New Help is Here for Youth — Our Next Generation of Business Leaders!

business-model-woman-message-large

Carl B. Forkner

One of the underserved segments of our population consists of teens and young adults who either do not aspire to or cannot afford college or university degrees. These are the future IT Technicians, office administrators, managers, and leaders who will lead America in a rapidly-approaching future.

A new program to help youth from 16-24 years of age gain the training, insight, and certifications they need to embark on successful careers has arrived!

The Maricopa County Arizona @ Work Youth Workforce Services is a program is designed to help out of school youth ages 16-24 return to education and/or find gainful employment that can provide a career and foster independence. This year-round program tailors training plans to each individual’s specific needs and goals. The program is funded through federal grants associated with the Workforce Incentive and Opportunity Act (WIOA) grant program — this means that your training is paid for without taking a penny out of your pocket!

Here’s How it Works!

Eligibility for the Program

Youth pexels-photo-57825who are in a number of different life situations are eligible for this training grant program. Eligible students meet with an advisor and together they develop a skills and training program tailored to your needs and career goals. If you are not attending school and meet one of the broad range of eligibility criteria, you’re in! 


To be eligible, you need to meet one or more criteria, including:

  • A school dropout
  • HS diploma or GED, low-income, basic skills lacking or English Language Learner (ELL)
  • Homeless or Runaway
  • In foster care or aged out of foster care system
  • Eligible for Social Security assistance 
  • Have a disability
  • Subject to juvenile or adult justice system
  • Pregnant or parenting 
  • and/or others…

You will need to have a photo ID that includes your date of birth, a Social Security card, proof that you fit one of the categories of criteria above, and Selective Service Registration (men age 18+).

Services Provided under the Program at Dynamic Worldwide Training in Tempe startup-photos-large

We provide training across a number of skill areas that enable young adults to lay the foundation for future success!

Our programs align with many of the available services promoted by Arizona @ Work Youth Workforce Services, including:

  • Occupational skills training
  • Education as workforce preparation for specific occupations 
  • Entrepreneurial skills training
  • Supportive services, including job placement assistance and training
  • Activities to prepare for transition to higher education/certifications
  • Leadership development
  • Services on the labor market, employment statistics, and in-demand career positions in the Phoenix metropolitan area.
How to Apply for the Training Grant

Closeup of message stones on white background.Applying for the grant is easy! The first step is to contact the Dynamic Worldwide Training representative to receive your initial counseling and ensure that you have the necessary documentation and answer your initial questions about the program. 

Our program representative is Mr. Rodger Brubacher. He can be reached by e-mail at rodger.brubacher@dwwtc.com, by phone at 602.386.2045 or 866.399.8287, or by stopping by the Dynamic Worldwide Training Consultants training facility at 4500 S. Lakeshore Drive, Suite 600, Tempe, AZ 85282.

When you come in for your initial visit, we will take you on a brief tour of the training facility so you can see where the beginning of your future will start!


dwwtc-logo

arizona-at-work-maricopa-county

Dynamic Worldwide Training Consultants proudly supports Arizona @ Work Youth and Adult Workforce Services!

IT Technician – Your Ticket to a Great Career!

comptia-it-tech-blog-header

Carl Forkner, Ph.D.

Director of Training & Development

Technology devices. Across the globe, most people have one. It may be on your desk, on your lap, or in your pocket. You can use these devices for social media, taking pictures, banking, shopping, research, communicating with others, and much more. The Internet of Things, allowing you to run your security system, household appliances, and other options, once only available to the rich and famous—now it is available to the average consumer. Technology will continue to evolve—it is not going to go away.

Why is this certification so important and what can it do for you?

Continue reading “IT Technician – Your Ticket to a Great Career!”

Application Security and Securing Social Media

Application Security and Securing Social Media

For my first posting we will discuss Application Security and securing social media (remember to update all the applications on your systems not just the operation system). Here is an example why; Adobe had a few patches out on 1/14/14 for Acrobat and Reader, at least 1 is considered Priority 1, and the other is an updated FLASH player for all platforms. The vulnerability patched closes a hole in Flash, which if exploited, allows an attacker to remotely access to your system. Yes, that means they could remotely control your system and take anything they want. Compare this to leaving your front door open with a sign saying “Take whatever you want”. Except the victims may never even realize that it is happening.

To follow-up on our last posting on hacked social media accounts, yes, they are targeted and Facebook, Skype and Linked-in have all fallen victim to hackers, but those are just the BIG attacks that took thousands of focused attackers. The difference is that your account could be targeted and it would never get reported.

Security Tip: You don’t have to put your real birthday, age, address etc. in those accounts.

I know somebody just read this and thought; “blasphemy!” how could you lie to Mark Zuckerberg, the poor guy is just using your information to make a buck, or two.  I realize you might not get all those great “Happy Birthday” messages that you are found of but you could just get them twice a year, once on your real birthday and once one your Facebook birthday!

Remember, if you think there are unscrupulous people out there trying to get your information, you are not paranoid, you just may be a little more aware of what may be going on behind the scenes.

For Security courses offered by Dynamic Worldwide please visit:

http://www.dwwtc.com
http://www.dwwtc.com/eccouncil/
http://www.dwwtc.com/uki/
http://www.dwwtc.com/outline/comptia/security-plus

By Brandon Huckeba, Security Instructor, DWWTC (CEH, Juniper JNCIS-Security, etc)

Social Media Accounts Security Breach

News just came out today from IT NEWS concerning the social media accounts security breach on Skype’s social media accounts.  Not surprising that social media accounts are the target of hackers everywhere.  Business and personal postings provide a wealth of information and whether or not someone can get to this information depends on the strength of the security.

Dynamic Worldwide Training Consultants  www.dwwtc.com believes in security training and offers:

Get your company ready in 2014 to ward off these types of breaches.

 

Skype’s social media accounts targeted by hacker group

Jan 02, 2014 12:56 am | IDG News Service

User information was not compromised, Skype said

by John Ribeiro

 

.Skype said its social media properties were targeted, with a group styling itself as the Syrian Electronic Army appearing to claim credit for the hacks.

“You may have noticed our social media properties were targeted today,” Skype said in a Twitter message late Wednesday. “No user info was compromised. We’re sorry for the inconvenience.”

Skype’s Twitter account, blog and Facebook page appeared to have been attacked by the SEA, a group that supports the Syrian government, according to reports. The Skype blog was still inaccessible late Wednesday and redirected users to the Skype home page.

The SEA reproduced in a Twitter message a copy of what appeared to be its message using the Skype account on Twitter. The message read: “Don’t use Microsoft emails(hotmail,outlook),They are monitoring your accounts and selling the data to the governments.More details soon #SEA.” It did not figure by late Wednesday on Skype’s Twitter feed.

SEA later posted on Twitter contact information purportedly of Microsoft CEO Steve Ballmer, stating: You can thank Microsoft for monitoring your accounts/emails using this details.

The attack on Skype’s social media accounts appears to be linked to disclosures through newspapers by former U.S. National Security Agency contractor Edward Snowden that Internet companies allegedly provide the agency real-time access to content on their servers for surveillance purposes.

The SEA has targeted previously many high-profile websites and Twitter accounts. In August, an attack purportedly by SEA on Melbourne IT, an Australian domain registrar, affected the websites of The New York Times, Twitter and other top companies.

John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John’s e-mail address is john_ribeiro@idg.com

Top 3 Reasons to Become Social Media Security Professional Certified

Meeting the Challenge to safeguard social media.

The role of Social Media Security Professional Certification is becoming increasingly important. Qualified, certified personnel are going to be necessary for social media protection.  UKI in partnership with Dynamic Worldwide Training Consultants offers a Social Media Security Professional certification powered by CompTIA. Why is this necessary?  Here are the top 3 reasons to become Social Media Security Professional certified:

1. Studies by Norton, Sourcefire, McAfee and Forrester named social media security among the top three biggest challenges for the information assurance industry in 2013.

2.  Protiviti “2013 Internal Audit Capabilities and Needs Survey Report” of more than 1,000 internal auditors revealed the 43% of respondents’ organizations have no social media policy and those that do, often fail to address basic security issues.

3. According to the “2013 IT Priorities Survey” by Protivity, CIOs view improved competency in social media security as one of the most pressing concerns as social media becomes more and more mainstream.

http://www.dwwtc.com/uki/

Social Media Attacks: The Pretty Face that Invaded a Government Agency through Social Media and How to Avoid Falling into the Same Trap

by Dr. Scott A. Wells and Justyna La Pay, Ultimate Knowledge Institute

As we just learned from Cyberdefense specialist Aamir Lakhani, Robin Sage social media attacks are alive and well. By creating a fake social media account under the name “Emily Williams” and tricking government personnel into accepting his requests, Lakhani, a penetration tester for World Wide Technology, gained access to passwords, sensitive documents, and even the computer of the head of information security at an unnamed government agency. It took only 15 hours for Lakhani to gain over 55 connections to his targets via Facebook and Linkedin. After a short time, male employees offered to help “Emily” get a laptop, and, most surprisingly, offered her a job and gave her early access to their network. Read more about this penetration testing attack.

Insidious, simple social media attacks that rely on penetrating social networks aren’t new, either. In 2009, security specialist Thomas Ryan tricked hundreds of defense specialists into giving him sensitive information by crafting the fake online persona “Robin Sage.”

One would think that national security professionals would be more careful about who they allow into their social networks. This latest example shows how vulnerable our data networks are to these types of attacks, and underscores the value of comprehensive cyber security training programs.

Here are three ways to prepare your organization against attacks like these:
1) Avoid allowing unknown people into your social network.

Often users tend to spend too little effort to ensure that the friendship requests are from actual friends. It’s been shown that 78 percent of all Facebook users use the number of friends they have in common with their current friends as the most compelling reason to accept an incoming friendship requests.

Google Image search can be used to help validate unknown social media requests.

We all know about Google Images, but do we all know about Google’s reverse image search engine? It’s a service that allows users to search by images. No, that isn’t search for images per se — it is search by images: you input an image URL or upload an image, and then Google finds similar looking images. Although the service may sound simple, it can be very useful.

Let’s say you have a profile picture of a person and you want to verify that they are who they claim to be.  Simply copy their picture to your desktop, drag it into the Google Image search field and there you go.  It either verifies their identity or you may find yourself in the middle of a catfish attack. A catfish attack is when an individual pretends to be someone they’re not, like in the case of “Emily Williams”. We can use Google Image search as a quick counter measure to those attacks. It is a great tool for confirming someone’s identity on Facebook, LinkedIn, Social Dating sites,  and any other venue in which a friendship is established based on a profile.

URL: http://images.google.com
Use: Google Chrome or Firefox Browser

2) A social media network is only as strong as its weakest link.

Be aware of connections in your network that may be compromised – even real associates or friends may be allowing bad actors in their network to view your data. If your friend hasn’t checked the authenticity of the friend request prior to accepting it and you’re approached by the same person, you may be dealing with a hacker.

3) Stress the importance of social media security awareness.

There are few technologies out there that will protect you from threats coming through social media. User security training is the best way to fend off attacks. Everyone can fall prey to social media attacks, even the very cyber security-savvy professional as evidenced by Lahkani’s research.

Learn more about Social Media Security Professional (SMSP) certification powered by CompTIA

http://www.dwwtc.com/outline/uki/social-media-security-professional

About Scott A. Wells, Ph.D.

Co-Founder / Director of Training,  Ultimate Knowledge Institute (UKI) | Chief Architect of the Social Media Security Professional (SMSP) Certification Powered by CompTIA

Dr. Scott Wells is recognized throughout the industry as a world-renowned instructor and consultant known for his commanding presence in the classroom and breadth of knowledge in the world of Information Technology and Information Security. Dr. Wells achieved his doctorate in Applied Mathematics (Cryptology) and has worked for and consulted industry leading corporations such as Microsoft, Digital, and Cisco as well many other Fortune 100 companies. For the past 12 years Dr. Wells has developed and taught hundreds of Information Technology and Cybersecurity training programs for the Department of Defense, Federal Agencies and Fortune 500 enterprises.

Dr. Wells leads the initiative to establish Ultimate Knowledge Institute as the industry leader in providing Social Media Security, Forensics, and Governance training as well as a renowned certification body awarding cybersecurity experts with the Social Media Security Professional (SMSP) Powered by CompTIAcertification, the Social Media Engineering & Forensics (SMEFP) and Social Media Management & Governance (SMMGP) certification.

Energy Vampires are on the loose.

file00042158605

Happy Halloween…. At DWWTC, we are having a “Come and Share a Bite” Vampire lunch so it really puts us in the mood!

We are on the downhill slide into the ending of 2013 and if you are in business, you are getting recharged for 2014. Pace picks up because it is very busy at work and the planning for all the holidays in the next few months makes it hectic at home. “Beware”, with everything that is going on, it seems the energy “vampires” are on the loose.

Energy Vampires can be labeled as anything that “sucks” the life right out of you. “Storybook” vampires drain the soul by depleting the blood but “real” vampires drain your spirit by depleting your positive energy.

Has stress, drama, negativity, guilt, unmet deadlines, inner conflict (mixed feelings about something), worrying about “stuff” to name a few things, made you feel tired, listless, stalled out, and not as productive as you would like? These are energy vampires at work. They alter your work and life balance and send you retreating into “dark shadows”. This is not the best place to be this time of year with so many expectations and so many things to enjoy for the memories they will create.

The best way to fight energy vampires is with garlic so let’s take a look at the power of this item.

G: GROUND yourself. This is perfect to do first thing in the morning before all the have to’s and the must do’s “creep” into your mind and heart. Close your eyes, focus on you and your breathing. Be thankful for what you have and what you can offer to someone else. Whenever possible: GO outside and walk and GO to the water (ocean, lake, river, bath, or shower). It is amazing what nature and water will do for your spirit.

A: You have heard the saying that ATTITUDE is everything and that the power of the mind is your best defense against the negative drains. Stay positive.

R: READJUST your thinking. Be the person who brings unexpected lightness and comfort to others and in return there will be more lightness and comfort brought to you. It is no longer about what is happening to you but what you can make happen for others.

L: LEARN to plan your activities to prevent running late, not meeting deadlines etc which are the things that cause stress. LEARN to LISTEN to your body. If you feel your heart racing and your stomach is in knots or you have an unsettling feeling, then take the time to change your focus. Energy goes where attention flows. Sometimes situations correct themselves or answers flow more freely if we can walk away from it for a few moments. Most of all: LAUGH, LOVE and enjoy LIFE.

I: Take an INVENTORY of the people you surround yourself with. Who are the energy providers and the energy drainers? INVESTIGATE what it would take to turn situations around to be pleasant experiences and less stressful. It is important to remember we are people of positive INDIVIDUAL power.

C: Understand that life is all about CHOICES. We CHOOSE to stay or walk away from what is draining us. If you feel your energy being sucked out, don’t hesitate to politely remove yourself from the situation for a few moments of breathing room. Those few moments can make all the difference. It helps you to read-just your feelings.

If you want to be an energy magnet, research shows that you need to pay attention to your heart. The heart acts as an emotional conductor and radiates how you are feeling to every cell in the body via the heart’s electromagnetic field; this energy field can be detected up to 5-10 feet away and is 5,000 times more powerful than the brain.

With your heart and your spirit protected by GARLIC, these vampires will have nowhere to go but away from you.

From the DNA of Six Sigma: The Great Discovery

file6931245178661

Make the Great Discovery and achieve breakthrough
performance in everything you do.

• Research-based and proven over two decades
• A time-tested repeatable and teachable way of reasoning
• Can be implemented by nearly anyone, at any education or experience level
• Greatly increase the odds of success for achieving breakthrough
• A way of thinking that leads to improvements based on the laws of science, not
Superstition or intuition
• Allows the ordinary to reach out and achieve the extraordinary
• A way of thinking that guides individuals and work teams to courageous results
From the co-creator of Six Sigma

Dr. Mikel J. Harry, has synthesized the key lessons learned in practicing Six Sigma
over the past two decades and is revealing the common thread that can lead to
break through success for any person or work team. He calls it The Great Discovery.
It is the essence of what is required to create breakthrough. But it has been taken
out of the world of upper management and can now be applied in any area of life
for any individual or work team.

Dr.  Mikel J. Harry, Co-creator of Six Sigma and National Best-Selling Author.

“The Six Sigma Way Of Thinking (SWOT) has made
outstanding improvements at large corporations
– I want to show you how it can be applied in
your work life, practiced in your personal life and
adapted to your home life.”
A Proven Path to a higher quality life……for your personal life, home life and work life.

See a free preview of this course offered in partnership with Dynamic Worldwide Training Consultants on August 22, 2013 from 9 am to 12 pm. Register and tell your friends to register:
http://eventbrite.com/event/7776681263

ABC’s of Championship Thinking in the Workplace

Closeup of message stones on white background.

A — Avoid assumptions, have an amazing attitude. Show appreciation for the people you work with on a regular basis.
B — Be yourself. Do not be the imitation of someone else.
C — Clarify your wishes, deliver clear, concise communication, commit to your growth
D — Design and Delight in your Destiny, be determined, use due diligence to get all the facts
E — Educate yourself, give no “excuses”
F — Face your fears, Focus on your future, Forgive
G — Adopt a “Good to Great” philosophy, Goals should be twofold: DO goals that will change and BE goals that will remain timeless since these are heart and soul goals. Businesses have DO and BE goals and we should have DO and BE goals as well.
H — stay Healthy by developing a good wellness plan
I — Inspire, improve, become interdependent by helping others grow by releasing the control brought on by independence.
J — “Jump” at the challenges offered. Here is a saying of some advice given to young American Indians at the moment of their initiation.
“As you go the way of life, you will see a great chasm. JUMP it is not as wide as you think.”
K — Become a “key” employee. Remember the story of “Karate Kid” and how Miyagi portrays Karate as the challenge on taking yourself on from beginning to end, top to bottom, to rethink every aspect of you, and that Karate is not just a form of protection. He had to find out Daniel’s commitment level with a series of tasks including the famous wax on, wax off. No matter what we chose to do, Karate Kid Kommitment (pardon the use of the K, kouldn’t help it) means not walking down the middle of the road. Commitment is either yes you do it or no, you do not but there isn’t any guess so about it.
L & M — This is the LESS of and MORE of: Less negative energy, more positive energy, Less talking, more listening, Less individual, more team.
N — Networks. Highly effective people work in networks, relying on the right people for the right reasons at the right times. We are innately social people so networking is right up our alley.
O — Overcome obstacles. It takes extra effort to be “outstanding”.
P — Be professional, persist over problems, there is power in positive interactions. Research has found that marriages are much more likely to succeed when the couple experiences a 5 to 1 ratio of positive to negative interactions. Additional research also shows that workgroups with positive to negative interaction ratios greater than 3 to 1 are significantly more productive than teams that do not reach this ratio. So what does this mean for you and me? For most of us it means we need to increase the number of positive interactions we have at home and at work and reduce our negative interactions. We need to engage each other with more smiles, kind words, encouragement, gratitude, meaningful conversations, honest dialogues and sincere positive interactions. And to foster these actions we need to create personal and team rituals that help us interact more positively. If we make them part of our organizational process and individual habits they are more likely to happen.
Q — Be a person of Quality.
R — Risk, it is worth it!! Understand that life and decisions carry some measure of risk with it but without moving ahead, we run the risk of standing still.
S — “Solve” the problem, find the “Solution”. Solutions are always out there.
T — Try, try, try….Be truthful.
U — Be Un-equal. We can decide to be average and equal or become above average and unequal.
Enhanced by Zemanta

For Returning Veterans: 7 Myths and Realities of Organizations

Watch-your-thoughtsAfter 9/11, many men and women volunteered for military duty and as a nation, we are ever so grateful for their service. Now that most are coming home after many months or years of service abroad, combat duty and/or recovering from injuries, transitioning from military life to civilian life is not easy. The cultures are different and many veterans have a hard time getting jobs and keeping them because the military way of doing things doesn’t always apply or function in the civilian work environment.

We at Dynamic Worldwide have partnered with Major General Carl Schneider (Retired) to help returning veterans transition into the civilian work environment. We are offering this course free of charge to any veteran in the Phoenix valley no matter what their situation is. Here is a little tidbit of what the course covers:

 

The 7 Myths and Realities of Organizations:

Myth #1: If you work hard and “keep your nose clean” the company “will take care of you.” By “will take care of you” we mean that you’ll be considered for promotions, special training programs and job assignments that will bring you visibility.

REALITY: A company or organization is an “It” – an entity doesn’t make decisions of policy, procedures, promotions, etc. The people running the entity do. And there are few of those, but many non-management employees. A boss once said:

“Hard work will not guarantee success. Not working hard will likely guarantee failure.”

Myth #2: There is a “perfect” job.

REALITY: There is what appears to be the perfect job. This is akin to “the grass is always greener on the other side.” The problem is, you still have to mow it. What may seem to be the perfect position in another company or department, may not always stay that way. People leave, they get promoted and the situations change, sometimes from one day to another. How can you prepare for the “unexpected”? You can’t. Continue to work hard and control your expectations. Learn all you can about your job, the company and what’s expected of you.

Myth #3: You can be successful without good people skills.

REALITY:

  1. Not easily done. No matter who you are, at one point in your career, you’ll have deal with people to be successful.
  2. People rarely fall for lack of technical skills. Instead, it’s the lack of skill in knowing how to deal effectively with other people where most failures occur. One must be tolerant of differences, control opinions, have empathy, be supportive and respectful.

Myth #4: Understanding corporate and individual unit culture is not important.

REALITY: Accurately reading and understanding the culture of an organization is critical to career success.

Myth #5: To be successful, I don’t need to understand or participate in the organization’s politics.

REALITY: Yes, you do. Politics are a part of all organizations no matter what type they are – both negative and positive politics.

Myth #6: Positive visibility is not important to career success.

REALITY: Positive visibility is a must.

Positive visibility is the ability to behave and complete your work in such a way that sets you apart from others in a positive manner and gets you recognized.

  • Communications skills – speaking, writing and listening
  • Human relations skills
  • Acquire knowledge – about your job, the company, culture, people, problems, competitors, company priorities
  • Sets you apart from those who don’t have them
  • Adds to your skill base
  • Prepares you for opportunities and assignments that require them
  • Builds self-confidence

You Should Follow Us:
Follow us on LinkedInFollow us on TwitterLike us on FacebookWe're on Google+follow us on Pinterest

Enhanced by Zemanta