IT Training and Certification Blog by Training Planet Online Interactive Training and Certification City Live Boot Camp Classes.
Wednesday, February 29, 2012
Saturday, February 25, 2012
Organizations Engage in Certification Training to Protect Against Cyber Attacks
The recent increase in security breaches has caused many organizations to put a greater emphasis on improving the skills of the information security (IS) workforce. Research shows IS certifications lead to improved job performance and higher returns on investment.
Wednesday, February 22, 2012
Computer Hacking Forensics Investigator CHFI Version 8
World’s Most Comprehensive Computer Forensics Certification – Computer Hacking Forensics Investigator (C|HFI) Version 8 is Available Now
EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator (C|HFI) Certification Program. C|HFI is designed to equip security professionals with the necessary skills to identify an intruder’s footprints and to properly gather the required evidence to prosecute in the court of law.
January 24, 2012, Albuquerque, New Mexico – EC-Council announces the availability of the all-new Version 8 of the Computer Hacking Forensics Investigator (C|HFI) program. The program will be available on February 27th, 2012 exclusively in 20 training centers across 15 countries. The current version 4 will be still available to test out on at exam centers until August 2012.
A report by Symantec confirms that “Cybercrime has surpassed illegal trafficking as the leading criminal money maker.” With lucrative returns, low risk and difficulty of providing admissible evidence in courts of law, computer and networks become the fastest growing technology tools favored by criminals. With the cost of security breaches almost tripling every two years, organizations need to designate well-trained security professionals to perform digital discovery, evidence acquisition and analysis in an acceptable manner to ensure that they trace, reduce or eliminate key security risks that face their organizations.
EC-Council C|HFI v8 program prepares designated security professionals to track, investigate and apprehend cyber criminals from the inside and outside of the organization.
CHFI v8 presents a detailed methodological approach towards computer forensics and evidence analysis. It is a comprehensive course covering important forensic investigation scenarios that enables students to acquire hands-on experience on various forensic investigation techniques and standard forensic tools. This skillset is necessary to successfully carryout a thorough computer forensic analysis leading to prosecution of perpetrators.
Among the salient features of the C|HFI v8 are:
•Revamped courseware with more emphasis on hands-on forensic techniques and methodologies.
•A total of 22 modules showcasing the latest forensics concepts, forensic techniques and tools.
•Over 200 labs, real-life cases, evidence files and forensic challenges
•Over 500 industry standard forensics lab tools
•Lab platform based on Windows 2008 Server and Windows 7
•Choice of classroom or virtual lab environment.
•Diagrammatic representation of concepts and forensic investigation techniques
•Result-oriented, descriptive and analytical lab manual.
Jay Bavisi, President of EC-Council said, “According to PwC’s Information Security Breaches Survey 2010, nearly half of the large organizations admit that they have experienced insider threats (misuse of web and email access, misuse of confidential information, and unauthorized access to systems or data). Organizations today face a very challenging threat in the form of insider abuse that must be addressed to ensure the safety of their organizations’ digital assets.”
A C|HFI v8 professional will be able to understand:
•The process of investigating cybercrime, laws involved, and the details in obtaining a search warrant.
•Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category.
•Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence and reporting the crime scene.
•How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux.
•The process involved in forensic investigation using Access Data FTK and Encase Steganography and its techniques, Steganalysis, and image file forensics.
•Password Cracking Concepts, tools, types of password attacks and how to investigate password protected file breach
•Different types of log capturing techniques, log management, time synchronization and log capturing tools.
•How to investigate logs, network traffic, wireless attacks, and web attacks.
How to track e-mails and investigate e-mail crimes.
EC-Council has certified professionals from Fortune 500 companies as well as various IT giants, conglomerates and government agencies around the world. The corporations and agencies include: US Department of Defence, FBI, CIA, Microsoft, Symantec, Deloitte, and IBM.
For more information, please contact the nearest authorized training center or http://www.trainingplanet.com
EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator (C|HFI) Certification Program. C|HFI is designed to equip security professionals with the necessary skills to identify an intruder’s footprints and to properly gather the required evidence to prosecute in the court of law.
January 24, 2012, Albuquerque, New Mexico – EC-Council announces the availability of the all-new Version 8 of the Computer Hacking Forensics Investigator (C|HFI) program. The program will be available on February 27th, 2012 exclusively in 20 training centers across 15 countries. The current version 4 will be still available to test out on at exam centers until August 2012.
A report by Symantec confirms that “Cybercrime has surpassed illegal trafficking as the leading criminal money maker.” With lucrative returns, low risk and difficulty of providing admissible evidence in courts of law, computer and networks become the fastest growing technology tools favored by criminals. With the cost of security breaches almost tripling every two years, organizations need to designate well-trained security professionals to perform digital discovery, evidence acquisition and analysis in an acceptable manner to ensure that they trace, reduce or eliminate key security risks that face their organizations.
EC-Council C|HFI v8 program prepares designated security professionals to track, investigate and apprehend cyber criminals from the inside and outside of the organization.
CHFI v8 presents a detailed methodological approach towards computer forensics and evidence analysis. It is a comprehensive course covering important forensic investigation scenarios that enables students to acquire hands-on experience on various forensic investigation techniques and standard forensic tools. This skillset is necessary to successfully carryout a thorough computer forensic analysis leading to prosecution of perpetrators.
Among the salient features of the C|HFI v8 are:
•Revamped courseware with more emphasis on hands-on forensic techniques and methodologies.
•A total of 22 modules showcasing the latest forensics concepts, forensic techniques and tools.
•Over 200 labs, real-life cases, evidence files and forensic challenges
•Over 500 industry standard forensics lab tools
•Lab platform based on Windows 2008 Server and Windows 7
•Choice of classroom or virtual lab environment.
•Diagrammatic representation of concepts and forensic investigation techniques
•Result-oriented, descriptive and analytical lab manual.
Jay Bavisi, President of EC-Council said, “According to PwC’s Information Security Breaches Survey 2010, nearly half of the large organizations admit that they have experienced insider threats (misuse of web and email access, misuse of confidential information, and unauthorized access to systems or data). Organizations today face a very challenging threat in the form of insider abuse that must be addressed to ensure the safety of their organizations’ digital assets.”
A C|HFI v8 professional will be able to understand:
•The process of investigating cybercrime, laws involved, and the details in obtaining a search warrant.
•Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category.
•Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence and reporting the crime scene.
•How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux.
•The process involved in forensic investigation using Access Data FTK and Encase Steganography and its techniques, Steganalysis, and image file forensics.
•Password Cracking Concepts, tools, types of password attacks and how to investigate password protected file breach
•Different types of log capturing techniques, log management, time synchronization and log capturing tools.
•How to investigate logs, network traffic, wireless attacks, and web attacks.
How to track e-mails and investigate e-mail crimes.
EC-Council has certified professionals from Fortune 500 companies as well as various IT giants, conglomerates and government agencies around the world. The corporations and agencies include: US Department of Defence, FBI, CIA, Microsoft, Symantec, Deloitte, and IBM.
For more information, please contact the nearest authorized training center or http://www.trainingplanet.com
Sunday, February 19, 2012
Tuesday, February 14, 2012
Thursday, February 09, 2012
Subject Matter Experts Needed for Certification Exam Development
Subject Matter Experts Needed for Certification Exam Development
CompTIA relies on Subject Matter Experts (known in the acronym-happy world as a “SME”) to provide objectives and blueprints for our exams. These IT professionals confab with peers and our CompTIA staff at exam development workshops at our headquarters in Downers Grove, Ill. Together, this brain trust creates and reviews items associated with the latest in technologies, knowledge sets and best practices in the IT industry. We need SMEs in document imaging, cloud computing and PR repair/troubleshooting for three upcoming workshops. For both the SMEs and their employers, it’s a chance to influence the direction of the industry by taking part in creating standards. Interested in lending your expertise?
CompTIA relies on Subject Matter Experts (known in the acronym-happy world as a “SME”) to provide objectives and blueprints for our exams. These IT professionals confab with peers and our CompTIA staff at exam development workshops at our headquarters in Downers Grove, Ill. Together, this brain trust creates and reviews items associated with the latest in technologies, knowledge sets and best practices in the IT industry. We need SMEs in document imaging, cloud computing and PR repair/troubleshooting for three upcoming workshops. For both the SMEs and their employers, it’s a chance to influence the direction of the industry by taking part in creating standards. Interested in lending your expertise?
Sunday, February 05, 2012
IT Executives Anticipate Expect Good, Not Great Year in 2012
IT Executives Anticipate Expect Good, Not Great Year in 2012
In our IT Industry Outlook 2012 report, IT companies express tempered optimism heading into the first quarter of the year, though longer-term prospects look more promising. We’re projecting a worldwide IT industry growth rate of 4.5 percent in 2012, with upside potential of 7.6 percent. The forecast for the U.S. market is slightly lower. IT industry executives are most bullish on IT services and software sales this year. “We may see modest improvement in 2012, but it likely won’t be drastically different from 2011,” said Tim Herbert, vice president, research, CompTIA. In our 2012 outlook, we also identified 12 trends to watch that will make their mark on the IT industry and the broader economy in the upcoming year.
In our IT Industry Outlook 2012 report, IT companies express tempered optimism heading into the first quarter of the year, though longer-term prospects look more promising. We’re projecting a worldwide IT industry growth rate of 4.5 percent in 2012, with upside potential of 7.6 percent. The forecast for the U.S. market is slightly lower. IT industry executives are most bullish on IT services and software sales this year. “We may see modest improvement in 2012, but it likely won’t be drastically different from 2011,” said Tim Herbert, vice president, research, CompTIA. In our 2012 outlook, we also identified 12 trends to watch that will make their mark on the IT industry and the broader economy in the upcoming year.
Labels:
hot tech jobs,
IT Jobs,
where are the tech jobs
Friday, February 03, 2012
Wednesday, February 01, 2012
PMP PDU CCR Certification Requirements
Maintain Your PMP Certification Credential
What's New
Congratulations on earning your PMI certification!
Now that you are a credential holder, you need to adhere to PMI’s Continuing Certification Requirements (CCR) program. To follow the program, participate in professional development activities to earn professional development units (PDUs) and maintain your credential.
Every credential requires a specific amount of PDUs per three-year certification cycle. Since the requirements are different for each one, visit their respective pages to find out more, or read the CCR frequently asked questions.
- Project Management Professional (PMP)®
- Program Management Professional (PgMP)®
- PMI Agile Certified Practitioner (PMI-ACP)SM
- PMI Risk Management Professional (PMI-RMP)®
- PMI Scheduling Professional (PMI-SP)®
Not sure how to earn PDUs? "Watch the How Do I Earn PDUs?" segment of the CCR video, read Ways to Earn PDUs for activity ideas, or visit PMI Professional Development for a more complete listing of PDU-earning opportunities.
Ready to report your activities? Visit PMI’s online CCR system to report PDUs and view your certification records, or download a printable PDU activity reporting form.
Subscribe to:
Posts (Atom)