Archive for

Cisco Certifications For Networking Professionals

In order to achieve the second tier of the Cisco Pyramid, one needs to pass the Cisco Certifications for Network Professionals exam. This exam will prove that a network professional will be able to install, configure, and troubleshoot converged local and wide area networks with one hundred to five hundred or more nodes. They will also be able to manage routers and switches that are part of the network core, along with edge applications that integrate voice, wireless and security into the network. One needs to pass a total of four tests to achieve this title and they will need to renew this certification every three years.

If you are having trouble passing these required tests or just need some extra help, many websites offer a CCNP boot camp which is usually a rigorous and effective course that will improve your chances of passing the test with ease. These classes are no joke and can last from eight AM in the morning to late into the evening, and will be either a great review for the test or it will help you learn the daunting information that will be on the test.

Of course, network professionals will want to move on to the top tier of the pyramid sooner or later. Naturally, one needs to obtain a Cisco Certified Internetwork Expert certification. Less than three percent of Cisco’s network professionals reach the CCIP stage and it’s a very tough test to pass. These skilled experts are able to install, configure, and operate networks that are in highly complex environments with specific protocols, implement Cisco hardware and networking requirements for large scale diverse networks. They will also be able to design and implement innovative network design and handle difficult design and hardware issues.

If you are interested in passing these exams and becoming a Cisco Certified Internetwork Expert, it would be a good idea to enroll in CCIE boot camps that will help you prepare. These courses are rather expensive and can be priced around nine thousand dollars, but they are worth every penny. The CCIE certification is the most prestigious certification in the Cisco line and will propel you to a better career in a hurry. The course only takes nine days over the span of two weeks, and you will receive your certification right afterwards.

CCIE boot camp training, like any other boot camp in this category, is a great way to help you along with your career and you won’t be disappointed.

Federal Cyber Security: Are We Winning or Losing?

At the recent Security Innovation Network (SINET) event held in Washington D.C recently a sober assessment of our nation’s capacity to maintain an adequate cyber defense emerged.

The state of our cyber defense was summarized by Michael Chertoff, former Secretary of the Department of Homeland Security when he concluded that it may take “a digital 9-11” to get business, consumers and governments to fortify their cyber security defenses. In effect we are fighting an asymmetrical war and, at present, we appear to be losing.

Echoing this theme, Mr. Vivek Wadhwa, a respected cyber security analyst, argues, “Government simply can’t innovate fast enough to keep pace with the threats and dynamics of the Internet or Silicon Valley’s rapidly changing technologies.”

Wadhwa goes on to point out that innovative entrepreneurial technology advancements are needed but the government, because of it overwhelming dependencies on large contractors, is not equipped to take advantage of new and powerful cyber defense technology.

Wadhwa concludes that true innovation developed through smaller entrepreneurial firms is being stifled by Federal Government procurement practices.

The Federal Government Acquisition Strategy is Inadequate:

Although Wadhwa’s argument is focused on technology development only it also applies equally to service providers who adapt new technology to new and improving defensive tactics such as vulnerability assessment, analysis of threats and remedial action.

Since effective defense against cyber attacks is an on going process of monitoring and taking coercive action, the role of services and the cyber warrior is also critical and outdated Federal buying patterns are equally harmful.

Much of the problem stems from the present buying and acquisition patterns of the government. For years now the government has preferred to bundle requirements in to large “omnibus” or IDIQ contracts (with negotiated task orders) that favor the largest contractors but stifle innovation and flexibility. Cyber security requirements are treated on a like basis with Information technology requirements and this is a mistake.

In addition, recent Congressional contracting “reforms” have encouraged protest actions on new contracts and task orders for both new and existing contracts, resulting in a significant delay of the procurement process. In the fast evolving world of cyber security, delayed deployment of often obsolete technology solutions increases the risk of a successful attack.

Because these contracts are extremely large, they require many levels of approval-usually by Congress or senior administration officials. It typically takes 3-4 years for government to award these and successful bidders frequently have to go through a grueling “certification” process to get approved to bid. Proposal efforts for large bundled contracts cost millions of dollars to prepare and to lobby government officials and political leaders in order to win.

Because of buying patterns that are slanted toward large, slower moving contractors new technology required to meet the multitude of cyber threats will be ignored in the coming years. This puts the nation at risk.

Small contractors are often overlooked in favor of large contractors who frequently use contract vehicles to provide services and solutions that are often out of date in the rapidly changing cyber world.

Startups can’t wait this long or afford the cost of bidding. But it is not enough to demonize large contractors when the root cause lies is how the government procures technology.

In order to remedy this problem an overhaul of the acquisition and procurement process is required to level the playing field for small cyber security companies: it must be made easier for startups and small service providers to bid for government contracts.

One effective way to do this is to unbundle the cyber requirements for IT acquisitions and use more small business set asides for contract awards. In addition protests at the General Accounting Office must be discouraged and reserved only for obvious abuses of the contracting process.

Procurement times should be reduced to months rather than years; some projects should be done in smaller steps so that the major contractors, whose goal is often revenue maximization and placing unqualified bench staff, aren’t the only ones qualified to complete them.

Cyber attacks on our sensitive infrastructure and government agencies have increased significantly. We need the latest technology and best tools in order to win the cyber war.