[M1S2-POWERPOINT] Certification and Technology Trends.pdf

Full Transcript

MODULE 1 INTRODUCTION TO THE PROFESSION SUBTOPIC 2 CERTIFICATION AND TECHNOLOGY TRENDS Understand the different jobs available in an IT department. Identify the benefits of computing-related certification for employers, Identify the different areas in IT certification. Und...

MODULE 1 INTRODUCTION TO THE PROFESSION SUBTOPIC 2 CERTIFICATION AND TECHNOLOGY TRENDS Understand the different jobs available in an IT department. Identify the benefits of computing-related certification for employers, Identify the different areas in IT certification. Understand and be aware of different Emerging Technologies What is certification? Process of verifying technical knowledge in a particular area. Proficiency is acknowledged with certificate. Enhances employee’s career, provides better standing as industry professional, and higher salaries and bonuses Vendors provide access to technical information, advanced training, and discounts on publications and tools How does certification benefit customers, employers, and industry? Customers receive better service from employees with certification(s) Employers benefit from more productive and knowledgeable workers Certification is a form of industry self-regulation Institute for Certification of Computer Professionals (ICCP) defines standards designed to raise competence level for computer industry What are factors to consider in choosing a certification? What options are available to prepare for certification? Self-study Online training classes Instructor-led training Web resources What are examinations like? Taken using computers Some are multiple choice, others are skill based With computerized adaptive testing, the tests analyze a person’s responses while taking the test What are application software certifications? Focus on knowledge of Sometimes called application software end-user certifications Microsoft Microsoft Adobe Office Certified Certified Desktop Support Specialist Expert Technician (MOS) (MCDST) sponsored by sponsored by sponsored by Adobe Microsoft Microsoft Systems IBM Certified Macromedia Professional Certified for Lotus Professional Software sponsored by sponsored by Macromedia IBM What are operating system certifications? Focus on particular skills—user, Differing levels of operator, system administrator, and system engineer certification Microsoft Certified Red Hat Certified Linux Certified Systems Professional Engineer Administrator (CNP) (RHCE) (MCSA) sponsored sponsored sponsored by by Novell by Red Hat Red Hat Microsoft Certified Sun Certified IBM Technician System Certified (RHCT) Administrator Specialist sponsored sponsored by sponsored by Red Hat Sun by IBM What are programming certifications? Recognition of programming Broadens knowledge and skill training base Certified IBM Certified Microsoft Software Solution Certified Development Developer Professional Professional sponsored Developer (CSDP) by IBM (MCPD) sponsored by sponsored IEEE by Microsoft Computer Society Sun Certified Sun Certified Sun Certified Enterprise Developer Programmer Architect sponsored sponsored sponsored by Sun by Sun by Sun What are hardware certifications? Recognition of general knowledge of hardware and controlling Can be narrowly or software needed to set up, broadly focused maintain, and repair a computer A+ IBM NACSE sponsored by eServer Network Technician Computing Certified (NNT) Technology Specialist sponsored by Industry sponsored by National Association IBM Association of (CompTIA) Communication Systems Engineers (NACSE) What are networking certifications? Awarded to professionals who demonstrate expertise in planning, installing, managing, and troubleshooting a network Certified Novell Certified Novell Cisco Certified Administrator Engineer (CNE) Network (CNA) sponsored by Professional sponsored by Novell (CCNP) Novell sponsored by Cisco Network+ Sun Certified sponsored by Network Computing Administrator Technology Industry sponsored by Association Sun (CompTIA) What are computer forensics certifications? Discovery, collection, and Certificate holders are analysis of evidence found on considered highly credible computers and networks during computer crimes cases Certified Electronic Certified Forensic Certified Computer Evidence Collection Computer Examiner Specialist (CEECS) Examiner (CCE) sponsored by (CFCE) sponsored by International sponsored by International Association of International Society of Computer Association of Forensic Investigative Computer Computer Specialists (IACIS) Investigative Examiners (ISFCE) Specialists (IACIS) What are security certifications? Measure a candidate’s ability to identify and control security risks to computer resources Certified Systems Security Information Certified Security Practitioner Professional (SSCP) (CISSP) sponsored by sponsored by (ISC)2 (ISC)2 Security Certified Security Certified Network Network Architect Professional (SCNA) (SCNP) sponsored by The sponsored by The Security Certified Security Certified Program Program What are Internet certifications? Require technical expertise in Include Web management, Web networking hardware and programming, and Web configuration development certifications Certified Cisco Certified Internet Certified Web Professional Webmaster Internetwork (CWP) (CIW) Expert sponsored by sponsored by (CCIE) International Prosoft sponsored by Webmasters Training Cisco Association What are database system certifications? Awarded for knowledge Test the various tasks of a specific database a database management management system staff must perform IBM IBM Microsoft Certified Certified Certified IT Solutions Solutions Professional Expert–DB2 Expert–Informix (MCITP) sponsored sponsored by sponsored by IBM IBM by Microsoft Oracle Sybase Certified Certified Professional Professional (OCP) sponsored sponsored by Sybase by Oracle Artificial Intelligence (AI) Artificial Intelligence continues to be a trend to watch because its effects on how we live, work and play are only in the early stages. AI refers to computers systems built to mimic human intelligence and perform tasks such as recognition of images, speech or patterns and decision making. AI can do these tasks faster and more accurately than humans. Machine Learning Machine Learning is a subset of AI. Computers are programmed to learn to do something they are not programmed to do. They learn by discovering patterns and insights from data. Neural networks, natural language processing (NLP), and deep learning are some subsets of Machine Learning. Robotic Process Automation or RPA RPA is the use of software to automate business processes such as interpreting applications, processing transactions, dealing with data, and even replying to emails. RPA automates repetitive tasks that people used to do. These are not just the menial tasks of a low-paid worker: up to 45 percent of the activities we do can be automated, including the work of financial managers, doctors and CEOs. Blockchain Most people think of blockchain technology in relation to cryptocurrencies such as Bitcoin. Blockchain offers security that is useful in many other ways. In the simplest of terms, blockchain can be described as data you can only add to, not take away from or change. Blockchains are consensus-driven so no one entity can take control of the data. Edge Computing Cloud computing has become mainstream, with major players AWS (Amazon Web Services), Microsoft Azure and Google Cloud dominating the market. Cloud computing is no longer the emerging technology. Edge is. Edge computing is designed to help solve some problems of cloud computing as a way to bypass the latency caused by cloud computing and getting data to a data center for processing. Virtual Reality (VR) and Augmented Reality (AR) Virtual Reality (VR) immerses the user in an environment. Augment Reality (AR) enhances their environment. Although VR has primarily been used for gaming thus far, it has also been used for training. Both have enormous potential in training, entertainment, education, marketing, and even rehabilitation after an injury. Cyber Security Cyber security might not seem like emerging technology but it is evolving just as other technologies are. Hackers will continue to find ways to get through even the toughest security measures. New technology is being adapted to enhance security. As long as we have hackers, we will have cyber security as an emerging technology because it will constantly evolve to defend against those hackers. Internet of Things Many “things” are now being built with WiFi connectivity, meaning they can be connected to the Internet—and to each other. IoT enables devices, home appliances, cars and much more to be connected to and exchange data over the Internet. The number of IoT devices reached 8.4 billion in 2017 and is expected to reach 30 billion devices after 3 years. Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA + Complete Study Guide (3rd Edition) Meyers, M. (2016). All In One CompTIA A+ Certification. Mc Graw Hill. Pearson. (2016). Introduction to Computers and Information Technology. Upper Saddle River, NJ: Pearson. Tavani, H. T. (2016). Ethics and Technology. Wiley. White, R. (2015). How Computer Work: The Evolution of Technology. IN: Que.

Use Quizgecko on...
Browser
Browser