We are happy to announce that DWWTC has been named as a Juniper Networks Education Partner of the Year for 2017.

With so many competitors in the training sector it is always a pleasure to find out that you are the best at what you do. At DWWTC we strive to bring you the finest training available and we have the services and instructors to prove it. At DWWTC our commitment to helping students achieve their goals is what makes all of this possible.

Alongside this news comes the announcement of the Americas Partner Instructor of the Year. This year the award goes to our very own Dave Warren. Dave is not just the company owner, but he is also a shining example of our desire to bring you the best education available. Dave has also obtained the coveted Quadruple JNCIE, meaning he is a certified expert-level instructor for Juniper service provider, enterprise, security, and data center courses.

DWWTC takes great pride in the quality of our instructors and their ability effectively educate our students. This passion is driven by our CEO’s aim to “help students to succeed in their careers”. A message that echos true in everything we do.

View Our Juniper Courses

About Dynamic Worldwide Training Consultants

Dynamic Worldwide Training Consultants (DWWTC) provides a wide variety of instructor-led information technology (IT) and professional certification preparation training programs. All our programs are certified and designed to prepare students for vendor approved, industry recognized certification examinations. And with Dynamic Worldwide Training’s revolutionary virtual classroom training capability, REAL-ILT™, remote students become part of the classroom using two-way video interaction to take part in a class from anywhere in the world.

New Help is Here for Youth — Our Next Generation of Business Leaders!


Carl B. Forkner

One of the underserved segments of our population consists of teens and young adults who either do not aspire to or cannot afford college or university degrees. These are the future IT Technicians, office administrators, managers, and leaders who will lead America in a rapidly-approaching future.

A new program to help youth from 16-24 years of age gain the training, insight, and certifications they need to embark on successful careers has arrived!

The Maricopa County Arizona @ Work Youth Workforce Services is a program is designed to help out of school youth ages 16-24 return to education and/or find gainful employment that can provide a career and foster independence. This year-round program tailors training plans to each individual’s specific needs and goals. The program is funded through federal grants associated with the Workforce Incentive and Opportunity Act (WIOA) grant program — this means that your training is paid for without taking a penny out of your pocket!

Here’s How it Works!

Eligibility for the Program

Youth pexels-photo-57825who are in a number of different life situations are eligible for this training grant program. Eligible students meet with an advisor and together they develop a skills and training program tailored to your needs and career goals. If you are not attending school and meet one of the broad range of eligibility criteria, you’re in! 

To be eligible, you need to meet one or more criteria, including:

  • A school dropout
  • HS diploma or GED, low-income, basic skills lacking or English Language Learner (ELL)
  • Homeless or Runaway
  • In foster care or aged out of foster care system
  • Eligible for Social Security assistance 
  • Have a disability
  • Subject to juvenile or adult justice system
  • Pregnant or parenting 
  • and/or others…

You will need to have a photo ID that includes your date of birth, a Social Security card, proof that you fit one of the categories of criteria above, and Selective Service Registration (men age 18+).

Services Provided under the Program at Dynamic Worldwide Training in Tempe startup-photos-large

We provide training across a number of skill areas that enable young adults to lay the foundation for future success!

Our programs align with many of the available services promoted by Arizona @ Work Youth Workforce Services, including:

  • Occupational skills training
  • Education as workforce preparation for specific occupations 
  • Entrepreneurial skills training
  • Supportive services, including job placement assistance and training
  • Activities to prepare for transition to higher education/certifications
  • Leadership development
  • Services on the labor market, employment statistics, and in-demand career positions in the Phoenix metropolitan area.
How to Apply for the Training Grant

Closeup of message stones on white background.Applying for the grant is easy! The first step is to contact the Dynamic Worldwide Training representative to receive your initial counseling and ensure that you have the necessary documentation and answer your initial questions about the program. 

Our program representative is Mr. Rodger Brubacher. He can be reached by e-mail at rodger.brubacher@dwwtc.com, by phone at 602.386.2045 or 866.399.8287, or by stopping by the Dynamic Worldwide Training Consultants training facility at 4500 S. Lakeshore Drive, Suite 600, Tempe, AZ 85282.

When you come in for your initial visit, we will take you on a brief tour of the training facility so you can see where the beginning of your future will start!



Dynamic Worldwide Training Consultants proudly supports Arizona @ Work Youth and Adult Workforce Services!

IT Technician – Your Ticket to a Great Career!


Carl Forkner, Ph.D.

Director of Training & Development

Technology devices. Across the globe, most people have one. It may be on your desk, on your lap, or in your pocket. You can use these devices for social media, taking pictures, banking, shopping, research, communicating with others, and much more. The Internet of Things, allowing you to run your security system, household appliances, and other options, once only available to the rich and famous—now it is available to the average consumer. Technology will continue to evolve—it is not going to go away.

Why is this certification so important and what can it do for you?

Continue reading “IT Technician – Your Ticket to a Great Career!”

Project Management Skills: Strengthened through Certification


Mary Pendleton

Director for Consumer Education

Today’s job market is tough—and that is not going to change in the foreseeable future. Many professionals with managerial and leadership skills are finding that the experience they have as leaders does not carry the prestige as it once did nor does it always translate into finding that next job. Now, it is no longer acceptable to just have managed projects as part of your leadership role, you need to have achieved the Project Management Professional (PMP) certification as well. With a job market that has more professionals seeking work than there are professional positions to fill, having certification along with experience is essential to carry you to the next level along your career path.

Why is this certification so important and what can it do for you?

Continue reading “Project Management Skills: Strengthened through Certification”

High Demand Skills You Should Acquire

Building the most up-to-date skills is a promising way to move your career forward. With our rapidly evolving world, there is an increase in demand for specialized skills in every industry sector. Here are 5 high-demand skills/certifications that you should acquire in second half of 2016.

Trending Career Skills
  • Data Center Management: The new data center landscape is now largely virtualized and spread across multiple, geographically distributed sites and public, private and hybrid cloud environments. It requires a new type of data center network with an architecture optimized for the cloud era and an infrastructure that gives you agility, automation, and simplicity. (source: Juniper Networks)
  • Leadership Development: Great leaders are made, not born to be. Building leadership skills helps you to look at challenges from a different perspective, build confidence and wisdom.
  • Network Automation: Right for you if you are network engineers, developers, and operators of large-scale network infrastructures. With knowledge of network automation, it is easier to boost productivity and operational efficiency while reducing risk factors.
High-Demand Certification
  • Six Sigma Green Belt: Lean Six Sigma is a business improvement method that searches for the causes of defect and eliminates these causes by focusing on outputs according to customer’s needs. As a certified Six Sigma Green Belt professional, you will have the technical and leadership capability to improve the performance of an existing industrial or commercial process.
  • ITIL Certification: The ITIL Foundation certification is a globally recognized IT Service Management certification. Certified professionals will be able to implement the best practices and bring values to a business.

The 3 Foundations of Cloud Computing

Types of Cloud ComputingCloud computing is a popular term that describes a broad range of services. As Cloud computing is rapidly evolving, it is important to understand the different components of cloud computing and how to choose the right level of cloud solutions to your unique needs.

There are 3 fundamental service models of cloud computing: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).

Infrastructure as a Service (IaaS) is the most basic of the three cloud service models.

The service provider creates the infrastructure, which becomes a self-service platform for the user for accessing, monitoring, and managing remote data center services. The benefit to IaaS is that the user does not have to invest large amounts into infrastructure and ongoing upgrades and service, while retaining operational flexibility. The down side is that this model requires the user to have a higher degree of technical knowledge. Amazon Web Service (AWS) currently dominates IaaS cloud solutions and Windows Azure is a cloud network with global reach that offers IaaS options. Look for OpenStack to become the future in IaaS and cloud computing management.

Platform as a Service (PaaS) provides an additional level of service to the user beyond the IaaS model.

In this model, the provider not only builds the infrastructure, but also provides monitoring and maintenance services for the user. Users of PaaS cloud services have access to “middleware” to assist with application development. PaaS solutions also include inherent characteristics including scalability, high availability, multi-tenancy, SaaS enabling, and other features. This allows the user to focus on what is most important to their business, their application(s). Windows Azure, for example, is an IaaS and PaaS in one cloud service, which gives you more control. It supports .NET, Node.js, PHP, Python, Java and Ruby. Developers can also use Visual Studio for creating and deploying applications.

Software as a Service (SaaS) represents the largest cloud computing market.

SaaS takes the final step of bringing the actual software application into the set of functions managed by the provider, with the user having a client interface. The application resides in the cloud itself, so most SaaS applications may be operated through a web browser without the need to install resident software on individual appliances. This allows businesses to develop software and operational requirements, but to have them written and fulfilled by a third party vendor. SaaS operates in a highly structured model and does not provide the broad flexibility of software development options available in the PaaS model. Best examples include Microsoft Office 365, Citrix GoToMeeting, Salesforce, etc…

Windows 10 Anniversary Update

Windows 10 Anniversary will make your experience a better one

More personalization, natural human-computing interaction, and bio-metric security will help you to adapt to Windows 10 with ease. Whether you upgrade early or you tend to take more time to migrate, we have some exciting features and experience improvements to share that have been revealed in the Windows 10 Insider Preview Build.

Cortana – Chatting with your new assistant even before login

For people who are new to Windows 10: While we’re getting used to be with digital assistants, from Siri on the iPhone to Alexa apps for home appliances such as Amazon Echo, Cortana is the only one built into a desktop operating system. Simply ask for assistance to set a calendar or make a note. The more you use Cortana, the more personalized your experience you will be.

For those who already have had Cortana finding files on your PC: You’ll be surprised in its evolving nature. In the coming anniversary update, Cortana will be at your service above the lock screen. Even if you don’t use all of the assistant features, you can still get tailored news and entertainment content delivered as a mini-newspaper.

Windows Ink enables you to sketch on screen and write on webpages*

Microsoft is dedicated to making pen-driven experience on PC as natural as it is on a piece of paper. Windows Ink Workplace is one of the biggest feature in the Anniversary Update that turns your PC into a canvas. With built-in experiences such as Sketchpad or Screen Sketch, it allows you to draw, capture or mark up anywhere on files across different programs and share when done. When enabled, the Microsoft Edge browser will allow you to directly highlight and take notes on webpages.

Windows 10 Screen Sketch
(source: https://blogs.windows.com/windowsexperience/2016/04/22/a-closer-look-at-windows-ink/)

*Hardware or touch-enabled required.

Windows Hello – Allowing access with enterprise-level security

Granting system access with enterprise-level security; Windows Hello uses bio-metric authentication such as fingerprints or facial recognition to secure your info without typing traditional passwords. In the forthcoming Anniversary Update, it’s expected to be tied-in with Microsoft’s Edge browser and applications where you’ll be able to have security and easy bio-metric access.

** Windows Hello requires specialized hardware, including fingerprint reader, illuminated IR sensor or other bio-metric sensors.

DWWTC Recommendations:

Still insecure about upgrading to Windows 10? Fear Not. We have related courses that help you get hands-on experience.

  • Using Microsoft Windows 10: Is a single day course guides you through major features and changes. It benefits you as an individual or your employees with a shortened learning curve and higher productivity with the new operating system.

For IT professionals, the following courses will prepare you for success:

Source: * https://www.microsoft.com/en-us/windows/upcoming-features * https://blogs.windows.com/windowsexperience/2016/04/22/a-closer-look-at-windows-ink/#67AqdHLHHTl3rHu7.99. Li-Chen Miller, Group Program Manager, Windows Ink * http://www.windowscentral.com/windows-10-anniversary-update-features. Mauro Huculak, a Microsoft Most Valuable Professional (MVP)

The Cybersecurity Threat Landscape in 2016

Cybersecurity Threat Landscape

Evolving technological advances drive the change of cyber threat landscape. Devices and applications are under development and appear on the market at more rapidly—and with those new technologies come new threats.

Not only companies and organizations—but individual users using laptops, tablets, and smartphones, who are novices in information security risks—must deal with potential cyber-attacks.

“Security is a journey, not a destination.”

Symantec CISO Patricia Titus

Hidden threats from social media sites are a continuing challenge, as social media becomes the primary source of connectivity for people around the world. More cross-platform sharing and integration will continue to make device and network security an evolving challenge at all levels.

It is essential to understand the multi-axial evolution of cyber-attacks. To combat evolving threats from a network’s core to end user devices, Fortinet recommends some advice to protect valuable assets inside the network, including:

  • Identify all legal requirements facing your specific business.
  • Ensure your data is protected, segmented and monitored.
  • Review your security posture on a regular basis.

*Source: Fortinet 2016 CTAP Threat Landscape Report

Dynamic Worldwide Recommendation

To get a foot in the door of cybersecurity, you may want to know more about:

If you are experienced in computer security but want to stay ahead of the curve in cyberspace, we recommend you consider the following certification:

Upcoming Training Events at DWWTC


About once a month we like to hold a free training events. These events are always free, typically include snacks, and are usually streamed to the web for remote viewing. The list of events keeps growing as you can see in the list below. Join us and see what DWWTC has to offer.

First Look: Digital Marketing with Social Media – Aug 21, 2014
Microsoft Tech Showcase: Windows Server 2012 R2 – First Look – Sep 2, 2014
Microsoft Tech Showcase: Microsoft Exchange Server 2013 – Sep 2, 2014
Microsoft Tech Showcase: Microsoft Windows Azure – Oct 2, 2014
Microsoft Tech Showcase: Microsoft Office365 – Oct 2, 2014
Microsoft Tech Showcase: SQL Server 2014 – November 25, 2014

This month we are offering a First Look event for our newly revised Digital Marketing with Social Media first look event. With this First Look, we hope to offer insight to the value of social media and how to engage your audience with tools like twitter, linked-in, facebook and more. Join us, August 21st for an event to help your business grow in today’s social market.

Application Security and Securing Social Media

Application Security and Securing Social Media

For my first posting we will discuss Application Security and securing social media (remember to update all the applications on your systems not just the operation system). Here is an example why; Adobe had a few patches out on 1/14/14 for Acrobat and Reader, at least 1 is considered Priority 1, and the other is an updated FLASH player for all platforms. The vulnerability patched closes a hole in Flash, which if exploited, allows an attacker to remotely access to your system. Yes, that means they could remotely control your system and take anything they want. Compare this to leaving your front door open with a sign saying “Take whatever you want”. Except the victims may never even realize that it is happening.

To follow-up on our last posting on hacked social media accounts, yes, they are targeted and Facebook, Skype and Linked-in have all fallen victim to hackers, but those are just the BIG attacks that took thousands of focused attackers. The difference is that your account could be targeted and it would never get reported.

Security Tip: You don’t have to put your real birthday, age, address etc. in those accounts.

I know somebody just read this and thought; “blasphemy!” how could you lie to Mark Zuckerberg, the poor guy is just using your information to make a buck, or two.  I realize you might not get all those great “Happy Birthday” messages that you are found of but you could just get them twice a year, once on your real birthday and once one your Facebook birthday!

Remember, if you think there are unscrupulous people out there trying to get your information, you are not paranoid, you just may be a little more aware of what may be going on behind the scenes.

For Security courses offered by Dynamic Worldwide please visit:


By Brandon Huckeba, Security Instructor, DWWTC (CEH, Juniper JNCIS-Security, etc)