High Demand Skills You Should Acquire

Building the most up-to-date skills is a promising way to move your career forward. With our rapidly evolving world, there is an increase in demand for specialized skills in every industry sector. Here are 5 high-demand skills/certifications that you should acquire in second half of 2016.

Trending Career Skills

  • Data Center Management: The new data center landscape is now largely virtualized and spread across multiple, geographically distributed sites and public, private and hybrid cloud environments. It requires a new type of data center network with an architecture optimized for the cloud era and an infrastructure that gives you agility, automation, and simplicity. (source: Juniper Networks)
  • Leadership Development: Great leaders are made, not born to be. Building leadership skills helps you to look at challenges from a different perspective, build confidence and wisdom.
  • Network Automation: Right for you if you are network engineers, developers, and operators of large-scale network infrastructures. With knowledge of network automation, it is easier to boost productivity and operational efficiency while reducing risk factors.

High-Demand Certification

  • Six Sigma Green Belt: Lean Six Sigma is a business improvement method that searches for the causes of defect and eliminates these causes by focusing on outputs according to customer’s needs. As a certified Six Sigma Green Belt professional, you will have the technical and leadership capability to improve the performance of an existing industrial or commercial process.
  • ITIL Certification: The ITIL Foundation certification is a globally recognized IT Service Management certification. Certified professionals will be able to implement the best practices and bring values to a business.

The 3 Foundations of Cloud Computing

Types of Cloud ComputingCloud computing is a popular term that describes a broad range of services. As Cloud computing is rapidly evolving, it is important to understand the different components of cloud computing and how to choose the right level of cloud solutions to your unique needs.

There are 3 fundamental service models of cloud computing: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).


Infrastructure as a Service (IaaS) is the most basic of the three cloud service models.

The service provider creates the infrastructure, which becomes a self-service platform for the user for accessing, monitoring, and managing remote data center services. The benefit to IaaS is that the user does not have to invest large amounts into infrastructure and ongoing upgrades and service, while retaining operational flexibility. The down side is that this model requires the user to have a higher degree of technical knowledge. Amazon Web Service (AWS) currently dominates IaaS cloud solutions and Windows Azure is a cloud network with global reach that offers IaaS options. Look for OpenStack to become the future in IaaS and cloud computing management.


Platform as a Service (PaaS) provides an additional level of service to the user beyond the IaaS model.

In this model, the provider not only builds the infrastructure, but also provides monitoring and maintenance services for the user. Users of PaaS cloud services have access to “middleware” to assist with application development. PaaS solutions also include inherent characteristics including scalability, high availability, multi-tenancy, SaaS enabling, and other features. This allows the user to focus on what is most important to their business, their application(s). Windows Azure, for example, is an IaaS and PaaS in one cloud service, which gives you more control. It supports .NET, Node.js, PHP, Python, Java and Ruby. Developers can also use Visual Studio for creating and deploying applications.


Software as a Service (SaaS) represents the largest cloud computing market.

SaaS takes the final step of bringing the actual software application into the set of functions managed by the provider, with the user having a client interface. The application resides in the cloud itself, so most SaaS applications may be operated through a web browser without the need to install resident software on individual appliances. This allows businesses to develop software and operational requirements, but to have them written and fulfilled by a third party vendor. SaaS operates in a highly structured model and does not provide the broad flexibility of software development options available in the PaaS model. Best examples include Microsoft Office 365, Citrix GoToMeeting, Salesforce, etc…

Windows 10 Anniversary Update

Windows 10 Anniversary will make your experience a better one

More personalization, natural human-computing interaction, and bio-metric security will help you to adapt to Windows 10 with ease. Whether you upgrade early or you tend to take more time to migrate, we have some exciting features and experience improvements to share that have been revealed in the Windows 10 Insider Preview Build.

Cortana – Chatting with your new assistant even before login

For people who are new to Windows 10: While we’re getting used to be with digital assistants, from Siri on the iPhone to Alexa apps for home appliances such as Amazon Echo, Cortana is the only one built into a desktop operating system. Simply ask for assistance to set a calendar or make a note. The more you use Cortana, the more personalized your experience you will be.

For those who already have had Cortana finding files on your PC: You’ll be surprised in its evolving nature. In the coming anniversary update, Cortana will be at your service above the lock screen. Even if you don’t use all of the assistant features, you can still get tailored news and entertainment content delivered as a mini-newspaper.

Windows Ink enables you to sketch on screen and write on webpages*

Microsoft is dedicated to making pen-driven experience on PC as natural as it is on a piece of paper. Windows Ink Workplace is one of the biggest feature in the Anniversary Update that turns your PC into a canvas. With built-in experiences such as Sketchpad or Screen Sketch, it allows you to draw, capture or mark up anywhere on files across different programs and share when done. When enabled, the Microsoft Edge browser will allow you to directly highlight and take notes on webpages.

Windows 10 Screen Sketch
(source: https://blogs.windows.com/windowsexperience/2016/04/22/a-closer-look-at-windows-ink/)

*Hardware or touch-enabled required.

Windows Hello – Allowing access with enterprise-level security

Granting system access with enterprise-level security; Windows Hello uses bio-metric authentication such as fingerprints or facial recognition to secure your info without typing traditional passwords. In the forthcoming Anniversary Update, it’s expected to be tied-in with Microsoft’s Edge browser and applications where you’ll be able to have security and easy bio-metric access.

** Windows Hello requires specialized hardware, including fingerprint reader, illuminated IR sensor or other bio-metric sensors.

DWWTC Recommendations:

Still insecure about upgrading to Windows 10? Fear Not. We have related courses that help you get hands-on experience.

  • Using Microsoft Windows 10: Is a single day course guides you through major features and changes. It benefits you as an individual or your employees with a shortened learning curve and higher productivity with the new operating system.

For IT professionals, the following courses will prepare you for success:

Source: * https://www.microsoft.com/en-us/windows/upcoming-features * https://blogs.windows.com/windowsexperience/2016/04/22/a-closer-look-at-windows-ink/#67AqdHLHHTl3rHu7.99. Li-Chen Miller, Group Program Manager, Windows Ink * http://www.windowscentral.com/windows-10-anniversary-update-features. Mauro Huculak, a Microsoft Most Valuable Professional (MVP)

The Cybersecurity Threat Landscape in 2016

Cybersecurity Threat Landscape

Evolving technological advances drive the change of cyber threat landscape. Devices and applications are under development and appear on the market at more rapidly—and with those new technologies come new threats.

Not only companies and organizations—but individual users using laptops, tablets, and smartphones, who are novices in information security risks—must deal with potential cyber-attacks.

“Security is a journey, not a destination.”

Symantec CISO Patricia Titus

Hidden threats from social media sites are a continuing challenge, as social media becomes the primary source of connectivity for people around the world. More cross-platform sharing and integration will continue to make device and network security an evolving challenge at all levels.

It is essential to understand the multi-axial evolution of cyber-attacks. To combat evolving threats from a network’s core to end user devices, Fortinet recommends some advice to protect valuable assets inside the network, including:

  • Identify all legal requirements facing your specific business.
  • Ensure your data is protected, segmented and monitored.
  • Review your security posture on a regular basis.

*Source: Fortinet 2016 CTAP Threat Landscape Report

Dynamic Worldwide Recommendation

To get a foot in the door of cybersecurity, you may want to know more about:

If you are experienced in computer security but want to stay ahead of the curve in cyberspace, we recommend you consider the following certification:

Upcoming Training Events at DWWTC


About once a month we like to hold a free training events. These events are always free, typically include snacks, and are usually streamed to the web for remote viewing. The list of events keeps growing as you can see in the list below. Join us and see what DWWTC has to offer.

First Look: Digital Marketing with Social Media – Aug 21, 2014
Microsoft Tech Showcase: Windows Server 2012 R2 – First Look – Sep 2, 2014
Microsoft Tech Showcase: Microsoft Exchange Server 2013 – Sep 2, 2014
Microsoft Tech Showcase: Microsoft Windows Azure – Oct 2, 2014
Microsoft Tech Showcase: Microsoft Office365 – Oct 2, 2014
Microsoft Tech Showcase: SQL Server 2014 – November 25, 2014

This month we are offering a First Look event for our newly revised Digital Marketing with Social Media first look event. With this First Look, we hope to offer insight to the value of social media and how to engage your audience with tools like twitter, linked-in, facebook and more. Join us, August 21st for an event to help your business grow in today’s social market.

Application Security and Securing Social Media

White Hat Hacker 1

Application Security and Securing Social Media

For my first posting we will discuss Application Security and securing social media (remember to update all the applications on your systems not just the operation system). Here is an example why; Adobe had a few patches out on 1/14/14 for Acrobat and Reader, at least 1 is considered Priority 1, and the other is an updated FLASH player for all platforms. The vulnerability patched closes a hole in Flash, which if exploited, allows an attacker to remotely access to your system. Yes, that means they could remotely control your system and take anything they want. Compare this to leaving your front door open with a sign saying “Take whatever you want”. Except the victims may never even realize that it is happening.

To follow-up on our last posting on hacked social media accounts, yes, they are targeted and Facebook, Skype and Linked-in have all fallen victim to hackers, but those are just the BIG attacks that took thousands of focused attackers. The difference is that your account could be targeted and it would never get reported.

Security Tip: You don’t have to put your real birthday, age, address etc. in those accounts.

I know somebody just read this and thought; “blasphemy!” how could you lie to Mark Zuckerberg, the poor guy is just using your information to make a buck, or two.  I realize you might not get all those great “Happy Birthday” messages that you are found of but you could just get them twice a year, once on your real birthday and once one your Facebook birthday!

Remember, if you think there are unscrupulous people out there trying to get your information, you are not paranoid, you just may be a little more aware of what may be going on behind the scenes.

For Security courses offered by Dynamic Worldwide please visit:





By Brandon Huckeba, Security Instructor, DWWTC (CEH, Juniper JNCIS-Security, etc)

Social Media Accounts Security Breach

How safe is your information?


News just came out today from IT NEWS concerning the social media accounts security breach on Skype’s social media accounts.  Not surprising that social media accounts are the target of hackers everywhere.  Business and personal postings provide a wealth of information and whether or not someone can get to this information depends on the strength of the security.

Dynamic Worldwide Training Consultants  www.dwwtc.com believes in security training and offers:

Get your company ready in 2014 to ward off these types of breaches.


Skype’s social media accounts targeted by hacker group

Jan 02, 2014 12:56 am | IDG News Service

User information was not compromised, Skype said

by John Ribeiro


.Skype said its social media properties were targeted, with a group styling itself as the Syrian Electronic Army appearing to claim credit for the hacks.

“You may have noticed our social media properties were targeted today,” Skype said in a Twitter message late Wednesday. “No user info was compromised. We’re sorry for the inconvenience.”

Skype’s Twitter account, blog and Facebook page appeared to have been attacked by the SEA, a group that supports the Syrian government, according to reports. The Skype blog was still inaccessible late Wednesday and redirected users to the Skype home page.

The SEA reproduced in a Twitter message a copy of what appeared to be its message using the Skype account on Twitter. The message read: “Don’t use Microsoft emails(hotmail,outlook),They are monitoring your accounts and selling the data to the governments.More details soon #SEA.” It did not figure by late Wednesday on Skype’s Twitter feed.

SEA later posted on Twitter contact information purportedly of Microsoft CEO Steve Ballmer, stating: You can thank Microsoft for monitoring your accounts/emails using this details.

The attack on Skype’s social media accounts appears to be linked to disclosures through newspapers by former U.S. National Security Agency contractor Edward Snowden that Internet companies allegedly provide the agency real-time access to content on their servers for surveillance purposes.

The SEA has targeted previously many high-profile websites and Twitter accounts. In August, an attack purportedly by SEA on Melbourne IT, an Australian domain registrar, affected the websites of The New York Times, Twitter and other top companies.

John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John’s e-mail address is john_ribeiro@idg.com

Top 3 Reasons to Become Social Media Security Professional Certified


Meeting the Challenge to safeguard social media.

The role of Social Media Security Professional Certification is becoming increasingly important. Qualified, certified personnel are going to be necessary for social media protection.  UKI in partnership with Dynamic Worldwide Training Consultants offers a Social Media Security Professional certification powered by CompTIA. Why is this necessary?  Here are the top 3 reasons to become Social Media Security Professional certified:

1. Studies by Norton, Sourcefire, McAfee and Forrester named social media security among the top three biggest challenges for the information assurance industry in 2013.

2.  Protiviti “2013 Internal Audit Capabilities and Needs Survey Report” of more than 1,000 internal auditors revealed the 43% of respondents’ organizations have no social media policy and those that do, often fail to address basic security issues.

3. According to the “2013 IT Priorities Survey” by Protivity, CIOs view improved competency in social media security as one of the most pressing concerns as social media becomes more and more mainstream.


Social Media Attacks: The Pretty Face that Invaded a Government Agency through Social Media and How to Avoid Falling into the Same Trap

by Dr. Scott A. Wells and Justyna La Pay, Ultimate Knowledge Institute

 As we just learned from Cyberdefense specialist Aamir Lakhani, Robin Sage social media attacks are alive and well. By creating a fake social media account under the name “Emily Williams” and tricking government personnel into accepting his requests, Lakhani, a penetration tester for World Wide Technology, gained access to passwords, sensitive documents, and even the computer of the head of information security at an unnamed government agency. It took only 15 hours for Lakhani to gain over 55 connections to his targets via Facebook and Linkedin. After a short time, male employees offered to help “Emily” get a laptop, and, most surprisingly, offered her a job and gave her early access to their network. Read more about this penetration testing attack.

Insidious, simple social media attacks that rely on penetrating social networks aren’t new, either. In 2009, security specialist Thomas Ryan tricked hundreds of defense specialists into giving him sensitive information by crafting the fake online persona “Robin Sage.”

One would think that national security professionals would be more careful about who they allow into their social networks. This latest example shows how vulnerable our data networks are to these types of attacks, and underscores the value of comprehensive cyber security training programs.

Here are three ways to prepare your organization against attacks like these:
1) Avoid allowing unknown people into your social network.

Often users tend to spend too little effort to ensure that the friendship requests are from actual friends. It’s been shown that 78 percent of all Facebook users use the number of friends they have in common with their current friends as the most compelling reason to accept an incoming friendship requests.

Google Image search can be used to help validate unknown social media requests.

We all know about Google Images, but do we all know about Google’s reverse image search engine? It’s a service that allows users to search by images. No, that isn’t search for images per se — it is search by images: you input an image URL or upload an image, and then Google finds similar looking images. Although the service may sound simple, it can be very useful.

Google Image

Let’s say you have a profile picture of a person and you want to verify that they are who they claim to be.  Simply copy their picture to your desktop, drag it into the Google Image search field and there you go.  It either verifies their identity or you may find yourself in the middle of a catfish attack. A catfish attack is when an individual pretends to be someone they’re not, like in the case of “Emily Williams”. We can use Google Image search as a quick counter measure to those attacks. It is a great tool for confirming someone’s identity on Facebook, LinkedIn, Social Dating sites,  and any other venue in which a friendship is established based on a profile.

URL: http://images.google.com
Use: Google Chrome or Firefox Browser

2) A social media network is only as strong as its weakest link.

Be aware of connections in your network that may be compromised – even real associates or friends may be allowing bad actors in their network to view your data. If your friend hasn’t checked the authenticity of the friend request prior to accepting it and you’re approached by the same person, you may be dealing with a hacker.

3) Stress the importance of social media security awareness.

There are few technologies out there that will protect you from threats coming through social media. User security training is the best way to fend off attacks. Everyone can fall prey to social media attacks, even the very cyber security-savvy professional as evidenced by Lahkani’s research.

Learn more about Social Media Security Professional (SMSP) certification powered by CompTIA




About Scott A. Wells, Ph.D.

Co-Founder / Director of Training,  Ultimate Knowledge Institute (UKI) | Chief Architect of the Social Media Security Professional (SMSP) Certification Powered by CompTIA

Dr. Scott Wells is recognized throughout the industry as a world-renowned instructor and consultant known for his commanding presence in the classroom and breadth of knowledge in the world of Information Technology and Information Security. Dr. Wells achieved his doctorate in Applied Mathematics (Cryptology) and has worked for and consulted industry leading corporations such as Microsoft, Digital, and Cisco as well many other Fortune 100 companies. For the past 12 years Dr. Wells has developed and taught hundreds of Information Technology and Cybersecurity training programs for the Department of Defense, Federal Agencies and Fortune 500 enterprises. Dr. Wells leads the initiative to establish Ultimate Knowledge Institute as the industry leader in providing Social Media Security, Forensics, and Governance training as well as a renowned certification body awarding cybersecurity experts with the Social Media Security Professional (SMSP) Powered by CompTIAcertification, the Social Media Engineering & Forensics (SMEFP) and Social Media Management & Governance (SMMGP) certification.

Energy Vampires are on the loose.


Happy Halloween…. At DWWTC, we are having a “Come and Share a Bite” Vampire lunch so it really puts us in the mood!

We are on the downhill slide into the ending of 2013 and if you are in business, you are getting recharged for 2014. Pace picks up because it is very busy at work and the planning for all the holidays in the next few months makes it hectic at home. “Beware”, with everything that is going on, it seems the energy “vampires” are on the loose.

Energy Vampires can be labeled as anything that “sucks” the life right out of you. “Storybook” vampires drain the soul by depleting the blood but “real” vampires drain your spirit by depleting your positive energy.

Has stress, drama, negativity, guilt, unmet deadlines, inner conflict (mixed feelings about something), worrying about “stuff” to name a few things, made you feel tired, listless, stalled out, and not as productive as you would like? These are energy vampires at work. They alter your work and life balance and send you retreating into “dark shadows”. This is not the best place to be this time of year with so many expectations and so many things to enjoy for the memories they will create.

The best way to fight energy vampires is with garlic so let’s take a look at the power of this item.

G: GROUND yourself. This is perfect to do first thing in the morning before all the have to’s and the must do’s “creep” into your mind and heart. Close your eyes, focus on you and your breathing. Be thankful for what you have and what you can offer to someone else. Whenever possible: GO outside and walk and GO to the water (ocean, lake, river, bath, or shower). It is amazing what nature and water will do for your spirit.

A: You have heard the saying that ATTITUDE is everything and that the power of the mind is your best defense against the negative drains. Stay positive.

R: READJUST your thinking. Be the person who brings unexpected lightness and comfort to others and in return there will be more lightness and comfort brought to you. It is no longer about what is happening to you but what you can make happen for others.

L: LEARN to plan your activities to prevent running late, not meeting deadlines etc which are the things that cause stress. LEARN to LISTEN to your body. If you feel your heart racing and your stomach is in knots or you have an unsettling feeling, then take the time to change your focus. Energy goes where attention flows. Sometimes situations correct themselves or answers flow more freely if we can walk away from it for a few moments. Most of all: LAUGH, LOVE and enjoy LIFE.

I: Take an INVENTORY of the people you surround yourself with. Who are the energy providers and the energy drainers? INVESTIGATE what it would take to turn situations around to be pleasant experiences and less stressful. It is important to remember we are people of positive INDIVIDUAL power.

C: Understand that life is all about CHOICES. We CHOOSE to stay or walk away from what is draining us. If you feel your energy being sucked out, don’t hesitate to politely remove yourself from the situation for a few moments of breathing room. Those few moments can make all the difference. It helps you to read-just your feelings.

If you want to be an energy magnet, research shows that you need to pay attention to your heart. The heart acts as an emotional conductor and radiates how you are feeling to every cell in the body via the heart’s electromagnetic field; this energy field can be detected up to 5-10 feet away and is 5,000 times more powerful than the brain.

With your heart and your spirit protected by GARLIC, these vampires will have nowhere to go but away from you.