Today's Tech and CompTIA Certs
-
Upload
comptia -
Category
Technology
-
view
906 -
download
1
description
Transcript of Today's Tech and CompTIA Certs
Today’s Technologies And CompTIA’s Cer/fica/ons Todd Thibodeaux President & CEO, CompTIA Thomas Reilly Vice President, CompTIA Learning James Stanger, PhD Senior Director, Product Development, CompTIA
CAPP session sponsored by:
BY 2025,
75% OF THE GLOBAL WORKFORCE WILL BE
NEXT GEN 2
Next Gen PopulaKon 10 million strong here in UK 700,000 in Ireland 1+ billion global
Next Gen Workforce Today: 1 in every 3 employees in UK & Ireland 2025: 75 % of global workforce in ten years! 2030: Will outnumber all other genera/ons in workforce
The Next Gen Is Already Here
Time period: 2013 revenue es/mate | Source: IDC
NEXT GEN’S
ON-‐DEMAND
4
LIFESTYLE IS HEAVILY RELIANT ON
MOBILITY, THE CLOUD
AND CYBERSECURITY
Social Media Transforms the Way We Connect
How Is the Next GeneraKon Transforming Our World?
• Tech is not just for geeks • Changing DNA of who works in IT • Broadens base of who gets IT Training
NEXT GEN SEES TECHNOLOGY AS A MEANS TO DELIVER
7
A BETTER LEARNING EXPERIENCE
Thomas Reilly Vice President, CompTIA Learning
Quick CertMaster Update
CompTIA CertMaster: an adap/ve learning tool with a unique Q&A method and learning algorithm to drive fast learning and long reten/on of CompTIA exam material.
• Available for A+, Network+, and Security+
and IT Fundamentals
• Launched 4 June 2014
• Available to consumers on www.certmaster.com or the Marketplace www.comp/astore.com
• Purchase directly through your CompTIA Business Development Managers; Member, CAPP and Academy discounts apply.
• Thousands of learners have purchased the product since June and many pilot organiza/ons are adding it to their learning and cer/fica/on programs.
CertMaster Success Story: Newham College
§ Business Challenge: Newham College needed their IT curriculum to becer align with required job skills. Thus, they updated curriculum to include CompTIA and MS Cer/fica/on focus.
§ CertMaster Experience: Introduced CertMaster pilot into the class and the students that used it were becer prepared.
§ “Students preferred CertMaster to the other online test prep tools because they were actually learning and remembering, not just cramming for the exam.” Chiraag Swaly, Instructor
§ Result: 13 people took the A+ 801 exam and passed. Newham plans to integrate CertMaster into the program for the upcoming full year.
Instructor: Chiraag Swaly LocaKon: London CerKficaKon Pursued: A+ # of Students: 27 total
L
CertMaster Success Story: Stephanie “Steph” Lowe
§ Personal Challenge: Always interested in IT, but finally bit the bullet to pursue a career in IT, so enrolled in courses at Bedford College.
§ CertMaster Experience: Encountered CertMaster A+ when the class was given a pilot. Steph studied CertMaster to achieve mastery.
§ “It was a fantas@c piece of soAware and I know my classmates found it extremely beneficial in prepara@on for the exam.” Steph Lowe
§ “It was amazing! I liked the repe@@on, it ingrains the learning in your head. I used CertMaster un@l I got every ques@on correct.” Steph Lowe
§ Result: Passed the A+ exam and landed her first IT job working for a London adver/sing agency.
Instructor: Joe Sullivan Organization: Bedford College Location: Bedford Certification Pursued: A+, now studying for Network+ Student Demographics: 27 years old
L
CertMaster Success Story: Lewis O’Brien
§ Personal Challenge: To improve my knowledge of CompTIA A+ so I can take the exam and pass.
§ CertMaster Experience: Piloted CertMaster A+ 801 /802 in prepara/on for the A+ exams as part of a Level1 appren/ceship provided through vq solu/ons.
§ “I really enjoyed the experience of using CertMaster. It is an excellent tes@ng engine with ques@ons relevant to the exam objec@ves.” Lewis O’Brien, Student
§ “CertMaster is the best tes@ng prep engine for CompTIA on the market. It’s easy to use, fun and informa@ve.” Harpreet Gill, vq soluKons Instructor
§ Result: Achieved his A+ Cer/fica/on with a high score and has a full-‐/me job with appren/ce company, IBIT Solu/ons.
Location: Coventry Instructor: Harpreet Gill Training provider: vq solutions Certification Pursued: CompTIA A+ 801/802 Demographics: 21yr, male, IT technician
L
Level up your career
How many classic video game Easter eggs can you spot in the video.
PosiKoning CompTIA CerKficaKons and Products: Talking Tech with Your Customers James Stanger, PhD Senior Director, Product Development Skills Cer/fica/on, CompTIA
CERTIFICATION TRENDS & UPDATES
Copyright (c) 2014 CompTIA Proper/es, LLC. All Rights Reserved. | CompTIA.org
Top Certs on the Rise
16
IT Fundamentals
CASP
Project+
CTT+
Linux+
58%
75%
55%
45%
32%
Growth since 2011
A+ 129,822 118,829 125,644 115,394 -‐13%
Storage+ -‐ 523 786 869 100%
Cloud + -‐ -‐ 39 691 100%
Mobility+ -‐ -‐ 10 228 100%
Mobile App Security+ Android/IOS -‐ -‐ 1 24 100%
Cloud Essen/als 7
891 1,764 1,378 99%
Healthcare IT 62 756 1,028 900 93%
CASP 552
271 1,385 2,206 75%
IT Fundamentals 5,101 7,405 8,547 12,238 58% Project+ 3,019 3,866 5,175 6,766 55% CTT+ 1,111 1,955 1,624 2,030 45% Linux+ 4,046 4,188 5,409 5,983 32% Net+ 30,982 32,942 31,255 29,866 -‐4% Security+ 50,341 44,099 43,228 43,488 -‐16% Server+ 4,285 3,663 3,229 2,554 -‐68%
CDIA+ 905 1,192 710 494 -‐83%
Majority of Businesses Throughout the World Expect IT CerKficaKons to Increase in Importance
28% 43%
24% Significant Increase in Importance
Increase in Importance
NET Decrease
NET Increase in Importance
No Change
ExpectaKons for Change in Importance of IT CerKficaKons Over Next Two Years
Base: 1,246 business and IT execu/ves from Brazil, Canada, France, Germany, India, Japan, Mexico, Middle East, Thailand and the UK Source: CompTIA Interna@onal Technology Adop@on and Workforce Issues study
Majority of Businesses Throughout the World Expect IT CerKficaKons to Increase in Importance
73% “It’s important to test aper training to confirm knowledge gains” 64% “Teams of staff with IT cer/fica/ons benefit from having a common founda/on of knowledge” 62% “Staff with IT cer/fica/ons have proven exper/se” 58% “Staff holding IT cer/fica/ons are more valuable to the organiza/on” 54% “The organiza/on is more secure from malware and hackers due to staff with IT cer/fica/ons”
NET Agreement* to Statements about IT CerKficaKon
*Strongly Agree + Agree
Base: 1,246 business and IT execu/ves from Brazil, Canada, France, Germany, India, Japan, Mexico, Middle East, Thailand and the UK Source: CompTIA Interna@onal Technology Adop@on and Workforce Issues study
.
October 2014
November 2014
December 2014
January 2015
February 2015
March 2015
April 2015
Later 2015
2014-15 Product Calendar effective Oct 21, 2014 dates subject to change
FCO-‐U51 Launch: Oct 15
Workshop
Re/rement
Launch*
901 Series JTA Oct 27-‐31
CAS-002 Est Launch:
Jan 20
* All launch dates dependent upon
courseware availability
Item Refresh Oct 20-‐22
Item Dev Oct 6-‐10
LX0-103, LX0-104 (exam numbers assigned,
objectives unchanged)
Est Launch: late Jan/early Feb, LPI dependent
N10-006 Est Launch:
Feb
220-901, 220-902 Est Launch Oct 2015
SG0-00 2 Est Launch: Jun
Item Wri/ng Nov 10-‐14
SY0-301 all non-English languages Retirement: Apr 1
Strata IT ALL VERSIONS
Retirement: Aug 31
SY0-301, JK0-018 Retirement: Dec 31
SY0-‐401 Japanese Launch: Oct 1
SKO-004 Est Launch: May
HIT-001 Decision to retire Dec 31 has been reversed, no retirement this year.
N10-005 Est Retirement: Jun
CAS-001 Retirement:
May 30
New
New
New
ESSENTIAL CONCEPTS TO HELP YOU POSITION COMPTIA PRODUCTS
Technologies You Need to Know, Right Now
§ Essen/al networking – Why devices from mul/ple vendors
work together at all – Fundamental protocols and devices – Cloud – Virtualiza/on – Addi/onal concepts (e.g., open source)
§ Storage – Types – Local and remote
§ Security – Confiden/ality, availability and integrity – Encryp/on and authen/ca/on – Separa/on of du/es and redundancy
21
This photo is for placement only
How Can All of our Devices Work Together?
§ All vendors adopted two models a long /me ago
– The 4-‐layer DOD model (Internet model) – The 7-‐layer (OSI/RM)
§ Who cares? Well, if this model hadn’t been created, every vendor would have to create its own protocols
§ If you thought Ma Bell, the Soviet Union and Disco were bad, imagine what it would have been like . . .
§ CompTIA wouldn’t exist, either . . . Why? – Why would you ever need vendor-‐neutral
cer/fica/on? – We, in many ways, owe our existence to
how the Internet began, as well as to how it will operate in the future . . .
22
Open Systems Interconnection Reference Model
Protocols: What Is TCP/IP?
It’s a suite of protocols: – Internet Protocol (IP)
§ Provides addressing – think of your home “snail mail” address – that’s what IP does § IPv4 (10.209.113.65) § IPv6 (fe80::3086:aa5a:9333:b9f2%16)
– Ports § Kind of like doors and windows into your home § Can have services /ed to them
– TCP (how an adult communicates) § Connec/on-‐oriented, like a voice phone call
§ 3-‐way handshake § E-‐mail, Web, your voice calls on Lync
– UDP (how kids communicate) § Connec/onless – kind of like tex/ng § Like throwing a paper airplane . . . § DNS, some audio
23
Fundamental Device Terms
Networked devices – A “host” – any network-‐aware device. Can also refer to a “hos/ng” OS in virtualiza/on – Protocol (TCP/IP, which includes HTTP/S, POP3, and many others) – Network Interface Card (NIC) – either wireless or wired
Switches – Used to connect computers to each other. Operates at Layer 2 of the OSI/RM. – Do you have a cable/DLS modem? Chances are, they have a switch installed, as well
Wireless technology – Wireless NIC – Access points
Routers – Connect networks – Layer 3 of the OSI/RM – These devices focus mostly on IP addresses and gevng
packets from one network to another. They also control access. – Can balance load, as well as “shape” packets to improve service
24
Pulng Things Together
25
A firewall does more than block traffic Monitoring is an essen/al part of a firewall. Logging, as well as integra/on with an intrusion detec/on system, is vital.
Pulng Things Together
26
AddiKonal rouKng and firewall terms § Subnevng – The ability to create mul/ple logical and physical networks. You can subnet by diving IP
addresses (logical). You can also subnet by using switches and routers.
§ Filtering – The ability of a device (e.g., firewall) to limit traffic, open based on IP address characteris/cs (e.g., actual address, port used, header informa/on)
§ Access Control List (ACL) – Term used to describe the ability of a router to control traffic. Not always considered a security feature, but a way to control traffic.
§ Virtual Private Network (VPN) – a service that allows remote workers or companies to access resources as if they were actually behind the firewall.
§ Ingress and egress – Terms used to describe incoming traffic (ingress) and outgoing traffic (egress).
§ “Default stance” – Can be default open or default closed. Default closed is the industry standard
§ Signature – Term used to describe characteris/cs of an acack (worm, virus, botnet, individual)
§ “Penetra/on tes/ng” – Tes/ng physical and logical resources to see how well they can withstand tampering and intrusion. Includes buzz words such as “brute force acack,” “fuzzing,” “superzapping,” and “key manipula/on.”
§ Old terms: Hub, bridge, “23 skidoo.”
Pulng Things Together
27
What about the intrusion detecKon system (IDS)? An IDS monitors traffic behind the perimeter established by the firewall. Two major types exist:
§ Host-‐based (HIDS): Sopware that listens for logins, illicit sopware installa/on, and anything strange. Can then send alerts.
§ Network-‐based IDS (NIDS): A device that listens in on a switch or router and listens to traffic for anomalies and issues. Can send alerts.
The Cloud – What You Need to Know
§ Services offered across the network, by a third party
§ You become a “tenant” to a provider
§ What used to be installed is now offered “as a service”
28
This photo is for placement only
TradiKonal and Cloud Soqware Comparison
Tradi<onal Cloud
Microsop Office Google Docs
Tradi/onal NetSuite Salesforce.com
Installed LMS / Transcender CertMaster
Microsop Outlook (office) Gmail / New Hotmail
§ Benefits and drawbacks galore: – Highly dependent upon bandwidth/QoS – What do you know about the provider? – Uses scalable, virtualized services – Tenant “collateral damage” e.g., Wikileaks!
The Cloud – What You Need to Know
29
This photo is for placement only
IaaS, SaaS, PaaS . . . what? Infrastructure as a Service: Where a company obtains opera/ons equipment, including storage, hardware, servers and networking components, from a third party. The company can then provide sopware.
Soqware as a Service: Ready-‐built, scalable sopware is obtained – usually via a Web browser – from a third party service provider.
Plarorm as a Service: Where you will build your own sopware, but using tools, libraries, and tes/ng tools provided by a third party.
VirtualizaKon
What is it? – The ability for one piece of hardware and a host opera/ng system to run mul/ple instances of
an opera/ng system at the same /me – A “decoupling” of sopware and hardware – Imagine the ability to run another, completely independent opera/ng system in the same way
you would launch a Web browser – IBM / LinuxWorld example – Can be extended to virtualize en/re network environments
Some basic terms: – Virtual machine (runs a hosted OS) – Hypervisor (a monitor that creates
and runs a virtual machine) – Host machine, guest machine
30
Types of VirtualizaKon
31
1. Server: Hos/ng of mul/ple environments (e.g., Linux and Windows) within a single opera/ng system instance.
2. Desktop: Where a user has a monitor and mouse, but receives their “desktop” from a remote server, either from the server room down the hall, or from a remote. Removes the need for a CPU at each computer sta/on.
3. ApplicaKon: Some/mes, a business-‐cri/cal applica/on won’t work because the opera/ng system doesn’t support it. It is possible for an opera/ng system to imitate another OS, kind of tricking the applica/on to run.
4. Network: Tradi/onally, the ability to create a Virtual LAN (VLAN). Now used to virtualize an en/re network for “live fire” security exercises. Imagine the ability to be able to create an en/re working network for whatever purpose, from educa/on to providing redundancy.
Storage Concepts
§ Hard disks – mul/ple types – Tradi/onal
§ SATA § SCSI § IDE
– Solid state (s/ll SATA)
§ Types of storage – Tradi/onal – Network Acached (NAS) – Storage Area Networks (SAN) – Ways to avoid I/O issues
§ Storage configura/on – RAID – Tiering
32
AddiKonal Concepts
Open source and proprietary development models: § Licensing models § Why it is important § More than Linus Torvalds versus Bill Gates § Both useful § Security implica/ons in both models
– Proprietary: We have a great team – Open source: “With enough eyes, all bugs are shallow”
OperaKng systems: § Linux § Windows § Mobile
– iOS – not Cisco’s, but Apple’s! – Android (where Linux finally made it to the . . . palmtop)
33
This photo is for placement only
Licensing Models
34
This photo is for placement only
Proprietary (End User Licensing Agreement -‐ EULA)
Sopware – or any intellectual property – is owned completely by the company. Protected by tradi/onal copyright laws. You are allowed to use it only under certain condi/ons. No modifica/on or alterna/ve use is allowed. Excep/ons may be allowed, but only by nego/a/on and contract.
Open Source
Based on a model where sopware – or any intellectual property – can be used by anyone. Use involves the ability to download, copy, distribute, and modify code at will. While open source sopware will s/ll open employ a EULA, usually such agreements simply relay the message that the sopware license is open.
Security Concepts
§ Redundancy – No, UK folks, I’m not talking about unemployment . . . – Mul/ple access points and failovers
§ People § Processes § Hardware
§ Risk management
§ ConfidenKality, availability and integrity – Known as the “CIA triad” in some circles – Kind of an ironic term, no?
§ EncrypKon and authenKcaKon – How we implement CIA – Symmetric key and asymmetric key encryp/on – Mul/ple factors (what you have, what you know, what you are . . .)
35
Security Concepts
§ Spoofing – Posing as someone – or something – other than what you are – Part of a /me-‐honored tradi/on
§ “Con ar/sts” § Computer hacking § Iden/ty thep
§ SeparaKon of duKes / segregaKon of duKes
36
This photo is for placement only
.
POSITIONING COMPTIA CERTIFICATIONS
Many Businesses Throughout the World Seek Improvement on the IT Skills Front
1. Staff produc/vity 2. Customer service / customer engagement 3. Security / defending against malware / hacking 4. Innova/on / new product development 5. Speed to market with new products or services
Top Areas Affected by IT Skills Gaps
1. Teamwork 2. Customer service 3. Project management
Top Rated “Soq” IT Skills
1. Networks / Infrastructure 2. Database / Informa/on management 3. Server / data center management 4. Storage / data back-‐up 5. Help Desk / IT support 6. Data analy/cs / Business intelligence 7. Printers, copiers, mul/func/on devices 8. Security / Cybersecurity 9. Customer rela/onship management (CRM) 10. Web design / development
Top Rated IT Skills in Terms of Importance to Businesses 16% of businesses report being
exactly where they want to be with IT skills, while 40% report being very close. Nearly half of businesses (44%) seek significant improvement on the IT skills front.
Base: 1,256 business and IT execu/ves from Brazil, Canada, France, Germany, India, Japan, Mexico, Middle East, Thailand and the UK Source: CompTIA Interna@onal Technology Adop@on and Workforce Issues study
Top IT Skills IT Professionals Plan to Pursue
6%
11%
14%
18%
19%
19%
19%
20%
26%
32%
35%
36%
46%
None
BI / Data analysis / Big data
Training / Teaching
Database management
Mobility
Storage
App development / Programming
Project management
IT support
Virtualiza/on
Cloud compu/ng
Servers
Networks
Security / Cybersecurity
IT knowledge / skills IT pros would like to further develop over the next two years
Base: 2,074 IT professionals in Canada, S. Africa, the UK, and the US Source: CompTIA 2nd Annual IT Career Insights study
51%
94% of IT pros plan to pursue more training.
Note: Nearly all respondents (96%) are already cer/fied in CompTIA A+ (73%), Network+ (53%), or Security+ (43%).
Domains: ü Sopware
ü Mobile, worksta/on ü Tradi/onal and cloud
ü Hardware ü Relevant to end user and techie
alike ü More than just “A-‐”
ü Security ü Encryp/on, secure login, repor/ng
acacks ü IT Literacy ü Networking
ü WiFi and mobile ü Perimeter and cloud
Perfect for: ü Grounding in IT concepts ü “Level set” for training ü For those considering a career in IT ü For technical sales ü Ideal for academic ü A+ is a job-‐role cer/fica/on; not everyone is ready for it
ü Same for Cisco, MS, VMWare
JOB ROLE: None – It is a preparatory cer/fica/on
POSITIONING: Preparatory training . . . and more
JOB TASKS: ü Ensure site and device connec/vity
ü Parts replacement ü Malware removal ü Device configura/on (hardware/sopware)
ü Troubleshoo/ng common problems
ü PC/Laptop repair ü PC/Laptop maintenance ü Performance and configura/on best prac/ces
JOB TASKS: ü Malware removal ü Sopware troubleshoo/ng ü Diagnosing hardware issues ü Documenta/on ü Customer support ü Support the field tech ü Applica/on support
JOB ROLE: Onsite Technician/ Field Service/Field Support
JOB ROLE: Remote Support/ Helpdesk Technician
Hardware (40%) ü Deep dive on hardware components: CPU,
RAM, power supplies and storage devices and drives
ü Also addresses the role of the BIOS as the primary tool for communica/on between hardware components
Networking (27%) ü Fundamental network concepts and
technologies, including TCP/IP and related characteris/cs, TCP and UDP ports and protocols, wireless networking standards and network devices
ü Introduces network topologies and types of networks
OperaKng Systems (33%) ü Installa/on, configura/on, and support of
various Microsop OSs (XP, Vista, and Win 7) including use of command line tools (NOTE: mobile OSs Android and iOS are included in a mobile device sec/on)
ü Client-‐side virtualiza/on
Security (22%) ü Physical and digital security ü Common security threats, including social
engineering, malware and rootkits
ü Securing a SOHO network
220-‐801 220-‐802
JOB ROLE: System Administrator
JOB TASKS: ü Automa/on,
provisioning, cloning
ü Opera/ons, maintenance, implementa/on, troubleshoo/ng
ü Resource control/monitoring
JOB ROLE: Network Administrator
JOB TASKS: ü VLAN maintenance,
firewall, port alloca/on
ü Network provisioning, deployment
ü Network monitoring and troubleshoo/ng
ü Bandwidth alloca/on
JOB ROLE: Storage Administrator
JOB TASKS: ü Provision storage
(thin provisioning) ü Understand www
names ü Deduplica/on ü Storage /ering,
performance tuning
VirtualizaKon
Virtualiza/on is a core enabling technology for cloud solu/ons and amounts to almost 20% of the exam content.
Deploying and managing a virtual NIC, disks, switches, LAN and SAN are at the heart of cloud environments.
Data security
Security remains a primary deciding factor in decisions about cloud compu/ng, so 16% of the exam is devoted to security.
TesKng
Tes/ng and managing the performance of systems (6.0) to ensure business con/nuity (7.0) is an exam area driven by the overarching goal of availability, 24/7.
JOB FUNCTIONS ü Run vulnerability scans ü Operate vulnerability hardware ü Monitor intrusion detec/on/
preven/on ü Review logs/audit logs ü Hardening systems ü Configure firewalls ü Manage port security ü Deploy and monitor an/virus systems ü Test and apply patches ü Manage physical security
JOB ROLES ü Security Specialist ü Security Engineer ü Security Administrator
Network Security (20%) ü Tools, technologies and tac/cs for securing a computer network and network-‐accessible
resources, including firewalls, NIDS and NIPS, UTM security appliances among others ü Secure network administra/on principles such as firewall rules, port security, UTM and so on
Threats & VulnerabiliKes (20%) ü Different types of malware and acack types, social engineering, wireless and applica/on
acacks ü Mi/ga/on and deterrent tac/cs including log monitoring and system hardening ü Methods of discovering security threats and vulnerabili/es
Compliance & OperaKonal Security (18%) ü Founda/onal concepts of risk including use of different types of controls and the importance
of policies ü Risk mi/ga/on strategies, basic forensic procedures and awareness of incident response
procedures are also expected of the Security+ verified professional
JOB TASKS: ü Troubleshoot and support mobile devices
ü Provision mobile devices ü Content administra/on ü Integra/on of new devices ü Establish configura/on and sevngs
JOB TASKS: ü Evaluate technologies ü Implementa/ons and installa/ons ü Integrate with current infrastructure
ü Ensure security policies are implemented
JOB ROLE: Mobile (Device Management) Administrator
JOB ROLE: Mobility Engineer
The State of Mobility Policies in the UK
28%
31%
24%
16%
Currently have a formal mobility policy
Currently building a formal mobility policy
Only share best prac/ces to follow
No set policy or prac/ces
Areas Covered in Policy
85% Mobile devices
73% Device security
65% Data Storage
64% Mobile apps
63% Data transmission
63% Personal use
Base: 250 UK end users/142 UK end users with mobility policies Source: CompTIA’s 3rd Annual Trends in Enterprise Mobility study
SAMPLE DOMAINS
Over-‐the-‐Air Technologies and Network Infrastructure WiFi capabili/es with strong enough signal strength must be in place, and the wireless solu/on must integrate with the exis/ng infrastructure
Mobile Device Management Onboarding”, backups, applica/ons and administering the devices according to corporate security policies TroubleshooKng Best prac/ces for informa/on gathering and troubleshoo/ng everything from power supply, password, sopware applica/ons, and connec/vity issues
Project+
§ The only project management cer/fica/on that covers the business and technical skills needed to successfully manage projects.
§ Exam covers the following topics: – Project Set-‐up and Ini/a/on – Iden/fy and validate project – Prepare a feasibility analysis – Determine project deliverables
§ Project planning – Prepare project scope documents – Use tools and diagrams, such as PERT and Ganc – Iden/fy and manage costs
§ Project execu/on and delivery
§ Change, control and communica/on
“CompTIA Project+ cer/fica/on is a great way to educate our project
management team. It grants credibility to our internal
stakeholders and customers.” -‐-‐ Ven Sivarajan, Engagement
Manager, CDW
Project+
Comparison of PMP and Project+ Exam Content The Project+ exam focus is especially on planning, and on change control and communica/on. As a founda/onal level exam for project leaders or team members, it is important to build and validate knowledge of the importance of planning, and assessing the impact of changes, on the overall project.
PMP Process Groups/Domains % of Exam Project+ ObjecKve Domains % of Exam
Ini/a/on 11% Pre-‐Project Setup/Ini/a/ng 12%
Planning 23% Project Planning 29%
Execu/ng 27% Project Execu/on and Delivery 23%
Monitorinig and Controlling 21% Change Control and Communica/on 27%
Closing 9% Project Closure 9%
Professional and Social responsibility 9%
Cybersecurity Awareness Training
49% 51%
Only about half of companies require cybersecurity awareness training for employees
No, it’s not required
Yes, it’s required 17% Compliance
14% Safety / protect the company
68% Both
Primary reason why cybersecurity awareness training is conducted:
Base: 153 HR execu/ves in the US | 69 who require training Source: CompTIA’s 2nd Employer Percep@ons of IT Training and Cer@fica@on study
CompTIA CerKficaKons
CompTIA Basic Cer/fica/on
IT Fundamentals
CompTIA Professional Cer/fica/on
A+ CDIA+ Cloud+ CTT+ Linux+
Mobile App Security+ Mobility+ Network+ Project+ Security+ Server+ Storage+
CompTIA Mastery Cer/fica/on
CompTIA Advanced Security Prac//oner
(CASP)
CompTIA Specialty Cer/fica/on
Cloud Essen/als Healthcare IT Technician
A Skills-‐Based Look at the CompTIA Roadmap
54
This photo is for placement only
EssenKal skills for the enKre IT department
Job role CerKficaKon Help desk/IT support technician/field technician A+ Opera/ng system support Server+, Linux+ Network technician Network+ IT/cloud architect Cloud Essen/als, Cloud+ Systems analyst/mobility engineer Mobility+ Mobile app developer Mobile App Security+ Security engineer/IA technician Security+, CASP Any employee CyberSecure (2015 launch) Project manager Project+
IT CerKficaKon Roadmap CompTIA.org/CertsRoadmap
THANK YOU. James Stanger, PhD Senior Director, Product Management CompTIA (630) 678-‐8345 office (360) 970-‐5357 mobile Email: jstanger@comp/a.org Skype: stangernet
Up Next
§ 15.00 – Networking Break in the Exhibit Hall – 5th floor Mountbacen Lounge
§ 15.45 – Closing Keynote: Jez Rose, The Behaviour Expert
– 6th floor Mountbacen Room
§ 16.45 – Closing Recep/on – 5th floor Mountbacen Lounge