Wk3 pt3 - Final Thoughts

00:07:36
https://www.youtube.com/watch?v=5JAFNfuu-pA

Résumé

TLDRThe video highlights the essential knowledge technology students must acquire regarding certification types: proprietary (like Microsoft and Cisco) and nonproprietary (like CompTIA). Nonproprietary certifications provide an adaptable foundation that reflects current technology trends, especially in cybersecurity and the proliferation of internet-connected devices. Certifications require periodic renewal, emphasizing lifelong learning in the field. Furthermore, the discussion touches upon security risks in workplaces caused by USB infections and unsafe downloads, advocating for robust training programs to mitigate these risks and ensure reliability and security in IT management.

A retenir

  • 📝 Understand the two certification types: proprietary & nonproprietary.
  • 📜 CompTIA offers valuable nonproprietary certifications.
  • 🔒 Cybersecurity is crucial in today's technology landscape.
  • 💻 BYOD increases connectivity but entails security risks.
  • 🛡 Regular training can significantly mitigate vulnerabilities.
  • 🔄 Nonproprietary certifications evolve with technology.
  • 🚫 Attachments and USB devices are common infection sources.
  • 🔍 Linux+ is one of the most respected nonproprietary certs.
  • 🎓 Lifelong learning is essential in tech fields.
  • ⚠️ Changes in systems can lead to major impacts.

Chronologie

  • 00:00:00 - 00:07:36

    This segment discusses the two types of certifications relevant for students: proprietary and non-proprietary. Non-proprietary certifications, such as those from CompTIA, provide an agnostic look at foundational concepts, emphasizing that they may need to be renewed every three years due to changes in technology. The importance of certifications like A+, Network+, Server+, and particularly Linux+ is highlighted, with Linux+ being regarded as particularly valuable in the industry. The contrast with proprietary certifications from companies like Microsoft and Cisco, which are more specialized and possibly rigid, is also noted. Additionally, the emergence of devices connected to the internet is mentioned as a critical consideration for current IT professionals. The segment concludes by stressing the importance of understanding various technology areas and the responsibility of system administrators to maintain security and reliability in their networks.

Carte mentale

Vidéo Q&R

  • What are the two types of certifications available?

    The two types of certifications are proprietary and nonproprietary.

  • What is an example of a nonproprietary certification?

    CompTIA A+, Network+, Server+, and Linux+ are examples of nonproprietary certifications.

  • Why are nonproprietary certifications important?

    They provide an agnostic look at the concepts and adapt to technological changes over time.

  • Which nonproprietary certification is considered most valuable?

    Linux+ is considered one of the most valuable certifications.

  • What is the impact of technology on certifications?

    Technology evolves rapidly, requiring regular updates and adaptations in certification programs.

  • What account for high security risks in organizations?

    USB infections and malicious attachments can lead to significant security vulnerabilities.

  • How can organizations reduce security risks?

    Implementing a good training program can help prevent issues related to downloading unsafe attachments and USB infections.

  • What does BYOD stand for?

    BYOD stands for Bring Your Own Device.

  • What is the importance of training programs in IT security?

    Training programs can facilitate accountability and continuous improvement in security practices.

Voir plus de résumés vidéo

Accédez instantanément à des résumés vidéo gratuits sur YouTube grâce à l'IA !
Sous-titres
en
Défilement automatique:
  • 00:00:00
    all right now let's take a look at the
  • 00:00:02
    certifications available a a student
  • 00:00:04
    asked me to go over this specifically
  • 00:00:07
    and there are two types of
  • 00:00:09
    certifications there are there is
  • 00:00:12
    proprietary and there's nonproprietary
  • 00:00:15
    actually even though this uh slide talks
  • 00:00:18
    about proprietary first let's talk about
  • 00:00:20
    why you would want nonproprietary
  • 00:00:22
    nonproprietary is almost like an
  • 00:00:26
    agnostic look at just the concepts
  • 00:00:29
    themselves so even though for example
  • 00:00:31
    CompTIA is a pretty powerful company and
  • 00:00:35
    they have a lot of say what goes you
  • 00:00:37
    know they have a say they put together
  • 00:00:40
    these certifications the A+ net plus
  • 00:00:42
    server plus and Linux plus it's it's a
  • 00:00:45
    little bit like how a university or a
  • 00:00:48
    program puts together a a course system
  • 00:00:52
    or a curricula based on course outcomes
  • 00:00:56
    so this course is is put together and
  • 00:01:00
    and the university has specific learning
  • 00:01:02
    outcomes that they expect this course to
  • 00:01:05
    have and that applies to all of your
  • 00:01:07
    courses throughout all the universities
  • 00:01:09
    in all the in all the curriculums and
  • 00:01:12
    it's supposed to you know a student that
  • 00:01:14
    goes to the entire program is supposed
  • 00:01:16
    to get a certain amount of exposure to
  • 00:01:20
    various things and of course they're
  • 00:01:21
    going to be adaptive throughout time as
  • 00:01:24
    time progresses and that is especially
  • 00:01:26
    true in uh in technology and computer
  • 00:01:29
    science science and and information
  • 00:01:31
    technology now I can't really say this
  • 00:01:33
    about let's say accounting because you
  • 00:01:36
    know um a equals uh L uh assets equals
  • 00:01:42
    uh uh or excuse me um how should I say
  • 00:01:46
    the ultimate accounting formula is
  • 00:01:50
    assets uh equals uh liability minus
  • 00:01:54
    expenses or whatever if that makes sense
  • 00:01:55
    and that's this has been the same uh as
  • 00:01:58
    it has gone through time however um when
  • 00:02:01
    it comes to technology you have the
  • 00:02:02
    onset of virtualization the onset of the
  • 00:02:06
    in in of the increased urgency of uh of
  • 00:02:10
    exploitation so you have more concerns
  • 00:02:12
    in cyber security and you have U the
  • 00:02:15
    onset of and as we go we'll talk about
  • 00:02:18
    in devices and Technologies the onset of
  • 00:02:21
    different types of devices that uh that
  • 00:02:23
    can connect to the internet like in The
  • 00:02:26
    Internet of Things iot devices you have
  • 00:02:29
    ipv six so it was wasn't too long ago
  • 00:02:32
    but whereas for example A+ or network
  • 00:02:35
    plus was still was only dealing with the
  • 00:02:37
    ipv4 and now IPv6 has reared its ugly
  • 00:02:41
    head and we and IPv6 is basically
  • 00:02:44
    everywhere now because we live in IPv6
  • 00:02:46
    world because of things like iot because
  • 00:02:49
    of like Wireless and that wasn't
  • 00:02:50
    necessarily there 20 years ago or even
  • 00:02:52
    10 years ago and so this information in
  • 00:02:55
    nonproprietary uh that you know CompTIA
  • 00:02:58
    produces is going to change over the
  • 00:03:00
    years so uh some of these you have to
  • 00:03:02
    understand that you take once and you're
  • 00:03:03
    going to have to take them again every 3
  • 00:03:05
    years uh so we have a plus net plus
  • 00:03:07
    server plus and Linux plus of these four
  • 00:03:10
    the ones that get the most respect are
  • 00:03:12
    probably the the two is server plus and
  • 00:03:14
    definitely Linux plus Linux plus is out
  • 00:03:17
    of these four probably the one that is
  • 00:03:20
    most quote unquote worth its salt we
  • 00:03:22
    have here the uh other non proprietary
  • 00:03:26
    well actually I had this is um in
  • 00:03:29
    nonproprietary actually this should be
  • 00:03:32
    shifted over here and because red hat is
  • 00:03:34
    very proprietary uh but here we have uh
  • 00:03:38
    Linux and you could say that they're
  • 00:03:40
    nonproprietary um but they're not the
  • 00:03:43
    reason why I would say that they're non
  • 00:03:45
    proprietary is that they industry
  • 00:03:47
    standard certificates but the these uh
  • 00:03:51
    this company okay let me go back here
  • 00:03:53
    and let me maybe may maybe little make
  • 00:03:56
    it a little bit uh bigger Linux
  • 00:03:58
    professional Institute really doesn't
  • 00:04:00
    sell anything other other than you know
  • 00:04:04
    they sell services and things like that
  • 00:04:06
    um whereas proprietary you have
  • 00:04:09
    Microsoft MTA Ms mcse msca Ms mcsd those
  • 00:04:16
    are all good certificates and then we
  • 00:04:18
    have Cisco which is definitely
  • 00:04:21
    proprietary because Cisco they are I
  • 00:04:24
    mean they're like the Microsoft of
  • 00:04:26
    network devices so Cisco's been buying
  • 00:04:29
    up you know you know um other companies
  • 00:04:31
    for the last 30 years and they become a
  • 00:04:34
    giant in the world of networking so I
  • 00:04:37
    suggest you just look these up on your
  • 00:04:39
    own and and you have an idea of where to
  • 00:04:42
    start now when it comes to devices and
  • 00:04:44
    Technologies that's going to be a
  • 00:04:46
    no-brainer because as I said nowadays
  • 00:04:48
    it's BYOD D bring your own device and
  • 00:04:51
    that is because now every device is
  • 00:04:54
    connected to the internet everything
  • 00:04:56
    from inanimate objects to traditional
  • 00:04:59
    device places that we wouldn't that we
  • 00:05:01
    would normally think uh we have tablets
  • 00:05:03
    we have PCS we have laptops and all
  • 00:05:06
    kinds of modalities but now vacuum
  • 00:05:08
    cleaners and the room Buzz all of those
  • 00:05:11
    are can connect to the Internet so you
  • 00:05:13
    just have to be much more careful so
  • 00:05:16
    this is the final slide of this week and
  • 00:05:19
    I just wanted to you know kind of
  • 00:05:21
    reinforce the idea is of the fact that
  • 00:05:24
    you have to be aware of all of these
  • 00:05:27
    areas storage networking security
  • 00:05:29
    Disaster Recovery admin Management areas
  • 00:05:32
    and you have to understand when it comes
  • 00:05:35
    to you know um when it comes to your job
  • 00:05:40
    you have to set an example that you have
  • 00:05:43
    to be in charge of you know maintaining
  • 00:05:46
    reliability and stability and ensuring
  • 00:05:49
    that your assets not only can be can be
  • 00:05:52
    available to those who need it but also
  • 00:05:55
    they need to be protected from those
  • 00:05:57
    that may exploit it and even advertently
  • 00:06:01
    may make your system vulnerable so one
  • 00:06:04
    area of profound change and remember
  • 00:06:08
    anything you do any change you do as a
  • 00:06:10
    system admin will can lead to profound
  • 00:06:14
    change by what by profound change what I
  • 00:06:17
    mean is it's going to be longlasting and
  • 00:06:21
    one way you can help you know um maybe
  • 00:06:25
    deploy your policy is having a great
  • 00:06:28
    training program
  • 00:06:30
    be because one security expert told me
  • 00:06:33
    once that you you know you could you can
  • 00:06:36
    eliminate 90% or 95 or even 99% of
  • 00:06:40
    exploitations if you do one of if you do
  • 00:06:44
    two things number one you prevent your
  • 00:06:47
    clients or your workers from downloading
  • 00:06:50
    errant attachments and number two USB
  • 00:06:54
    infection so people bring in their USBS
  • 00:06:56
    from home pluging into their work PC or
  • 00:06:58
    their laptop and infect the laptop so if
  • 00:07:01
    for example you were able to have a nice
  • 00:07:04
    have a good training program that that
  • 00:07:07
    that facilitated accountability and
  • 00:07:10
    facilitated you know continual
  • 00:07:12
    Improvement in those two areas then you
  • 00:07:15
    would basically have 95 to 90% 95% of
  • 00:07:20
    your in your stability problems lick
  • 00:07:23
    okay this is Jason Myers wanting to say
  • 00:07:26
    thank you and this week we did a lot of
  • 00:07:28
    things we had we had a couple
  • 00:07:30
    demonstrations and I hope you enjoyed
  • 00:07:32
    watching them and I hope you got
  • 00:07:34
    something out of it
Tags
  • certifications
  • nonproprietary
  • proprietary
  • cybersecurity
  • CompTIA
  • Linux+
  • BYOD
  • training programs
  • IT security
  • technology