I AM I.T. TRAINING
  • Home
  • Courses
    • Cybersecurity Pathway
    • Cloud and Networking Pathway
    • CompTIA
    • Microsoft Office >
      • Microsoft Word
      • Microsoft Excel
      • Microsoft PowerPoint
      • Microsoft Outlook
      • Microsoft Sharepoint
    • Cloud SaaS Classes >
      • Google Suite
      • Office 365
  • About
    • Contact
    • DoD 8570/8140
    • Success Stories
    • Instructors
  • Blog

I am I.T. Blog

CompTIA Security+ Exam Practice

5/26/2020

 
Security+ Test Prep  
Watch our live CompTIA Study Group from May 2020.
CompTIA’s Sec+ certification is one of the most popular vendor neutral certifications in the world. We are reviewing the objectives and practice questions.


Read More

CompTIA PenTest+ Exam Prep

2/19/2020

 
CompTIA’s PenTest+ focuses on responsible and successful penetration testing. Recent exam takers share their tips for success. 

The CompTIA PenTest+ certification verifies that successful candidates have the knowledge and skills required to plan and scope an assessment, understand legal and compliance requirements, perform vulnerability scanning and penetration testing, analyze data, and effectively report and communicate results.

Read More

2020 Tech Conferences

12/27/2019

 
Searching for the top technology events to attend in 2020? Here is the top Tech events, per month, on the calendar for 2020.
​
Heading to a conference, trade show, summit or seminar?  Share the info with us!


Read More

STEM Toys for the Holidays

12/18/2019

 
STEM Toys are Science, Technology, Engineering, and Math based toys geared towards learning, curiosity, and education. STEM skills are integral to fostering creativity and problem solving in young minds. Opting for toys that help develop these skills encourages children to explore, examine, and be curious about the way the world works.  Check out our guide for 2019 best STEM toys.

Read More

States of Data and Encryption

12/6/2019

 
Unprotected data, whether in-use, in-transit or at-rest, leaves enterprises vulnerable to attack, but there are effective security measures that offer robust data protection across endpoints and networks. 

States of Data

  • ​​Data at rest is data that has reached a destination (even if only temporarily). 
  • Data in use is data currently in the process of being generated, updated, appended, or erased.​
  • ​Data-in-transit, or data-in-motion, is data actively moving from one location to another such as across the internet or through a private network.

​Data should be protected through strong user authentication, identity management, profile permissions and encryption.
Picture

Read More

Tips to Avoid Being Phished

12/2/2019

 
Phishing is the fraudulent practice of sending communications purporting to be from a reputable source for the purpose of gaining access or information that should be protected. Over half of cyberattacks begin with a spear-phishing (“personalized”) email.
​
The number of people being attacked on a daily basis continues to climb rapidly. Attacks are becoming more sophisticated, more common, more difficult to detect and more damaging when they succeed.

Read More
<<Previous
Forward>>
    YouTube

See You In Our Next Class!


Programs

Information Security
IT Hardware
Network Infrastructure 
Data Management

Telephone

901-300-6396

Blog

Get Certified, Get Paid!
​

How to Pick a Tech School

EC-Council CEH vs CompTIA Security+
i am I.T. is a CompTIA Authorized Academy Partner
Picture
Picture
  • Home
  • Courses
    • Cybersecurity Pathway
    • Cloud and Networking Pathway
    • CompTIA
    • Microsoft Office >
      • Microsoft Word
      • Microsoft Excel
      • Microsoft PowerPoint
      • Microsoft Outlook
      • Microsoft Sharepoint
    • Cloud SaaS Classes >
      • Google Suite
      • Office 365
  • About
    • Contact
    • DoD 8570/8140
    • Success Stories
    • Instructors
  • Blog