New Help is Here for Youth — Our Next Generation of Business Leaders!

business-model-woman-message-large

Carl B. Forkner

One of the underserved segments of our population consists of teens and young adults who either do not aspire to or cannot afford college or university degrees. These are the future IT Technicians, office administrators, managers, and leaders who will lead America in a rapidly-approaching future.

A new program to help youth from 16-24 years of age gain the training, insight, and certifications they need to embark on successful careers has arrived!

The Maricopa County Arizona @ Work Youth Workforce Services is a program is designed to help out of school youth ages 16-24 return to education and/or find gainful employment that can provide a career and foster independence. This year-round program tailors training plans to each individual’s specific needs and goals. The program is funded through federal grants associated with the Workforce Incentive and Opportunity Act (WIOA) grant program — this means that your training is paid for without taking a penny out of your pocket!

Here’s How it Works!

Eligibility for the Program

Youth pexels-photo-57825who are in a number of different life situations are eligible for this training grant program. Eligible students meet with an advisor and together they develop a skills and training program tailored to your needs and career goals. If you are not attending school and meet one of the broad range of eligibility criteria, you’re in! 

To be eligible, you need to meet one or more criteria, including:

* A school dropout                        

* HS diploma or GED, low-income, basic skills lacking or English Language Learner (ELL)

* Homeless or Runaway              

* In foster care or aged out of foster care system              

* Eligible for Social Security assistance 

* Have a disability                        

* Subject to juvenile or adult justice system                        

* Pregnant or parenting                

* and/or others…

You will need to have a photo ID that includes your date of birth, a Social Security card, proof that you fit one of the categories of criteria above, and Selective Service Registration (men age 18+).

Services Provided under the Program at Dynamic Worldwide Training in Tempestartup-photos-large

We provide training across a number of skill areas that enable young adults to lay the foundation for future success!

Our programs align with many of the available services promoted by Arizona @ Work Youth Workforce Services, including:

* Occupational skills training                            

* Education as workforce preparation for specific occupations                          

* Entrepreneurial skills training                      

* Supportive services, including job placement assistance and training          

* Activities to prepare for transition to higher education/certifications                   

* Leadership development

* Services on the labor market, employment statistics, and in-demand career positions in the Phoenix metropolitan area.

How to Apply for the Training Grant

Closeup of message stones on white background.Applying for the grant is easy! The first step is to contact the Dynamic Worldwide Training representative to receive your initial counseling and ensure that you have the necessary documentation and answer your initial questions about the program. 

Our program representative is Mr. Rodger Brubacher. He can be reached by e-mail at rodger.brubacher@dwwtc.com, by phone at 602.386.2045 or 866.399.8287, or by stopping by the Dynamic Worldwide Training Consultants training facility at 4500 S. Lakeshore Drive, Suite 600, Tempe, AZ 85282. When you come in for your initial visit, we will take you on a brief tour of the training facility so you can see where the beginning of your future will start!

 


dwwtc-logo

arizona-at-work-maricopa-county

Dynamic Worldwide Training Consultants proudly supports Arizona @ Work Youth and Adult Workforce Services!

IT Technician – Your Ticket to a Great Career!

comptia-it-tech-blog-header

Carl Forkner, Ph.D.

Director of Training & Development

 

Technology devices. Across the globe, most people have one. It may be on your desk, on your lap, or in your pocket. You can use these devices for social media, taking pictures, banking, shopping, research, communicating with others, and much more. The Internet of Things, allowing you to run your security system, household appliances, and other options, once only available to the rich and famous—now it is available to the average consumer. Technology will continue to evolve—it is not going to go away.

Why is this certification so important and what can it do for you? Continue Reading

Project Management Skills: Strengthened through Certification

pmp-header-for-blog

Mary Pendleton

Director for Consumer Education

 

Today’s job market is tough—and that is not going to change in the foreseeable future. Many professionals with managerial and leadership skills are finding that the experience they have as leaders does not carry the prestige as it once did nor does it always translate into finding that next job. Now, it is no longer acceptable to just have managed projects as part of your leadership role, you need to have achieved the Project Management Professional (PMP) certification as well. With a job market that has more professionals seeking work than there are professional positions to fill, having certification along with experience is essential to carry you to the next level along your career path.

Why is this certification so important and what can it do for you? Continue Reading

High Demand Skills You Should Acquire

Building the most up-to-date skills is a promising way to move your career forward. With our rapidly evolving world, there is an increase in demand for specialized skills in every industry sector. Here are 5 high-demand skills/certifications that you should acquire in second half of 2016.

Trending Career Skills

  • Data Center Management: The new data center landscape is now largely virtualized and spread across multiple, geographically distributed sites and public, private and hybrid cloud environments. It requires a new type of data center network with an architecture optimized for the cloud era and an infrastructure that gives you agility, automation, and simplicity. (source: Juniper Networks)
  • Leadership Development: Great leaders are made, not born to be. Building leadership skills helps you to look at challenges from a different perspective, build confidence and wisdom.
  • Network Automation: Right for you if you are network engineers, developers, and operators of large-scale network infrastructures. With knowledge of network automation, it is easier to boost productivity and operational efficiency while reducing risk factors.

High-Demand Certification

  • Six Sigma Green Belt: Lean Six Sigma is a business improvement method that searches for the causes of defect and eliminates these causes by focusing on outputs according to customer’s needs. As a certified Six Sigma Green Belt professional, you will have the technical and leadership capability to improve the performance of an existing industrial or commercial process.
  • ITIL Certification: The ITIL Foundation certification is a globally recognized IT Service Management certification. Certified professionals will be able to implement the best practices and bring values to a business.

The 3 Foundations of Cloud Computing

Types of Cloud ComputingCloud computing is a popular term that describes a broad range of services. As Cloud computing is rapidly evolving, it is important to understand the different components of cloud computing and how to choose the right level of cloud solutions to your unique needs.

There are 3 fundamental service models of cloud computing: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).

 

Infrastructure as a Service (IaaS) is the most basic of the three cloud service models.

The service provider creates the infrastructure, which becomes a self-service platform for the user for accessing, monitoring, and managing remote data center services. The benefit to IaaS is that the user does not have to invest large amounts into infrastructure and ongoing upgrades and service, while retaining operational flexibility. The down side is that this model requires the user to have a higher degree of technical knowledge. Amazon Web Service (AWS) currently dominates IaaS cloud solutions and Windows Azure is a cloud network with global reach that offers IaaS options. Look for OpenStack to become the future in IaaS and cloud computing management.

 

Platform as a Service (PaaS) provides an additional level of service to the user beyond the IaaS model.

In this model, the provider not only builds the infrastructure, but also provides monitoring and maintenance services for the user. Users of PaaS cloud services have access to “middleware” to assist with application development. PaaS solutions also include inherent characteristics including scalability, high availability, multi-tenancy, SaaS enabling, and other features. This allows the user to focus on what is most important to their business, their application(s). Windows Azure, for example, is an IaaS and PaaS in one cloud service, which gives you more control. It supports .NET, Node.js, PHP, Python, Java and Ruby. Developers can also use Visual Studio for creating and deploying applications.

 

Software as a Service (SaaS) represents the largest cloud computing market.

SaaS takes the final step of bringing the actual software application into the set of functions managed by the provider, with the user having a client interface. The application resides in the cloud itself, so most SaaS applications may be operated through a web browser without the need to install resident software on individual appliances. This allows businesses to develop software and operational requirements, but to have them written and fulfilled by a third party vendor. SaaS operates in a highly structured model and does not provide the broad flexibility of software development options available in the PaaS model. Best examples include Microsoft Office 365, Citrix GoToMeeting, Salesforce, etc…

Windows 10 Anniversary Update

Windows 10 Anniversary will make your experience a better one

More personalization, natural human-computing interaction, and bio-metric security will help you to adapt to Windows 10 with ease. Whether you upgrade early or you tend to take more time to migrate, we have some exciting features and experience improvements to share that have been revealed in the Windows 10 Insider Preview Build.

Cortana – Chatting with your new assistant even before login

For people who are new to Windows 10: While we’re getting used to be with digital assistants, from Siri on the iPhone to Alexa apps for home appliances such as Amazon Echo, Cortana is the only one built into a desktop operating system. Simply ask for assistance to set a calendar or make a note. The more you use Cortana, the more personalized your experience you will be.

For those who already have had Cortana finding files on your PC: You’ll be surprised in its evolving nature. In the coming anniversary update, Cortana will be at your service above the lock screen. Even if you don’t use all of the assistant features, you can still get tailored news and entertainment content delivered as a mini-newspaper.

Windows Ink enables you to sketch on screen and write on webpages*

Microsoft is dedicated to making pen-driven experience on PC as natural as it is on a piece of paper. Windows Ink Workplace is one of the biggest feature in the Anniversary Update that turns your PC into a canvas. With built-in experiences such as Sketchpad or Screen Sketch, it allows you to draw, capture or mark up anywhere on files across different programs and share when done. When enabled, the Microsoft Edge browser will allow you to directly highlight and take notes on webpages.

Windows 10 Screen Sketch
(source: https://blogs.windows.com/windowsexperience/2016/04/22/a-closer-look-at-windows-ink/)

*Hardware or touch-enabled required.

Windows Hello – Allowing access with enterprise-level security

Granting system access with enterprise-level security; Windows Hello uses bio-metric authentication such as fingerprints or facial recognition to secure your info without typing traditional passwords. In the forthcoming Anniversary Update, it’s expected to be tied-in with Microsoft’s Edge browser and applications where you’ll be able to have security and easy bio-metric access.

** Windows Hello requires specialized hardware, including fingerprint reader, illuminated IR sensor or other bio-metric sensors.

DWWTC Recommendations:

Still insecure about upgrading to Windows 10? Fear Not. We have related courses that help you get hands-on experience.

  • Using Microsoft Windows 10: Is a single day course guides you through major features and changes. It benefits you as an individual or your employees with a shortened learning curve and higher productivity with the new operating system.

For IT professionals, the following courses will prepare you for success:

Source: * https://www.microsoft.com/en-us/windows/upcoming-features * https://blogs.windows.com/windowsexperience/2016/04/22/a-closer-look-at-windows-ink/#67AqdHLHHTl3rHu7.99. Li-Chen Miller, Group Program Manager, Windows Ink * http://www.windowscentral.com/windows-10-anniversary-update-features. Mauro Huculak, a Microsoft Most Valuable Professional (MVP)

The Cybersecurity Threat Landscape in 2016

Cybersecurity Threat Landscape

Evolving technological advances drive the change of cyber threat landscape. Devices and applications are under development and appear on the market at more rapidly—and with those new technologies come new threats.

Not only companies and organizations—but individual users using laptops, tablets, and smartphones, who are novices in information security risks—must deal with potential cyber-attacks.

“Security is a journey, not a destination.”

Symantec CISO Patricia Titus

Hidden threats from social media sites are a continuing challenge, as social media becomes the primary source of connectivity for people around the world. More cross-platform sharing and integration will continue to make device and network security an evolving challenge at all levels.

It is essential to understand the multi-axial evolution of cyber-attacks. To combat evolving threats from a network’s core to end user devices, Fortinet recommends some advice to protect valuable assets inside the network, including:

  • Identify all legal requirements facing your specific business.
  • Ensure your data is protected, segmented and monitored.
  • Review your security posture on a regular basis.

*Source: Fortinet 2016 CTAP Threat Landscape Report

Dynamic Worldwide Recommendation

To get a foot in the door of cybersecurity, you may want to know more about:

If you are experienced in computer security but want to stay ahead of the curve in cyberspace, we recommend you consider the following certification:

Upcoming Training Events at DWWTC

events-wide

About once a month we like to hold a free training events. These events are always free, typically include snacks, and are usually streamed to the web for remote viewing. The list of events keeps growing as you can see in the list below. Join us and see what DWWTC has to offer.

First Look: Digital Marketing with Social Media – Aug 21, 2014
Microsoft Tech Showcase: Windows Server 2012 R2 – First Look – Sep 2, 2014
Microsoft Tech Showcase: Microsoft Exchange Server 2013 – Sep 2, 2014
Microsoft Tech Showcase: Microsoft Windows Azure – Oct 2, 2014
Microsoft Tech Showcase: Microsoft Office365 – Oct 2, 2014
Microsoft Tech Showcase: SQL Server 2014 – November 25, 2014

This month we are offering a First Look event for our newly revised Digital Marketing with Social Media first look event. With this First Look, we hope to offer insight to the value of social media and how to engage your audience with tools like twitter, linked-in, facebook and more. Join us, August 21st for an event to help your business grow in today’s social market.

Application Security and Securing Social Media

White Hat Hacker 1

Application Security and Securing Social Media

For my first posting we will discuss Application Security and securing social media (remember to update all the applications on your systems not just the operation system). Here is an example why; Adobe had a few patches out on 1/14/14 for Acrobat and Reader, at least 1 is considered Priority 1, and the other is an updated FLASH player for all platforms. The vulnerability patched closes a hole in Flash, which if exploited, allows an attacker to remotely access to your system. Yes, that means they could remotely control your system and take anything they want. Compare this to leaving your front door open with a sign saying “Take whatever you want”. Except the victims may never even realize that it is happening.

To follow-up on our last posting on hacked social media accounts, yes, they are targeted and Facebook, Skype and Linked-in have all fallen victim to hackers, but those are just the BIG attacks that took thousands of focused attackers. The difference is that your account could be targeted and it would never get reported.

Security Tip: You don’t have to put your real birthday, age, address etc. in those accounts.

I know somebody just read this and thought; “blasphemy!” how could you lie to Mark Zuckerberg, the poor guy is just using your information to make a buck, or two.  I realize you might not get all those great “Happy Birthday” messages that you are found of but you could just get them twice a year, once on your real birthday and once one your Facebook birthday!

Remember, if you think there are unscrupulous people out there trying to get your information, you are not paranoid, you just may be a little more aware of what may be going on behind the scenes.

For Security courses offered by Dynamic Worldwide please visit:

http://www.dwwtc.com

http://www.dwwtc.com/eccouncil/

http://www.dwwtc.com/uki/

http://www.dwwtc.com/outline/comptia/security-plus

By Brandon Huckeba, Security Instructor, DWWTC (CEH, Juniper JNCIS-Security, etc)

Social Media Accounts Security Breach

How safe is your information?

 

News just came out today from IT NEWS concerning the social media accounts security breach on Skype’s social media accounts.  Not surprising that social media accounts are the target of hackers everywhere.  Business and personal postings provide a wealth of information and whether or not someone can get to this information depends on the strength of the security.

Dynamic Worldwide Training Consultants  www.dwwtc.com believes in security training and offers:

Get your company ready in 2014 to ward off these types of breaches.

 

Skype’s social media accounts targeted by hacker group

Jan 02, 2014 12:56 am | IDG News Service

User information was not compromised, Skype said

by John Ribeiro

 

.Skype said its social media properties were targeted, with a group styling itself as the Syrian Electronic Army appearing to claim credit for the hacks.

“You may have noticed our social media properties were targeted today,” Skype said in a Twitter message late Wednesday. “No user info was compromised. We’re sorry for the inconvenience.”

Skype’s Twitter account, blog and Facebook page appeared to have been attacked by the SEA, a group that supports the Syrian government, according to reports. The Skype blog was still inaccessible late Wednesday and redirected users to the Skype home page.

The SEA reproduced in a Twitter message a copy of what appeared to be its message using the Skype account on Twitter. The message read: “Don’t use Microsoft emails(hotmail,outlook),They are monitoring your accounts and selling the data to the governments.More details soon #SEA.” It did not figure by late Wednesday on Skype’s Twitter feed.

SEA later posted on Twitter contact information purportedly of Microsoft CEO Steve Ballmer, stating: You can thank Microsoft for monitoring your accounts/emails using this details.

The attack on Skype’s social media accounts appears to be linked to disclosures through newspapers by former U.S. National Security Agency contractor Edward Snowden that Internet companies allegedly provide the agency real-time access to content on their servers for surveillance purposes.

The SEA has targeted previously many high-profile websites and Twitter accounts. In August, an attack purportedly by SEA on Melbourne IT, an Australian domain registrar, affected the websites of The New York Times, Twitter and other top companies.

John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John’s e-mail address is john_ribeiro@idg.com