Hi [[ session.user.profile.firstName ]]
Sort by:
    • Women in Cyber Security Women in Cyber Security Chanel Suggs, IT Security Manager, Professor and Advisory board member, EC-Council Recorded: Jan 27 2016 4:00 pm UTC 47 mins
    • The future for women in Cyber Security is NOW.

      Despite the growing demand and tremendous opportunities in the job market, cyber security remains an area where there is a significant shortage of skilled professionals regionally, nationally and internationally.

      At EC-Council University we want to empower and recognize women who are results-driven and able to manage multiple disparate tasks while leading groups to achieve positive outcomes and astonishing professional successes.

      Even worse, women’s representation in this male-dominated field of security is alarmingly low. Women are detail oriented with an analytical mind that quickly assess and achieve solutions to the most difficult problems, prioritizing and executing in a rapid, dynamic environment.

      “At EC-Council University we wish to highlight these prestigious women and set examples for others to follow suit.”

      Read more >
    • Application of Cryptography for Enterprise Security Application of Cryptography for Enterprise Security Dr Michael H. Goldner, Dean of EC-Council University, EC-Council University Recorded: Dec 17 2014 7:00 pm UTC 113 mins
    • Cryptography is the practice and study of techniques for keeping secrets. While the practice of keeping information hidden, or secured, has been around throughout the history of mankind, Modern Cryptography has evolved into much more. Now we use various algorithms (a fancy word for mathematical formulas) to not only keep information secured (Confidentiality), but also to authenticate the message and the originator of that message (Authentication); to stop the sender of the message from denying they sent it (Non-Repudiation); and to make sure that the information has not accidentally or purposely altered or corrupted (Integrity). This basic workshop will explain the basic concepts discussed above, as well as the differences between Symmetric and Asymmetric encryption. We will discuss Steganograhy, Digital certificates, Public Key Infrastructure and Digital Signatures. Although the workshop is to enhance basic understanding of these concepts, anyone studying for one of the major certification examinations in information security, such as the recently launched EC-Council Certified Chief Information Security Officer (C|CISO) will need to have a good grasp of these important concepts.

      Read more >
    • Application of Cryptography for Enterprise Security Application of Cryptography for Enterprise Security Dr Michael H. Goldner, Dean of EC-Council University, EC-Council University Recorded: Jul 31 2014 1:00 pm UTC 113 mins
    • Cryptography is the practice and study of techniques for keeping secrets. While the practice of keeping information hidden, or secured, has been around throughout the history of mankind, Modern Cryptography has evolved into much more. Now we use various algorithms (a fancy word for mathematical formulas) to not only keep information secured (Confidentiality), but also to authenticate the message and the originator of that message (Authentication); to stop the sender of the message from denying they sent it (Non-Repudiation); and to make sure that the information has not accidentally or purposely altered or corrupted (Integrity). This basic workshop will explain the basic concepts discussed above, as well as the differences between Symmetric and Asymmetric encryption. We will discuss Steganograhy, Digital certificates, Public Key Infrastructure and Digital Signatures. Although the workshop is to enhance basic understanding of these concepts, anyone studying for one of the major certification examinations in information security, such as the recently launched EC-Council Certified Chief Information Security Officer (C|CISO) will need to have a good grasp of these important concepts.

      Read more >
    • Maintaining Operational Security in Today’s Ever-Changing Landscape Maintaining Operational Security in Today’s Ever-Changing Landscape Dr Michael H. Goldner, Dean of EC-Council University, EC Council University Recorded: Feb 24 2015 4:00 pm UTC 123 mins
    • Our Cyber world is constantly evolving and becoming more challenging almost on a daily basis. So if your Network and operating systems are secure one week, they might not be the next. Thus, we have the concept of Operational Security (OpSec) which is a combination of multiple domains principles, yet applied on a constant basis. Operational Security applies to everything that affects your network, computers and operation systems, applications and everything else that keeps you systems functional and operating. It encompasses people, equipment, policies and planning to confirm that all have proper and necessary access to the data needed to preform, as well as monitoring and auditing this environment to make sure that every thing is functioning “according to Hoyle”. This workshop will focus on those concepts, knowledge and practices that will allow you, as a Cyber Security Professional to maintain OpSec as one of your assigned duties.

      Read more >
    • Is Physical Security important in the cyber world? Is Physical Security important in the cyber world? Dr Michael H. Goldner, Dean of EC-Council University, EC Council University Recorded: Jan 22 2015 5:00 pm UTC 124 mins
    • Information security practitioners often overlook or take for granted, physical security and general environmental concerns. They are most concerned with data and communication protections; attack vectors; vulnerabilities and risk analysis. However, Physical security is the first layer of protection for computers and data. It involves the protection of assets such as personnel, hardware, networks, and data from attacks or natural disasters that cause injury, loss or damage. While the primary concern of any physical security plan is the protection and preservation of human life, a good physical security plan, like its counterpart, an information security plan, is formulated by implementing defense in depth. This 2nd workshop will discuss the various options and interdependent layers that make up that defense in depth physical security plan.

      Read more >
    • Maintaining Operational Security in Today’s Ever-Changing Landscape Maintaining Operational Security in Today’s Ever-Changing Landscape Dr Michael H. Goldner, Dean of EC-Council University, EC Council University Recorded: Sep 18 2014 1:00 pm UTC 123 mins
    • Our Cyber world is constantly evolving and becoming more challenging almost on a daily basis. So if your Network and operating systems are secure one week, they might not be the next. Thus, we have the concept of Operational Security (OpSec) which is a combination of multiple domains principles, yet applied on a constant basis. Operational Security applies to everything that affects your network, computers and operation systems, applications and everything else that keeps you systems functional and operating. It encompasses people, equipment, policies and planning to confirm that all have proper and necessary access to the data needed to preform, as well as monitoring and auditing this environment to make sure that every thing is functioning “according to Hoyle”. This workshop will focus on those concepts, knowledge and practices that will allow you, as a Cyber Security Professional to maintain OpSec as one of your assigned duties.

      Read more >
    • Is Physical Security important in the cyber world? Is Physical Security important in the cyber world? Dr Michael H. Goldner, Dean of EC-Council University, EC Council University Recorded: Aug 14 2014 1:00 pm UTC 124 mins
    • Information security practitioners often overlook or take for granted, physical security and general environmental concerns. They are most concerned with data and communication protections; attack vectors; vulnerabilities and risk analysis. However, Physical security is the first layer of protection for computers and data. It involves the protection of assets such as personnel, hardware, networks, and data from attacks or natural disasters that cause injury, loss or damage. While the primary concern of any physical security plan is the protection and preservation of human life, a good physical security plan, like its counterpart, an information security plan, is formulated by implementing defense in depth. This 2nd workshop will discuss the various options and interdependent layers that make up that defense in depth physical security plan.

      Read more >