00:00:00
all right now let's take a look at the
00:00:02
certifications available a a student
00:00:04
asked me to go over this specifically
00:00:07
and there are two types of
00:00:09
certifications there are there is
00:00:12
proprietary and there's nonproprietary
00:00:15
actually even though this uh slide talks
00:00:18
about proprietary first let's talk about
00:00:20
why you would want nonproprietary
00:00:22
nonproprietary is almost like an
00:00:26
agnostic look at just the concepts
00:00:29
themselves so even though for example
00:00:31
CompTIA is a pretty powerful company and
00:00:35
they have a lot of say what goes you
00:00:37
know they have a say they put together
00:00:40
these certifications the A+ net plus
00:00:42
server plus and Linux plus it's it's a
00:00:45
little bit like how a university or a
00:00:48
program puts together a a course system
00:00:52
or a curricula based on course outcomes
00:00:56
so this course is is put together and
00:01:00
and the university has specific learning
00:01:02
outcomes that they expect this course to
00:01:05
have and that applies to all of your
00:01:07
courses throughout all the universities
00:01:09
in all the in all the curriculums and
00:01:12
it's supposed to you know a student that
00:01:14
goes to the entire program is supposed
00:01:16
to get a certain amount of exposure to
00:01:20
various things and of course they're
00:01:21
going to be adaptive throughout time as
00:01:24
time progresses and that is especially
00:01:26
true in uh in technology and computer
00:01:29
science science and and information
00:01:31
technology now I can't really say this
00:01:33
about let's say accounting because you
00:01:36
know um a equals uh L uh assets equals
00:01:42
uh uh or excuse me um how should I say
00:01:46
the ultimate accounting formula is
00:01:50
assets uh equals uh liability minus
00:01:54
expenses or whatever if that makes sense
00:01:55
and that's this has been the same uh as
00:01:58
it has gone through time however um when
00:02:01
it comes to technology you have the
00:02:02
onset of virtualization the onset of the
00:02:06
in in of the increased urgency of uh of
00:02:10
exploitation so you have more concerns
00:02:12
in cyber security and you have U the
00:02:15
onset of and as we go we'll talk about
00:02:18
in devices and Technologies the onset of
00:02:21
different types of devices that uh that
00:02:23
can connect to the internet like in The
00:02:26
Internet of Things iot devices you have
00:02:29
ipv six so it was wasn't too long ago
00:02:32
but whereas for example A+ or network
00:02:35
plus was still was only dealing with the
00:02:37
ipv4 and now IPv6 has reared its ugly
00:02:41
head and we and IPv6 is basically
00:02:44
everywhere now because we live in IPv6
00:02:46
world because of things like iot because
00:02:49
of like Wireless and that wasn't
00:02:50
necessarily there 20 years ago or even
00:02:52
10 years ago and so this information in
00:02:55
nonproprietary uh that you know CompTIA
00:02:58
produces is going to change over the
00:03:00
years so uh some of these you have to
00:03:02
understand that you take once and you're
00:03:03
going to have to take them again every 3
00:03:05
years uh so we have a plus net plus
00:03:07
server plus and Linux plus of these four
00:03:10
the ones that get the most respect are
00:03:12
probably the the two is server plus and
00:03:14
definitely Linux plus Linux plus is out
00:03:17
of these four probably the one that is
00:03:20
most quote unquote worth its salt we
00:03:22
have here the uh other non proprietary
00:03:26
well actually I had this is um in
00:03:29
nonproprietary actually this should be
00:03:32
shifted over here and because red hat is
00:03:34
very proprietary uh but here we have uh
00:03:38
Linux and you could say that they're
00:03:40
nonproprietary um but they're not the
00:03:43
reason why I would say that they're non
00:03:45
proprietary is that they industry
00:03:47
standard certificates but the these uh
00:03:51
this company okay let me go back here
00:03:53
and let me maybe may maybe little make
00:03:56
it a little bit uh bigger Linux
00:03:58
professional Institute really doesn't
00:04:00
sell anything other other than you know
00:04:04
they sell services and things like that
00:04:06
um whereas proprietary you have
00:04:09
Microsoft MTA Ms mcse msca Ms mcsd those
00:04:16
are all good certificates and then we
00:04:18
have Cisco which is definitely
00:04:21
proprietary because Cisco they are I
00:04:24
mean they're like the Microsoft of
00:04:26
network devices so Cisco's been buying
00:04:29
up you know you know um other companies
00:04:31
for the last 30 years and they become a
00:04:34
giant in the world of networking so I
00:04:37
suggest you just look these up on your
00:04:39
own and and you have an idea of where to
00:04:42
start now when it comes to devices and
00:04:44
Technologies that's going to be a
00:04:46
no-brainer because as I said nowadays
00:04:48
it's BYOD D bring your own device and
00:04:51
that is because now every device is
00:04:54
connected to the internet everything
00:04:56
from inanimate objects to traditional
00:04:59
device places that we wouldn't that we
00:05:01
would normally think uh we have tablets
00:05:03
we have PCS we have laptops and all
00:05:06
kinds of modalities but now vacuum
00:05:08
cleaners and the room Buzz all of those
00:05:11
are can connect to the Internet so you
00:05:13
just have to be much more careful so
00:05:16
this is the final slide of this week and
00:05:19
I just wanted to you know kind of
00:05:21
reinforce the idea is of the fact that
00:05:24
you have to be aware of all of these
00:05:27
areas storage networking security
00:05:29
Disaster Recovery admin Management areas
00:05:32
and you have to understand when it comes
00:05:35
to you know um when it comes to your job
00:05:40
you have to set an example that you have
00:05:43
to be in charge of you know maintaining
00:05:46
reliability and stability and ensuring
00:05:49
that your assets not only can be can be
00:05:52
available to those who need it but also
00:05:55
they need to be protected from those
00:05:57
that may exploit it and even advertently
00:06:01
may make your system vulnerable so one
00:06:04
area of profound change and remember
00:06:08
anything you do any change you do as a
00:06:10
system admin will can lead to profound
00:06:14
change by what by profound change what I
00:06:17
mean is it's going to be longlasting and
00:06:21
one way you can help you know um maybe
00:06:25
deploy your policy is having a great
00:06:28
training program
00:06:30
be because one security expert told me
00:06:33
once that you you know you could you can
00:06:36
eliminate 90% or 95 or even 99% of
00:06:40
exploitations if you do one of if you do
00:06:44
two things number one you prevent your
00:06:47
clients or your workers from downloading
00:06:50
errant attachments and number two USB
00:06:54
infection so people bring in their USBS
00:06:56
from home pluging into their work PC or
00:06:58
their laptop and infect the laptop so if
00:07:01
for example you were able to have a nice
00:07:04
have a good training program that that
00:07:07
that facilitated accountability and
00:07:10
facilitated you know continual
00:07:12
Improvement in those two areas then you
00:07:15
would basically have 95 to 90% 95% of
00:07:20
your in your stability problems lick
00:07:23
okay this is Jason Myers wanting to say
00:07:26
thank you and this week we did a lot of
00:07:28
things we had we had a couple
00:07:30
demonstrations and I hope you enjoyed
00:07:32
watching them and I hope you got
00:07:34
something out of it