CompTIA is providing an opportunity for IT Professionals to enroll in the CompTIA Continuing Education (CE) program on or before December 31, 2012. This offer is limited to only those certified in 2010 or earlier in CompTIA A+, CompTIA Network+ and/or CompTIA Security+  certifications. Candidates who earned their CompTIA certification in 2011 are already enrolled in the CE program.

Candidates certified in 2010 or earlier are considered “certified for life,” but they can enroll in the CompTIA Continuing Education Program to further demonstrate their knowledge and skills to their employers who may require such a certification.

If the “certified for life” individual is not enrolled in the Continuing Education program before Dec 31, 2012, they will need to retake and pass the corresponding current certification exam in order to achieve the CE certification.

Continuing education credits can be awarded within a three-year period through a variety of activities that show an understanding of relevant industry knowledge.

Candidates who are “certified for life” must follow these steps to enroll in the CE program:

1. Log in to the CompTIA Candidate Database https://www.certmetrics.com/comptia/login.aspx
2. Click the Continuing Education Menu Item
3. Click on the Enroll link
4. Click on the Enroll button

Click the link below for more information on tihs program: http://certification.comptia.org/news/12-11-29/Deadline_for_Certified_for_Life_Candidates_to_Enroll_in_Continuing_Education_Dec_31.aspx

uCertify, a proud CompTIA GOLD Partner will be at CompTIA’s Academy Educator Conference this month, in Las Vegas on July 28th and 29th. The conference is targeted at educators and has several informative sessions on the latest CompTIA certifications. We would love to meet you and learn about your specific needs, as well as share how we can help your students not only get certified, but actually learn the skills expected of a certified professional!
Highlights of our CompTIA Recommended curriculum:
Full spectrum of CompTIA products: A+, Network+ (2012), Healthcare IT, Storage+, Cloud, CASP, Project+ and more! 

  • 100% Exam Coverage
  • Available 24×7 online, mobile and offline
  • Online reference guide
  • Pre and Post Assessments
  • Hundreds of practice questions with detailed answer explanations
  • Chapter wise study notes, How-tos, Flash cards, Interactive Quizzes and much more
  • Student progress tracking, test history and performance review
  • Powerful analytics
  • Co-branding
  • Perfect for independent study or instructor led learning
  • Optional customization with lesson plans, assignments, single-sign on and integration with existing LMSs
We would love to show off our top quality products and services to you! Stop by the uCertify table at the Publisher Expo on Saturday afternoon, noon-5:00 p.m for demos, academic licensing options, and great promotional giveaways!
If you can’t attend the conference, but would like to learn more about uCertify, our academic discounts, or to schedule a demo, please contact Betsy Rivers, Director of Customer Partnerships at betsy@ucertify.com or call 925-252-5499.

Developing applications that use system types and collections

  • Use the CausesValidation property of the ImageButton class to set a value to indicate whether validation is performed on a Web server control when an ImageButton control is clicked.
  • Installation packages are created for deploying a Web application by using a Web Setup project. A merge module project is used for components to be added to the application.
  • Use the Web Setup project and Deployment project to create installation packages for the deployment of Web-based applications such as XML Web services, Web applications etc., to a Web server.
  • Use a RequiredFieldValidator control to check whether or not an input control contains a value.
  • Use a RegularExpressionValidator control to check whether or not the value entered into a form field matches the pattern specified by a regular expression.
  • Continue reading

General Security Concepts

  • Kerberos is an industry standard authentication protocol used to verify user or host identity.
  • Role-based access control (RBAC) is an access control model. In this model, a user can access resources according to his role in the organization.
  • Mandatory Access Control (MAC) is a model that uses a predefined set of access privileges for an object of the system.
  • Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.
  • Certificate-based authentication is the most secure method of authentication. It provides stronger key for encryption as compared to Digest authentication and sends encrypted passwords across the network. This prevents unauthorized users from intercepting the passwords.
  • Anonymous authentication is generally used for public Internet Web sites. Using this method, a user can establish a connection with a Web server without providing username and password.
  • Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.
  • Password Authentication Protocol (PAP) transmits user credentials as plaintext.
  • A certificate is a digital representation of information that identifies authorized users on the Internet and intranets.
  • Continue reading

e-business Infrastructure

  • File Transfer Protocol (FTP) is an Internet service that helps in transferring files from one computer to another over the Internet.
  • Layer 2 Tunneling Protocol (L2TP) is a more secure version of Point-to-Point Tunneling Protocol (PPTP). It provides tunneling, address assignment, and authentication.
  • Virtual private network (VPN) uses a tunneling protocol to span public networks, such as the Internet, without security risk. VPN enables remote users to access corporate networks securely by using a tunneling protocol such as PPTP or L2TP.
  • TCP/IP is the primary protocol of the Internet.
  • SMTP uses port 25 by default.
  • Address Resolution Protocol (ARP) is a network maintenance protocol of the TCP/IP protocol suite. It is responsible for the resolution of IP addresses to media access control (MAC) addresses of a network interface card (NIC).
  • FTP uses port 20 and 21 by default.
  • MIME stands for Multipurpose Internet Mail Extensions. It is a standard for multi-part, multimedia electronic mail messages and World Wide Web hypertext documents on the Internet.
  • The TCP/IP protocol should be bound to the dial-up adapter for Internet access on a Windows 98 computer.
  • Continue reading