Why Your IT Department Doesn't Trust You: Agenda
Transcription
Why Your IT Department Doesn't Trust You: Agenda
19 June, 2013 Why Your IT Department Doesn't Trust You: And How to Solve the Problem James Stanger, Ph.D. President and Certification Architect CERTIFICATION PARTNERS, LLC Agenda Today, we're going to discuss: • Our online rights – and responsibilities • Why you aren't trustworthy: The importance of computing responsibly • The rise of the executive order: The IT department BOFH • The cloud and security: How safe is your information? • What you can do • Instructors and the Internet: What teachers can do with the Internet in the classroom, based on executive order from the IT department Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res About us Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 1 We're CIW — Your Web and Internet certification Skills-based education standard • A holistic approach to certification • Courses and certification exams for career and college prep • Internet skills, Video SEO, social media, Web design and development • We put people on a life-long learning path, not a vendor's product treadmill Vendor-neutral • The best vendor applications as judged by industry • Open source • Competency and job role-based approach to education Globally accepted • Almost a million courses and exams delivered worldwide • Over 65,000 certified individuals – ready for today's IT environment Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res CIW: Preparing for your career CIW puts people on a lifelong learning path, not a vendor's product treadmill Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Your host • James Stanger – President and Chief Certification Architect – Technologist, consultant and author • Linux Magazine and Ubuntu User • Eselvier • O'Reilly – Security, Web and social media consultant – Educator and instructor • Just taught Security+ in a virtual environment • Web technologies • Social media • Bring Your Own Device (BYOD) Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 2 Our online rights – and responsibilities Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Your rights You have the right to: • Get online – To communicate freely – To learn how to: • Learn • Compute securely • Make connections • Make money . . . • Compute privately(?) Well, maybe not so much – Possibly • People also have the right to use your data • Government: Metadata and the NSA • Private sector: Google & WiFi sniffing Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Your rights (continued) • Quite a few people talk about “the right to be forgotten” • Started in the European Union • Do Not Track / Do Not Call Policy • Can these things work? • What records do governments have in regards to Internet security? • What records do governments and corporations have in regards to privacy? • What about the idea of not getting tracked in the first place? • Consider the right to: • Learn • Learn how to work online • Conduct unfettered exchange of ideas Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 3 Your responsibilities We're all citizens . . . Sure, it's a cliché – but there's a reason why it's a cliché To know the systems you're using The Internet Devices Protocols • • • To know the motivations of people – and entities – you will encounter Take a test: How does a smart phone connect to the Internet? Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Your responsibilities (cont'd) • Behavior – Ethics – Consider “Safe at work” behavior • Security: – Configuration – Updating your computing devices • Traditional systems (e.g., desktops and notebooks) • Mobile phone firmware • Antivirus software – Avoiding – and reporting – issues: • Attacks • Harassment / bullying • Suspicious business behaviors Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Why you aren't trustworthy: The importance of computing responsibly Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 4 The decisions you make Sometimes, we kind of turn off our minds when we compute Our logic gets fuzzy Details go into the background Case in point: – FBI ransomware scam – Older attack, but still effective Why is this the case? Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Training Or the lack thereof Lack of security awareness training alone is estimated to cost us $100 billion – Phishing – Software-based attacks 556 million victims a year 18 victims per second Training is the primary solution – Hardware. Okay. – Software? Sure. – It's all about the wetware Source URLs: http://www.go-gulf.com/blog/cyber-crime/ Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res http://www.v3.co.uk/v3-uk/the-frontline-blog/2253010/the-weak-link-in-the-cyber-security-battle-is-the-end-user Communication (or the lack thereof) How well do you communicate with your IT department? Are you afraid to ask questions? – – Of the IT / help desk department Of other knowledgeable employees Do you think you know more than they do? Does communication: – – Slow you down? Cause you too much frustration? Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 5 New technologies Appearing daily: Sometimes they're hype Sometimes they're real Technology moves from novelty to commodity It's hard to keep track of: – – – How to use them How to secure them And think of Bring Your Own Device (BYOD) – what are the implications? Source URL: http://www.electroiq.com/articles/sst/2012/08/gartner-identifies-fast-movingCopyright © 2013 Certification Partners, LLC ‐‐ All Rights Res technologies-with-hype-cycle-report.html Bad guys Consider: Number of botnets – Honeymap (http://map.honeynet.org) – http://botnettracker.blogspot.com Varied attack types Motivations – – – – “Hacktivism” General crime Espionage War and terrorism Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Bad guys (cont'd) Motivations abound, but notice the increase in hacktivism What does this mean? • “Bad guys” are targeting specific people and organizations • The result is that people can't learn by the school of hard knocks anymore Who will teach them? Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 6 Analyzing techniques Notice the increase in targeted attacks Why have targeted attacks increased? Because individuals haven't been taught – How to secure systems – It's more than a digital literacy issue; it's all about learning how to think proactively Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res You don't know security Few people do, actually – at least at first Back in the day – – – – – You learned by doing – or doing it wrong Someone taught you The school of “hard knocks” Computer viruses and worms were rampant Botnets, now Can we afford to continue this model in 2013 and beyond? Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res People now online Internet World Stats: Source URL: http://www.internetworldstats.com/stats.htm Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 7 People now online (cont'd) CIA World Factbook: Source URL: https://www.cia.gov/library/publications/the-worldfactbook/rankorder/2153rank.html Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res The answer: No We can't afford the school of hard knocks Positive solutions: – – – Education Better technologies Easier to learn technologies But there are also negative solutions . . . Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res The rise of the executive order: The IT department BOFH and BYOD Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 8 What is the BOFH? The grumpy IT/support/security person – – – – Character created by Simon Travaglia Smart, geeky, knowledgeable Gruff, angry, world weary Power hungry Employs the PFY, works with “lusers” Rogue system administrator Alternative definitions: – A person who gets tired of being • rousted out of bed at 3am because of end users • ignored by end users • interrupted Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res What motivates this behavior? So, why does the IT guy get so bent out of shape? It's not because end users need to be geeks People who aren't responsible – They do before they think – They ignore basic principles: • Have a sense of curiosity • A bit of healthy skepticism about certain claims found in e-mails or other messages • Ask questions Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res The cloud and security: How safe is your information? Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 9 Well, not particularly . . . We've all heard about the NSA metadata controversy, right? Take a look at the picture to the right -->>>>> • • Nice rig, eh? What does it tell you? Well, it tells more than the fact I like to get outdoors • It has metadata information • It can be quite useful Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Analyzing metadata Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res There's more . . . How did my phone know about the date and the weather of this picture? From captured GPS data • • It is embedded in the image Most smart phones do this This means others can discover this information, too, as you: • • • • Update Pinterest SMS your pictures Use Flickr and Facebook Generally do most anything Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 10 Well . . . pretty safe How so? Data at rest – You can encrypt it – You don't have to store in the cloud, you know . . . Data in transit – Authentication – Encryption • VPN • SSL To gain trust, organizations can't be too cynical – word always gets out Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res What you can do Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Store data locally And you can do it securely Data at rest – Stored on your SD card – In native mobile device memory – The good old USB thumb drive You can secure data at rest through: – Whole disk encryption – Password protection • Screen savers • Entire devices Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 11 Know the policies It's all about the Acceptable Use Policy (AUP) A public document – Meant to show what is allowed – And . . . what is not Is there an AUP in your organization? Do you create one for your students, if you're an instructor? Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Secure your devices • Here's what you can do: • Encryption • SD card • Native memory • Disable “features” • Use a pass code • Remote data wiping • And don't forget traditional devices • Notebooks It's all about the steps you take ... • Desktop Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Secure yourselves Become literate in the tools that you use • Are we asking you to become a geek? • Yes and no • Yes: – Do you know your phone settings? – Have you spent time “peeking underneath the hood?” • No – Become a smart consumer – Consider becoming familiar with the technologies you use Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 12 Steps you can take Options include: Configuring your phones to stop collecting data Tracking Protection Lists • Abine Standard • EasyPrivacy Apps and add-ons • TrackerBlock for Chrome • Ghostery • Chrome • Firefox • Safari • IE Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Steps you can take (cont'd) Additional steps: Configure your mobile device to stop tracking you – GPS – Photos Opting out – if the option exists Secure your device – Password protection – Firmware updates – Application updates Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Instructors and the Internet: What teachers can do with the Internet in the classroom based on executive order from the IT department Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 13 Survey results Anne Arundel Schools – A board – Approves – or denies – requests – Takes about a week to find out Maryland Schools – County Media Center – Fewer online restrictions than the standard classroom – More observation, however Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Survey results (cont'd) Try a national proxy service You will need to gather support – Edline – A Learning Community Management System (LCMS) – URL: www.edline.net – $4k a year for schools, according to the schools surveyed How do you work to get support? – Document the need – Show overwhelming need Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Recommendations Considerations include: Use a different Web browser – Requests generated from one browser can make a difference with the proxy server – Consider rendering engine: Chrome versus IE Conduct an instructor-assisted lab – Instructors may be able to use different logins than students – Use an overhead Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 14 Recommendations (cont'd) You can always try: Using your mobile phone as a hot spot – Then conduct an instructor-led lab – Don't allow students to connect directly! Anonymous proxy (anonymizers) – Can bypass limitations – Liabilities – beware of them – Overview: http://navigators.com/anonymizer.html Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Recommendations (cont'd) Empower the students: Open access, then create an Acceptable Use Policy (AUP) – Students enroll in a program – They are then taught how to behave responsibly – Terminate students from the program for irresponsible use One-to-one technology access – Implement a BYOD policy – Again, exercise strict control and reinforce training Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Caveats Considerations include: Does your department have enough talented techs to implement? Some instructors feel BYOD will lead to the fall of civilization as we know it Others feel it empowers students What if the resources go offline? – Store locally – Make alternative labs available Keeping students on task – Kinesthetic labs – Have them use devices for only a few minutes, then conduct interpretive labs Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 15 Resources Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Resources Some of the better places we found include: • “Fact Sheet 18: Online privacy” URL: https://www.privacyrights.org/fs/fs18-cyb.htm • “Cybersmart: Learn More about your Online Rights and Responsibilities” URL: http://www.cybersmart.gov.au/About%20Cybersmart/Newsroom/Annual% 20Events/Safer%20Internet%20Day%202013/SID2013%20%20Connect%20with%20respect.aspx Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Resources (cont'd) “NSA Best Practices for Keeping Your Home Network Secure” (How ironic!) URL: http://www.nsa.gov/ia/_files/factsheets/Best_Practices_Datasheets.pdf • “MIT Top Ten Safe Computing Tips” URL: http://ist.mit.edu/security/tips • “University of Oregon Safe Computing: Tips and Tricks” URL: https://casit.uoregon.edu/faq/security/safe-computing Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 16 Resources (cont'd) “How much online privacy do you really have? Less than you think URL: http://www.zdnet.com/blog/bott/how-much-online-privacy-do-you-reallyhave-less-than-you-think/4508 • Govloop's “Cyber Security in Focus” URL: http://www.govloop.com/profiles/blogs/infographic-cybersecurity-in-focus • The EasyPrivacy Web site URL: https://easylist.adblockplus.org/en/ Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res How CIW teaches you responsible online behavior – beyond simple digital literacy Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res CIW Foundations – Especially IBA and NTA Most will want to simply focus on IBA. But that's not enough – NTA teaches you essential security concepts for the workplace. Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 17 CIW Internet Business Associate (IBA) As a Web developer, you need to know all of the Internet cold – not just the Web . Skills taught and assessed in this program include: • Mitigating risk online • Project management essentials • Using Internet and Web-based tools to create and collaborate • Working as a team • Understanding IT job roles • Using search engines • Advanced searches (Booleans) • Configuring a home office network • Troubleshooting browser connectivity • Using browser plug-ins and add-ons • Database essentials • Working in a cloud computing environment • The Domain Name System (DNS) • Using Internet clients in business • Social media • Protecting your identity • Open source essentials For more information, go to: http://www.ciwcertified.com/certifications/ web_foundations_series/iba.php Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res CIW Site Development Associate (SDA) Skills taught and assessed in this program include: • Identifying steps in the Web site planning and development process • Creating pages with HTML5 • Cascading Style Sheets (CSS) • XHTML • Web design as a project • Using templates • Creating HTML5 forms • Validating code Creating video Editing for the audience Ensuring page accessibility Coordinating with social media Internet marketing Search engine optimization (SEO) • Using GUI-based HTML editing software to create Web pages. • Testing and analyzing Web site performance issues • • • • • • • Maintaining a Web site • Consulting with customers • Benefits and drawbacks of using cloud providers • Write solid copy • Identify trademark and copyright issues • Publish to the cloud For more information, go to: http://www.ciwcertified.com/certifications/ web_foundations_series/sda.php Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res CIW Network Technology Associate (NTA) Skills taught and assessed in this program include: • Working with cloud service providers • Virtualization • Service-based models, including SaaS, IaaS, and PaaS • Network troubleshooting • Maintaining hardware • Configuring mobile devices • IP addressing • Recognizing attacks • Securing traditional and cloud networks • Authentication schemes • Encryption types • Firewall configuration • Intrusion detection • End user security • Mobile computing devices • Content management systems • Network models and types • IPv4 and IPv6 • Typical Internet security and availability issues • Routing essentials For more information, go to: http://www.ciwcertified.com/certifications/ web_foundations_series/nta.php Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 18 CIW Certifications Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res CIW Certifications Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res How we help people teach and learn: CIW's turnkey, modular approach Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 19 We provide it all No other Web or Internet program provides: • Pre-assessment • Courseware, with hands-on labs • Online, via our CIW campus • Book-based • Supplements • Practice exams • Videos • LiveLabs – Ready-made “sandbox” environment that allows students to learn today's technologies • Industry-respected assessment and certification Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Courseware To get certified, you have three options: • Learning resources • PDF-based • Available via our electronic campus • We welcome you to attend a demonstration • Book-based, if you wish • Supplements • Exercises designed to engage today's learners • LiveLabs Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Assessment and certification To get certified, you have three options: • VUE testing centers • Available worldwide • www.pearsonvue.com • Prometric testing centers • Available worldwide • www.prometric.com • Innovative Exams kiosks nation-wide (US) • CTC Online (our preferred option) • We own and operate • You become a proctor and test students test right in the classroom Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 20 Faculty training and professional development We can help prepare you. Options include: • In-person training • Right in your facility – or ours • Expert, trained instructors • Online training • The same instructors • Taught using all CIW tools • Hybrid model • The most effective model • Helps “trickle feed” instructors over time on a more flexible schedule, but also with a personal touch Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res What makes CIW work? • Individuals want CIW because: • People want the skills • Hands-on learning • We push skills, not software • We profile the right applications • Institutions use CIW because it is: • Easy to teach • Articulation agreements and relationships that ease funding and put students in seats • Books allow students to quickly identify what they're learning • Online supplements assist knowledge transfer Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Why is the CIW standard so relevant? We focus on job roles and skills that set you apart Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 21 CIW Advisory Council: Helping us create the standard A nexus of industry, academia, government, and not-for profit organizations Academic/Government Industry/ Not For Profit Home Learning College Western Governors University University of Phoenix Mesa Community College Kaplan University University of the West of Scotland Pellissippi State College Tokyo University State of Florida Google CompTIA Certiport Western Digital American Express HitachiSoft (Japan) O'Reilly Media Cypherpath Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res What does the council do? Acts as a nexus for industry, government and academia • Identifies gaps between what academia provides and what the industry needs • Industry and academia can share perspectives Provides feedback • The latest technologies that CIW should profile • How CIW can adjust its instructional design to better teach students Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res CIW: A Proven Way to Fast-Track Your Development Career Internet.com names CIW a top developer cert • Recommends CIW as one of its Top 5 Certifications that put Web Developers on the Fast Track • CIW's Web Developer came in at No. 3 with "the distinction of being the industry standard for Webmasters” • No. 1 and 2 (MCSD and SCJD) are well-known vendor-based industry staples — CIW is vendor-neutral and focuses on core technologies and languages • “When you combine in-demand skill-sets and proven salary impact, specific certifications become valuable to individual technology professionals” • Proof positive of CIW's continuing value to designers and developers worldwide Read the full Internet.com article at: http://www.computertrainingschools.com/training-spotlights/5-certs-that-putdevelopers-on-the-fast-track.html Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 22 ISC2 and CIW ISC2, creators of the CISSP certification, have partnered with CIW • ISC2 recognizes CIW's leadership in the Web design and development space • CIW Web Security Associate now listed as a certification that allows CISSPs to waive a year of experience • We continue to partner with ISC2 Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res CIW: Government endorsements eSkills and City and Guilds (England) Helps educators in the United Kingdom validate training programs All CIW programs listed as approved Department of Defense 8570 Initiative (USA) Designed to help the DOD and its contractors compute securely All CIW programs listed: https://www.cool.navy.mil/ia_documents/ia_iat_flow.htm Scottish Qualifications Authority Helps universities and further education colleges determine skill levels Listed since 2006 Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res CIW: What people are saying “No other Internet job-role certification can claim the same size, credibility and acknowledgement as CIW.” Source URL: http://www.cedsolutions.com/courses/ciw-certification.cfm “CIW certified are in high demand in small to big enterprise level organizations.” Source URL: http://www.theitlibrary.com/ciw_certifications.html “If your resume [has] a CIW certification on it then it will give you a head start in the IT industry over and above the other candidates.” Source URL: http://myhomeschoolnews.com/growing-importance-of-ciwcertification Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 23 What the industry is saying about Web Foundations Associate . . . “As far as I'm concerned everyone at our company could benefit from CIW Foundations training, especially Network Technology Associate (NTA).” "Very interesting stuff, probably things I should already know.” —Jim Bush, a veteran in security and virtualization, Consonus Corporation “Foundations would be very valuable from new employees to seasoned vets." “These courses would be great to offer in tandem, I found myself answering client questions directly from the knowledge gained in these courses.” — Michael Graupner, a new technical consultant for Consonus Corporation Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res CIW: Its impact on careers Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res CIW: Skills that set you apart Compare traditional designers with those who have the skills CIW teaches: Salary for a traditional JavaScript developer: $78,000 Source URL: http://www.indeed.com/salary?q1=javascript&l1=durham%2C+nc Salary for a CIW JavaScript Specialist: $86,000 Source URL: http://www.indeed.com/salary?q1=senior+front+end+developer&l1=durham%2C+nc Note: Salary figures may change over time Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 24 CIW: Skills that set you apart Compare traditional designers with those who have the skills CIW teaches: Salary for a traditional Web designer: $69,000 Source URL: http://www.indeed.com/salary?q1=Web+designer&l1=durham%2C+nc Salary for a CIW Web Design Professional: $80,000 Source URL: http://www.indeed.com/salary?q1=Web+design&l1=durham%2C+nc Note: Salary figures may change over time Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res CIW: Skills that set you apart Compare traditional designers with those who have the skills CIW teaches: Salary for a traditional Web designer: $69,000 Source URL: http://www.indeed.com/salary?q1=Web+designer&l1=durham%2C+nc Salary for a CIW Web Design Professional: $80,000 Source URL: http://www.indeed.com/salary?q1=Web+design&l1=durham%2C+nc Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Who uses CIW? • Learning centers worldwide – Firebrand (UK) – YAT (Egypt) – LaSalle Learning (United States) • Universities worldwide – – – – – – – Home Learning College in (UK) Kaplan (United States) University of the West of Scotland Western Governors University (WGU) American Public University System (APUS) New Hebei University (China) University of Phoenix (UoP) • Secondary schools (grades 9-12) worldwide • 200+ community colleges and growing Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 25 Questions? If you have questions, feel free to: Use the “chat” window Raise your hand using the GoToMeeting feature Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Our next Webinar Our next topic: Real Life Computing and Teaching with Virtualization Wednesday, September 18, 2013 8:00 am – 9:00 am Pacific Register at the following URL: http://www.ciwcertified.com/About_CIW/webinars.php You can also go to the above URL to learn more about future offerings Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Summary • Our online rights – and responsibilities • Why you aren't trustworthy: The importance of computing responsibly • The rise of the executive order: The IT department BOFH • The cloud and security: How safe is your information? • What you can do • Instructors and the Internet: What teachers can do with the Internet in the classroom based on executive order from the IT department Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 26 Follow CIW Today! www.twitter.com/CIWcertified www.facebook.com/CIWCertified http://tinyurl.com/6eznl7z www.youtube.com/CIWCerts Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res Contact us today James Stanger President and Certification Architect CERTIFICATION PARTNERS jstanger@certification-partners.com +1 (888) 303-8694 +1 (360) 970-5357 Mike Shirra Marketing Manager CERTIFICATION PARTNERS mshirra@certification-partners.com +1 (602) 794-4160 To receive the latest info about CIW, follow CIWcertified on Twitter, Facebook and LinkedIn (CIW Group) Copyright © 2013 Certification Partners, LLC ‐‐ All Rights Res 27
Similar documents
4students: Read More about Our Writing Services
At 4students.us, students have an opportunity to get knowledge from the best academic writers. Read more at 4students.us about high quality custom writing easily.
More information