Centriq Training Print Logo

Monday

December 10 10:22 AM

25°F Sunny


Blog Banner Graphic

Centriq Blog Category: Security

IT Certifications 101 – Why Are Certifications Important? What Certifications Should I Get?

IT Certifications 101 – Why Are Certifications Important? What Certifications Should I Get?

August 28, 2018 in ITIL, Corporate IT Training, CompTIA, Microsoft, Security, Web Development, Cisco, EC-Council / by Sara Lamb

Nobody is born an expert programmer or cybersecurity specialist. It takes years of work to gain the skills and experience necessary to even get started choosing a field of specialized expertise.

The tech industry is one of the most dynamic fields in the modern marketplace, constantly changing, evolving, and developing new norms among its members. Simply keeping up is a full-time job, and it’s still virtually guaranteed that some new development or specialization will pop up in the most unexpected of places.Read More

CEH vs CISSP – Which Is Best?

CEH vs CISSP – Which Is Best?

July 6, 2018 in Corporate IT Training, Security / by Sara Lamb

If you asked 100 IT security professional which certification to get for both knowledge and career advancement, you’d get approximately 90 different answers. There are so many cybersecurity certifications out there that it can be tough to decide which to choose.

CEH vs CISSP

There is a consensus among cybersecurity pros that both the Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP) certifications are valuable for a career in IT security.

That leaves you with the challenge of identifying which is right for you and your career. Let me break it down to help with your decision.  Read More

How to Protect Office 365 from Ransomware

How to Protect Office 365 from Ransomware

April 4, 2018 in Corporate IT Training, Microsoft, Security / by Sara Lamb

Microsoft products and services have been victim to hackers for many years, and the recent growth in ransomware and phishing attacks has left Office 365 as a primary target. Phishing, the attempt to acquire sensitive information like usernames, passwords, and credit card details under the guise of a trusted entity in electronic communication, leaves Office 365 particularly susceptible. In an article from Redmond, Jasson Walker Jr. explains the defense necessary to reduce the risk of Office 365 falling prey to ransomware attacks. The following is excerpted from his article, Protecting Office 365 from Attack; to read the full article, follow the link at the bottom of the page.

Following the growth in ransomware and phishing attacks, it’s essential that Office 365 administrators take proactive steps to “hack-proof” their environments. A recent report released by the U.S. Department of Justice revealed that ransomware “the fastest growing malware” quadrupled last year from 1,000 attacks per day observed in 2015 to more than 4,000 daily incidents with the amounts paid in ransom expected to reach $1 billion. The 2017 Verizon “Data Breach Investigations Report” found that 43 percent of hackers used e-mail-based phishing as their method of attacks, which were associated with espionage and financial theft.Read More

How To Keep Your Smart Home Secure

How To Keep Your Smart Home Secure

March 27, 2018 in Corporate IT Training, Security / by Sara Lamb

The term “Internet of Things” (IoT) is used to describe devices that are connected to the internet when in use, and transmit information or data as part of its functional features or services that the devices provides. For instance, a thermostat that is connected to an app that allows the homeowner to control it from their phone qualifies as an IoT device. Burglar alarms that allow you monitor your home from your mobile device or desktop computer while you are away at work is a very common IoT technology that we rely on to feel secure. As we live in an increasingly connected society, it is only a matter of time before our whole lives are somehow fused with online technology.Read More

10 Things To Know About EC-Council CEH v10

10 Things To Know About EC-Council CEH v10

March 20, 2018 in Security, EC-Council / by Sara Lamb

Cyber Security as a profession is evolving, the barrier to entry is rising, the demand for Skilled Cyber professionals continues to grow, but it is being refined, demanding a higher level of skill and ability.

EC-Council raises the bar again for ethical hacking training and certification programs with the all-new CEH v10. The Certified Ethical Hacker (CEH v10) program is a trusted and respected ethical hacking training program from EC-Council that any information security professional will need.Read More

2018 IT Certification Roadmap

2018 IT Certification Roadmap

January 19, 2018 in Corporate IT Training, Microsoft, Security, Cisco, EC-Council / by Sara Lamb

The Computing Technology Industry Association (CompTIA) is a leading non-profit trade association that educates and informs current and future IT professionals who want to earn the right certifications. Filling the need for skilled IT workers is a top priority here at Centriq. After all, there are literally millions of unfilled IT jobs that cost the US economy a lot of money. If you are considering earning a professional IT certification, take a few moments to review this objective roadmap that CompTIA made that lays out the different certifications you can earn to qualify for a variety of jobs in the field.Read More

Stop searching for IT Training & let Centriq do it for you

Stop searching for IT Training & let Centriq do it for you

June 30, 2017 in Big Data, Corporate IT Training, Microsoft, Security, Web Development, Cisco, EC-Council, IBM / by Sara Lamb

As technology evolves, professionals in the field of IT need to be educated and up-to-speed on the latest versions of existing software and the capabilities of new software as soon as they become available. Blogs, YouTube videos and usergroup discussions are all great places to gain small amounts of knowledge, but to be fully immersed and hands-on experience, instructor-led IT training is the way to go.

Sometimes IT training can be hard to find (especially if the technology is uncommon or very new), which is where Centriq comes in. Not only do we have offer IT training classes on technologies like Cisco, Microsoft, ITIL, etc, but we teach Agile Bootcamps, IBM, Apache, Hadoop and Business Skills classes as well. If you need training on a technology we don’t have on our Class Schedule, we will locate a class for you that fits your schedule and budget, saving you time and money.
Read More

2017 IT Certification Roadmap

2017 IT Certification Roadmap

March 6, 2017 in Corporate IT Training, Microsoft, Security, Cisco, EC-Council / by Sara Lamb

CompTIA has created a vendor neutral IT certification roadmap that will be useful to all IT Pros.

Whether you’re just starting out or are a seasoned professional in information security, storage and data, training, software development, hardware services, infrastructure, web and mobile or IT management and strategy, this roadmap will show you the certification route that’s best.Read More

Introducing CHFI v9: The World’s Most Comprehensive Computer Forensic Certification Program

Introducing CHFI v9: The World’s Most Comprehensive Computer Forensic Certification Program

February 7, 2017 in Corporate IT Training, Security, EC-Council / by Sara Lamb

Digital technologies are changing the face of business. As organizations rapidly embracing digital technologies such as cloud, mobile, big data and IOT, the context of digital forensics is more relevant than before. The growing number of cybercrimes has changed the role of forensics from DNA to Digital.

According to the market research report published by IndustryARC, by 2020, the digital forensics market will reach 4.8 billion USD. IndustryARC also predicts that the maximum use of digital forensics is from the federal sector and this will grow from $1,097.2 million in 2015 to $2,060.5 million by 2020. The major drivers for this are increasing threats from cybercrime and terrorist attacks. Foote Partners, which tracks information technology (IT) jobs across all skill levels, projects the global demand for cyber security talent to rise to six million by 2019, with an expected shortfall of 1.5 million professionals.Read More