Wednesday, August 22, 2007

10 tech certifications that actually mean something




Here’s a look at 10 of the technical certifications that actually mean something in today’s IT job market.

#1: MCSE

The Microsoft Certified Systems Engineer (MCSE) certification suffered a bad reputation several years back when numerous people were memorizing the answers to exam questions from “brain dumps” posted by test-takers on the Internet and obtaining the certification without any real understanding of the technology.

Microsoft responded by replacing the knowledge-based multiple-choice questions with a variety of performance-related scenario questions that make it much more difficult to cheat. The difficulty level of the questions was escalated, and the number of exams required to obtain the certification was increased to seven.

The MCSE has consequently regained respect in many corners of the IT community and is a useful certification for demonstrating your expertise in Microsoft server products.

#2: MCA

In addition to making the MCSE exams more difficult, Microsoft has created many new certifications. The Microsoft Certified Architect (MCA) is the premiere Microsoft certification, designed to identify top experts in the industry. To obtain the MCA, you must have at least three years of advanced IT architecture experience, and you have to pass a rigorous review board conducted by a panel of experts.

There are a number of MCA programs. The infrastructure and solutions MCA certifications cover broad architecture skills, but there are also more technology-specific programs for messaging and database skills. There are currently fewer than 100 MCAs in the world, making this an elite certification.

#3: CCIE

The Cisco Certified Internetwork Expert (CCIE) is widely recognized as one of the most difficult to obtain (and expensive) IT certifications. Like the MCSE/MCA, it’s a vendor-sponsored certification, focusing on Cisco’s products.

The CCIE requires that you pass both a written exam and a hands-on lab. To sit for the written exam, you must pay $300 and choose from one of several tracks: Routing and Switching, Security, Storage Networking, Voice, and Service Provider.

You must pass the written exam before you’re eligible to take the lab exam. This is an eight-hour hands-on test of your ability to configure and troubleshoot Cisco networking equipment and software. The lab exams cost $1,250 each. This does not, of course, include travel expenses that may be necessary since the labs are conducted only in certain locations.

As if all that weren’t enough, you don’t get to rest on your laurels after obtaining the certification. CCIEs must recertify every two years or the certification is suspended.

#4: CCSP

Another Cisco exam that’s popular with employers in today’s security-conscious business world is the Cisco Certified Security Professional (CCSP). It focuses on skills related to securing networks that run Cisco routers and other equipment.

You’re required to pass five written exams and must recertify every three years by passing one current exam. Before you can take the CCSP exams, you must meet the prerequisites by obtaining one of Cisco’s lower-level certifications, either the Cisco Certified Network Associate (CCNA) or the Cisco Certified Internetwork Specialist (CCIP).

#5: CISSP

Security certifications confer some of the highest-paying jobs in IT today, and one of the most well-respected non-vendor specific security certifications is the Certified Information Systems Security Professional (CISSP). The organization that grants the CISSP is the (ISC)2, which was founded in 1989 and has issued certifications to more than 50,000 IT professionals.

Exam candidates must have at least four years of direct full-time work experience as a security professional. One year of experience can be waived if you have a four-year or graduate degree in information security from an approved institution. Another unique feature of the CISSP is that you must subscribe to the (ISC)2 code of ethics to take the exam.

Exam fees vary based on geographic region. In the United States, standard registration is $599 ($499 for early registration). You must recertify every three years by obtaining at least 120 hours of continuing professional education, and you must pay a yearly fee of $85 to maintain the certification. The exam is a six-hour test consisting of 250 multiple-choice questions.

#6: SSCP

For those who can’t meet the rigorous experience requirements to sit for the CISSP, the (ISC)2 also offers the Systems Security Certified Practitioner (SSCP) certification. SSCP candidates need have only one year of direct full-time security work experience. The exam consists of 125 multiple-choice questions, and you have three hours to complete it.

Those who pass the written exam must be endorsed by someone who holds a current (ISC)2 certification and will attest to the candidate’s professional experience or by an officer of the corporation or organization that employs you (owner, CEO, managing partner, CIO, etc.). As with the CISSP, you must recertify every three years by submitting proof of continuing education credits and paying an annual maintenance fee.

#7: GSE

Another popular and well-regarded security certification is the GIAC Security Expert (GSE), offered by the SANS Software Security Institute. Before you can attempt the GSE, you must complete three lower-level certifications: GIAC Security Essentials Certification (GSEC), GIAC Certified Intrusion Analyst (GCIA), and GIAC Certified Incident Handler (GCIH).

The lower-level certifications require passing multiple-choice exams, and at least two of the three certifications must be at the “Gold” level, which requires that in addition to the written exam, you submit a technical report that’s approved to be published in the SANS Reading Room. A personal interview is also part of the GSE qualification process.

Pricing depends on whether you take the exam as part of SANS self-study or conference training programs or challenge the exam. Without the training, each lower-level exam costs $899.

#8: RHCE/RHCA

Many companies are looking to save money by switching to Linux-based servers, but they need personnel who are trained to design, deploy, and administer Linux networks. There are a number of Linux certifications out there, but the Red Hat Certified Engineer (RHCE) certification has been around since 1999 and is well respected in the industry.

The exam is performance-based. You’re required to perform actual network installation, configuration, troubleshooting, and administration tasks on a live system. You have a full day (9:00 a.m. to 5:00 p.m.) to complete it. The cost is $749.

The Red Hat Certified Architect (RHCA) is an advanced certification that requires completion of five endorsement exams, each of which costs $749 and range from two to eight hours. Like the RHCE exam, they are hands-on skills tests. You must have the RHCE certification to take the RHCA exams.

#9: ITIL

For those who aspire to management positions in IT services, the Information Technology Infrastructure Library (ITIL) certifications provide demonstration of knowledge and skills involved in that discipline. There are three certification levels: Foundation, Practitioner, and Manager.

The Manager level certification requires completion of a rigorous two-week training program, and you must have the Foundation certification and five years of IT management experience. Then, you must pass two three-hour exams consisting of essay questions.

#10: Certifications for special situations

Many specialist exams are available in IT subcategories that can be helpful to those who want to specialize in those areas. Some of these include:

  • Health Insurance Portability and Accountability Act (HIPAA) compliance certification
  • Sarbanes-Oxley (SOX) compliance certification
  • Database administration certification
  • Wireless networking certifications
  • Voice over IP certifications

In addition, for those who have little or no experience in IT, entry-level certifications such as those offered by CompTIA may help you get a foot in the door as you start your IT career.



Source from : Tech Republic

Wednesday, August 8, 2007

How to Absolutely Secure Your Data



A lot has been said in the news lately about spyware and system security.
Are you terrified of losing your notebook machine and having your entire life compromised?

What can you do to secure your computerized tax records, bank account information, credit cards, identity, etc.?

Well, here are some simple steps to be a lot more secure, so much so that if both your notebook, and your computer were physically stolen, you'd still be pretty ticked off, but not in anything like a panic.

Steps
  1. BACK UP YOUR DATA. Above all else, be sure your data is backed up, and that the backed up data is stored in such a manner that a single disaster will not destroy both copies. As a minimum, put any backup in closet in a separate room. In a water-proof and fire-proof container is better (i.e. in an envelope, in a well-burped zip lock baggy in a cheap safe or steel box with a 'fire rating'). In a separate building (like in an outbuilding or at a trusted friend or family member's home) is better, but somewhat less convenient.
  2. Get yourself an external storage device, like a USB 'Thumb Drive' for your most sensitive data. Don't buy the biggest, best, most expensive one with the largest capacity available unless you truly need it. Small, cheap and relatively valueless is best. Maybe shop for 'fast', though. If it's a FLASH format compatible with cameras, make sure it doesn't match any camera that you have, but that you do have a convenient flash reader that handles it.
  3. Treat that external drive like you would an internal drive, and back it up occasionally to CD or some other media. Keep that backup very safe, such as in a safe deposit box. Then if your home burns, at least you still have a backup of your most sensitive things.
  4. Plug that drive in ONLY to access or modify the information that is on it. Unplug it (in windows, 'Safely Remove Hardware' first, in Linux/Unix/etc. 'unmount' it first) when you are finished.
  5. Physically disconnect from the network (if paranoid) whenever the drive is to be plugged in. If your connection is wireless, unplug or disable the wireless adapter, or unplug your router, (assuming you own it).
  6. If you are not a 'computer geek', get one to help you track down your files and help you migrate them so that software runs right while accessing your files from the external drive. Then make sure the files no longer exist on your computer's hard drive(s).
  7. Find some software that will securely wipe files and histories and such in a convenient, automatic manner. Use it after using the external drive.
  8. Move all sensitive files ('TAX', 'Quicken', etc.) that formerly resided on your computer's hard disk to that external drive. Make sure the originals are removed.
  9. Type a text file onto the external drive containing a list of all of your accounts, account passwords, contact information, etc. for future reference. Keep this file up-to-date. See 'Tips' for what is meant by 'text file'.
  10. Disable and clear EVERY form of 'Password' caching you have in your computer. Especially in your web browser(s). All manner of data mining spyware is well acquainted with the location, format, encryption method, etc. of password caches, and will usually steal those first. It's nice and convenient to log in, go to your bank's web site and instantly be in and accessing your account, but ANYONE can do that just as conveniently if they gain access to your machine. Your windows password is absolutely no protection against this.
  11. Type a text file onto the external drive containing a list of all of the 'registration codes' and electronic receipts for services that you may have received as email. Keep this file/folder up-to-date. Include web sites, order numbers and whatever other pertinent information is needed to access support for those tools. Include software registration codes printed on CD sleeves, boxes, books, etc.
  12. Don't leave email in your 'inbox' that has username/account/regcode/receipts/etc. information. Save that information somewhere (copy/paste if necessary) and remove the email. Put it onto the external drive when you get around to it.
  13. Add 'private' documents and information next. Anything that won't cause you financial/identity harm, but would be embarrassing if they were read by others.
  14. Scan sensitive paper documents into files on the drive, assuming there is space. Use 'adequate' black&white scanner resolution to read their content. According to the nature of the documents, they can then be destroyed, but at least you'll still have a copy of them in case of fire or flood.
  15. Consider backing up other data from your computer onto it. You can use 'xcopy' or 'rsync' or Microsoft's 'SyncToy' or other tools to backup incrementally and keep files synchronized on the thumb drive.
  16. Consider adding some basic system recovery tools, like downloaded installations for certain applications you need to access your files, or at least links to where you can find them.
  17. When not in use, put the drive away somewhere obscure and secure, well away from your computer(s) or anything valuable.
related wikihow.com

Tuesday, August 7, 2007

Hiring good programmers: The high cost of scrimping

Came across this very interesting and enlightening piece by Frank Wiles in which he discusses various topics that we are all too familiar with pertaining to software projects.

He made a few salient points drawn from his experiences which I have summarized as follows:

  • A good programmer can be as effective as 5-10 average ones
  • Finding good programmers is hard in any language
  • Average pay rates for equivalent programmers are out of sync and are more based on language than skill
  • Seriously consider allowing telecommuting to get access to the best talents
  • It might make more sense to hire expert programmers who can learn a particular language than an expert in that language

As to perennial question as to why is it so hard to find good programmers; an offered explanation would be that when companies find good programmers, they do their utmost to keep them for as long as possible. Essentially, demand and supply takes care of a possibly limited pool of talents here.

However, what caught my interest was Frank’s assertion that simply hiring more junior programmers is often not the answer. Instead, the result often culminates in nothing more than “keeping the seat” warm in most situations.

Excerpt from: A Guide to Hiring Programmers: The High Cost of Low Quality

Companies need to stop thinking about their developers as cogs in the machine. They are more akin to artists, authors, designers, architects, scientists, or CEOs. Would your HR department rush to find the first person who would willing to take on the role of Chief Scientist, Art Director, or CEO in your company? Of course not…

They realize that having the wrong person in that seat is much worse than having the seat empty. It is absolutely the same with programming.

What about you? What are your experiences with hiring or working with programmers?


related blogs.techrepublic.com.com


Sunday, August 5, 2007

Easy way to submit your web page URL to multiple search engines

Ready to spread the word about your web page? You may want to start by submitting your pages to Internet search engines. We've created a free utility that can submit your pages to multiple search engines from a single interface. It just might save you some time and a lot of keystrokes.

To get started, type your web page URL and email address, and click "Next...". When you reach the next screen, simply select the search engines you want to submit to. To improve the appearance and possibly the position of your entry, be sure to add "keywords" and "description" meta tags to your pages before submitting to search engines.

Contiune :

Thursday, August 2, 2007

Spotlight on Vista in free online course



Microsoft's years-in-the-making new operating system has finally arrived, and with it come the inevitable questions: What’s new? What’s different? And when should you upgrade from XP? And, what's up with the new start menu? In the Windows Vista Basics free online course, you’ll learn everything you need to know about Windows Vista before taking the plunge.

Wednesday, August 1, 2007

3 tips to improve your executive presence



One of the most frequent issues clients ask me for help with is “executive presence”. It’s one of those beauty-is-in-the-eye-of-the-beholder issues to some extent. What works for some people is a turnoff to others. Approaches or styles which are considered appropriate in one organization may be the fastlane to the exit door in another company. But there are a few guidelines which are consistent across most organizations.

If you are getting feedback that your “style” or “approach” needs some polishing, odds are that clear concise direction hasn’t come with the feedback because it’s often tough to package.

These are three of the key ones on which I focus my clients;

1. Men think to talk. Women talk to think. When genders are working together it can sound like a personal relationship on occasion. Women asking the guys why they don’t participate in a discussion but then leave the meeting and have a bunch of ideas; or men asking the gals why they take so long to make a point.

The way our brains are wired, according to recent research out of UC at Berkley really makes a difference in our processing. Women are more prone to thinking aloud and using that to come to a position while men go radio silent while they are noodling inside before making a statement.

If you’re a woman in a male dominated environment, don’t go processing aloud - it can frustrate the men who just want an answer. If your a man in a female dominated environment, don’t give the appearance that you’ve shutdown by processing internally without telling those around you what you’re thinking.

2. When in Rome wear a toga. Dress codes are really vague. Most senior company leaders say that they understand that the days of suits and dresses are long gone. I’m often told by them that they “get it” that their employees want fewer rules and regs which have little to do with performance.

But later, they will make comments which are inconsistent. Behind closed doors they get a little more forthcoming. I’ve been told that capri pants are too much for a work environment or that if so and so should stop wearing pants without his underwear showing if he ever expects to get ahead. “Flip flops? Not what future leaders should be wearing.” Lots of other comments in this vein about both genders.

The real world is that the boss really wants people to follow his or her lead when it comes to standards of dress. If the boss is wearing a sports coat with Dockers, or a businessy skirt with a cotton button down collar, they are sending a signal. Disregard such signals at your own peril.

3. Take your time before you answer. Or don’t. Ever notice how some bosses make a decision in a quarter of a second while others want to have endless meetings or papers written before any movement forward?

How we make our decisions has a lot to do with our personal value systems. Some leaders have learned that any important decision requires a lot of input and noodling, while others show disdain for anything but an immediate answer and direction.

If you have one approach but your boss has the other I suggest you change. Or at least give the impression that you have. Otherwise you risk making your boss nervous - and nobody succeeds when they have a nervous boss. If the boss believes in lengthy and thoughtful consideration before coming to a conclusion but you think that fast decisions are the best; (s)he may start to worry about the caliber of your thoughts and directions. This can lead to doubt about your promotional prospects as well. Same holds true if your boss is one of those shoot-from-the-hip types and you seem to be ponderous and slow off the mark. Don’t try to teach your boss that you have a better style - it doesn’t often work.

related to tech republic