This document discusses CompTIA certifications and how they relate to emerging technologies. It provides an overview of trends showing growth in certifications like CASP, IT Fundamentals, Project+, and Linux+. The document also highlights case studies of individuals who pursued CompTIA A+ certification and had success passing the exam and finding jobs. It emphasizes how CompTIA certification helps validate skills and knowledge. Finally, it outlines CompTIA's CertMaster adaptive learning tool and its benefits for preparing for exams.
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Today's Tech and CompTIA Certs
1. Today’s
Technologies
And
CompTIA’s
Cer/fica/ons
Todd
Thibodeaux
President
&
CEO,
CompTIA
Thomas
Reilly
Vice
President,
CompTIA
Learning
James
Stanger,
PhD
Senior
Director,
Product
Development,
CompTIA
CAPP session sponsored by:
2. BY
2025,
75%
OF
THE
GLOBAL
WORKFORCE
WILL
BE
NEXT
GEN
2
3. The
Next
Gen
Is
Already
Here
Next
Gen
PopulaKon
10
million
strong
here
in
UK
700,000
in
Ireland
1+
billion
global
Next
Gen
Workforce
Today:
1
in
every
3
employees
in
UK
&
Ireland
2025:
75
%
of
global
workforce
in
ten
years!
2030:
Will
outnumber
all
other
genera/ons
in
workforce
Time
period:
2013
revenue
es/mate
|
Source:
IDC
4. NEXT
GEN’S
ON-‐DEMAND
4
LIFESTYLE
IS
HEAVILY
RELIANT
ON
MOBILITY,
THE
CLOUD
AND
CYBERSECURITY
6. How
Is
the
Next
GeneraKon
Transforming
Our
World?
• Tech
is
not
just
for
geeks
• Changing
DNA
of
who
works
in
IT
• Broadens
base
of
who
gets
IT
Training
7. NEXT
GEN
SEES
TECHNOLOGY
AS
A
MEANS
TO
DELIVER
7
A
BETTER
LEARNING
EXPERIENCE
9. Quick
CertMaster
Update
CompTIA
CertMaster:
an
adap/ve
learning
tool
with
a
unique
Q&A
method
and
learning
algorithm
to
drive
fast
learning
and
long
reten/on
of
CompTIA
exam
material.
• Available
for
A+,
Network+,
and
Security+
and
IT
Fundamentals
• Launched
4
June
2014
• Available
to
consumers
on
www.certmaster.com
or
the
Marketplace
www.comp/astore.com
• Purchase
directly
through
your
CompTIA
Business
Development
Managers;
Member,
CAPP
and
Academy
discounts
apply.
• Thousands
of
learners
have
purchased
the
product
since
June
and
many
pilot
organiza/ons
are
adding
it
to
their
learning
and
cer/fica/on
programs.
10. CertMaster
Success
Story:
Newham
College
§ Business
Challenge:
Newham
College
needed
their
IT
curriculum
to
becer
align
with
required
job
skills.
Thus,
they
updated
curriculum
to
include
CompTIA
and
MS
Cer/fica/on
focus.
§ CertMaster
Experience:
Introduced
CertMaster
pilot
into
the
class
and
the
students
that
used
it
were
becer
prepared.
§ “Students
preferred
CertMaster
to
the
other
online
test
prep
tools
because
they
were
actually
learning
and
remembering,
not
just
cramming
for
the
exam.”
Chiraag
Swaly,
Instructor
§ Result:
13
people
took
the
A+
801
exam
and
passed.
Newham
plans
to
integrate
CertMaster
into
the
program
for
the
upcoming
full
year.
Instructor:
Chiraag
Swaly
LocaKon:
London
CerKficaKon
Pursued:
A+
#
of
Students:
27
total
L
11. CertMaster
Success
Story:
Stephanie
“Steph”
Lowe
§ Personal
Challenge:
Always
interested
in
IT,
but
finally
bit
the
bullet
to
pursue
a
career
in
IT,
so
enrolled
in
courses
at
Bedford
College.
§ CertMaster
Experience:
Encountered
CertMaster
A+
when
the
class
was
given
a
pilot.
Steph
studied
CertMaster
to
achieve
mastery.
§ “It
was
a
fantas@c
piece
of
soAware
and
I
know
my
classmates
found
it
extremely
beneficial
in
prepara@on
for
the
exam.”
Steph
Lowe
§ “It
was
amazing!
I
liked
the
repe@@on,
it
ingrains
the
learning
in
your
head.
I
used
CertMaster
un@l
I
got
every
ques@on
correct.”
Steph
Lowe
§ Result:
Passed
the
A+
exam
and
landed
her
first
IT
job
working
for
a
London
adver/sing
agency.
Instructor:
Joe Sullivan
Organization:
Bedford College
Location: Bedford
Certification Pursued: A+,
now studying for Network+
Student Demographics:
27 years old
L
12. CertMaster
Success
Story:
Lewis
O’Brien
§ Personal
Challenge:
To
improve
my
knowledge
of
CompTIA
A+
so
I
can
take
the
exam
and
pass.
§ CertMaster
Experience:
Piloted
CertMaster
A+
801
/
802
in
prepara/on
for
the
A+
exams
as
part
of
a
Level1
appren/ceship
provided
through
vq
solu/ons.
§ “I
really
enjoyed
the
experience
of
using
CertMaster.
It
is
an
excellent
tes@ng
engine
with
ques@ons
relevant
to
the
exam
objec@ves.”
Lewis
O’Brien,
Student
§ “CertMaster
is
the
best
tes@ng
prep
engine
for
CompTIA
on
the
market.
It’s
easy
to
use,
fun
and
informa@ve.”
Harpreet
Gill,
vq
soluKons
Instructor
§ Result:
Achieved
his
A+
Cer/fica/on
with
a
high
score
and
has
a
full-‐/me
job
with
appren/ce
company,
IBIT
Solu/ons.
Location:
Coventry
Instructor:
Harpreet Gill
Training provider:
vq solutions
Certification Pursued:
CompTIA A+ 801/802
Demographics:
21yr, male, IT technician
L
13. Level
up
your
career
How many classic video game Easter eggs can you spot in the video.
14. PosiKoning
CompTIA
CerKficaKons
and
Products:
Talking
Tech
with
Your
Customers
James
Stanger,
PhD
Senior
Director,
Product
Development
Skills
Cer/fica/on,
CompTIA
16. 75%
Copyright
(c)
2014
CompTIA
Proper/es,
LLC.
All
Rights
Reserved.
|
CompTIA.org
Top
Certs
on
the
Rise
16
CASP
IT
Fundamentals
Project+
CTT+
Linux+
58%
55%
45%
32%
Growth since 2011
17. Majority
of
Businesses
Throughout
the
World
Expect
IT
CerKficaKons
to
Increase
in
Importance
ExpectaKons
for
Change
in
Importance
of
IT
CerKficaKons
Over
Next
Two
Years
28%
24%
43%
Significant
Increase
in
Importance
Increase
in
Importance
NET
Decrease
NET
Increase
in
Importance
No
Change
Base:
1,246
business
and
IT
execu/ves
from
Brazil,
Canada,
France,
Germany,
India,
Japan,
Mexico,
Middle
East,
Thailand
and
the
UK
Source:
CompTIA
Interna@onal
Technology
Adop@on
and
Workforce
Issues
study
18. Majority
of
Businesses
Throughout
the
World
Expect
IT
CerKficaKons
to
Increase
in
Importance
NET
Agreement*
to
Statements
about
IT
CerKficaKon
73%
“It’s
important
to
test
aper
training
to
confirm
knowledge
gains”
64%
“Teams
of
staff
with
IT
cer/fica/ons
benefit
from
having
a
common
founda/on
of
knowledge”
62%
“Staff
with
IT
cer/fica/ons
have
proven
exper/se”
58%
“Staff
holding
IT
cer/fica/ons
are
more
valuable
to
the
organiza/on”
54%
“The
organiza/on
is
more
secure
from
malware
and
hackers
due
to
staff
with
IT
cer/fica/ons”
*Strongly
Agree
+
Agree
Base:
1,246
business
and
IT
execu/ves
from
Brazil,
Canada,
France,
Germany,
India,
Japan,
Mexico,
Middle
East,
Thailand
and
the
UK
Source:
CompTIA
Interna@onal
Technology
Adop@on
and
Workforce
Issues
study
19. 2014-15 Product Calendar effective Oct 21, 2014
.
October
2014
November
2014
December
2014
January
2015
Item
Dev
Oct
6-‐10
February
2015
March
2015
April
2015
Later
2015
dates subject to change
FCO-‐U51
Launch:
Oct
15
Launch*
Workshop
Re/rement
901
Series
JTA
Oct
27-‐31
CAS-002
Est Launch:
Jan 20
*
All
launch
dates
dependent
upon
courseware
availability
Item
Refresh
Oct
20-‐22
LX0-103, LX0-104
(exam numbers assigned,
objectives unchanged)
Est Launch: late Jan/early
Feb, LPI dependent
N10-006
Est Launch:
Feb
220-901, 220-902
Est Launch Oct 2015
SG0-00 2
Est Launch: Jun
Item
Wri/ng
Nov
10-‐14
SY0-301
all non-English
languages
Retirement: Apr 1
Strata IT
ALL VERSIONS
Retirement: Aug 31
SY0-301,
JK0-018
Retirement: Dec
31
SY0-‐401
Japanese
Launch:
Oct
1
SKO-004
Est Launch: May
HIT-001
Decision to retire Dec
31 has been reversed,
no retirement this
year.
N10-005
Est Retirement: Jun
CAS-001
Retirement:
May 30
New
New
New
21. Technologies
You
Need
to
Know,
Right
Now
§ Essen/al
networking
– Why
devices
from
mul/ple
vendors
work
together
at
all
– Fundamental
protocols
and
devices
– Cloud
– Virtualiza/on
– Addi/onal
concepts
(e.g.,
open
source)
§ Storage
– Types
– Local
and
remote
§ Security
– Confiden/ality,
availability
and
integrity
– Encryp/on
and
authen/ca/on
– Separa/on
of
du/es
and
redundancy
This
photo
is
for
placement
only
21
22. How
Can
All
of
our
Devices
Work
Together?
§ All
vendors
adopted
two
models
a
long
/me
ago
– The
4-‐layer
DOD
model
(Internet
model)
– The
7-‐layer
(OSI/RM)
§ Who
cares?
Well,
if
this
model
hadn’t
been
created,
every
vendor
would
have
to
create
its
own
protocols
§ If
you
thought
Ma
Bell,
the
Soviet
Union
and
Disco
were
bad,
imagine
what
it
would
have
been
like
.
.
.
§ CompTIA
wouldn’t
exist,
either
.
.
.
Why?
– Why
would
you
ever
need
vendor-‐neutral
cer/fica/on?
– We,
in
many
ways,
owe
our
existence
to
how
the
Internet
began,
as
well
as
to
how
it
will
operate
in
the
future
.
.
.
Open Systems
Interconnection
Reference Model
22
23. Protocols:
What
Is
TCP/IP?
It’s
a
suite
of
protocols:
– Internet
Protocol
(IP)
§ Provides
addressing
–
think
of
your
home
“snail
mail”
address
–
that’s
what
IP
does
§ IPv4
(10.209.113.65)
§ IPv6
(fe80::3086:aa5a:9333:b9f2%16)
– Ports
§ Kind
of
like
doors
and
windows
into
your
home
§ Can
have
services
/ed
to
them
– TCP
(how
an
adult
communicates)
§ Connec/on-‐oriented,
like
a
voice
phone
call
§ 3-‐way
handshake
§ E-‐mail,
Web,
your
voice
calls
on
Lync
– UDP
(how
kids
communicate)
§ Connec/onless
–
kind
of
like
tex/ng
§ Like
throwing
a
paper
airplane
.
.
.
§ DNS,
some
audio
23
24. Fundamental
Device
Terms
Networked
devices
– A
“host”
–
any
network-‐aware
device.
Can
also
refer
to
a
“hos/ng”
OS
in
virtualiza/on
– Protocol
(TCP/IP,
which
includes
HTTP/S,
POP3,
and
many
others)
– Network
Interface
Card
(NIC)
–
either
wireless
or
wired
Switches
– Used
to
connect
computers
to
each
other.
Operates
at
Layer
2
of
the
OSI/RM.
– Do
you
have
a
cable/DLS
modem?
Chances
are,
they
have
a
switch
installed,
as
well
Wireless
technology
– Wireless
NIC
– Access
points
Routers
– Connect
networks
– Layer
3
of
the
OSI/RM
– These
devices
focus
mostly
on
IP
addresses
and
gevng
packets
from
one
network
to
another.
They
also
control
access.
– Can
balance
load,
as
well
as
“shape”
packets
to
improve
service
24
25. Pulng
Things
Together
25
A
firewall
does
more
than
block
traffic
Monitoring
is
an
essen/al
part
of
a
firewall.
Logging,
as
well
as
integra/on
with
an
intrusion
detec/on
system,
is
vital.
26. Pulng
Things
Together
26
AddiKonal
rouKng
and
firewall
terms
§ Subnevng
–
The
ability
to
create
mul/ple
logical
and
physical
networks.
You
can
subnet
by
diving
IP
addresses
(logical).
You
can
also
subnet
by
using
switches
and
routers.
§ Filtering
–
The
ability
of
a
device
(e.g.,
firewall)
to
limit
traffic,
open
based
on
IP
address
characteris/cs
(e.g.,
actual
address,
port
used,
header
informa/on)
§ Access
Control
List
(ACL)
–
Term
used
to
describe
the
ability
of
a
router
to
control
traffic.
Not
always
considered
a
security
feature,
but
a
way
to
control
traffic.
§ Virtual
Private
Network
(VPN)
–
a
service
that
allows
remote
workers
or
companies
to
access
resources
as
if
they
were
actually
behind
the
firewall.
§ Ingress
and
egress
–
Terms
used
to
describe
incoming
traffic
(ingress)
and
outgoing
traffic
(egress).
§ “Default
stance”
–
Can
be
default
open
or
default
closed.
Default
closed
is
the
industry
standard
§ Signature
–
Term
used
to
describe
characteris/cs
of
an
acack
(worm,
virus,
botnet,
individual)
§ “Penetra/on
tes/ng”
–
Tes/ng
physical
and
logical
resources
to
see
how
well
they
can
withstand
tampering
and
intrusion.
Includes
buzz
words
such
as
“brute
force
acack,”
“fuzzing,”
“superzapping,”
and
“key
manipula/on.”
§ Old
terms:
Hub,
bridge,
“23
skidoo.”
27. Pulng
Things
Together
27
What
about
the
intrusion
detecKon
system
(IDS)?
An
IDS
monitors
traffic
behind
the
perimeter
established
by
the
firewall.
Two
major
types
exist:
§ Host-‐based
(HIDS):
Sopware
that
listens
for
logins,
illicit
sopware
installa/on,
and
anything
strange.
Can
then
send
alerts.
§ Network-‐based
IDS
(NIDS):
A
device
that
listens
in
on
a
switch
or
router
and
listens
to
traffic
for
anomalies
and
issues.
Can
send
alerts.
28. The
Cloud
–
What
You
Need
to
Know
§ Services
offered
across
the
network,
by
a
third
party
§ You
become
a
“tenant”
to
a
provider
§ What
used
to
be
installed
is
now
offered
“as
a
service”
This
photo
is
for
placement
only
28
TradiKonal
and
Cloud
Soqware
Comparison
Tradi<onal
Cloud
Microsop
Office
Google
Docs
Tradi/onal
NetSuite
Salesforce.com
Installed
LMS
/
Transcender
CertMaster
Microsop
Outlook
(office)
Gmail
/
New
Hotmail
§ Benefits
and
drawbacks
galore:
– Highly
dependent
upon
bandwidth/QoS
– What
do
you
know
about
the
provider?
– Uses
scalable,
virtualized
services
– Tenant
“collateral
damage”
e.g.,
Wikileaks!
29. The
Cloud
–
What
You
Need
to
Know
This
photo
is
for
placement
only
29
IaaS,
SaaS,
PaaS
.
.
.
what?
Infrastructure
as
a
Service:
Where
a
company
obtains
opera/ons
equipment,
including
storage,
hardware,
servers
and
networking
components,
from
a
third
party.
The
company
can
then
provide
sopware.
Soqware
as
a
Service:
Ready-‐built,
scalable
sopware
is
obtained
–
usually
via
a
Web
browser
–
from
a
third
party
service
provider.
Plarorm
as
a
Service:
Where
you
will
build
your
own
sopware,
but
using
tools,
libraries,
and
tes/ng
tools
provided
by
a
third
party.
30. VirtualizaKon
What
is
it?
– The
ability
for
one
piece
of
hardware
and
a
host
opera/ng
system
to
run
mul/ple
instances
of
an
opera/ng
system
at
the
same
/me
– A
“decoupling”
of
sopware
and
hardware
– Imagine
the
ability
to
run
another,
completely
independent
opera/ng
system
in
the
same
way
you
would
launch
a
Web
browser
– IBM
/
LinuxWorld
example
– Can
be
extended
to
virtualize
en/re
network
environments
Some
basic
terms:
– Virtual
machine
(runs
a
hosted
OS)
– Hypervisor
(a
monitor
that
creates
and
runs
a
virtual
machine)
– Host
machine,
guest
machine
30
31. Types
of
VirtualizaKon
31
1. Server:
Hos/ng
of
mul/ple
environments
(e.g.,
Linux
and
Windows)
within
a
single
opera/ng
system
instance.
2. Desktop:
Where
a
user
has
a
monitor
and
mouse,
but
receives
their
“desktop”
from
a
remote
server,
either
from
the
server
room
down
the
hall,
or
from
a
remote.
Removes
the
need
for
a
CPU
at
each
computer
sta/on.
3. ApplicaKon:
Some/mes,
a
business-‐cri/cal
applica/on
won’t
work
because
the
opera/ng
system
doesn’t
support
it.
It
is
possible
for
an
opera/ng
system
to
imitate
another
OS,
kind
of
tricking
the
applica/on
to
run.
4. Network:
Tradi/onally,
the
ability
to
create
a
Virtual
LAN
(VLAN).
Now
used
to
virtualize
an
en/re
network
for
“live
fire”
security
exercises.
Imagine
the
ability
to
be
able
to
create
an
en/re
working
network
for
whatever
purpose,
from
educa/on
to
providing
redundancy.
32. Storage
Concepts
§ Hard
disks
–
mul/ple
types
– Tradi/onal
§ SATA
§ SCSI
§ IDE
– Solid
state
(s/ll
SATA)
§ Types
of
storage
– Tradi/onal
– Network
Acached
(NAS)
– Storage
Area
Networks
(SAN)
– Ways
to
avoid
I/O
issues
§ Storage
configura/on
– RAID
– Tiering
32
33. AddiKonal
Concepts
Open
source
and
proprietary
development
models:
§ Licensing
models
§ Why
it
is
important
§ More
than
Linus
Torvalds
versus
Bill
Gates
§ Both
useful
§ Security
implica/ons
in
both
models
– Proprietary:
We
have
a
great
team
– Open
source:
“With
enough
eyes,
all
bugs
are
shallow”
OperaKng
systems:
§ Linux
§ Windows
§ Mobile
– iOS
–
not
Cisco’s,
but
Apple’s!
– Android
This
photo
is
for
placement
only
(where
Linux
finally
made
it
to
the
.
.
.
palmtop)
33
34. Licensing
Models
Proprietary
(End
User
Licensing
Agreement
-‐
EULA)
Sopware
–
or
any
intellectual
property
–
is
owned
completely
by
the
company.
Protected
by
tradi/onal
copyright
laws.
You
are
allowed
to
use
it
only
under
certain
condi/ons.
No
modifica/on
or
alterna/ve
use
is
allowed.
Excep/ons
may
be
allowed,
but
only
by
nego/a/on
and
contract.
This
photo
is
for
placement
only
34
Open
Source
Based
on
a
model
where
sopware
–
or
any
intellectual
property
–
can
be
used
by
anyone.
Use
involves
the
ability
to
download,
copy,
distribute,
and
modify
code
at
will.
While
open
source
sopware
will
s/ll
open
employ
a
EULA,
usually
such
agreements
simply
relay
the
message
that
the
sopware
license
is
open.
35. Security
Concepts
§ Redundancy
– No,
UK
folks,
I’m
not
talking
about
unemployment
.
.
.
– Mul/ple
access
points
and
failovers
§ People
§ Processes
§ Hardware
§ Risk
management
§ ConfidenKality,
availability
and
integrity
– Known
as
the
“CIA
triad”
in
some
circles
– Kind
of
an
ironic
term,
no?
§ EncrypKon
and
authenKcaKon
– How
we
implement
CIA
– Symmetric
key
and
asymmetric
key
encryp/on
– Mul/ple
factors
(what
you
have,
what
you
know,
what
you
are
.
.
.)
35
36. Security
Concepts
§ Spoofing
– Posing
as
someone
–
or
something
–
other
than
what
you
are
– Part
of
a
/me-‐honored
tradi/on
§ “Con
ar/sts”
§ Computer
hacking
§ Iden/ty
thep
§ SeparaKon
of
duKes
/
segregaKon
of
duKes
This
photo
is
for
placement
only
36
.
38. Many
Businesses
Throughout
the
World
Seek
Improvement
on
the
IT
Skills
Front
Top
Areas
Affected
by
IT
Skills
Gaps
1. Staff
produc/vity
2. Customer
service
/
customer
engagement
3. Security
/
defending
against
malware
/
hacking
4. Innova/on
/
new
product
development
5. Speed
to
market
with
new
products
or
services
Top
Rated
IT
Skills
in
Terms
of
1. Networks
/
Infrastructure
2. Database
/
Informa/on
management
3. Server
/
data
center
management
4. Storage
/
data
back-‐up
5. Help
Desk
/
IT
support
6. Data
analy/cs
/
Business
intelligence
7. Printers,
copiers,
mul/func/on
devices
8. Security
/
Cybersecurity
9. Customer
rela/onship
management
(CRM)
10. Web
design
/
development
Top
Rated
“Soq”
IT
Skills
1. Teamwork
2. Customer
service
3. Project
management
16%
of
businesses
report
being
Importance
to
Businesses
exactly
where
they
want
to
be
with
IT
skills,
while
40%
report
being
very
close.
Nearly
half
of
businesses
(44%)
seek
significant
improvement
on
the
IT
skills
front.
Base:
1,256
business
and
IT
execu/ves
from
Brazil,
Canada,
France,
Germany,
India,
Japan,
Mexico,
Middle
East,
Thailand
and
the
UK
Source:
CompTIA
Interna@onal
Technology
Adop@on
and
Workforce
Issues
study
39. Top
IT
Skills
IT
Professionals
Plan
to
Pursue
IT
knowledge
/
skills
IT
pros
would
like
to
further
develop
over
the
next
two
years
6%
11%
14%
20%
19%
19%
19%
18%
26%
35%
32%
36%
51%
46%
Security
/
Cybersecurity
Networks
Servers
Cloud
compu/ng
Virtualiza/on
IT
support
Project
management
App
development
/
Programming
Storage
Mobility
Database
management
Training
/
Teaching
BI
/
Data
analysis
/
Big
data
None
94%
of
IT
pros
plan
to
pursue
more
training.
Base:
2,074
IT
professionals
in
Canada,
S.
Africa,
the
UK,
and
the
US
Source:
CompTIA
2nd
Annual
IT
Career
Insights
study
Note:
Nearly
all
respondents
(96%)
are
already
cer/fied
in
CompTIA
A+
(73%),
Network+
(53%),
or
Security+
(43%).
40. Domains:
ü Sopware
ü Mobile,
worksta/on
ü Tradi/onal
and
cloud
ü Hardware
ü Relevant
to
end
user
and
techie
alike
ü More
than
just
“A-‐”
ü Security
ü Encryp/on,
secure
login,
repor/ng
acacks
ü IT
Literacy
ü Networking
ü WiFi
and
mobile
ü Perimeter
and
cloud
Perfect
for:
ü Grounding
in
IT
concepts
ü “Level
set”
for
training
ü For
those
considering
a
career
in
IT
ü For
technical
sales
ü Ideal
for
academic
ü A+
is
a
job-‐role
cer/fica/on;
not
everyone
is
ready
for
it
ü Same
for
Cisco,
MS,
VMWare
JOB
ROLE:
None
–
It
is
a
preparatory
cer/fica/on
POSITIONING:
Preparatory
training
.
.
.
and
more
41. JOB
TASKS:
ü Ensure
site
and
device
connec/vity
ü Parts
replacement
ü Malware
removal
ü Device
configura/on
(hardware/
sopware)
ü Troubleshoo/ng
common
problems
ü PC/Laptop
repair
ü PC/Laptop
maintenance
ü Performance
and
configura/on
best
prac/ces
JOB
TASKS:
ü Malware
removal
ü Sopware
troubleshoo/ng
ü Diagnosing
hardware
issues
ü Documenta/on
ü Customer
support
ü Support
the
field
tech
ü Applica/on
support
JOB
ROLE:
Onsite
Technician/
Field
Service/Field
Support
JOB
ROLE:
Remote
Support/
Helpdesk
Technician
42. 220-‐801
220-‐802
Hardware
(40%)
ü Deep
dive
on
hardware
components:
CPU,
RAM,
power
supplies
and
storage
devices
and
drives
ü Also
addresses
the
role
of
the
BIOS
as
the
primary
tool
for
communica/on
between
hardware
components
Networking
(27%)
ü Fundamental
network
concepts
and
technologies,
including
TCP/IP
and
related
characteris/cs,
TCP
and
UDP
ports
and
protocols,
wireless
networking
standards
and
network
devices
ü Introduces
network
topologies
and
types
of
networks
OperaKng
Systems
(33%)
ü Installa/on,
configura/on,
and
support
of
various
Microsop
OSs
(XP,
Vista,
and
Win
7)
including
use
of
command
line
tools
(NOTE:
mobile
OSs
Android
and
iOS
are
included
in
a
mobile
device
sec/on)
ü Client-‐side
virtualiza/on
Security
(22%)
ü Physical
and
digital
security
ü Common
security
threats,
including
social
engineering,
malware
and
rootkits
ü Securing
a
SOHO
network
44. VirtualizaKon
Virtualiza/on
is
a
core
enabling
technology
for
cloud
solu/ons
and
amounts
to
almost
20%
of
the
exam
content.
Deploying
and
managing
a
virtual
NIC,
disks,
switches,
LAN
and
SAN
are
at
the
heart
of
cloud
environments.
Data
security
Security
remains
a
primary
deciding
factor
in
decisions
about
cloud
compu/ng,
so
16%
of
the
exam
is
devoted
to
security.
TesKng
Tes/ng
and
managing
the
performance
of
systems
(6.0)
to
ensure
business
con/nuity
(7.0)
is
an
exam
area
driven
by
the
overarching
goal
of
availability,
24/7.
45. JOB
FUNCTIONS
ü Run
vulnerability
scans
ü Operate
vulnerability
hardware
ü Monitor
intrusion
detec/on/
preven/on
JOB
ROLES
ü Security
Specialist
ü Security
Engineer
ü Security
Administrator
ü Review
logs/audit
logs
ü Hardening
systems
ü Configure
firewalls
ü Manage
port
security
ü Deploy
and
monitor
an/virus
systems
ü Test
and
apply
patches
ü Manage
physical
security
46. Network
Security
(20%)
ü Tools,
technologies
and
tac/cs
for
securing
a
computer
network
and
network-‐accessible
resources,
including
firewalls,
NIDS
and
NIPS,
UTM
security
appliances
among
others
ü Secure
network
administra/on
principles
such
as
firewall
rules,
port
security,
UTM
and
so
on
Threats
&
VulnerabiliKes
(20%)
ü Different
types
of
malware
and
acack
types,
social
engineering,
wireless
and
applica/on
acacks
ü Mi/ga/on
and
deterrent
tac/cs
including
log
monitoring
and
system
hardening
ü Methods
of
discovering
security
threats
and
vulnerabili/es
Compliance
&
OperaKonal
Security
(18%)
ü Founda/onal
concepts
of
risk
including
use
of
different
types
of
controls
and
the
importance
of
policies
ü Risk
mi/ga/on
strategies,
basic
forensic
procedures
and
awareness
of
incident
response
procedures
are
also
expected
of
the
Security+
verified
professional
47. JOB
TASKS:
ü Troubleshoot
and
support
mobile
devices
ü Provision
mobile
devices
ü Content
administra/on
ü Integra/on
of
new
devices
ü Establish
configura/on
and
sevngs
JOB
TASKS:
ü Evaluate
technologies
ü Implementa/ons
and
installa/ons
ü Integrate
with
current
infrastructure
ü Ensure
security
policies
are
implemented
JOB
ROLE:
Mobile
(Device
Management)
Administrator
JOB
ROLE:
Mobility
Engineer
48. The
State
of
Mobility
Policies
in
the
UK
28%
31%
24%
16%
Currently
have
a
formal
mobility
policy
Currently
building
a
formal
mobility
policy
Only
share
best
prac/ces
to
follow
No
set
policy
or
prac/ces
Areas
Covered
in
Policy
85%
Mobile
devices
73%
Device
security
65%
Data
Storage
64%
Mobile
apps
63%
Data
transmission
63%
Personal
use
Base:
250
UK
end
users/142
UK
end
users
with
mobility
policies
Source:
CompTIA’s
3rd
Annual
Trends
in
Enterprise
Mobility
study
49. SAMPLE
DOMAINS
Over-‐the-‐Air
Technologies
and
Network
Infrastructure
WiFi
capabili/es
with
strong
enough
signal
strength
must
be
in
place,
and
the
wireless
solu/on
must
integrate
with
the
exis/ng
infrastructure
Mobile
Device
Management
Onboarding”,
backups,
applica/ons
and
administering
the
devices
according
to
corporate
security
policies
TroubleshooKng
Best
prac/ces
for
informa/on
gathering
and
troubleshoo/ng
everything
from
power
supply,
password,
sopware
applica/ons,
and
connec/vity
issues
50. Project+
§ The
only
project
management
cer/fica/on
that
covers
the
business
and
technical
skills
needed
to
successfully
manage
projects.
§ Exam
covers
the
following
topics:
– Project
Set-‐up
and
Ini/a/on
– Iden/fy
and
validate
project
– Prepare
a
feasibility
analysis
– Determine
project
deliverables
§ Project
planning
– Prepare
project
scope
documents
– Use
tools
and
diagrams,
such
as
PERT
and
Ganc
– Iden/fy
and
manage
costs
§ Project
execu/on
and
delivery
§ Change,
control
and
communica/on
“CompTIA
Project+
cer/fica/on
is
a
great
way
to
educate
our
project
management
team.
It
grants
credibility
to
our
internal
stakeholders
and
customers.”
-‐-‐
Ven
Sivarajan,
Engagement
Manager,
CDW
51. Project+
Comparison
of
PMP
and
Project+
Exam
Content
The
Project+
exam
focus
is
especially
on
planning,
and
on
change
control
and
communica/on.
As
a
founda/onal
level
exam
for
project
leaders
or
team
members,
it
is
important
to
build
and
validate
knowledge
of
the
importance
of
planning,
and
assessing
the
impact
of
changes,
on
the
overall
project.
PMP
Process
Groups/Domains
%
of
Exam
Project+
ObjecKve
Domains
%
of
Exam
Ini/a/on
11%
Pre-‐Project
Setup/Ini/a/ng
12%
Planning
23%
Project
Planning
29%
Execu/ng
27%
Project
Execu/on
and
Delivery
23%
Monitorinig
and
Controlling
21%
Change
Control
and
Communica/on
27%
Closing
9%
Project
Closure
9%
Professional
and
Social
responsibility
9%
52. Cybersecurity
Awareness
Training
Only
about
half
of
companies
require
cybersecurity
awareness
training
for
employees
49%
No,
it’s
not
required
51%
Yes,
it’s
Primary
reason
why
cybersecurity
awareness
training
is
conducted:
17%
Compliance
required
14%
Safety
/
protect
the
company
68%
Both
Base:
153
HR
execu/ves
in
the
US
|
69
who
require
training
Source:
CompTIA’s
2nd
Employer
Percep@ons
of
IT
Training
and
Cer@fica@on
study
54. A
Skills-‐Based
Look
at
the
CompTIA
Roadmap
EssenKal
skills
for
the
enKre
IT
department
Job
role
CerKficaKon
Help
desk/IT
support
technician/field
technician
A+
Opera/ng
system
support
Server+,
Linux+
Network
technician
Network+
IT/cloud
architect
Cloud
Essen/als,
Cloud+
Systems
analyst/mobility
engineer
Mobility+
Mobile
app
developer
Mobile
App
Security+
Security
engineer/IA
technician
Security+,
CASP
Any
employee
CyberSecure
(2015
launch)
Project
manager
Project+
This
photo
is
for
placement
only
54