody to come in and do some
08:40
consultative work as far as vulnerability assessment that type of thing. We do work sometimes directly with with customers. We have an academic division.
08:51
Where we work with large universities universities across the world and providing that content for them to run cyber security training courses.
09:00
We have our channel division which is exit certified tech data as well as some other training centers globally. And then we have a government division, where we work directly with the do D. I've been part of that government division.
09:16
And just to kind of let you guys know, as far as again what these certifications mean, who's
09:23
Training with these certifications. We work directly with
09:28
Central Command. We work directly with cyber command we work directly with fort McCoy Fort Bragg, we work directly with the Air Force cyberspace command. So when people talk about should I take a EC Council course.
09:45
It's highly recommended. And again, if, if these branches of the military are using it. It is. It's great for everyone.
09:55
We also have a virtual division. So exit certified tech data can offer you training boot camp style meaning putting people in seats in a classroom environment brick and mortar or getting taught from an instructor that is probably the best training, you're going to get
10:15
Now we have a virtual side as well that exit certified tech data can provide to you.
10:20
If you are more comfortable with.
10:23
Being virtual so joining an EC Council run live online class we have that available to you. If you're more comfortable with asynchronous so self paced training we have that available to you as well.
10:39
And these courses come with course where
10:43
A lab environment, which we'll talk about a minute.
10:47
For the asynchronous you get lecture videos broken down by chapter from one of our top instructors kind of standing in front of a green screen going through training slides and all of that.
10:56
And you also get an exam voucher with remote proc during service, meaning you can test out from home being proctored via webcam or your laptop camera.
11:06
Now I labs.
11:09
Is our cloud based lab environment.
11:14
This is where rubber hits the road. So when we talk about. It's not policy based its hands on. This is where that happens. So it is critical that students train hands on to become experts in cybersecurity, and we are talking about experts here.
11:32
So that's experts in all of the courses that will will show you but you can't become an expert without doing hands on training. If you don't have a lab environment.
11:41
That's like trying to teach a pilot to fly without a simulator right he just 16 year old drive by PowerPoint alone. It's got to be a hands on environment. Ours is cloud based mean it's accessible from anywhere. It is. It's a secure sandbox. So you're not going to do damage.
12:01
To a network.
12:06
So why
12:08
Why do we do this. All you have to do is turn on the news and you'll see some type of cyber attack happened to somebody, somewhere and it's only getting worse.
12:20
Yeah, obviously was huge news during the elections Trump and Hillary
12:25
The one of the biggest things now is what's called ransomware
12:29
This isn't, is it the life we live here. It's kind of a daily thing. But if you're not familiar with that.
12:34
ransomware is a malware attack that happens and Lately it's been happening quite a bit to hospitals, I say lately. It's actually been a couple years.
12:43
But hospitals get hit with a ransomware attack meaning their computers are shut down one of them. I remember
12:51
The story was that the people came into work they turn on their computer and the AC DC song, thunderstruck started playing at all. There was a skull and crossbones on all of the computers.
13:02
And then you get a message basically saying that your computer has been infected with a virus, unless you pay this ransom normally in Bitcoin your computers will be toast.
13:14
So, and what happens is hospitals are held hostage. Right. Hence, the whole term ransomware
13:23
If they don't pay the ransom, then they can't get their computer systems back. That means that your system is shut down.
13:31
Unless your backup files were siloed than your backup files are also encrypted and on accessible.
13:38
So we got a call. A couple of weeks ago from a very large bank here in the US that everybody knows, and they got hit with this.
13:45
So they asked for our help and we went into check them out and their files were toast and their backup files were also toast. So the last time that they backed up their files and siloed them meaning detached was seven years ago. So imagine a very large national bank global bank.
14:06
That had to start over with data that was seven years old.
14:11
That's an absolute nightmare. I mentioned a hospital being turned back into the stone age where all they have is pencil and paper. That means no CAT scans no x rays, no computers, no client data WHATSOEVER NO drip feeds.
14:29
So it's gotten to the point where it's it's scary. Um, cyber attacks are hitting public schools. Now I heard a story the other day of somebody's home. They had a smart home.
14:40
You know where you control the light bulbs and all that kind of stuff. And the hackers had turned their thermostat up to 90 degrees and we're talking to them through their smart home.
14:50
hackers can actually hack through one of the best ways to hack into a home, believe it or not, is through a dishwasher.
14:56
When you have a smart home LED light bulbs dishwasher, whatever it is they come with a default password if you don't change that it's very easy to hack into
15:05
So this is why we do what we do. We have got to train people to become what we call ethical hackers or white hat hackers has to pose to black hat hackers, which are the bad guys.
15:20
So,
15:21
This graph release kind of small, but the daily expense for North America was 12 billion spent on cybersecurity and fiscal year 18
15:33
A ton of money is just being spent on this problem. And again, it's only getting worse, we are under attack on a daily basis from nation states.
15:43
From other organizations, just trying to do damage either still steal data damage reputations credit card information, whatever it may be, or shut down power grids.
15:57
You know, scary things like for instance, what if Morton Salt got hacked. What if they were able to change the formula for salt.
16:05
Nobody thinks about that, really. But if salt became toxic.
16:12
That would be a major, major problem.
default user avatar Unknown Speaker
16:17
So,
default user avatar Todd York
16:18
The cybersecurity skills gap is getting worse. That is good news for anybody looking to get into cyber
16:26
Okay. So according to Forbes
16:30
We need a lot more white hat hackers a lot more. And as you can see there and read supposed to be 3.5 million unfilled positions in the industry by 2021
16:41
So, it, it, quite frankly, it's one of the best careers, you could possibly pick
16:53
So is it worth it, getting certified. This is a question that students asked fairly often.
16:59
And the answer is it is it absolutely is.
17:05
to legitimize your, your
17:08
Earnings
17:10
I'm sorry to legitimize your skills by earning certifications. Right. So you might even not get a job because you don't hold a certification so
17:19
In the back in the day, few years ago, five years ago 10 years ago, whatever it was.
17:24
Corporations WOULD HAVE IT professionals those IT professionals either did or did not hold certifications and again it may be it mattered, maybe it didn't.
17:33
Those days are coming to a screeching halt organizations are now being asked what certifications THERE IT professionals hold you have got to be able to validate the skills of your IT professionals. If you don't believe me, go talk to somebody in the D. O. D.
17:51
It has gotten to a point. Now we're taking a multiple question test doesn't cut it.
17:56
Now they want to see performance based skills. They want to see you actually perform the job so EC council. We've been stepping up our game when it comes to that as well. Now,
18:09
What courses. Do you need before taking EC Council courses you know how much training, how much
18:19
Experience. Do you need before taking our courses. It depends what course you're talking about. But for baseline training.
18:27
With EC council, you should have had some certifications before, right. So, as it says there come to a plus that plus security. Plus, those are the standard baseline training courses that really are a great idea. Before you get started with EC council or a different level, to be honest.
18:47
Some people ask about subscription based content. Right. So there's all kinds of free or not free. But let's say you pay $100 a year for subscription based training and has all this content right Ethical Hacking this
19:01
You know network defense that those are great. Those can be a great additional resource, but they do not by any means take the place of certifications.
19:10
You've got to be able to hang up plaque on the wall. You've got to have the credentials next to your name in order to really launch your career.
19:20
So what does EC Council offer. This is a quick screenshot of our website.
19:26
We offer training our baseline training bottom level when it comes to cyber security is certified network defender.
19:35
Then we have certified ethical hacker again. That is what we are known for. We now have as a fairly recently a course called CH master, that again is performance based that is a practical challenge.
19:49
If you take the CH course and you get your CH certification. You can sit for the CH master practical challenge all that is is a practical challenge range that we drop you into
20:04
And there are no instructions. You've got to figure out how to navigate and see if you can pass the practical challenge. If you do that, we will nominate you as a CH master.
20:16
We have the same for another course that we have called EC essay or that's our EC Council is certified security analyst. There's a practical for that as well.
20:24
But as you can see we have courses and a lot of different fields, whether it's licensed penetration tester incident handling.
20:31
forensics is a big one. We're going to take a minute to dive into a few of these in a minute to give you quite a bit more information on what these are about
20:41
Two of our newer courses are certified threat intelligence analyst, as well as the bottom right hand corner, which is certified SoC analyst. So that's a security operations center.
20:53
Those are quite
20:56
becoming more and more prevalent. These sock centers and we've people have been kind of poking out of saying we've got to come up with a sock analysts scores and it is now fully available.
21:09
So,
21:10
What are the best certifications to get depending on what
21:16
Information, you're looking at what list. You're looking at CH is either one, two or three. This one happens to be number one.
21:24
So again, what's the best certification to get when you're getting into cyber security certified ethical hacker number 10 on that list is our forensics course.
21:35
There were a lot of other there's a few other certification bodies that are like us, where a certification body that have good courses as well.
21:44
Personally, we, you know, like ours, but I'm certainly look into those as well.
21:53
So this one is kind of important to me and I hope it is to you guys as well.
21:59
Official Training versus non official training.
22:04
When you go to what is called an accredited training center like exit certified tech data, you are going to get training and quality at the top level.
22:16
If you decide that you would rather not do that. That is your prerogative.
22:21
You can take training from anybody. There are all kinds of courses out there in cyber that are created by some reputable organization some very much not reputable organizations.
22:35
This is kind of a joke but Billy Bob's Ethical Hacking. I mean, I use that quite often terminology, because you will see
22:42
training centers out there. I call them training centers, it could be anybody could be a shack in the woods. For all I know, but they offer some type of Ethical Hacking class.
22:51
And a lot of times just to be frank, it's a it's a direct rip off of EC council. Other times it's kind of a half baked course.
23:01
So if you take training from an accredited Training Center. First of all, you're going to want to look for that.
23:08
That yellow or gold around logo that says EC Council accredited Training Center, it will be prominent on their website. That's the first thing you want to look for
23:18
The course will be offered and taught by a Certified EC Council instructor or a CI that is someone that is certified in the latest version.
23:27
Of for this example certified ethical hacker. Of course, this goes for any of our other courses. If it's network defense, they would be certified the latest version that we're defense.
23:36
You're going to use of our official training slides by the instructor and our official lab environment called I labs.
23:45
Our official course where which is of course updated with the latest tools and techniques you get support from our team. And there's a good probability that you're going to pass the exam.
23:54
Or you can slide over to Billy Bob and you can get training offered by whatever it is that they do, you know, they may be focused on Microsoft, but they throw in some hacking because they know it's popular
24:08
Is it taught by an instructor that even holds a CH no guarantee that the contents created by, I don't know, use of a lab exercise. Do they have a lab environment. Are they going to throw up a bunch of slides that they created and call it Ethical Hacking
24:25
So this lab exercise and this is kind of interesting because we are in this case, talking about hacking
24:32
Right, this is an offensive tactical course using offensive tactical tools. This is no joke right we train people to become the best of the best when it comes to
24:43
To cyber security and that starts at network defense and CH, but then it goes way up the chain now.
24:51
There are some even a TCS that we have accredited training centers that have their own lab environment and we provide a lab guide.
25:02
Saying, here's what you need to create your own lab environment. It's not really cloud based, you have to actually be there on site. But to give you a quick story about the danger.
25:13
Years ago.
25:15
Probably, I think it was 2003 or five, something like that, we ran a certified ethical hacker class and Las Vegas at the Bellagio hotel.
25:25
We offered the Bellagio hotel to use our labs lab environment. And they said, Oh, no, we have our own lab environment we run all kinds of training with our lab environment.
25:34
And we said, Okay, would you, we recommend using our lab setup guide. They said, No, we're in good shape ran the CH class. And one of the students got outside of their network out of the secure sandbox, if you will, and ended up shutting down the Bellagio Hotel in the middle of the afternoon.
25:53
So imagine that power out at the Bellagio casino.
25:58
So, no joke that's lesson learned. Right, this is this. This training is for real.
26:05
So if you look on the right hand side is some of those logos. See, the one that says
26:10
top right hand corner CH. I think it says by serve or something that's not us don't know who that is.
26:18
The other one below it. Ethical Hacking again, not us.
26:22
That top left, see a certified hacker bundle. I know who that guy is. But that is not us. And none of this is official that CP, eh, the blue and green there at the bottom.
26:34
Again, not us. We know who they are as well. Also, matter of fact they're actually located here in Tampa. So if you're looking for official training, please go to an accredited training center exit certified is the perfect place to go.
26:53
So let's talk about what this means to you for getting certified, do you want to start a career and cyber advance your career and cyber
27:02
There are wonderful salaries, these are average incomes that I pulled up that's here in Tampa.
27:07
So if you happen to be living in, say, a larger city like maybe LA or New York, the salaries are will be much higher than this, but these are just a few examples of just your average salary for holding these certifications.
27:28
All right, we're gonna run through these fairly quickly. It's 1232. So we've got about 10 minutes or so on. Then we'll have Q AMP a
27:35
But I just want to take you through these real quickly on some of our more popular courses certified network defender baseline training. This is
27:44
Bottom of the floor. When you come to EC council. This is where you start now. You can't take this in place of content security plus or net plus
27:54
Those courses are really more policy based they're going to give you the foundation and the fundamentals of security. This is hands on tactical defensive training. You can see who it's for. On the right hand side.
28:07
Yeah, I'm not going to bore you with going through all this but this course, you know, is for protect detect and respond
28:17
So as you can see the top right hand corner. All the way in the top 85,000 base salary or average salary for holding this certification. I'm sorry, not for holding the certification. I couldn't find CND
28:30
When looking for the certification itself. But if you look at a network security engineer, which is listed as one of the who's it for. That's the average salary for a for that person.
28:42
Next, we recommend certified ethical hacker. Again, this is our bread and butter.
28:48
This course again offensive. So some of our courses are defensive what we call blue team. Some of them are offensive what we call red team.
28:57
So the most desired information security training program in the industry, you can see we're on version 10 now so we come out with a new version about every oh 12 to 18 months. It will be coming out with a with 11 I think probably Q1 of next year.
29:17
So here's information on that. The five phases of Ethical Hacking is kind of cool. But it's reconnaissance
29:24
enumeration or scanning so reconnaissance scanning gain access maintain your access cover your tracks.
29:31
In order to beat a hacker, you have to think like a hacker. That's what this is all about. If your organization is getting hit with a cyber attack.
29:40
Certified ethical hackers, not only can recognize that, but they can go on the offensive. So a lot like if somebody is
29:47
shining a light at you if you take a mirror, you can shine a light right back. Adam, Adam. So if you're getting hit with a
29:54
Dedicated denial of service attack or a de dos attack, they call it. That's just flooding your network with information. So it just overwhelms everything your computer's like I'm not doing that. I don't know what to do.
30:06
You can turn that around and fire it right back at the bad guy and overwhelm his network.
30:14
This is one of our newer courses we talked about SoC analyst, if you are working for a security operations center or thinking about it. This is perfect for you. And that tier one, tier two level.
30:25
So a great course. This is actually only a three day course.
30:29
But again, it is designed for that Soc analyst cybersecurity analysts entry level entry level cybersecurity professionals, anyone who wants to become a sock analysts.
30:40
Ever salary 75,000 I keep in mind that's average salary for a security operations center analyst or SoC analyst.
30:50
But if you hold this certification along with CH, then your value is much higher, right, the more certifications, you hold the higher your value because the more you're worth the more you can do
31:03
So forensics. This is great for law enforcement right defense military government agencies banking all that. So what happens, your, your bank got hacked.
31:14
Okay, we got hacked our systems are compromised. Somebody got into our network. What's the first thing we do right as a IT person. Well, let's go pull the data log wrong. You just stepped on the evidence.
31:29
That's what forensics is about right, we have to gather the evidence we have to give it to the FBI.
31:35
If you go digging for who got in. You just, you just smeared the fingerprint.
31:44
You CSA security analyst. This is really penetration testing. I actually was able to look this one up salary for a CSA 94,000 penetration testing critical it is critical to go in and look in an organization's network to find vulnerabilities. That's what this does.
32:03
Find the vulnerabilities patch the holes give a report to your executive team.
32:10
Now, a lot of organizations outsource this to companies like Deloitte P WC guess what certifications. Those guys from Deloitte and pw see hold exactly a CSA
32:23
So, someone's going to come in and they're going to do this job. Why not as an organization have somebody on your team already certified instead of looking at your vulnerabilities on a quarterly basis.
32:33
Or every six months. How about having somebody look at your vulnerabilities daily or weekly
32:39
How about having somebody on your team, they can not only look for vulnerabilities, but maybe somebody that holds a CH. They can go on the offensive. How about somebody that isn't network defender anybody that has admin rights should have a network defense certification.
32:56
Cc So okay, this is a completely different animal, this is C level executive anybody that's looking to get into that C level executive level.
33:06
Right. And it's not just see. So this isn't becoming a CSO certified chief information security officer. This is, this course is designed for everybody in that C suite CFO CFO CIO, CIO, you name it.
33:19
It is getting C level executives to learn to speak the same language when it comes to cyber security, not from a technical aspect and this course five day course we run a war game. Many we will actually put three C level executives through a simulated cyber attack situation.
33:41
So let's pretend they're the C level executives of infinity Corporation
33:47
You have just been hit with a ransomware attack your email systems are compromised. How do you communicate with your employees you have 10 minutes
33:55
To come up with your answer, then you're going to get up in front of the other half of the class and give your answer they give their answer and then you reference back to the training material itself to give the exact perfect answer next
34:10
Media is aware of the attack. What do you say, and when do you say it, give us your answer. Go.
34:16
You have 10 minutes
34:18
Your shareholders are on the phone. What do you say, and when right these are critical things to be able to manage and to have a plan in place when it all hits the fan. That's what this course is designed for
34:32
This course has actually been outselling our CH course at some of our events.
34:38
So learning Trax quickly. How do you become a network defender network defense and operations. Here's what we recommend.
34:45
Take certified network defender. Then take incident handling than disaster recovery. And then we have a course called cast 614 which is advanced network defense if you go through that you are worth quite a bit of money.
34:57
You can see the organizations that that hold that have employees with that certification will see end forensics. How do I become a forensics person CND CH, you could take the CH practical if you'd like and become a master that's awesome incident handling and then into forensics.
35:15
Vulnerability vulnerability vulnerability assessment of penetration testing CND CH e CSA into the LP tea master. If you hold the LP tea master, write your own check work anywhere in the world you are worth a pretty penny and you are highly valuable.
35:37
And then Cc So right, this isn't really attract. This is just kind of giving you some more information about Cc So
35:48
So enough of all that right courses. Yeah. Yeah. Yeah. Got it. It's great that that is the way to advance your career, but
35:57
Some fun things that can take place global cyber Olympics right we hold a cyber Olympic competition, globally from and teams join teams of six, eight people.
36:10
That join and have a cyber competition to hacking competition and it gets condensed down to a team to about I think there's 10 teams and then we hosted somewhere whether it's in Toronto, or Atlanta on this team, I believe.
36:26
So say Oracle usually the team from Deloitte wins. They're really, really good. But that's a cool thing that we do that you guys can do as well. Right.
36:35
So the world of cyber is just not some geek sitting in front of a computer 12 hours a day.
36:40
Right, it's an exciting world we have a hacker halted event actually coming up next week that I got to fly out to. That's a really cool conference.
36:48
We hold drone hacking workshops where we actually provide a storm kit which is little mini computer with a keypad. It's a penetration testing tool and you can learn to hack drones and we have a takedown con event that we host
37:06
Right so cybersecurity career again.
37:10
It encompasses a lot more than somebody behind a computer just sitting there right be your own hero hack the Pentagon. The Pentagon put out a competition.
37:19
To try and hack their systems right they selected a group, different people and said, have at it, try and hack our system. If you can hack it will pay you a teenager 120 $5,000
37:32
A teenager.
37:34
He penetrated their system.
37:36
The guy in the top left hand corner quickly. I know we're running out of time, but quickly.
37:41
That's Chris Roberts.
37:43
Know him well. He'll be at our hacker hopper hacker halted comp can conference he right now is somewhere overseas and he flies all over the world doing presentations cool guy.
37:53
That's a hacker right not not a geek, not a nerd tattoos long crazy different colored go to every time was on a flight in North America.
38:05
AND HE HACKED INTO THE PLANES Wi Fi system in flight. And he briefly shut down the left engine very, very briefly, so the the plane turns slightly
38:18
And then he turned the engine back on. Right, I'm talking very briefly like almost unnoticeable from other passengers. But you know who noticed with the FAA
38:29
So the plane lands and guess what happens
38:33
Chris's escorted off the plane. I don't know if it was immediately right then or shortly thereafter, but he is arrested and he is locked up. And then guess what happens. He is hired by the FAA for a pretty penny.
38:47
How did you do that Chris, how in the heck did you hack into the Wi Fi network and disable an engine on a commercial aircraft.
38:57
Alright, so now he's famous and the hacker world. There's a lot of people like this, right. So Edward Snowden. Right. Most of you probably know that name. He is a certified ethical hacker
39:09
Okay, so good guy bad guy, however you want to look at that. There are guys that do these type of things that hack into organizations and say, Hey, I got in and I want to tell you how can you weren't authorized to get in but you got it anyway. So we're pissed. But you're hired.
39:31
So really it's a it's a great opportunity to get into cyber security to if you're already in to advance your career.
39:40
You know, contact exit certified tech data, talk to them about courses coming up, how you can get involved, what's going on. So we'll go ahead and now I'll turn this back over to, I guess, Michelle, to kind of go through, see if there's any questions that have been posed.
user avatar Michelle Coppens :: Webinar Producer
39:59
Thank you so much, Todd. Yeah. Now is a great time to open up the floor for some Q and A's. We have a few queued up
40:10
The first question comes from Michael. Thank you, Michael. So the question is, if you could elaborate. I think we covered it. But let's elaborate on this.
40:20
The question, what would be or what is the recommended cyber security entry level course for someone with little experience than an individual can go into to be certified and then move up the ladder.
default user avatar Todd York
40:36
Yeah, so, so great question.
40:39
Again, I would focus on, I would look at comp to you.
40:43
Because content is going to give you that baseline training com to a plus network plus security plus
40:49
Not completely necessary. It's not a requirement, you could come to EC council and say I want to try for certified network defender.
41:00
That's fine. You don't have to have any it experience or have any pre certifications for certified network defender for certified ethical hacker, we recommend two years of it experience.
41:12
Minimum it'd be great if you did hold some type of other certification like from comp to I see that Zach actually asks a question as well.
41:21
He says, I usually take a two prong approach LIKE IT Pro TV plus exit certified IoT to pass an exam. What's your opinion on that approach. I think that's a good approach. I KNOW IT Pro TV know them well we were considering
41:37
You know, kind of trying to work with them, but it doesn't really fit our, our environment right so subscription based learning isn't isn't really in our wheelhouse at this very moment.
41:49
There are some there's quality material out there and some of the places.
41:55
Just to give props to one called cyber airy C library.
42:00
That is a branch off of a of a nother training partner of ours. That's pretty good, as well.
42:06
You know, sometimes you have guys that are in the cyber industry sometimes instructors that are certified as
42:13
An ethical hackers or penetration testers, whatever that put together their own slides and those things can be beneficial. So, you know, I don't want to talk down to them talk down about them at all. But I would say that that's a
42:28
A benefit to maybe taking training, but I would absolutely focus on the training with maybe those things as
42:38
You know, just kind of an add on, but being in front of an instructor that has taught this class before many times with official
42:46
Curriculum from EC council, especially the lab environment that is critical to success. We have people all the time and I sorry I missed. I didn't, didn't talk about this on that slide.
42:57
Talking about Billy Bob's Ethical Hacking if you take grey market training, what we call great market, you probably saw it listed there.
43:06
There's $100 application fee and you have to fill out an application to sit for the exam. The exam cost alone is, I believe, 1100 dollars is 1000 or 1100 dollars for the exam itself.
43:17
Plus, you have to fill out this application, you have to wait for us to respond.
43:21
We do that because we want to drive people to accredited training centers. A lot of people will come to us and say I failed the exam.
43:28
Okay, well what training. Did you take
43:31
I trained it you know with cyber ear IT Pro TV or I read one of your Ethical Hacking books. What book specifically did you read. It's not ours. I don't know who made that or what you read. So sorry. So
43:46
I think it's a good idea to, you know, kind of expand your, your resources. Right. So whether it's, you know, perform on a performance basis, but
43:55
You know, logging into look at some free resources or some paid resource and all that, it's all great, but absolutely look to get your certification from exit certified
user avatar Michelle Coppens :: Webinar Producer
44:09
That's awesome. And just to expand on that. I'm going to post the link in the chat for everyone. Right now this link is going to bring you directly over to exit certified calm and
44:21
It's going to highlight all of the EC Council courses that we're currently offering as well as the current schedule.
44:28
So another question from jack. What was the highly paid position. You had mentioned towards the end of the slide. Maybe if we could go back to the salary slide.
default user avatar Todd York
44:43
A problem.
44:46
See how quickly my computer response here.
44:50
The highest paid one is a certified chief information security officer.
44:56
That's the certification, you can get, but the position is called CSO or chief information security officer.
45:03
That is the highest paid one
45:08
Sorry guys forget a little backing up here probably this one is the one you're you're referencing
45:13
So we can look at that one.
45:16
Sorry, I gotta move this box. Either way, so I can see 159 94,000
45:24
To be frank, the highest paid, you're going to get when it comes to EC Council courses and probably in the industry is penetration testing.
45:33
Looking for vulnerabilities looking for holes ACS as a way to get there into our licensed penetration testing or LP T course that's really
45:43
Kind of top of the charts. Now there's a company out there called is c squared, which has a course called cis sp. You guys probably already know cis sp. That's a highest paid position as well.
45:55
The number one student going into our Cc So class is the CI SSP person.
46:03
See is sp has been a top of the mountain. For the longest time, there was nowhere else to go. Now those students can see that technically I'm at the top of the mountain. Now I need to get into management level.
default user avatar Unknown Speaker
46:20
That's great. Thank you.
default user avatar Todd York
46:23
Todd, can you
user avatar Michelle Coppens :: Webinar Producer
46:24
Provide any recommended reading material to prep for class and or exams.
default user avatar Todd York
46:32
Almost
46:34
There is
46:36
Dance, you know, not right now we have a product that's going to be coming out very soon. There's going to be called cyber quoting or cyber cue cyber Q is assessment. So it is assessing not just is this course right for you. But it assesses your skills or you currently sit
46:56
So to a national standard. Are you at the standard below above the standard and it goes deep into the assessment as in
47:08
This portion of what you do lacks a little bit of experience or knowledge we recommend taking this because of that.
47:17
So there are, there's some cool things coming from EC council that I'm going to kind of hold off on talking about now, but
47:23
From an overall student perspective, we're going to be coming to you and offering things to you.
47:29
Through exit certified that are going to be able to really expand your knowledge when it comes to certifications and or training and specific parts of certification. Like, what if you worked for Hewlett Packard, I needed to know how to do packet sniffing
47:47
Right or packet analysis. Sorry, and
47:51
You really needed to focus on that rather than taking a whole CH course. Can you focus on a certain division of that. And that is something that is coming soon.
48:00
We'll be launching some information on that soon and cyber Q is the assessment part of that as far as reading resources that are available right now what we just talked about, probably, I'd probably point you to cyber airy.
48:15
IT Pro TV. They offer similar type, type things, but probably number one on my list would be side, Barry.
default user avatar Unknown Speaker
48:25
It's great.
48:27
The floor is still open. If there's any more questions, feel free to enter them into the Q AMP a window or in the chat window.
user avatar Michelle Coppens :: Webinar Producer
48:42
And as we wait for any final questions to come in. I just want to take this moment to thank you, Todd and to thank every one of you for attending our cyber security webinar. I tons of great information on how you can advance your career in this industry.
49:00
We are going to send the recording of the session to everyone here is in the room, feel free to reach out to us with any questions if they come up later on you'll have all of our contact information.
49:15
I'll be hanging out here. If there are any questions that do come in. But I think that we can
49:21
Jump back to the Q AMP a box because we just have one that's come in. So thank you for the transparency. I agree. I was talking about that before the webinar. I think it's really great to have just a completely transparent view of what a career in this industry would look like.
49:39
Regarding exit certified any future outlook on an annual package for example my employers paying instead of
49:48
One off a yearly path or package could be sold easier internally, that's a great question and jack for you or for anyone else who has a similar question.
49:59
I would strongly recommend reaching out to exit certified will connect you with one of our dedicated education representatives.
50:09
They're going to find a package that works for you. Your needs your company's needs and we are very flexible and accommodating. So I strongly recommend reaching out to us will connect you with someone who will be able to determine the right training path for you and your colleagues.
50:39
Alright everyone, I will be here if there are any other questions, but I think we can adjourn. Thank you so much. Enjoy the rest your day.
default user avatar Todd York
50:45
Thank you everyone. I appreciate it.
user avatar Michelle Coppens :: Webinar Producer
50:52
Todd. Another question.
50:54
Okay, individual jump programs. So once they finish the baseline course, for example, After completing Katia then to CMT and one jump straight to see. Ah.
default user avatar Todd York
51:10
Yes. Actually, that's the perfect path actually comp to then into CND so you get through comp to then you start with our baseline, which is CND the next recommended course for you is CH. Now, great point. You bring up
51:26
I think of our training like a tree, right. So when you start at the base of the tree, you have CND then you have CH. And then you start to branch out into different divisions, whether it's forensics, whether it's an incident handling disaster recovery penetration testing. So yes, you can.
51:43
Let's say you got your CD and you wanted to go right into forensics and not get your car.
51:49
You could, but it's it's really highly recommend you get your car. But after your car, you can jump anywhere straight into penetration testing straight into forensics, you know, whatever, whatever direction you want to go. So that, yeah, that that's a great question.
52:13
That's my pleasure.
52:27
Alright everyone, that wraps up our webinar today. Have a great one.