The IT Certification Resource Center

Featured Deal

Get CompTIA, Cisco, and Microsoft training courses free for a week.
Learn More ❯

Certification Watch (Vol. 21, No. 2)

In this week's roundup of the latest IT certification news, CompTIA keys in on cybersecurity, we circle back to the end of last year to salute Training Industry's list of the Top IT Training Companies of 2017, and more.

CompTIA Identifies Three Elements of Effective Cybersecurity

 

What are three pillars of effective cybersecurity? Hint: They all pertain to people.The more that we learn about cybersecurity, the more that we realize how inextricably linked it is to people. No matter how effective, efficient, and extensive cybersecurity software becomes, it remains tied to human behavior and human thought processes. Until AI becomes sophisticated enough for computers to make decisions and pursue rationales, people are going to have the final say in how thoroughly and judiciously cybersecurity software is installed and maintained, and how comprehensively cybersecurity policy is crafted and carried out. A recent post to the IT Career News blog of tech industry association CompTIA captures the scope of the problem in describing the experience of a CISO hired to overhaul the information security infrastructure of California's El Camino Community College District. A big part of Paul Yoder's approach was to focus on the need to improve the human component of cybersecurity by helping people acquire knowledge, promote awareness, and effectively follow through. All three are courses of actions that, broadly adopted and widely implemented, could go a long way toward shoring up information security everywhere.

 

ISACA Breaks Down the Threat of Meltdown and Spectre

 

Speaking of effective cybersecurity — and really, one way or another, when are we ever not stuck on that topic these days? — a new post to the ISACA Now Blog of cybersecurity and governance association ISACA digs into the latest far-flung cybersecurity catastrophe to threaten computers and users everywhere with digital doom and destruction. At the end of last week, the internet was blowing up (as it so very often is, these days) with news of a new and disturbing cybersecurity crisis. Blogger and ISACA researcher Ed Moyle walks through the profiles of Meltdown and Spectre, two hardware exploits that allow access to systems and networks through computer processor flaws. If you aren't concerned about the problems that have come to light here, then you haven't read enough about them. This is critical threat intelligence, as much for everyday, garden variety users as for network admins and security teams. It's also yet another reminder that effective cybersecurity training and certification is the gift that just keeps on giving. The career possibilities, at least in the short term, and something close to limitless.

 

Are You a Big Tent or Small Tent Certified Professional?

 

Once upon a time in world religious history, early Christians faced a question that many religious movements grapple with: Is it better to have a narrow focus, or a broad one? That is to say, should you throw open the tent flaps and attempt to grapple with the problems of all religious seekers everywhere? Or would it be better to hunker down and focus on those who are already in the flock? A similar issue is the topic of a new post this week to the Born To Learn Blog of Microsoft Learning. Blogger David Elfassy discusses his own thought process in deciding whether to focus on cloud computing certifications that are directly relevant to technologies that affect his immediate employment, or to take a broader look at cloud technology certification. It's a valuable question, and one that probably captures the attention of all certified professionals at some point. Should I just do the thing that I'm being paid to do right now, or it is better to have a broader, more well-rounded understanding?