Why CompTIA Security + will benefit your IT career

Do you know about the phrase “a perfect storm?” It’s that situation where unrelated factors combine and amplify together, all to create something horrible? That’s what is taking place with companies scrambling to hire CompTIA Security+ certified professionals. Factors about this certification include: a long legacy, a strong reliance across the industry, and changes in the current exam version in 2017 all form the perfect climate for anyone who doesn’t yet have this powerful certification. And one more factor remains, an upcoming surge in credibility, but more on that later. The bottom line is, if you don’t have the Security+ certification in 2018, you should get it now. But before you do, read about each factor in this article.

Long Legacy

The CompTIA Security+ certification is nearing its sixteenth year. For some people, 16 years is not a long time, but it means Security+ came before YouTube and Facebook. The very first iPod was released 11 years ago, as was the first USB flash drive. In terms of security certifications, Security+ predates ISACA’s CISM and Red Hat’s Certified Security Specialist.

In the information security field, 16 years seems a much longer time. Information security has matured a great deal in less than 20 years, seeing new focus on areas like identity management, risk management and governance. IT professionals familiar with keeping financial information secure will remember the Sarbanes-Oxley Act was enacted in July 2002 (hey—also less than 20 years old!). Indeed, a lot of ground was covered in the past 16 years. And the Security+ certification has lived through it all.

Industry Respect for Security+

Just because something is older doesn’t make it better. But in this case, maybe it does. I find the Security+ increasingly becoming a baseline. Take, for example, how the Security+ certification gets used as a prerequisite toward a higher level certification. The most well-used case is in Microsoft’s Certified Solutions Expert, where a person seeking their MCSE can use CompTIA’s Security+ as an elective. In fact, CompTIA is the only third-party option available to Microsoft MCSE certification seekers. For Microsoft’s security specialization, again, the CompTIA Security+ is an alternative to Microsoft’s own security courses. This kind of endorsement creates a considerable level of credibility for the Security+. This credibility comes unbiased, from both the private and public sectors.

The CompTIA Security+ certification is vendor-neutral. This means the certification is not biased, does not promote, nor heavily dependent on a strong familiarity of one vendor. This means when talking about identify management, for example, you are not going to miss a question because you aren’t overly familiar with implementing Cisco products. Nor are you bound to focus on one solution provider such as Microsoft.

Endorsement in the Public Sector

It’s not just private companies that leverage how popular the Security+ certification is. The public sector refers to it as well in defining job requirements and training. For example, the United States Department of Defense (DoD) has manual 8140.01M (last updated April 2015), which describes the training and certification requirements for all Information Assurance professionals within the DoD. That includes all the US military, the Pentagon, the NSA and the rest of the 3 million employees and service members.

The DoD manual describes the requirements of “IAT” or Information Assurance Technical personnel at particular levels within the DoD. In the manual’s words: “The IA workforce focuses on the operation and management of IA capabilities for DoD systems and networks.” Regarding Department of Defense information assurance technical and managerial personnel, there are three possible levels. The manual details experience and training requirements for all three levels. For example, an IAT Level 3 person is more qualified than an IAT Level 1 person.

But how does this manual (and DoD) regard the Security+ certification? According to the manual, an IAT Level 2 person “normally has at least 3 years in IA technology or a related area” to be considered qualified. However, if a person holds the Security+ certification, that person now meets the minimum requirements for IAT level 2 work.

Yes, the Security+ certification qualifies a person for IAT Level 2 work, a position for someone assumedly having “at least 3 years” experience. Bear in mind that even CompTIA does not require but only recommends 2 years’ experience before taking the Security+ exam. This is because the Security+ is designated as a “DoD approved certification” for IAT Levels 1 and 2, and IAM (management) Level 1 positions.

All told, there are noticeable shifts in how the industry—both private and public—valuate the Security+ certification. In every case, it seems to reflect a growing respect for the Security+, so I feel the investment spent in gaining the certification is bound to pay off.

Changeover in exam version

CompTIA is noticing that growing respect, too. Perhaps one response is their recent, complete makeover of the exam. Earlier in 2017, CompTIA released a new revision of the popular exam, the exam’s fourth version since its start in 2002. And the revision is timed with yet another “perfect storm” factor, to be explained later. It’s enough to say their timing was well-thought out. This can be good and bad news.

The good news, as we discussed above, is that CompTIA is continuing to improve upon the certification. The bad news, if you’re the kind of certification student that relies on notes and experience from past students, is that a new revision means new areas of study with completely new questions. Depending on the source, study guides could be edited and honed multiple times during one exam revision. In contract, a new exam revision means untested territory for study guide providers. In short, study guides of “today” are of little help for the exam of “tomorrow.”

To be certain, we’re talking about the same exam revisions. The new revision is SY0-401 and has been available to exam takers since July 2017. However, the expiring exam revision is called SY0-201 and is available to you until the end of the year, as noted per the CompTIA website.

Credibility Surge

Remember in the introduction I added another important factor, an upcoming surge in credibility? Let me explain.

In 2011, CompTIA announced they removed the “open-ended” trait from their three foundation certifications, of which Security+ is the most senior. What does that mean? In the past, if you got a Security+ certification, you keep it for life, regardless of any effort to upkeep or exercise it. No more “free ride” now.

This means holders will need to demonstrate their ongoing practice by recording a number of activities such as teaching, publishing, or attending conferences. This should sound familiar to many certification holders who already have to record their Continuing Education Units or CEUs. Now, Security+ becomes one more certification where you can apply the same conference.

Why do I consider this a smart move? Simply put, much more credibility is given to certifications kept up-to-date compared to ones given “for life.” Five years from now, you can be sure those certified as Security+ are dedicated to their trade. And so will employers.

In Summary—A Perfect Storm

Remember I called this the “perfect storm”? A perfect storm is what this is because of the timing of multiple factors. The factors include its legacy and the certification’s growing respect, the waning availability of the older exam revision, and the removal of the certification’s “open-ended” quality. All told, the timing for getting this certification couldn’t be better. Waste no more time and secure a good class to take this in demand job certification.

ABCO Technology offers courses in a program known as the cyber security engineer, which includes this certification plus five others.

If you are interested in a cyber security career, contact our campus by telephone between 9 AM and 6 PM Monday through Friday at: (310) 216-3067.

Email your questions to info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:

11222 South La Cienega Blvd. STE #588

Los Angeles, Ca. 90304

Train for a career in cyber security today!

Facebook hack creates countless cyber-security jobs

Facebook shares were down 15 points as of 12.30 PM California time. Monday, after a Friday report revealed that a Trump-linked analytics firm improperly obtained the personal data of tens of millions of users.

The massive $15-per-share drop, which represents a roughly $43 billion loss in market capital, comes just three days after it was revealed that a Cambridge University professor accessed the data of more than 50 million Facebook users by creating a data-mining survey, which exposed the personal information of the 270,000 respondents as well as their unwitting friends.

Facebook confirmed that the professor, Aleksandr Kogan, obtained the data entirely in accordance with the site’s guidelines; his only violation was sharing it with Cambridge Analytica, which was founded by Breitbart executive Steve Bannon and Hedge-fund billionaire Robert Mercer.

Facebook’s apparent inability to prevent user data from falling into the hands of a third-party organization once obtained by a seemingly benign actor prompted widespread criticism. The social-media giant learned Kogan had shared the data with Cambridge Analytica in 2015. At the time, Cambridge Analytica offered assurances that all of the data had been deleted, but Facebook has admitted that it recently learned that wasn’t the case

Facebook confirmed that the professor, Aleksandr Kogan, obtained the data entirely in accordance with the site’s guidelines; his only violation was sharing it with Cambridge Analytica, which was founded by Breitbart executive Steve Bannon and Hedge-fund billionaire Robert Mercer.

Facebook’s apparent inability to prevent user data from falling into the hands of a third-party organization once obtained by a seemingly benign actor prompted widespread criticism. The social-media giant learned Kogan had shared the data with Cambridge Analytica in 2015. At the time, Cambridge Analytica offered assurances that all of the data had been deleted, but Facebook has admitted that it recently learned that wasn’t the case

Facebook confirmed that the professor, Aleksandr Kogan, obtained the data entirely in accordance with the site’s guidelines; his only violation was sharing it with Cambridge Analytica, which was founded by Breitbart executive Steve Bannon and Hedge-fund billionaire Robert Mercer.

Facebook’s apparent inability to prevent user data from falling into the hands of a third-party organization once obtained by a seemingly benign actor prompted widespread criticism. The social-media giant learned Kogan had shared the data with Cambridge Analytica in 2015. At the time, Cambridge Analytica offered assurances that all of the data had been deleted, but Facebook has admitted that it recently learned that wasn’t the case.

The scale of the breach coupled with Facebook’s lack of awareness bolstered calls for regulation on Capitol Hill.

Senator Amy Klobuchar (D., Minn.) responded to the report by demanding that Facebook founder and CEO Mark Zuckerberg appear in front of the Senate Judiciary Committee to explain “what Facebook knew about misusing data from 50 million Americans in order to target political advertising and manipulate voters.”

Cybercrime and misuse continues to increase. Demand for cyber-security professionals is exploding nationwide.

If you want to learn more about how a cyber security certification will benefit your career, call ABCO Technology. You can reach us by phone from 9 AM to 6 PM Monday through Friday. Call today at: (310) 216-3067.

ABCO Technology is located at:

11222 South La Cienega Blvd. STE #588

Los Angeles, Ca. 90304

 

Train and certify for cyber-security today!

New York financial Cybersecurity rule creates countless jobs

On March 1, 2018, New York state has moved forward with the strongest cybersecurity regulations in the United States. All banks, financial institutions and other investment organizations who transact business with the public must have a cybersecurity officer as part of their information technology staff.

The New York regulations are nationwide because all national banks and investment offices have major branches in New York. Companies who fail to comply with this regulation will be subject to fines, which range up to 1% of assets. The 1% of assets is a large number. For example banks licensed in New York managing one trillion dollars of assets could be fined up to ten billion dollars for simply not having a cybersecurity officer as part of their staff.

Becoming a cybersecurity officer can be accomplished with proper certification and training. The best path for a financial industry cybersecurity career in this field is to first become a network administrator and then add the cybersecurity certifications to your existing credentials.

Let’s breakdown each certification down one by one.

1. Begin with the CompTIA A+ certification, which qualifies the holder to repair, maintain, install and configure computers plus devices on a network. This certification is completed in less than two months.

2. Microsoft’s MCSE or Microsoft certified Solutions Expert. This certification, which is completed in six months entitles the holder to install, maintain, configure and secure a corporate server, which is the large computer on a network distributing programs to all workstations.

3. Your next certification is the Cisco Certified Network Associate or CCNA, which qualifies the holder to install, configure and secure a corporate router. This certification is usually finished in six weeks.

4. You are now a junior level network administrator. Your first cyber security certification is the CompTIA Security +, which entitles the holder to secure a network against cyberattacks and teach other employees about cyber security. This certification is completed in six weeks.

5. The next certification is the Certified Ethical Hacker, which is completed in six weeks. This course teaches you to think like a hacker so you can defend your organization against cyberattacks. The certification allows you to have access to the latest attacks committed by hackers and how you can defend against them.

6 Your final certification is your CompTIA Linux +, which teaches you how to use the Linux operating system. Organizations large and small use Linux in the background because the operating system is difficult for hackers to penetrate and attack.

After completing these certifications, which will take you about one year, you can apply for a position in cybersecurity. The US labor department has stated that jobs will grow at an average rate of 15% a year up through 2030. This career offers strong job security, good benefits and a chance to earn an excellent living doing what you love.

If you are interested in obtaining a promising career in the fast growing field of cybersecurity, contact ABCO Technology. You can reach our campus between 9 AM and 6 PM Monday through Friday. Call our campus today at: (310) 216-3067.

Email your questions to: info@abcotechnology.edu

Financial aid is available to all students who qualify for funding.

ABCO Technology is located at:
11222 South La Cienega Blvd. STE #588
Los Angeles, Ca. 90304

Cybersecurity is an exploding jobs field. Train and certify for a position today!

9 important computer maintenance tips for beginners

abco 16 years

This article contains a brief list of nine computer maintenance tips, which will make you a valued employee at your place of work.

If you are able to perform some computer maintenance on your own, you will save both money and time.

This blog post will contain some maintenance tips, which you can perform by yourself, which will help you keep your computer running smoothly.

1 First tip make sure your computer is plugged in, connections connected and your monitor is turned on.

2 Computers often build up dust on the inside. Remove dust from your PC by using compressed air. compressed air removes dust. Perform this operation approximately every 90 days unless you are in a high dust environment. If you are in a polluted environment, then use compressed air every 30 days.

3 The disk defragmenter arranges your files in logical order. It will run automatically in Windows 7 if set up. Arranging your files in logical order will speed up your computer. The disk defrag command will defrag files up to 64MB.

If you want to defrag or arrange larger files, use this command defrag c: -w. This command will defrag all of the files in your hard drive.

4 If you want to check the condition of your hard disk, use the command, Chkdsk. This command will tell you if your disk has any errors or bad tracks.

If you want a command to fix these bad tracks and errors, use the command chkdskg/f. This command will repair your disk in many instances.

If you are using Linux, use fsck.

5 It is a good practice to delete temporary files. Deleting these files will save disk space.

6 Windows disk clean up utility will delete temporary files. Deleting these files will free up disk space, which will also increase the speed of your computer.

7 In windows you have a backup and restore command where you can restore your computer to a time when it functioned without errors.

8 It is a good practice to back up to an external hard drive. Hard drives are constantly getting cheaper. Use them, they will save you time and money.

9 When backing up files, use archive attributes, this will make it easier to find these files if you need them. You simply need to select file types to be backed up and the location where you want them to be stored.

#ABCO #Technology teaches comprehensive programs for network administration and #CyberSecurity . Possessing the knowledge to fix, maintain, install and protect networks is vital in the economy of the twenty-first century. Call our campus between 9 AM and 6 PM Monday through Friday. Call today at: (310) 216-3067

Email all questions to info@abcotechnology.edu

Financial aid is available to all students who can qualify for funding.

ABCO Technology is located at:
11222 South La Cienega Blvd. STE #588
Los Angeles, Ca. 90304

 

Get started by learning computers and networks today!

Cyber Security, your Pizza orders aren’t safe

Pizza Hut’s customers had their online accounts compromised.
Cybercrime is growing at such a rapid rate, even companies selling products as safe as pizza are under cyber-attack. The increase in cybercrime to this level continues to create more cyber security jobs.

Pizza Hut told customers by email on Saturday that some of their personal information may have been compromised. Some of those customers are angry that it took almost two weeks for the fast food chain to notify them.

According to a customer notice emailed from the pizza chain, those who placed an order on its website or mobile app between the morning of Oct. 1 and midday Oct. 2 might have had their information exposed.

The “temporary security intrusion” lasted for about 28 hours, the notice said, and it’s believed that names, billing ZIP codes, delivery addresses, email addresses and payment card information — meaning account number, expiration date and CVV numbers — were compromised. Would you like to be that special person who saved your company from a devastating cyber-attack?

A cyber-attack of this level could only occur if the network administrators didn’t use or have the correct cyber security skills.
The media fails to report that most cyber-attacks occur over time. Before the attacker intruded into Pizza Huts network, a great deal of time was spent in making login attempts, port scanning, analyzing for network weaknesses and stealing passwords. The activity could have been detected if the company had the right tools in place. The fact Pizza Hut was attacked for 28 hours clearly demonstrates someone in cyber security failed to do their job. You could be the network administrator who picks up where those cyber admins left off.

The skills we are talking about in this article involve cyber security. Courses including CompTIA Security +, Certified Ethical Hacker, Linux Fundamentals and Cisco Certified Network Associate will create a library of cyber skills, which will help any network administrator implement cyber security policies.

A thorough understanding of the computer and network servers is also required for this job. The network administrator must think of any network as an electronic eco system. Maintaining such a mindset will go a long way towards preventing the type of cyber-attack, which occurred at Pizza Hut.

If you want to have an exciting career in cyber security, please contact ABCO Technology. Reaching our Los Angeles campus is easy. We are available by telephone from 9 AM to 6 PM Monday through Friday at: (310) 216-3067.

Email all questions to info@abcotechnology.edu
Financial aid is available to all students who can qualify for funding.

ABCO Technology is located at: 11222 South La Cienega Blvd. in STE # 588
Los Angeles, Ca. 90304.

Cyber security is a growing field in information technology. Train for a cyber security position today!

×

Request Info with No Obligation

    How much is tuition?Can I get financial aid?What are my career prospects?When does it start?

    By checking this box, I give consent for ABCO Technology to use automated technology to call and/or text me at the number provided above, including my wireless number if applicable. Call us for information: 310-216-3067

    I understand & agree