Based in Southern California, with five offices in Los Angeles, Orange, San Diego and San Bernardino counties, New Horizons Computer Learning Centers of Southern California was recently named Red Hat Training’s Ready Partner of the Year at the annual Red Hat Training Partner Conference in Las Vegas, NV. As part of the world’s largest independent IT training company, New Horizons Computer Learning Centers of Southern California is a learning solutions provider for the industry’s top vendors, and has been a Red Hat Training Partner since 2010. We recently caught up with New Horizons Computer learning Centers of Southern California’s CEO, Kevin Landry, for his thoughts regarding the state of the training industry today and how it will change tomorrow.
Who are you training these days?
The market we’re in is a little bit unique. 70% of our business is considered B2B or enterprise business, companies like Disney, Southern California Edison, and Ingram Micro. Working with Red Hat over the past several years, we’ve continually seen this business double year after year. Developers in training is the largest growth area, but the greatest area of interest we’ve seen increase has been in the consumer market, where individuals fund their own training. I’d say 30% of the individuals that we train fall into this latter group, and are funding training on their own or have alternative government funding, such as VA benefits or unemployment benefits.
What are the most common reasons people are getting trained right now?
Skill shortage is the main reason that individuals are seeking training, and being that it’s more likely these days to see Linux or Red Hat in a job description, we’ve seen a lot of growth in consumers seeking Red Hat Certifications.
Continue reading “Catching up with New Horizons Computer Learning Centers of Southern California”
How does your salary compare to national averages? Which skills are in demand? Do training and certifications impact salary? Help us answer these questions and more by participating in Global Knowledge’s 2014 IT Skills and Salary Survey.
Secure-24, an IT outsourcing leader, has been in perpetual growth mode since 2000 and is always looking for qualified personnel to join its team. Its prime candidates? Engineers who have gone through the Red Hat Certification Program. This is their story.
Continue reading “VIDEO: Secure-24 uses Red Hat certifications to attract customers, recruit talent”
by Scott McBrien (Red Hat)
My name is Scott McBrien. I work for the Red Hat Training Curriculum Development Team and was the project leader for the development of the Red Hat Server Hardening (RH413) course. Before joining the Red Hat Training Curriculum Development Team, I worked as both a Red Hat training instructor and consultant. I hope that my field experiences show through in our new class.
When I first started thinking of writing a security focused class, I tried to think about what story would make a compelling course that I, and other systems administrators, would like to attend. One of the topics that I have seen grow to be pervasive in the systems administration community is Security Policy Compliance. Many of us have had the lovely experience of having someone from another team, or an outside consultant, come in to run some type of scanning software against our machine, and say “You’re not in compliance with SECURITY-STANDARD”. In my experience, the systems administrator is told to fix the deficiency without a lot of direction from the person telling them that there’s a problem, or worse, they are given instructions by someone who is not an expert on the technology, which fixes the audit deficiency, but down the line causes problems. A situation that I see over and over again is systems administrators being told to install non-supported software on their Red Hat Enterprise Linux machines because the version they have is “old” or “vulnerable”. In reality, Red Hat does a lot of work to publish updates to Red Hat Enterprise Linux (and other products) so that an administrator can use supported, packaged software from Red Hat and not have software open to known vulnerabilities. Red Hat’s update management and application of updates is the first topic in “Red Hat Server Hardening”.
Continue reading “Behind Red Hat Server Hardening (RH413)”
by Christian Stankowic
If you’re maintaining multiple Red Hat Enterprise Linux systems (or equivalent offsets like CentOS or Scientific Linux) your administration work with the particular hosts will gain in a routine. Because even the best administrator might forget something it would be advantageously to have a central software and configuration management solution. Chef and Puppet are two very mighty and popular mangement tools for this application. Depending on your system landscape and needs these tools might also be oversized though – Red Hat Package Manager (RPM) can emerge as a functional alternative in this case.
It is often forgotten that RPM can be used for sharing own software and configurations as well. If you’re not managing huge system landscapes with uncontrolled growth of software and want to have a easy-to-use solution, you might want to have a look at RPM.
I’m myself using RPM to maintain my whole Red Hat Enterprise Linux system landscape – this article will show you how easy RPM can be used to simplify system management.
Continue reading “GUEST POST: Software and configuration management made easy with RPM”
by Iain Gray, vice president, global services, Red Hat
Today is an exciting day for Red Hat as we announce our new Red Hat Certificate of Expertise in Infrastructure-as-a-Service and expanded training in support of Red Hat’s OpenStack technology.
We launched Red Hat Enterprise Linux OpenStack Platform at the Red Hat Summit in June as a core part of our open hybrid cloud strategy. There is a huge amount of excitement about OpenStack both at Red Hat and from our customers. In terms of company focus, it truly is “the next Linux.” Our goal is to bring our enterprise experience to the Infrastructure-as-a-Service (IaaS) market and provide an OpenStack platform that our customers can trust.
We are committed to providing services that help our customers use OpenStack to get their products to market faster. We recently launched a range of IaaS-focused offerings. From cloud migration strategy consulting, to Red Hat Enterprise Linux OpenStack Platform product-pilot implementation services, through complete IaaS-based solution development, we can support our customers through every stage in their cloud journey. Red Hat OpenStack Administration (CL210), a course we introduced earlier this year, helps customers build their teams’ readiness to adopt and use this new technology.
Today, we complement and expand these offerings by introducing the Red Hat Certificate of Expertise in Infrastructure-as-a-Service and expanding the Red Hat OpenStack Administration course to cover new capabilities in the latest release and to provide preparation for the Red Hat Certificate of Expertise in Infrastructure-as-a-Service Exam (EX210).
Continue reading “Red Hat announces new OpenStack certification”
by Rich Heironimus (Red Hat)
It’s no secret that middleware is increasingly a critical component of integrating, automating and accelerating business. With the rapid development of new technologies and platforms, we caught up with Rich Heironimus for his thoughts as to the latest trends arounds middleware, and what it means for developers.
How are customers using middleware today?
Today, middleware is increasingly helping customers achieve business agility. The flexibility that a well-architected system brings to the customer ultimately translates into better business efficiency. Legacy systems are often tightly coupled and making changes becomes more and more expensive over time. Many customers are building an integration or SOA foundation that leverages BPM and BRMS to achieve business agility by deploying their key processes and rules in middleware platforms. As more customers become more globalized, many customers are trying to deploy standardized processes and rules across the region or globe with localized changes or differences. BPM and BRMS middleware is enabling this flexibility.
What are some trends happening right now in the middleware space?
Middleware is being used to reduce the time to market for new applications by leveraging the efficiency driven through integration and BPM/BRMS platforms. Customers are revamping legacy workflow driven applications by refactoring them on a BPM/BRMS platform and owning the changes. Big data is also driving Complex Event processing, rules and process adoption.
Continue reading “Five Questions with…Rich Heironimus, middleware practice lead, Red Hat Consulting”
by Randy Russell (Red Hat)
I am pleased to announce our newest certification, Red Hat Certificate of Expertise in Server Hardening. This new Certificate of Expertise will take the place of the Red Hat Certificate of Expertise in Security: Network Services and Red Hat Certificate of Expertise in Directory Services and Authentication. Red Hat Certified Professionals working towards earning Red Hat Certified Security Specialist (RHCSS), Red Hat Certified Datacenter Specialist (RHCDS) or Red Hat Certified Architect are able to visit our Certification FAQ to learn more about how this new Certificate of Expertise fits into these programs. Why are we introducing this new credential and replacing long-standing ones with it?
Every year, Las Vegas plays host to DEF CON® Hacking Conference, which is routinely described as the world’s biggest hacker conference. Most people attend to learn about security exploits so that they can protect themselves and others. At last year’s conference many speakers within the DEF CON community spoke about the important of asking questions, engaging with others while at the conference and sharing knowledge.
One speaker, who is particular well-established, likewise made such a statement. He then went on to say that in order to speak to him, there were requirements. He then proceeded to enumerate, accompanied by slides, the vast array of skills and knowledge one needed in order to be worthy to step into his presence. His rigorous list would be an excellent checklist for someone who wanted to have a heavy-duty, information assurance consulting practice. However, many of us must think about security and implement practices that address specific risk factors with appropriate levels of time, effort and money. It is not our role to contemplate the vast everythingness of everything. We need to ensure that we have taken appropriate steps on systems within our care. In short, we need focus within that deep, broad ocean called security.
Continue reading “Announcing the Red Hat Certificate of Expertise in Server Hardening”