CertStudent is a regular feature that profiles students of all ages who are pursuing certification at schools, in training programs, and on their own time (and own dime). Know an interesting CertStudent ? Share the details with us at editor (at) certmag (dot) com.
Now he likes to use a sleek MacBook Air, but Isaiah …Read Article
There is a new word du jour that you can’t help but stumble across as you study for a number of security-related exams (such as CompTIA’s Security+), and that word is “control.” In this article, we will first define it from the standpoint of the testing body, then walk through two analogies on controls: one …Read Article
For the past 15 years or so, I have had a problem with operating systems. My primary computer is always running a recent version of Microsoft Windows. It is the OS that is invariably the one available in the offices where I work. I often have a project, however, that requires some other operating system. …Read Article
Gradually, imperceptibly, beneath your very fingers on the keyboard, the internet is becoming something different. Many users may never even notice the change, especially since it’s not intended to effect what you see so much as what goes on beneath the surface that lets you see it. Since 1997, the internet has hummed along on …Read Article
Dear CertMag is a weekly feature that addresses common questions about certification and related IT issues. Have a question? Send an e-mail to editor (at) certmag (dot) com.
Dear CertMag: My parents have a mom-and-pop computer repair service where I worked for years before college. I picked up a lot of what I know from …Read Article
This feature first appeared in the Spring 2014 issue of Certification Magazine.
Among the skills sought for work in penetration testing — the branch of cybersecurity in which gifted “ethical hackers” attempt to strengthen network or website security by finding and exploiting weaknesses — are excellence in programming, deep familiarity with operating systems, knowledge of computer …Read Article