The International Council of Electronic Commerce Consultants (EC-Council) is a professional organization established in USA, with headquarters in Albuquerque, New Mexico hosting members and affiliates worldwide.
With an estimate of 1.4 Billion* Internet users worldwide and 104 Million* domain names, there is a huge increase in the demand for skilled professionals. In view of this, EC-Council offers several options for aspiring and practicing Electronic Commerce professionals to study topics identified as e-Business industry standard skills. The e-business certification programme form EC-Council combine both business and technical training to impart the solid background necessary to build successful e-businesses. The EC-Council e-Business certification program is built on proven e-business techniques, like open standards, scalability, availability and security. EC-Council programs are vender-neutral based that perform and scale to adapt to all kind of system, aimed to develop boundaries free application for EC-Commerce professionals.
The average annual loss from security breaches was US$ 350, 424 in 2007* - in increase of 108% from the previous year.
In this age of super-connectivity, Information Security has become a hot-button issue for the modern organization. Instead of information breach due to external threat from the hackers; many organizations are facing internal risks from trusted sources within the organization itself at the same time. In general, the primary root that leads to information breach is the lack attention and effort of the organization towards its IT Security and insufficient up-to-date knowledge from IT Security workforce.
A consistent IT Security Training for the IT Security workforce is the best solution for an organization to defend from information breach that never cost the amount in the statement.
As the leading IT Security Certification Body, EC-Council has trained 60,000 and certified 21,000 from 60 countries worldwide. These EC-Council Certified IT Security Professionals continue to be highly-demanded for by the industry at large; among them are top consulting firms, financial institutions and even Fortune 500 companies.
To check out the latest organizations requiring EC-Council Certified IT Security Professionals, check out at http://www.eccouncilapac.org/jobreference
According to a report by Identity Theft Resource Centre, a total of 34, 028, 410 personal records* were exposed for the first 11 months of 2008. News like these continues to dominate security-related websites, portals and blogs on a daily basis.
At EC-Council Asia Pacific, we gather the latest and hottest news in the global landscape. To subscribe to our latest news, check out at http://www.eccouncilapac.org/dailynews
Job Roles Based on Monster.com
|Senior Security Forensics Investigator||This position is responsible for responding to and for leading security investigations of varying types. Functions include the design, implementation and creation of plans, strategies and actions necessary for a successful security investigations program. Responsibilities will include careful analysis of risk and threat conditions and associated mitigations or remediation’s available through the use of appropriate technical security applications and/or use of security resources.|
|Advanced Penetration Testing||Ideal candidates include those individuals that have the abilities to conduct either an application or network based penetration test, which includes initial identification of vulnerabilities through a variety of software tools, and then exploiting vulnerabilities using appropriate techniques that minimize likelihood of causing harm to networks.
Some one that can work individually or in teamrs to perform these tasks using ethical hacking protocol.
|Disaster Recovery Specialist||The senior Specialist for Disaster Recovery is responsible for all aspects of th IT Disaster Recovery Plan. Provides oversight and guidance for all disaster recovery related activities within the IT department. Manages all aspects of IT disaster recovery including the development, implementation and testing of a comprehensive IT Disaster Recovery plan. Responsible for developing, coordinating, and maintaining a comprehensive disaster recovery testing program.
Lead in performing disaster recovery capacity planning coordinate IT departments to ensure that new initiative focus proactively on disaster recovery and its requirements and costs are part of each new IT initiative.
|Secure Programmer||The Programmer’s role is to define, develop, test, analyze and maintain new software applications in .NET. This includes writing, coding, testing and analyzing software programs and applications. Candidate will work with network administrators, system analysts, and product vendors to assist in resolving problems with software products or company software systems. This role will also consist of assistance in proactive administrations of the companies Database servers.|
|Network Administrators||The Network Administrator is in charge of the overall health of the network infrastructure in terms of hardware and software as well as the network connectivity security. Ideal Candidates is responsible for network address assignment, assignment of routing protocols and routing table configuration, network maintenance, network design and network security implementation. The role also consists of developing, installing and maintaining emergency system to back up the main network to prevent loss or corruption of data stored.|
|Accenture||HDFC Bank||Pfizer||United Nations|
|American Express||Hewlett Packard||Reserve Bank of India||Unites States Marine Corps|
|Canon||IBM Global Services||SAIC||US Air Force Reserve|
|CIA||Kodak||Singapore Airlines||US Army|
|Cisco||Marriot Hotel||Singapore Police||US Department of Defense|
|EDS||Microsoft Corporation||Sony||US Embassy|
|FBi||Nortel Networks||Supreme Court of Philippines||US Military|
|FedEx||Northrop Grumman Intelligence||UK Ministry of Defense||Xerox|
|And many more…|