Showing posts with label Comptia training. Show all posts
Showing posts with label Comptia training. Show all posts

Tuesday, March 13, 2012

SG1-001 Q&A / Study Guide / Testing Engine

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


QUESTION 1
Which two (2) are advantages of ISL over-subscription? (Choose two.)

A. efficient ISL bandwidth utilization
B. lowers cost-per-port per installation
C. higher performance per ISL
D. enables zoning simplicity
E. more available F_Ports

Answer: A,E

Explanation:


QUESTION 2
The SAN audit reports that there is a single fabric in a full mesh topology. Which three (3) benefits
result from migrating to dual fabrics with full mesh topologies? (Choose three.)

A. less inter-switch links
B. simplifies manageability
C. protection from human error
D. reduction in maintenance activity
E. decreased maintenance disruption

Answer: A,C,E

Explanation:


QUESTION 3
What two (2) benefits does SCSI Command Tag Queueing provide? (Choose two.)

A. allows I/O requests to be queued to the device
B. determines the most efficient way to order & process commands
C. tags I/O requests so they can be executed first in first out
D. allows SCSI I/O throughput to equal rates of fibre channel
E. determines queue depth position

Answer: A,B

Explanation:


QUESTION 4
You have a single fabric with four servers connecting to an edge switch in a core edge
configuration with single 2Gb/s ISLs to the core. Each server has an average throughput
requirement of 40MB/s. Under which circumstance would you need to add a second ISL?

A. to provide a redundant path
B. to avoid congestion on the ISL
C. to separate out FSPF updates
D. to provide a management path

Answer: A

Explanation:


QUESTION 5
Two servers have been connected to a SAN with redundant fabrics and the zone configuration
needs to be changed. How can you safely change the zone configuration?

A. Save the current zone configuration to disk, modify it and apply it to both fabrics simultaneously to avoid segmentation.
B. Modify the zone configuration on one fabric, test it, and then modify the zone configuration on the second fabric.
C. Modify the zone configuration on one fabric, test it, and then copy the zone configuration to the second fabric.
D. Modify the zone configuration on both fabrics at the same time, enable them simultaneously to avoid segmentation.

Answer: B

Explanation:


Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Tuesday, October 5, 2010

SY0-201 - CompTIA Security+ (2008 Edition) Exam

Presently the era has changed enormously as far as employment is concerned. In the past people rely on college degrees to achieve employment. Degree of highly reputed organization was a proof of job certainty but now the things are turned around. Now the job market no longer cares about the institution that a person has come out from but they look at the qualities and the actual knowledge that he person possesses.


Best online Comptia A+ Training, Comptia A+Certification at certkingdom.com


220-702 braindumps has to prove his skills, knowledge, and abilities by obtaining various certifications in his respective field of study so certification is a valid proof of a person’s skill and expertise in his respective field of study. All this is possible by the reputed organizations who are pioneers in their respective fields have been standardizing knowledge by giving out various certifications to candidates after taking highly difficult tests.

CompTia is one of those organizations that give N10-004 braindumps certification to security professionals. After attaining this certification you can go for other certifications in the security field. In 220-702 braindumps time allowed is 90 minutes to answer 100 questions and minimum passing score is 700 out of 900. The topics that are included in this exam are organizational security, cryptography, system security, access control as well as network infrastructure. One has to poses good knowledge about these topics to be able to clear the examination. It’s not difficult to make exam preparation as the organization give the coaching itself as well as there are various online coaching available providing various practice tests, study guides, question answers guide to make the preparation easy for the candidate.

At the end I would like to recommend 70-686 Testking study guide and training material for your guidance.

Sunday, October 3, 2010

Most Wanted IT Certifications

There is countless number of IT certifications available in the market today. However, only few of them have the ability to guide you through your path of success. According to our survey, over 90% of the candidates acknowledge that they have spent needless time and money before finding the most suitable solution to pass the exams. If you are just starting and looking for the most appropriate way to obtain certification, or a technician in the most efficient way to obtain certification, we have the right solution for you.


Best online Comptia A+ Training, Comptia A+Certification at certkingdom.com




100% Success Guaranteed. Fast Certifications. 100% pass without exam test or training, Never fail a test again, No need to visit any testing location, No need to study hard for more details visit: http://www.certkingdom.com


CCNA (Available at http://www.certkingdom.com)

one of the many courses offered networking Cisco wants to be the networking among experts as the CCNA (Cisco Certified Network Associate). Let's get to know more about the Cisco CCNA certification that has a team of thousands of people around the world with the skills needed to operate and maintain a network of routers and switches. As its name has entered the current Cisco CCNA training program and is a gateway to training at expert level. Pass without CCNA Training and CCNA exam now.

MCSE (Available at http://www.certkingdom.com)

MCSE is Microsoft Certified Systems Engineers. MCSE is an abbreviation for Microsoft Certified Systems Engineer. What exactly does having a Microsoft MCSE certification mean anyway? We know that it looks good on a resume and opens new doors in your career. Did you know that being certifiable - in Microsoft anyway - sometimes will also boost your pay? Experience counts for a lot, but having a Microsoft certification or two does not hurt either! Pass without MCSE Training and MCSE exam now.


CCNP (Available at http://www.certkingdom.com)

CCNP (Cisco Certified Network Professional) can benefit your career. Industry recognition of their professional knowledge and for developers to install, configure and troubleshoot convergence of local and wide area networks with 100 to 500 or more nodes. Network Professionals who achieve the Cisco CCNP Certification have demonstrated the knowledge and skills required to manage the routers and switches that form the core network, as well as applications that integrate edge voice, wireless and network security. Pass without CCNP Training and CCNP exam now.

MCITP (Available at http://www.certkingdom.com)

A leader in the industry to dictate the evolution of computers and is none other than Microsoft. The increase in the technology industry is unstoppable at present. This sector has created many opportunities through the development of its certification programs. They are specially designed to enhance the technical capabilities of the associated technologies. With the growth of Microsoft MCITP Certification (Microsoft Certified IT Professional) in this business many professionals will have the opportunity to follow a certain path for their desired jobs. Where you can work well and show their skills. Pass without MCITP Training and MCITP exam now.

MCTS (Available at http://www.certkingdom.com)

The Microsoft Certified Technology Specialist (MCTS) certification based on certification for Microsoft. These certifications are designed to validate their knowledge about the features and functionality of key technologies. You can show the depth of their knowledge in a specific technology, Microsoft MCT Certification earn multiple certifications to show breadth across different products, based on the MCTS to earn a Professional Series credentials. Pass without MCTS Training and MCTS exam.

Most Wanted IT Certifications - Fast Certifications - MCSE MCITP A+ ITIL CCNA ... - 100% Pass without exam or training - 100% Success Guaranteed. No need to study hard for more details visit: http://www.certkingdom.com
Read more at http://www.articlealley.com/article_1662770_10.html?kcplink=1

Wednesday, September 29, 2010

How To Pass The Comptia Security+ With Ease

As computer security threats continue to rise, the need for qualified computer security professionals also increases. In an effort to prove their competency, many IT professionals choose to obtain the internationally accepted CompTIA Security+ Certification. In order to become certified, CompTIA Security+ candidates must first pass a certification exam. With proper preparation and the use of several training techniques, passing the CompTIA Security+ exam is easily attainable. By completing the following steps, you should be able to combat the emergence of increased computer security threats by passing the CompTIA Security+ exam with confidence.


Best online Comptia A+ Training, Comptia A+Certification at certkingdom.com








Instructions
Step 1
Enroll in a CompTIA Learning Alliance training center. There are numerous CompTIA Learning Alliance training centers across the United States. Go to the CompTIA website for a list of approved training centers in your area. Such training centers provide the best Security+ certification exam preparation available.

Step 2
Download Security+ exam objectives from the CompTIA website. Under the Certifications & Exams section of the CompTIA website, you will find a section devoted to exam preparation. There you can download the
free CompTIA practice questions for any CompTIA exam, including the Security+ exam.

Step 3
Answer sample questions. The CompTIA website also provides a number of sample questions for each certification exam it offers. After filling out a form on the CompTIA website, you will have access to a list of sample free test questions
for the Security+ exam.

Step 4
Purchase access to CompTIA's eLearning Center. By purchasing access to this CompTIA learning tool, you will have 24/7 access to unique learning tools designed to help you prepare for the Security+ exam for a period of six months. Features include in-depth lessons, virtual labs and audio help, as well as ac.

Monday, September 20, 2010

How To Pass The Comptia Security+ With Ease

How To Pass The Comptia Security+ With Ease
As computer security threats continue to rise, the need for qualified computer security professionals also increases. In an effort to prove their competency, many IT professionals choose to obtain the internationally accepted CompTIA Security+ Certification(http://www.certkingdom.com) In order to become certified, CompTIA Security+ candidates must first pass a certification exam. With proper preparation and the use of several training techniques, passing the CompTIA Security+ exam is easily attainable. By completing the following steps, you should be able to combat the emergence of increased computer security threats by passing the CompTIA Security+ exam with confidence.




Best online Comptia A+ Training, Comptia A+Certification at certkingdom.com



Instructions
Step 1
Enroll in a CompTIA Learning Alliance training center. There are numerous CompTIA Learning Alliance training centers across the United States. Go to the CompTIA website for a list of approved training centers in your area. Such training centers provide the best Security+ certification exam preparation available.

Step 2
Download Security+ exam objectives from the CompTIA website. Under the Certifications & Exams section of the CompTIA website, you will find a section devoted to exam preparation. There you can download the free CompTIA practice questions(http://www.actualkey.com/vendor/CompTIA-4.html) for any CompTIA exam, including the Security+ exam.

Step 3
Answer sample questions. The CompTIA website also provides a number of sample questions for each certification exam it offers. After filling out a form on the CompTIA website, you will have access to a list of sample free test questions(http://www.actualkey.com) for the Security+ exam.

Step 4
Purchase access to CompTIA's eLearning Center. By purchasing access to this CompTIA learning tool, you will have 24/7 access to unique learning tools designed to help you prepare for the Security+ exam for a period of six months. Features include in-depth lessons, virtual labs and audio help, as well as ac.


As computer security threats continue to rise, the need for qualified computer security professionals also increases. In an effort to prove their competency, many IT professionals choose to obtain the internationally accepted CompTIA Security+ Certification(http://www.certkingdom.com) In order to become certified, CompTIA Security+ candidates must first pass a certification exam. With proper preparation and the use of several training techniques, passing the CompTIA Security+ exam is easily attainable. By completing the following steps, you should be able to combat the emergence of increased computer security threats by passing the CompTIA Security+ exam with con
fidence.

Instructions
Step 1
Enroll in a CompTIA Learning Alliance training center. There are numerous CompTIA Learning Alliance training centers across the United States. Go to the CompTIA website for a list of approved training centers in your area. Such training centers provide the best Security+ certification exam preparation available.

Step 2
Download Security+ exam objectives from the CompTIA website. Under the Certifications & Exams section of the CompTIA website, you will find a section devoted to exam preparation. There you can download the free CompTIA practice questions(http://www.actualkey.com/vendor/CompTIA-4.html) for any CompTIA exam, including the Security+ exam.

Step 3
Answer sample questions. The CompTIA website also provides a number of sample questions for each certification exam it offers. After filling out a form on the CompTIA website, you will have access to a list of sample free test questions(http://www.actualkey.com) for the Security+ exam.

Step 4
Purchase access to CompTIA's eLearning Center. By purchasing access to this CompTIA learning tool, you will have 24/7 access to unique learning tools designed to help you prepare for the Security+ exam for a period of six months. Features include in-depth lessons, virtual labs and audio help, as well as actual learning.

Saturday, September 18, 2010

Search Engine Optimization (SEO) by Google webmaster central

Search Engine Optimization (SEO) by Google webmaster central
SEO is an acronym for “search engine optimization” or “search engine optimizer.” Deciding to hire an SEO is a big decision that can potentially improve your site and save time, but you can also risk damage to your site and reputation. Make sure to research the potential advantages as well as the damage that an irresponsible SEO can do to your site. Many SEOs and other agencies and consultants provide useful services for website owners, including:

* Review of your site content or structure
* Technical advice on website development: for example, hosting, redirects, error pages, use of JavaScript
* Content development
* Management of online business development campaigns
* Keyword research
* SEO training
* Expertise in specific markets and geographies.



Best online Comptia A+ Training, Comptia A+Certification at certkingdom.com


Keep in mind that the Google search results page includes organic search results and often paid advertisement (denoted by the heading “Sponsored Links”) as well. Advertising with Google won’t have any effect on your site’s presence in our search results. Google never accepts money to include or rank sites in our search results, and it costs nothing to appear in our organic search results. Free resources such as Webmaster Tools, the official Webmaster Central blog, and our discussion forum can provide you with a great deal of information about how to optimize your site for organic search. Many of these free sources, as well as information on paid search, can be found on Google Webmaster Central.

Before beginning your search for an SEO, it’s a great idea to become an educated consumer and get familiar with how search engines work. We recommend starting here:

* Google Webmaster Guidelines
* Google 101: How Google crawls, indexes and serves the web.

If you’re thinking about hiring an SEO, the earlier the better. A great time to hire is when you’re considering a site redesign, or planning to launch a new site. That way, you and your SEO can ensure that your site is designed to be search engine-friendly from the bottom up. However, a good SEO can also help improve an existing site.

Some useful questions to ask an SEO include:

* Can you show me examples of your previous work and share some success stories?
* Do you follow the Google Webmaster Guidelines?
* Do you offer any online marketing services or advice to complement your organic search business?
* What kind of results do you expect to see, and in what timeframe? How do you measure your success?
* What’s your experience in my industry?
* What’s your experience in my country/city?
* What’s your experience developing international sites?
* What are your most important SEO techniques?
* How long have you been in business?
* How can I expect to communicate with you? Will you share with me all the changes you make to my site, and provide detailed information about your recommendations and the reasoning behind them?

While SEOs can provide clients with valuable services, some unethical SEOs have given the industry a black eye through their overly aggressive marketing efforts and their attempts to manipulate search engine results in unfair ways. Practices that violate our guidelines may result in a negative adjustment of your site’s presence in Google, or even the removal of your site from our index. Here are some things to consider:

* Be wary of SEO firms and web consultants or agencies that send you email out of the blue.

Amazingly, we get these spam emails too:

“Dear google.com,
I visited your website and noticed that you are not listed in most of the major search engines and directories…”

Reserve the same skepticism for unsolicited email about search engines as you do for “burn fat at night” diet pills or requests to help transfer funds from deposed dictators.

* No one can guarantee a #1 ranking on Google.

Beware of SEOs that claim to guarantee rankings, allege a “special relationship” with Google, or advertise a “priority submit” to Google. There is no priority submit for Google. In fact, the only way to submit a site to Google directly is through our Add URL page or by submitting a Sitemap and you can do this yourself at no cost whatsoever.

* Be careful if a company is secretive or won’t clearly explain what they intend to do.

Ask for explanations if something is unclear. If an SEO creates deceptive or misleading content on your behalf, such as doorway pages or “throwaway” domains, your site could be removed entirely from Google’s index. Ultimately, you are responsible for the actions of any companies you hire, so it’s best to be sure you know exactly how they intend to “help” you. If an SEO has FTP access to your server, they should be willing to explain all the changes they are making to your site.

* You should never have to link to an SEO.

Avoid SEOs that talk about the power of “free-for-all” links, link popularity schemes, or submitting your site to thousands of search engines. These are typically useless exercises that don’t affect your ranking in the results of the major search engines — at least, not in a way you would likely consider to be positive.

* Choose wisely.

While you consider whether to go with an SEO, you may want to do some research on the industry. Google is one way to do that, of course. You might also seek out a few of the cautionary tales that have appeared in the press, including this article on one particularly aggressive SEO: http://seattletimes.nwsource.com/html/businesstechnology/2002002970_nwbizbriefs12.html. While Google doesn’t comment on specific companies, we’ve encountered firms calling themselves SEOs who follow practices that are clearly beyond the pale of accepted business behavior. Be careful.

* Be sure to understand where the money goes.

While Google never sells better ranking in our search results, several other search engines combine pay-per-click or pay-for-inclusion results with their regular web search results. Some SEOs will promise to rank you highly in search engines, but place you in the advertising section rather than in the search results. A few SEOs will even change their bid prices in real time to create the illusion that they “control” other search engines and can place themselves in the slot of their choice. This scam doesn’t work with Google because our advertising is clearly labeled and separated from our search results, but be sure to ask any SEO you’re considering which fees go toward permanent inclusion and which apply toward temporary advertising.

* What are the most common abuses a website owner is likely to encounter?

One common scam is the creation of “shadow” domains that funnel users to a site by using deceptive redirects. These shadow domains often will be owned by the SEO who claims to be working on a client’s behalf. However, if the relationship sours, the SEO may point the domain to a different site, or even to a competitor’s domain. If that happens, the client has paid to develop a competing site owned entirely by the SEO.

Another illicit practice is to place “doorway” pages loaded with keywords on the client’s site somewhere. The SEO promises this will make the page more relevant for more queries. This is inherently false since individual pages are rarely relevant for a wide range of keywords. More insidious, however, is that these doorway pages often contain hidden links to the SEO’s other clients as well. Such doorway pages drain away the link popularity of a site and route it to the SEO and its other clients, which may include sites with unsavory or illegal content.

* What are some other things to look out for?

There are a few warning signs that you may be dealing with a rogue SEO. It’s far from a comprehensive list, so if you have any doubts, you should trust your instincts. By all means, feel free to walk away if the SEO:

owns shadow domains

puts links to their other clients on doorway pages

offers to sell keywords in the address bar

doesn’t distinguish between actual search results and ads that appear on search results pages

guarantees ranking, but only on obscure, long keyword phrases you would get anyway

operates with multiple aliases or falsified WHOIS info

gets traffic from “fake” search engines, spyware, or scumware

has had domains removed from Google’s index or is not itself listed in Google

If you feel that you were deceived by an SEO in some way, you may want to report it.

Friday, September 10, 2010

Google re-jiggering Android as tablet

Google re-jiggering Android as tablet
While the latest version of the Android operating system runs on Samsung's Galaxy Tab, it isn't configured to run on tablets in general, according to Google's director of mobile products.

The 22 Best Android Apps
Cloud Controlled 802.11n - Faster, Easier, and Cheaper than Ethernet?: View now

In an interview with TechRadar, Google's Hugo Berra said current versions of the mobile operating system may be running on tablets and similar devices but that they aren't tailored for tablets and thus might not be the ideal operating systems to run on tablets.


Best online Comptia A+ Training, Comptia A+Certification at certkingdom.com





"The way Android Market works is it's not going to be available on devices that don't allow applications to run correctly," Berra explained to TechRadar. "If you want Android Market on that platform, the apps just won't run. [Froyo, the latest version of the Android operating system] is just not designed for that form factor."

Google and Verizon are reportedly teaming up to create an Android-based tablet that will be specifically tailored for Verizon's network. Presumably, the Google-Verizon tablet will have a new version of Android if and when it is finally released.

TechRadar speculates that Berra's comments mean that Google will have such a tablet-based mobile operating system up and ready to go in the near future.

Google added several key enterprise features to the Froyo edition of its Android platform in June. Among other things, Froyo gives administrators the ability to enforce password policies across Android devices and to remotely wipe any Android devices that become lost or compromised. The latest version of the platform also supports Exchange Calendars and auto-discovery to make it easier for users to set up and sync Exchange accounts.

These enterprise upgrades give Android-based phones and tablets the bare minimum that most analysts recommend for letting a device link to the corporate network. This doesn't mean, however, that IT departments should let down their guard on Android devices overall, since the Android application market does not filter out applications posted for sale. This means that there are significant dangers for users who don't carefully watch what permissions they grant applications they download onto their devices.

Read more about wireless & mobile in Network World's Wireless & Mobile section.

Wednesday, September 8, 2010

Microsoft goes through another small round of layoffs

Microsoft goes through another small round of layoffs
Microsoft has quietly laid off "hundreds" of workers this week, although the company has not yet made a formal announcement to the SEC or on its Investor Relations website. I heard from a friend of mine who got the pink slip (and a nice package).

Rumors have been building for weeks that Microsoft was poised for another round of good-byes, but the total headcount this time seems relatively small.

In 2009, Microsoft laid off about 5,800 employees, but then turned around and hired about 2,000. Some media reports are trying to connect the Microsoft layoffs with the company's botched mobile strategy resulting in the embarrassing Kin phone and it's even more embarrassing fast failure. But I'm not buying that. The Softie I talked to this morning had nothing to do with Kin. Others say that most of these layoffs are from the sales and marketing organizations, which jives with the first-hand account I heard.

Microsoft is set to announce its fiscal year-end earnings results on July 22. The reduced headcount is a bit of a surprise because Microsoft had a record-breaking second quarter that ended Dec. 31, 2009 and another record-breaking third quarter that ended Mar. 31, 2010, thanks mostly to the popularity of Windows 7 and an increase in mojo for Xbox and Xbox Live. (Recent news reports suggests that Xbox Live will make $1 billion in revenue this year.)

The best reasoning I've heard is that the layoffs are part of a routine restructuring, some kind of end-of-fiscal-year housecleaning. Some say if Microsoft really wanted to be lean and mean, it would cut its workforce by 30,000 or more. I personally don't advocate cleaving the company so harshly, but I can see the rationale for it. Microsoft has over 88,180 employees today, up from about 32,000 at the start of the decade. 53,363 are in the U.S., with 39,738 in the Puget Sound area. Half of the employees are in a "business" group making Microsoft's products, most of the rest are in a group that sell its products, with about 10,000 in overhead-ish operations positions. Do you really need one salesperson for every product person?



Best online Comptia A+ Training, Comptia A+Certification at certkingdom.com


Some Microsoft employees are none-too-pleased with this idea that layoffs are an automatic part of the fiscal year. They say that the current system creates an atmosphere where even high achievers can be punished. If an employee has been meeting expectations, but has been in a role for a long time, and the hiring manager doesn't see further advancement potential within the group, that is reflected on the employees twice-a-year performance review, and is akin to branding the person with a scarlet layoff letter.

Will Microsoft report another great quarter, or are the layoffs a sign that the peak results of 2010 have headed toward the valley?

Saturday, September 4, 2010

Portfast and the Comptia A+ Training

Portfast and the CCNA
As a Comptia A+ Training candidate you are expected to understand the purpose and function of Spanning-tree Portfast. The Comptia A+ Training’s exam will ask of you to determine the purpose of the Portfast within the spanning-tree protocol.

Before we go into the detail for the purpose and operation of the Portfast feature we need to understand the switched network environment behaviour before the introduction of portfast as a command.


From the “BPDU Guard” article you will recall that the stability of the Root Bridge is of paramount importance in the operation and continual uninterrupted service of spanning-tree and that a change in the position of the Root Bridge will cause service disruption on the network; another important factor to bear in mind is that is it not just the changing of the position of the Root Bridge that can cause network disruption but events such as access switchports transitioning on/off line can create an unstable network.

When a port first goes on-line spanning-tree will treat it like it treats any other port and will cycle through the normal spanning-tree port roles, i.e. blocking, listening. Learning, forwarding. The port will transition to the forwarding state after 30secs. In which no user traffic is allowed to pass.

At the point that the port went on-line the switch would have generated a new type of Bridge Protocol data unit called a “Topology Change Notification” BPDU, this TCN is relayed up out of the Root port towards the Root Bridge, the Root Bridge will register this TCN as a “Topology Change” and reset the TCN timer. These timers can be viewed by issuing the “show spanning-tree vlan # detail”. These false readings will cause no end of confusion in your fault finding and network disruption as you chase false positives.

The major benefit of Portfast on the access port, (since this command can only an should only be configured in access ports) is that it causes spanning-tree to bypass the lengthy forward delay timers on that port.

Port fast is enabled on an access port:

Swith(config-if)#spanning-tree portfast

Once PortFast is enabled it place the port directly into the forwarding state, bypassing the spanning-tree forward delay timers, but at the same time the PortFast feature will keep an eye open for any BPDU’s entering the access ports. If at any time the port received a BPDU it will default back to normal operation Comptia A+ Certification.

With the Portfast feature on the port the switch does not generate any more TCN’s when the port transitions on/off line, this means that any “Topology Changes” that you view from the output of the “show spanning-tree detail” you will see valid TCN’s along with the port that the TCN was received on.

Wednesday, September 1, 2010

Security pros seek hacking, forensics skills

Security pros seek hacking, forensics skills
IT professionals looking to boost their high-tech careers in the coming five years are betting on security certifications and skills to help them stand out to potential employees, according to a new survey.

Five ways to get affordable certification skills
Some IT skills see pay hikes during the downturn


Best online Comptia A+ Training, Comptia A+Certification at certkingdom.com

CompTIA, an IT industry trade association, polled some 1,537 high-tech workers and found 37% intend to pursue a security certification over the next five years. Separately, nearly 20% indicated they would seek ethical hacking certification over the same time period. And another 13% pinpointed forensics as the next certification goal in their career development.

"When you add the results, you will see that about two-thirds of IT workers intend to add some type of security certification to their portfolio," says Terry Erdle, senior vice president of skills certifications. "This trend is driven by two factors: one, security issues are pervasive, and two, more and more people are moving to managed services and software-as-a-service models, which involves more complex networking. That level of non-enterprise data center computing has people look more closely at their security infrastructure."

High-tech workers surveyed cited economic advancement and personal growth as the motivation to seek further certifications. Nearly 90% said they want to spruce up their resumes and another 88% said they hope to grow personally with new certifications. Emerging technologies and vertical industry trends also drive certifications seekers. For instance, SaaS ranked among the technologies in which IT workers intend to seek certifications in the coming years. Green IT, mobile and healthcare IT also placed among high-tech career development plans.

"We are going to see upwards of 70,000 IT jobs in healthcare and the related network and storage skills that come with electronic records, such as e-reporting and e-charting," Erdle adds. "We are working now to determine what kind of IT roles should be supported in certifications from CompTIA."

Do you Tweet? Follow Denise Dubie on Twitter here.

Saturday, August 28, 2010

Microsoft Exchange in the Cloud: Four Migration Tips

Microsoft Exchange in the Cloud: Four Migration Tips

Get Added Security, Not Just Savings
McGuire's Law of Mobility: A Product's Value Increases with Mobility: Download now

Though reluctant to discuss specific costs, Day says the value in moving to BPOS is to gain more capabilities without a huge increase in the cost.

"We did a very detailed cost comparison between re-architecting what we have on-premise versus a Microsoft BPOS solution and the cloud option won," says Day.



Best online Comptia A+ Training, Comptia A+Certification at certkingdom.com


Slideshow: Fighting the Dark Side: Tech's Heroes and Villains

Dow is doing a big uplift from Exchange 2003, with its limited mailbox sizes and quotas that just don't cut it in today's corporate e-mail environment. The BPOS advantage is that Dow will get Live Meeting and OCS for its worldwide workforce and Exchange mailboxes that can compete with Gmail on capacity, says Day.

Another advantage in moving to the cloud, says Day, is the savings culled from letting Microsoft handle security measures such as intrusion protection and spam filtering.

"Nobody can run Exchange like Microsoft," he says. "From a security perspective, I can't afford to spend as much on securing an Exchange environment as Microsoft can."

On the other hand, says Day, IT departments need to work with their cloud vendor to ensure compliance regulations are being met. "We're not going to just toss all our data over the wall to Microsoft. We're going to engage with them regularly."

Push the Vendor to Do More on Compliance

Day understands that although Microsoft has been providing services via the Internet for years with its MSN mailboxes, it's quite a different thing to provide e-mail services to a Fortune 50 company.

"Microsoft is going through a paradigm shift," says Day. "We're going to have to coordinate with them a lot and learn together."

But one thing Microsoft must do is deliver on its cloud customers' compliance needs.

Day has been adamant that Microsoft not just provide a console for Dow to monitor its own data, but to provide near real-time information flow through an automation interface.

"So we're pushing Microsoft to feed us all available data through an automation framework so we can take immediate action for compliance reasons."

No matter what vendor you choose, Days adds, never enter into a cloud partnership lightly.

"You have to push them. That's critical."

Shane O'Neill is a senior writer at CIO.com. Follow him on Twitter at twitter.com/smoneill. Follow everything from CIO.com on Twitter at twitter.com/CIOonline.

Microsoft Exchange in the Cloud: Four Migration Tips

Microsoft Exchange in the Cloud: Four Migration Tips

Get Added Security, Not Just Savings
McGuire's Law of Mobility: A Product's Value Increases with Mobility: Download now

Though reluctant to discuss specific costs, Day says the value in moving to BPOS is to gain more capabilities without a huge increase in the cost.

"We did a very detailed cost comparison between re-architecting what we have on-premise versus a Microsoft BPOS solution and the cloud option won," says Day.



Best online Comptia A+ Training, Comptia A+Certification at certkingdom.com


Slideshow: Fighting the Dark Side: Tech's Heroes and Villains

Dow is doing a big uplift from Exchange 2003, with its limited mailbox sizes and quotas that just don't cut it in today's corporate e-mail environment. The BPOS advantage is that Dow will get Live Meeting and OCS for its worldwide workforce and Exchange mailboxes that can compete with Gmail on capacity, says Day.

Another advantage in moving to the cloud, says Day, is the savings culled from letting Microsoft handle security measures such as intrusion protection and spam filtering.

"Nobody can run Exchange like Microsoft," he says. "From a security perspective, I can't afford to spend as much on securing an Exchange environment as Microsoft can."

On the other hand, says Day, IT departments need to work with their cloud vendor to ensure compliance regulations are being met. "We're not going to just toss all our data over the wall to Microsoft. We're going to engage with them regularly."

Push the Vendor to Do More on Compliance

Day understands that although Microsoft has been providing services via the Internet for years with its MSN mailboxes, it's quite a different thing to provide e-mail services to a Fortune 50 company.

"Microsoft is going through a paradigm shift," says Day. "We're going to have to coordinate with them a lot and learn together."

But one thing Microsoft must do is deliver on its cloud customers' compliance needs.

Day has been adamant that Microsoft not just provide a console for Dow to monitor its own data, but to provide near real-time information flow through an automation interface.

"So we're pushing Microsoft to feed us all available data through an automation framework so we can take immediate action for compliance reasons."

No matter what vendor you choose, Days adds, never enter into a cloud partnership lightly.

"You have to push them. That's critical."

Shane O'Neill is a senior writer at CIO.com. Follow him on Twitter at twitter.com/smoneill. Follow everything from CIO.com on Twitter at twitter.com/CIOonline.

Saturday, August 21, 2010

Is offering too many products or features a bad thing?

Is offering too many products or features a bad thing?

My friend and I got into a very interesting conversation the other day about how companies tend to focus a large amount of energy creating products or versions of their products for particular market segments. Now, I’m not talking about the act of language localization. Instead, what I’m referring to is how companies actively pursue any of the following Comptia A+ Training :

1. Create a product for a very particular market space. For example many Japanese electronic manufactures tend to create products that only make sense within the Japanese marketplace. In Japan this called Galápagos syndrome. A really good example of this syndrome can be found with Japanese cell phones manufacturers. Despite being way ahead of their time in the 1990s, they first defined and adopted cell standards that were rejected everywhere else and then created fenced-in Web services that only provided content within Japan. Then in early 2000 they focused on 3G too fast, which left their phones too advanced for the rest of the world markets. Lastly, because they initially had a huge market within Japan, they had very little incentive to tackle overseas markets.
2. Create many different versions of a product to fit many different market spaces. This one particularly bothers me. Rather than making a really good product that should meet almost everyone’s needs, companies will pump out a bunch of different models of the product in an attempt to meet everyone’s needs. A perfect example of this can be found on Panasonic's Web site. This link gives you a list of around 64 new camera models for the year 2010. Really, 64 new camera models and this is just for the USA region.
3. Lastly, modify an existing product to make it more appealing to a particular market segment. This can range from needed changes like Google addressing Google Maps privacy issues to silly changes like modify the name of a movie as shown in the following image. You will notice that the name Karate Kid has been replaced with Best Kid (in Katakana).

So just how does this relate to information technology or even Microsoft for that matter? Well, my friend is a product designer. In a sense, he is kind of responsible for “The Too Many” product syndrome and made the argument that companies need to design products that fit or can be adapted to the needs of the market place. I on the other hand like to design IT infrastructure architecture (it’s a hobby of sorts). Naturally, I advocate standardization and economies of scale for anything and everything. :>)

In other words, if a product (hardware and software) is presented to me that suffers from any of the three detractors that I noted, then these are solutions that I might choose to pass on. After all, there is a very fine line between being feature rich and being a POS Comptia A+ Certification.

What are your thoughts?

Sunday, August 15, 2010

Obtaining an OID for a Certificate Issuing Policy (CAPolicy.inf)

Obtaining an OID for a Certificate Issuing Policy (CAPolicy.inf)
In the happy fairy land that is PKI there comes a time when an OID is needed. Such a time is when you want to specify a Certificate Issuing Policy within a CAPolicy.inf for Microsoft’s Certificates Services. However, how to obtain an OID tends to be a coveted mystery among the security gods.



So… in my quest to provide knowledge to the masses here are some methods to obtain an OID that may be placed within your CAPolicy.inf.

Method One:
If you already have a valid OID obtain a CPS arc from you OID overlord.

Method Two:
Don’t have a valid OID. Go to the following Web site and after paying lots of money you too can become an evil OID overlord: http://web.ansi.org/other_services/registration_programs/reg_org.aspx?menuid=10

Method Three:
Go to the following site, and get oidgen.vbs: http://gallery.technet.microsoft.com/ScriptCenter/en-us/56b78004-40d0-41cf-b95e-6e795b2e8a06. This script generates unique OIDs in the Microsoft number sequence (1.2.840.113556).

Method Four:
Cheat create your own. Bring up a backup of your Active Directory environment in a lab. Install certificate services as an Enterprise Root on a domain controller. At a command prompt on the domain controller type certtmpl.msc and press Enter. The Certificate Templates MMC will open. In the right pane select the Workstation Authentication template. Alternatively, you can select any other V2 template. From the Action menu select Properties. Click the Extensions tab. Select the Issuance Policies from the list box and click Edit. In the Edit Issuance Policies Extension dialog click Add. Click New... in the next dialog. A unique object identifier is generated and shown in the New Issuance Policy dialog. Select the complete OID and press + to copy the content into the clipboard. Copy the OID into a document for future reference.

Again… this yet another procedure I wouldn’t recommend for a “real” PKI deployment.

Friday, August 13, 2010

A+ update

A+ update
The Computing Technology Industry Association (CompTIA) is overhauling its A+ certification to reflect the need for security and soft skills. "IT workers who understand how to use technology to meet business goals, and who can articulate this understanding, are golden in the eyes of employers," says Neill Hopkins, vice president of skills development for CompTIA A+ Training.

CompTIA MCITP Certification updated A+ certification will feature two exams - one covers core competencies on technology, and the other focuses on how to apply the skills in specific job environments. For more information on when the current exam will be phased out as well as launch of the new exams, go here.



I won't keep you in suspense. I'll go ahead and name them right here, at the top of my post -- the six free security tools that all IT folks should know about and use. (But, you'll have to click through this nifty mult-page post to let me explain my choices.) And the winners are ... MetaSploit, Splunk, Google (don't laugh -- it's true!), KeePass, Helix and Netwox. Now read on to learn why ...

MetaSploitFree

It has a strange name, but MetaSploit is a very cool development platform that assists information security professionals in creating tools and exploits. Using the framework (its built-in tools), you can conduct penetration tests, verify patch installations and even perform regression testing. Written using Ruby, the current 3.1 version comes with over 450 modules, including 265 remote exploits that can be targeted against various releases of Windows, Linux, BSD, Unix, and the Mac OS. If that isn't enough built-in functionality for your tastes, you can also use MetaSploit to create your own modules or scour around for ones that have already been created.

Overall this is a great tool and in the hands of system administrations it can be put to good use testing your organization’s defenses. However, there are always two-sides to a shiny coin. MetaSploit is also an effective tool for conducting attacks.

Click to enlarge.
MetSploit

For more information see: www.metasploit.com

SplunkFree

I first talked about Splunk when I wrote about the 2008 RSA Conference. Yes, the Security Incident and Event Manager (SIEM) space is crowded. But Splunk is not a SIEM per se. Its approach is slightly different in that it is, like Google, primarily a search engine. As such its developers have focused much of their effort on making Splunk into a good information aggregator for IT-related information and events. So Splunk is different from other SIEMs in that it is able to provide a very good platform for correlation and analysis. From the get go, by some hidden method, Splunk takes in data and provides order where there was once chaos. In my opinion, being able to dynamically figure out different logging structures (provided you can feed Splunk data via a known basis – text primarily) is a very powerful feature which makes this tool a must-have.

Note: Splunk is not open source but you can download it for free under its developer's freeware license.



PasswordSafe - a simpler Open Source alternative to KeePass
By pwsafe-user (not verified) on Thu, 05/22/2008 - 9:06am.

PasswordSafe is another open source password management utility. It's originally from security expert Bruce Schneier's firm, but has since been made open source and actively maintained and improved upon. It's emphasis is on simplicity as well as rock-solid security, and worth a look for those who consider KeePass too daunting.



Password sharing between co-workers
By Joe Schmoe (not verified) on Thu, 05/22/2008 - 6:52pm.

How about a program to securely share passwords between co-workers? I can't tell you how many people use E-mail to communicate/share passwords to just about every system under the sun.

Ideally, the secure password share software should allow a corporation's security officer to see who's sharing what passwords with whom.

Anybody know of a tool like this, free or otherwise?
Thanks,
Joe



Password protecting/sharing
By StaticFlux (not verified) on Tue, 05/27/2008 - 10:59am.

We use: Network Password Manager

check it out at: www.sowsoft.com

Regards,

-Static-



Password Manager Pro
By asdfasdf (not verified) on Fri, 05/30/2008 - 10:31am.

We use Password Manager Pro. http://manageengine.adventnet.com/products/passwordmanagerpro/index.html

It ties into Active Directory and does a good job. It keeps an audit log of password access and allows us to share passwords out to groups of people quickly.



Looks good, but very
By Alexei (not verified) on Sun, 08/17/2008 - 3:14am.

Looks good, but very expensive :(



Password sharing
By Fabio (not verified) on Sun, 06/08/2008 - 2:54pm.

We use Secret Server.

Have a look at

http://www.thycotic.com/products_secretserver_overview.html

Fabio



re: PasswordSafe - a simpler Open Source alternative to KeePass
By CubsFan (not verified) on Wed, 05/28/2008 - 8:56pm.

One thing about KeePass that PasswordSafe can't do is run on Windows Mobile. Along with KeePass, my team keeps disaster recovery and business continuity docs on our phones. Should a disaster strike, each of us has everything needed to get the DR site up and running.



For Mac the best app is Info.xhead...
By Nazzdeq (not verified) on Fri, 05/30/2008 - 9:31pm.



Try info.xhead for Mac....
By Nazzdeq (not verified) on Fri, 05/30/2008 - 10:32pm.

Info.xhead It is not open source, but it is one of the best password/personal data storage for Macs.



Yes passwordsafe is easier i guess
By Security Procedure (not verified) on Sat, 05/31/2008 - 5:33pm.

Yes, i used passwordsafe for maintain my password, easy to used and strong security protection. Highly recommended

A+ update

A+ update
The Computing Technology Industry Association (CompTIA) is overhauling its A+ certification to reflect the need for security and soft skills. "IT workers who understand how to use technology to meet business goals, and who can articulate this understanding, are golden in the eyes of employers," says Neill Hopkins, vice president of skills development for CompTIA A+ Training.

CompTIA MCITP Certification updated A+ certification will feature two exams - one covers core competencies on technology, and the other focuses on how to apply the skills in specific job environments. For more information on when the current exam will be phased out as well as launch of the new exams, go here.



I won't keep you in suspense. I'll go ahead and name them right here, at the top of my post -- the six free security tools that all IT folks should know about and use. (But, you'll have to click through this nifty mult-page post to let me explain my choices.) And the winners are ... MetaSploit, Splunk, Google (don't laugh -- it's true!), KeePass, Helix and Netwox. Now read on to learn why ...

MetaSploitFree

It has a strange name, but MetaSploit is a very cool development platform that assists information security professionals in creating tools and exploits. Using the framework (its built-in tools), you can conduct penetration tests, verify patch installations and even perform regression testing. Written using Ruby, the current 3.1 version comes with over 450 modules, including 265 remote exploits that can be targeted against various releases of Windows, Linux, BSD, Unix, and the Mac OS. If that isn't enough built-in functionality for your tastes, you can also use MetaSploit to create your own modules or scour around for ones that have already been created.

Overall this is a great tool and in the hands of system administrations it can be put to good use testing your organization’s defenses. However, there are always two-sides to a shiny coin. MetaSploit is also an effective tool for conducting attacks.

Click to enlarge.
MetSploit

For more information see: www.metasploit.com

SplunkFree

I first talked about Splunk when I wrote about the 2008 RSA Conference. Yes, the Security Incident and Event Manager (SIEM) space is crowded. But Splunk is not a SIEM per se. Its approach is slightly different in that it is, like Google, primarily a search engine. As such its developers have focused much of their effort on making Splunk into a good information aggregator for IT-related information and events. So Splunk is different from other SIEMs in that it is able to provide a very good platform for correlation and analysis. From the get go, by some hidden method, Splunk takes in data and provides order where there was once chaos. In my opinion, being able to dynamically figure out different logging structures (provided you can feed Splunk data via a known basis – text primarily) is a very powerful feature which makes this tool a must-have.

Note: Splunk is not open source but you can download it for free under its developer's freeware license.



PasswordSafe - a simpler Open Source alternative to KeePass
By pwsafe-user (not verified) on Thu, 05/22/2008 - 9:06am.

PasswordSafe is another open source password management utility. It's originally from security expert Bruce Schneier's firm, but has since been made open source and actively maintained and improved upon. It's emphasis is on simplicity as well as rock-solid security, and worth a look for those who consider KeePass too daunting.



Password sharing between co-workers
By Joe Schmoe (not verified) on Thu, 05/22/2008 - 6:52pm.

How about a program to securely share passwords between co-workers? I can't tell you how many people use E-mail to communicate/share passwords to just about every system under the sun.

Ideally, the secure password share software should allow a corporation's security officer to see who's sharing what passwords with whom.

Anybody know of a tool like this, free or otherwise?
Thanks,
Joe



Password protecting/sharing
By StaticFlux (not verified) on Tue, 05/27/2008 - 10:59am.

We use: Network Password Manager

check it out at: www.sowsoft.com

Regards,

-Static-



Password Manager Pro
By asdfasdf (not verified) on Fri, 05/30/2008 - 10:31am.

We use Password Manager Pro. http://manageengine.adventnet.com/products/passwordmanagerpro/index.html

It ties into Active Directory and does a good job. It keeps an audit log of password access and allows us to share passwords out to groups of people quickly.



Looks good, but very
By Alexei (not verified) on Sun, 08/17/2008 - 3:14am.

Looks good, but very expensive :(



Password sharing
By Fabio (not verified) on Sun, 06/08/2008 - 2:54pm.

We use Secret Server.

Have a look at

http://www.thycotic.com/products_secretserver_overview.html

Fabio



re: PasswordSafe - a simpler Open Source alternative to KeePass
By CubsFan (not verified) on Wed, 05/28/2008 - 8:56pm.

One thing about KeePass that PasswordSafe can't do is run on Windows Mobile. Along with KeePass, my team keeps disaster recovery and business continuity docs on our phones. Should a disaster strike, each of us has everything needed to get the DR site up and running.



For Mac the best app is Info.xhead...
By Nazzdeq (not verified) on Fri, 05/30/2008 - 9:31pm.



Try info.xhead for Mac....
By Nazzdeq (not verified) on Fri, 05/30/2008 - 10:32pm.

Info.xhead It is not open source, but it is one of the best password/personal data storage for Macs.



Yes passwordsafe is easier i guess
By Security Procedure (not verified) on Sat, 05/31/2008 - 5:33pm.

Yes, i used passwordsafe for maintain my password, easy to used and strong security protection. Highly recommended

Monday, August 9, 2010

10 best IT jobs right now

10 best IT jobs right now
IT professionals looking to find new employment or upgrade their current positions should investigate job opportunities that address growing demand for technologies such as virtualization, cloud, network security and social computing skills.

20 most useful career sites for IT professionals
The Guide to IT Search: Download now

Industry watchers report that while an economic recovery won't guarantee that IT jobs return to pre-recession levels, increased interest in emerging and existing technologies will drive internal training and external hiring decisions.

"IT staffing got hit in 2009, but it didn't get decimated they way it did back in 2002. Companies were renegotiating contracts, freezing salaries and delaying projects, so this year we won't see a flood of IT employment back," says Mark McDonald, group vice president and head of research, Gartner Executive Programs. "But we will see a skills shift from IT personnel that operates only in the old, slow expensive ways to IT pros that can adopt agile methods. There will continue to be opportunities in analytics, for people who understand lean IT, Six Sigma, business processes and improvements -- it's going to be about information, connectivity and collaboration."

Here we examine 10 IT job titles that could gain traction in 2010 as new technology demands require evolving IT skills.

1. Security specialist/ethical hacker

Disturbing new facts and figures appear almost daily about companies falling victim to hackers and experiencing security and/or data breaches. That won't change in 2010 and IT training and employment industry specialists report that interest in acquiring new security skills continues to grow among IT pros and hiring managers who seek the latest skill sets to better secure their environments.

"If you know how to keep your company's data secure, you were in demand yesterday, are in demand today and will be in demand tomorrow," Tom Silver, senior vice president with Dice.com, said in a recent interview with Network World.

The Computing Technology Industry Association, or CompTIA, in late 2009 polled some 1,537 high-tech workers and found 37% intend to pursue a security certification over the next five years. Separately, nearly 20% indicated they would seek ethical hacking certification over the same time period. And another 13% pinpointed forensics as the next certification goal in their career development.

"When you add the results, you will see that about two-thirds of IT workers intend to add some type of security certification to their portfolio," said Terry Erdle, senior vice president of skills certifications at CompTIA, in an earlier Network World interview. "This trend is driven by two factors: one, security issues are pervasive, and two, more and more people are moving to managed services and software-as-a-service models, which involves more complex networking. That level of non-enterprise data center computing has people looking more closely at their security infrastructure."

2. Virtual systems manager

While many systems managers might not yet have the word "virtual" officially in their titles, it is just a matter of time, according to industry experts.

"Virtualization and automation technologies are directly related to the cloud. Virtual servers comprise the computing environment and automation is responsible for the cloud being monitoring, management, secured and made compliant," says Andi Mann, research director at Enterprise Management Associates. "Virtualization is fundamentally mainstream now, and there is a lot of activity around virtual systems management."

Like high-tech vendors, IT pros will have to incorporate virtual systems knowledge into their repertoire in order to compete for open positions in 2010. Virtualization not only impacts current data center plans, but also future cloud computing efforts and while companies look to adopt such technologies, they will expect staff to be versed in the tools required to support new environments.

"We get several calls per week around SaaS, cloud and virtual skills that companies want guidance on, considering we are the vendor-neutral party," CompTIA's Erdle explained in late 2009. "CompTIA is working now on building certifications programs to release in 2010 and get in front of this growing demand."

3. Capacity manager

Companies that don't properly prepare for needed resources could lose money or fail to respond to business needs. That's why industry watchers from Forrester Research and Gartner have tagged capacity planning skills as in demand, especially considering the down economy.

Forrester says the role of capacity manager will be in demand for companies looking to optimize resources and accurately assign financial values to technology resources.

"Due to the current economic environment, downsizing (or rightsizing) of infrastructure, resources and capabilities is a top priority for IT," Forrester Senior Analyst Evelyn Hubbert stated in the Forrester Research report "Role Overview: Capacity Manager."

Gartner identifies a similar skill set in its IT resource planning position. By combining the tenets of capacity planning with financial management as well as usage and service measurement, IT resource planning experts will help IT departments understand how services and resources are consumed. This knowledge will help IT respond to business demands quickly.

"Capacity planning today is all about trying to ensure that you have enough capacity and memory cycles to meet workload demand. But virtualization causes new variables to be taken into consideration, and power consumption is just one among many," said Cameron Haight, research vice president at Gartner, in an interview with Network World. "For IT resource planning (ITRP) there are several more elements to consider and the process must become much more strategic within an enterprise."

4. Network engineer

As retro as it may sound, network know-how won't go out of style in 2010. According to Gartner, interest in networking, voice and data communications technologies increased for 2010, meaning skills in that high-tech area will also be in demand.

"The future of IT and enhanced competitive advantage requires social interactions and greater collaboration and that is why the importance of the network continues to grow," Gartner's McDonald says. "Even though revenue was down in 2009, CIOs reported that transaction volumes and communications requirements continued to grow, making it imperative to focus on network technologies."

Comptia A+ Training and Comptia A+ certification

10 best IT jobs right now

10 best IT jobs right now
IT professionals looking to find new employment or upgrade their current positions should investigate job opportunities that address growing demand for technologies such as virtualization, cloud, network security and social computing skills.

20 most useful career sites for IT professionals
The Guide to IT Search: Download now

Industry watchers report that while an economic recovery won't guarantee that IT jobs return to pre-recession levels, increased interest in emerging and existing technologies will drive internal training and external hiring decisions.

"IT staffing got hit in 2009, but it didn't get decimated they way it did back in 2002. Companies were renegotiating contracts, freezing salaries and delaying projects, so this year we won't see a flood of IT employment back," says Mark McDonald, group vice president and head of research, Gartner Executive Programs. "But we will see a skills shift from IT personnel that operates only in the old, slow expensive ways to IT pros that can adopt agile methods. There will continue to be opportunities in analytics, for people who understand lean IT, Six Sigma, business processes and improvements -- it's going to be about information, connectivity and collaboration."

Here we examine 10 IT job titles that could gain traction in 2010 as new technology demands require evolving IT skills.

1. Security specialist/ethical hacker

Disturbing new facts and figures appear almost daily about companies falling victim to hackers and experiencing security and/or data breaches. That won't change in 2010 and IT training and employment industry specialists report that interest in acquiring new security skills continues to grow among IT pros and hiring managers who seek the latest skill sets to better secure their environments.

"If you know how to keep your company's data secure, you were in demand yesterday, are in demand today and will be in demand tomorrow," Tom Silver, senior vice president with Dice.com, said in a recent interview with Network World.

The Computing Technology Industry Association, or CompTIA, in late 2009 polled some 1,537 high-tech workers and found 37% intend to pursue a security certification over the next five years. Separately, nearly 20% indicated they would seek ethical hacking certification over the same time period. And another 13% pinpointed forensics as the next certification goal in their career development.

"When you add the results, you will see that about two-thirds of IT workers intend to add some type of security certification to their portfolio," said Terry Erdle, senior vice president of skills certifications at CompTIA, in an earlier Network World interview. "This trend is driven by two factors: one, security issues are pervasive, and two, more and more people are moving to managed services and software-as-a-service models, which involves more complex networking. That level of non-enterprise data center computing has people looking more closely at their security infrastructure."

2. Virtual systems manager

While many systems managers might not yet have the word "virtual" officially in their titles, it is just a matter of time, according to industry experts.

"Virtualization and automation technologies are directly related to the cloud. Virtual servers comprise the computing environment and automation is responsible for the cloud being monitoring, management, secured and made compliant," says Andi Mann, research director at Enterprise Management Associates. "Virtualization is fundamentally mainstream now, and there is a lot of activity around virtual systems management."

Like high-tech vendors, IT pros will have to incorporate virtual systems knowledge into their repertoire in order to compete for open positions in 2010. Virtualization not only impacts current data center plans, but also future cloud computing efforts and while companies look to adopt such technologies, they will expect staff to be versed in the tools required to support new environments.

"We get several calls per week around SaaS, cloud and virtual skills that companies want guidance on, considering we are the vendor-neutral party," CompTIA's Erdle explained in late 2009. "CompTIA is working now on building certifications programs to release in 2010 and get in front of this growing demand."

3. Capacity manager

Companies that don't properly prepare for needed resources could lose money or fail to respond to business needs. That's why industry watchers from Forrester Research and Gartner have tagged capacity planning skills as in demand, especially considering the down economy.

Forrester says the role of capacity manager will be in demand for companies looking to optimize resources and accurately assign financial values to technology resources.

"Due to the current economic environment, downsizing (or rightsizing) of infrastructure, resources and capabilities is a top priority for IT," Forrester Senior Analyst Evelyn Hubbert stated in the Forrester Research report "Role Overview: Capacity Manager."

Gartner identifies a similar skill set in its IT resource planning position. By combining the tenets of capacity planning with financial management as well as usage and service measurement, IT resource planning experts will help IT departments understand how services and resources are consumed. This knowledge will help IT respond to business demands quickly.

"Capacity planning today is all about trying to ensure that you have enough capacity and memory cycles to meet workload demand. But virtualization causes new variables to be taken into consideration, and power consumption is just one among many," said Cameron Haight, research vice president at Gartner, in an interview with Network World. "For IT resource planning (ITRP) there are several more elements to consider and the process must become much more strategic within an enterprise."

4. Network engineer

As retro as it may sound, network know-how won't go out of style in 2010. According to Gartner, interest in networking, voice and data communications technologies increased for 2010, meaning skills in that high-tech area will also be in demand.

"The future of IT and enhanced competitive advantage requires social interactions and greater collaboration and that is why the importance of the network continues to grow," Gartner's McDonald says. "Even though revenue was down in 2009, CIOs reported that transaction volumes and communications requirements continued to grow, making it imperative to focus on network technologies."

Comptia A+ Training and Comptia A+ certification

Monday, August 2, 2010

New books from Cisco Microsoft CompTIA RFID cert Cisco Binary Game

New books from Cisco Microsoft CompTIA RFID cert Cisco Binary Game
Today, we have a round-up of networking book releases and certification news that should be of interest to you.

First, James Macfarlane has released an entry-level book on routing. A networking course instructor, Macfarlane said he wrote the book entitled, "Networking Routing Basics: Understanding IP Routing in Cisco Systems", because he found little that gave enough of a thorough treatment to the topic.
A Green Architectural Strategy That Puts IT in the Black: Download now

The book was researched and written over three years and begins with a review of core networking. It discusses how routing works and explains static and dynamic routing. Among the routing protocols covered include the legacy RIP and IGRP protocols and the current EIGRP and OSPF protocols for large networks. It also briefly discusses Border Gateway Protocol.

Also new this month are three books from Cisco Press:

* "CCNA Official Exam Certification Library, Second Edition", featuring a series of short instructional videos that demonstrate how to accomplish various CCNA-level configuration tasks on Cisco routers and switches.

* "Storage Networking Protocol Fundamentals", which introduces network administrators to the requirements of storage protocols and compares and contrasts the basic functionality of Ethernet IP and Fibre Channel.

* "Advanced Host Intrusion Prevention with CSA", which explains the features and functions of Cisco Security Agent.

Microsoft MCTS Training Press has also recently released three books that could be of interest to networking pros preparing for Microsoft certification exams:

* "MCSE Self-Paced Training Kit (Exam 70-294): Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure"

* "MCSA/MCSE Self-Paced Training Kit (Exam 70-291): Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure, Second Edition"

* "MCSE Self-Paced Training Kit (Exams 70-290, 70-291, 70-293, 70-294): Microsoft Windows Server 2003 Core Requirements, Second Edition"

In certification news, CompTIA A+ Training has launched the worldwide availability of its RFID+ certification. Among the skills the certification exam will test are installation, configuration and maintenance of RFID hardware and device software, site surveys and site analysis, and tag selection, placement and tsting. The certification is intended for professionals with a minimum of six to 24 months of experience in RFID or related data collection technologies.

CompTIA says it launched the certification to address what businesses see as an insufficient "pool of talent" in RFID technology from which to hire. According to a CompTIA A+ Certification survey of 500 North American organizations, just over half said they either completed RFID implementations or plan to do so in the next 12 months. The most aggressive adoption of RFID is planned in the automotive industry, followed by consumer goods and the transportation and logistics sector. A quick search for RFID jobs on the Indeed job search aggregator (which you can access from NetworkWorld.com) netted almost 900 jobs in the country.

Finally, who says exams aren't full of fun and games? Cisco has added the Binary Game to its Cisco Certified Network Associate Prep Center. According to Cisco, the game teaches strategies related to the binary system, a foundation knowledge used by CCNAs to install, configure and operate networks. While playing the binary game, rows of 1s and 0s appear from the bottom of the screen. The player clicks the 1s and 0s to create binary numbers, and earns points when answering correctly, the company says. The challenge starts when rows begin to appear faster and faster. As players achieve higher sores and advanced levels, they begin to recognize patterns and develop conversion strategies, Cisco explains.

Friday, July 30, 2010

BCS and CompTIA launch new green IT certificate

BCS and CompTIA launch new green IT certificate
Comptia, the global IT association, has launched a new green IT certificate.

The new Strata Green IT certificate, which is backed by BCS, the Chartered Institute for IT, is for IT professionals who can demonstrate they have the technical skills to ensure that IT policies that reduce emissions are implemented, maintained and monitored Comptia A+ Training.
Forrester: Addressing the Risks of Web 2.0: Download now

The launch of the certificate comes as the Carbon Reduction Commitment Energy Efficiency Scheme is due to come into force on 1 April. The scheme provides financial incentives for companies who reduce their use of electricity.

To gain the certificate, IT professionals will learn how to develop and implement an internal IT strategy, understand how to use assessment tools, and ensure the strategy delivers a good return on investment.

Specific skills that will be assessed for the certificate include disposal of hazardous materials, preservation of power and virtualisation.

IT professionals can study for the new qualification independently or through accredited training providers across the country.

The Institute recently launched a Foundation Certificate in IT which aims to help policy makers and facilities managers understand carbon energy accounting, green IT strategies and regulations.

Matthew Poyiadgi, European vice-president at CompTIA A+ Certification, said: "For many organisations, green IT offers untapped potential to reduce both costs and emissions. Holders of the CompTIA and BCS qualifications will have the means to help organisations take advantage of this potential."