10 Certifications Every IT Pro Needs to Have

CED Solutions provides certification training classes on every one of these highly desired certifications.  by Donald E. Sears [singlepic id=883 w=320 h=240 float=right] No. 10: Cert: Security+ Organization: CompTIA Purpose: Knowledge of system security, network infrastructure, access control and organizational security. No. 9: Cert: ITIL (IT Infrastructure Library) Organization: ITIL Certification Management Board (ICMB) Purpose: To show knowledge of IT operational best practices. There are three tiers of ITIL: Foundation, Practitioner and Manager. No. 8: Cert: MCSA (Microsoft Certified Systems Administrator) Organization: Microsoft Purpose: Demonstrated expertise in MS systems troubleshooting networks in [...]

Read more...

CompTIA Changes Certification Requirements – CED Solutions Provides Certification Training

[singlepic id=883 w=320 h=240 float=right]CompTIA faces backlash from technology certification holders after informing those with supposedly lifetime A+, Network+ and Security+ certifications that they would have to retroactively pay for renewals. CompTIA has since retracted the changes for anyone who receives one of those certifications in 2010, but come 2011 the renewal process will be in place. In December, the Computing Technology IndustryAssociation decided lifetime A+, Network+ and Security+ certifications were going to retroactively require renewal every three years. The [...]

Read more...

Hot Security Courses Are in High Demand – CEH CHFI CISSP

[singlepic id=834 w=320 h=240 float=right]CED Solutions has several high-in-demand security certification courses coming up shortly.  These courses are provided by EC  Council and are some of the premium level courses to provide information leading to the protection of company networks. Security Managers and security technical employees should attend these courses: CEH – Defend your network against hackers by mastering the hacking technologies and become a Certified Ethical Hacker.  The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking [...]

Read more...

Computer Users Should Fear These in 2010

[singlepic id=839 w=320 h=240 float=right]About once a year, computer security news leaps out of the technology section and onto the front page and the top of network news broadcasts.  This year, the day was April Fools’ Day, as the Conficker worm became the latest malicious program with the power to eat the Internet.  Somehow, we soldiered on, most of us without ever having to kick on the emergency power generators or dig into that can of spam in the [...]

Read more...

Conficker Set to Activate Tomorrow – Protect Your Systems Today!

[singlepic id=830 w=320 h=240 float=right]On Wednesday, April 1, the latest variant of the Conficker (also known as Downadup and Kido) work will download new instructions. The sophistication of this worm and its botnet have many concerned, although the amount of legitimate concern is a matter of debate. To prevent Conficker from activating, read the information from PC Mag Blogs at: http://blogs.pcmag.com/securitywatch/2009/03/the_most_important_things_to_k.php

Read more...