Ultimas Noticias

Microsoft Office certifications
08.05.2013 by admin | Applications | Sin Comentarios

Demonstrate your expertise in using one or more of the Microsoft Office applications or in using the cloud-based collaboration and productivity tools offered by Office 365.

Continuar Leyendo…

Microsoft Dynamics certifications
08.05.2013 by admin | Applications | Sin Comentarios

Demonstrate your proficiency in a specific module of a Microsoft Dynamics product by earning a Microsoft Certified Technology Specialist (MCTS) certification.

Microsoft will continue to support the achievement of existing Microsoft Dynamics MCTS and MCITP certifications until further notice. Under each certification below, please check for a Certification Retirement Notice for more information. Microsoft plans to retire all Microsoft Dynamics MCTS and MCITP certifications by December 31, 2014. We will announce replacement and additional certifications for new versions of Microsoft Dynamics products over the next 12 months.

Continuar Leyendo…

Windows certifications
08.05.2013 by admin | Desktop | Sin Comentarios

Getting certified on the Windows operating system can help you reach your goals. In today’s increasingly complex IT environment, a Windows certification helps prove to customers and employers that you have the technical skills necessary to do the job.

Heard about the coming Windows 8 updates, called Windows 8.1? Read the FAQs below to find out how we are updating our certifications.

Continuar Leyendo…

Microsoft SQL Server certifications
08.05.2013 by admin | Database | Sin Comentarios

Prove your knowledge and skills in designing, building, and maintaining the next wave of cloud-ready database and information solutions.

Choose a certification below:

Microsoft  Certified Solutions Associate (MCSA)

Microsoft Certified Solutions Associate (MCSA)

Associate level

The foundation for your professional career
MCSA:
SQL Server 2012
MCSA:
SQL Server 2008
Microsoft Certified Solutions Expert (MCSE)

Microsoft Certified Solutions Expert (MCSE)

Expert level

The globally recognized standard for IT professionals
MCSE:
Data Platform
MCSE:
Business Intelligence
Microsoft  Certified Solutions Master (MCSM)

Microsoft Certified Solutions Master (MCSM)

The pinnacle of professional distinction
MCSM:
Data Platform

Other certifications

The lifespan of a certification varies, based on the certification track and certification technology. See a list of retired certifications.

Three MCTS certifications are available on Microsoft SQL Server 2008, each aligning with a market-relevant job role.

Certification title Required exam
MCTS: SQL Server 2008, Implementation and Maintenance
MCTS: SQL Server 2008, Database Development
MCTS: SQL Server 2008, Business Intelligence Development and Maintenance

* This exam will be retired on January 31, 2014.

MCITP: Database Administrator 2008

Take the exams listed below to earn your MCITP: Database Administrator 2008 certification.

Step Certification title Required exam
1 TS: Microsoft SQL Server 2008, Installation and Maintenance
2 PRO: Designing, Optimizing and Maintaining a Database Server Infrastructure Using Microsoft SQL Server 2008

* This exam will be retired on January 31, 2014.

MCITP: Database Developer 2008

This certification has been retired.

Step Certification title Required exam
1 TS: Microsoft SQL Server 2008, Database Development
2 PRO: Designing Database Solutions and Data Access Using Microsoft SQL Server 2008 451**

*This exam will be retired on January 31, 2014.

**This exam has been retired.

MCITP: Business Intelligence Developer 2008

This certification has been retired.

Step Certification title Required exam
1 TS: Microsoft SQL Server 2008, Business Intelligence Development and Maintenance
2 PRO: Designing a Business Intelligence Infrastructure Using Microsoft SQL Server 2008 452*

*This exam has been retired.

The MCM program for Microsoft SQL Server 2008 is designed to help provide the most experienced and talented IT professionals worldwide with validation and recognition of their in-depth technical expertise in Microsoft SQL Server.

Required exams:

88-970: SQL Server 2008 Microsoft Certified Master: Knowledge Exam

88-971: SQL Server 2008 Microsoft Certified Master: Lab Exam

Prerequisite experience:

Five or more years of experience with SQL Server 7.0 or later: installing, configuring, and troubleshooting

One or more years of experience with SQL Server 2005 or later: installing, configuring, and troubleshooting

Thorough understanding of SQL Server design and architecture

Thorough understanding of SQL Server core components and dependencies, such as online transaction processing (OLTP), high availability, disaster recovery, performance-tuning optimization, storage, security, manageability, and data distribution technologies

Ability to speak, understand, and write fluent English

If you have proven experience designing and delivering IT solutions for enterprise customers, as well as technical and leadership skills that surpass those of your peers, and you have achieved a Microsoft Certified Master certification, consider earning the Microsoft Certified Architect (MCA) certification.

The MCA: Microsoft SQL Server certification is designed for architects who specialize in using Microsoft technologies to provide expert solutions. It is the highest level of professional certification on Microsoft server products.

If you have already earned a certification on SQL Server 2008, you are eligible to take advantage of a shorter upgrade path to achieve an MCSE or MCSA SQL Server 2012 certification.

If you have an MCTS on SQL Server 2008 or MCSA: SQL Server 2008 certification, you can upgrade to the MCSA SQL Server 2012 certification.

Step Title Required exam Certification earned
1 Transition Your MCTS on SQL Server 2008 to MCSA: SQL Server 2012, Part 1
MCSA SQL Server 2012
2 Transition Your MCTS on SQL Server 2008 to MCSA: SQL Server 2012, Part 2

If you have an MCITP: Database Administrator or MCITP: Database Developer certification, you can upgrade to the MCSE: Data Platform certification.

Step Title Required exam Certification earned
1 Transition Your MCTS on SQL Server 2008 to MCSA: SQL Server 2012, Part 1
MCSE: Data Platform
2 Transition Your MCTS on SQL Server 2008 to MCSA: SQL Server 2012, Part 2
3 Transition Your MCITP on SQL Server 2008 to MCSE: Data Platform

If you have an MCITP: Business Intelligence Developer certification, you can upgrade to the MCSE Business Intelligence certification.

Step Title Required exam Certification earned
1 Transition Your MCTS on SQL Server 2008 to MCSA: SQL Server 2012, Part 1
MCSE: Business Intelligence
2 Transition Your MCTS on SQL Server 2008 to MCSA: SQL Server 2012, Part 2
3 Transition Your MCITP: Business Intelligence Developer 2008 to MCSE: Business Intelligence
Microsoft Visual Studio certifications
08.05.2013 by admin | Developer | Sin Comentarios

Earn a Microsoft Certified Solutions Developer (MCSD) certification and prove your skills in building Windows 8 apps using your choice of programming approaches, including C# and HTML5 with JavaScript.

Continuar Leyendo…

MCPD: Windows Phone Developer
08.05.2013 by admin | Developer | Sin Comentarios

Prove to customers and employers that you have the technical skills necessary to develop phone applications.

Step Title Optional training Required exam Certification earned
1 TS: Silverlight 4, Development
MCPD: Windows Phone Developer
2 TS: Accessing Data with Microsoft .NET Framework 4
3 PRO: Designing and Developing Windows Phone Applications
MCSD: SharePoint Applications
08.05.2013 by admin | Developer | Sin Comentarios
The globally recognized standard for developer excellence

Demonstrate your expertise at designing and developing collaboration applications with Microsoft SharePoint. To achieve this certification you must have a solid foundation of web programming skills using HTML5 with JavaScript and ASP.NET MVC 4. (New to application development? Learn about MTA certification for new entrants.)

Earning an MCSD: SharePoint Applications certification will qualify you for such jobs as software developer or web developer.

Continuar Leyendo…

CEH – Certified Ethical Hacking
08.05.2013 by admin | EC-Council | Sin Comentarios
Think Like a Hacker and Attain EC-Council Certified Ethical Hacker Certification
To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one.
Attend Advanced Ethical Hacking Training Program
The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker.
Get Certified Ethical Hacking (CEH ) Training
The Certified Ethical Hacker class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems.

Become a Certified Ethical Hacker with EC-Council's  Ethical Hacking Training

The World's Most Advanced Ethical Hacking and Penetration Testing Program - Certified Ethical Hacker (CEH)

Get EC-Council's Certified Ethical Hacker Certification with Advanced Ethical Hacking Training

This is the worlds most advanced ethical hacking course with 19 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with hacking skills that are highly in demand, as well as the internationally recognized certified ethical hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50. Learn more

 

Acquire Certified Ethical Hacker Certification with EC-Council's Ethical Hacking Course

I am a Hacker, I am the Good Guy, I am a CEH

Learn from Experts in the field of Information Security

Testimonials of EC-Council's Ethical Hacking Courses and Training.

We don’t just have great instructors, our instructors have years of industry experience and are recognized as experts. EC-Council Master instructors have real life Network Security and Ethical Hacking experience. The bottom line with this program is that we hope the work starts when the class is over. So I think it is important to teach students how to use the material more so than expecting them to memorize all of it in a short time. 

Steve De Fino
EC-Council Master Instructor

Certified Ethical Hacker Training

Why is Certified Ethical Hacker Training Important for You
What Makes the Ethical Hacking and Countermeasures Course Different from Other Courses in the Market
This is the world’s most advanced ethical hacking course with 20 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with hacking skills that are highly in demand, as well as the internationally recognized certified ethical hacker certification! Ethical hacking course prepares you for EC-Council Certified Ethical Hacker exam 312-50
Learn more

Acquire certified ethical hacker certification from EC-Council an Ethical Hacking Training Industry Market leader

Who Should Attend - Ethical Hacking Course Exam
Ethical hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

  • Duration: 5 Days (9:00 AM – 5:00 PM)

CEH Exam 312-50 Information

  • Number of Questions: 125
  • Passing Score: 70%
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: Prime Prometric (IBT), VUE, and APTC
  • Exam Prefix: 312-50-ANSI (IBT), 312-50v8 (VUE), or 350 CEHv8 (APTC)
CHFI – Computer Hacking Forensic Investigator
08.05.2013 by admin | EC-Council | Sin Comentarios
Computer Hacking Forensic Investigator
Join CHFIv8 course to acquire skills in forensic investigation techniques and standard forensic tools for successful computer forensic investigation

CHFI v8 Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The C|HFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

 

A CHFI v8 certified professionals will be able to understand:

  • Duration: 5 Days (9:00 AM – 5:00 PM)
  • The process of investigating cyber-crime, laws involved, and the details in obtaining a search warrant.
  • Different types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
  • Roles of first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting the crime scene
  • How to recover deleted files and deleted partitions in Windows, Mac OS X, and Linux
  • The process involved in forensic investigation using Access Data FTK and Encase Steganography and its techniques, Steganalysis, and image file forensics
  • Password Cracking Concepts, tools, types of password attacks and how to investigate password protected file breach
  • Different types of log capturing techniques, log management, time synchronization, log capturing tools
  • How to investigate logs, network traffic, wireless attacks, and web attacks
  • How to track e-mails and investigate e-mail crimes and many more.
  Join CHFIv8 course to acquire skills in forensic investigation techniques and standard forensic tools for successful computer forensic investigation

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensic investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.

  Join CHFIv8 course to acquire skills in forensic investigation techniques and standard forensic tools for successful computer forensic investigation

The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your or-ganization be comprised (hacked)?” but, rather, “when?” Today’s battles between corporations, gov-ernments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.

Join CHFIv8 course to acquire skills in forensic investigation techniques and standard forensic tools for successful computer forensic investigation

Computer forensics training teaches that computer forensics investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer Hacking Forensic investigators (CHFI) can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. Securing and analyzing electronic evidence is a central theme in an ever-increasing number of conflict situations and criminal cases.

CISO – Certified Chief Information Security Officer
08.06.2013 by admin | EC-Council | Sin Comentarios
EC-Council is dedicated to advancing the careers of the information security industry’s leaders.  Here you will find information on earning our Certified CISO (CCISO) certification, resources on the trends in information security and updates on the CISO events we host throughout the year.  We bring together the best and brightest of the information security leaders via our certification program, our free educational resources, and our highly successful CISO events in order to advance the cause of information security.

What is CISO
The CISO certification recognizes an individual’s accumulated skills in developing and executing an information security management in alignment with organizational goals.Read More…
Why CISO
If you aspire to attain the highest regarded title within the IS profession – CISO, if you already serve as an official CISO, or perform CISO functions without the official title, the CISO designation will be the recognition of your knowledge and achievements that will award you with professional acknowledgement and propel your career.Read More…
Benefits of CISO
Achieving a CISO Certification will differentiate you from others in the competitive ranks of senior IS Professionals. CISO will provide your employers with the assurance that as a CISO certified executive leader, you possess the proven knowledge and experience to plan and oversee IS for the entire corporation.