Contents Computer Training Magazine™ Volume 1 Issue 1
4
Letter from the CEO
5
IT Employment is Back – With Changes
6
Meeting the Challenges of Securing Your Business
7
Ironclad Security Practices a “Must” with Microsoft
8
Controlling Your Network’s Microsoft Updates with WSUS
9
Log Shipping with SQL Server 2005
12 Proving Yourself: What Certification
Can Do for You and How to Get Them
13 When Image is Everything: Designing Corporate Web Layouts 15 Capitalize on Microsoft Software Assurance and
Save Millions on Training Costs
16 Novell & Microsoft Colloborate, Customers Win 17 Sun Opens Java Code 18 Employment Opportunites 20 NetCom’s Winter 2007 Course Catalog
Advertisers Index
•
SOX Institute
•
PC Expert
•
New Generation Software System
•
Tech Expo Job Fairs
•
NetCom Information Technology
•
Microsoft
•
Transbeam
Featured Article John Venator, CEO of CompTIA “IT Employment is BACK “
To advertise with us please call 646-747-5682 For training contact: NetCom Information Technology at 888.563.8266 or visit www.netcominfo.com
Computer Training Magazine 350 Fifth Avenue, Suite 727 New York, NY 10118 646-747-5682 or 866.629.7265 www.netcominfo.net
Microsoft Incentives. UNITED STATES
Act now. Save now.
Eileen Mullin, Editor Nicholas Ntovas, Marketing Manager
Help increase the return on your investment with
MicrosoftIncentives.com – your resource for valuable offers, special financing, and incentives for Microsoft products.
Contributing Writers Allan Jacobs Mudit Mittal Eileen Mullin Baya Pavliashvii Russell Sarder Mary Shacklett John Venator Advertising Sales Paulson Ambookan Publishing & Distribution Manager 646.747.5682 Design Team Katherine Papadopoulos Anthony Ribando Corporate Information
com
Don’t leave money on the table. Take advantage of our current offerings.
Your time is valuable and you want to keep costs down.
Microsoft Incentives can help you do both. Whether it’s through 50% off on software licenses, or by offering thousands of dollars towards partner services that keep your business up and running, Microsoft Incentives can help you make the most of your technology investments.
Russell Sarder, CEO
Visit MicrosoftIncentives.com and take advantage of the latest offers. Save valuable time and money on the products you and your business use most:
Titu Sarder, COO
Office and Productivity Products
Adam Chng, CIO
Infrastructure Solutions
Therese Switzer,CTO Mudit Mittal, General Manager Brian Ciufo, Sr. Apps Developer
All rights reserved. Reproduction or use without written permission is strictly prohibited.
To Subscribe online go to www.netcominfo.net/promo/subscribe
Business Solutions
– Such as Microsoft Office 2003
– Such as Windows Server System™
– Such as Microsoft Dynamics™
Visit MicrosoftIncentives.com for all the current offers – plus other important information such as terms and conditions. Act now, as many incentives are available for a limited time only.
For training related to these products see NetCom Information Technology’s catalog or vist www.netcominfo.com
Save today in three easy steps:
1 PURCHASE 2 SAVE 3 VISIT
Visit MicrosoftIncentives.com review the current offerings.
and
Purchase the qualifying products and quantities.
Save with the special financing, incentives, or services subsidy associated with your purchase.
IT Employment is Back —
Letter from the CEO
With Changes By John A. Venator
I
am very excited and pleased to introduce this first issue of Computer Training Magazine from NetCom Information Technology.
N e t C o m I n f o r m a t i o n T e c h n o l o g y , a nationwide technology training organization with headquarters in New York City’s Empire State Building, is witnessing a dramatic upswing in demand by corporations and individuals for IT education and certification. NetCom president and CEO Russell Sarder concludes that IT is on an upswing in terms of career potential.
I
n these pages, you’ll find informative articles and training resources for CTOs, CIOs, IT managers, and other IT-purchase influences. With a circulation of over 120,000, Computer Training aims to serve as the go-to resource for finding current and in-demand technological trends and training on these trends. Technology managers, business and technical users and people interested in improving their computer and technical skills will find this magazine of great interest. The magazine will offer quick access to authoritative reviews of technology products, continuously updated industry news, free workshops, e-newsletters and vendor information on technology products. In addition, you’ll find detailed listings of our upcoming courses. At NetCom, we offer over 900 courses both locally – with headquarters in the Empire State Building – and in 21 remote locations. NetCom is an authorized training center
recognized by industry leaders such as Adobe, Autodesk, CIW, CWNP, Check Point, Cisco®, Citrix, CompTIA, EC-Council, IBM, Linux Professional Institute, Mercury, Microsoft, Novell, Oracle, Quark Inc, and Zend. NetCom is also an authorized testing center for Sylvan Prometric and VUE.
“According to leading industry research organizations, IT training is a $20 billion a year industry,” Sarder said. “Training is in demand because organizations are investing in workforce development while at the same time adding jobs that require trained and certified individuals. I’m very optimistic about the future.”
We strive daily to deliver the best technical training available anywhere to our customers and students. We are committed to their success, for we are only as successful as our customers and students. By acquiring this magazine, you have shown that you have already acted upon your interest into this compelling industry. I urge you not to put off acquiring the needed knowledge and skills that would likely change your future and career.
Training has traditionally been one of the leading indicators of the overall health of the IT job market. When economic times are bad, companies reduce the money they spend on training as well as the number of people they employ. Training and educational institutions are among the first to experience the downswing. As the economy picks up and organizations invest in productivity enhancing upgrades, chief information officers start raising head counts and budgeting for skills development. Then the phones begin to ring at training centers.
I thank you for your interest, and hope you find this magazine a useful source of information for IT related products, services and training!
Sarder and others in the IT skills development industry are providing a much welcomed early alert to an upswing in career opportunities. Does this mean that IT careers are returning to their former dot-com glory days?
Sincerely,
Russell Sarder President and CEO
John Venator is the president and chief executive officer of the Computing Technology Industry Association (CompTIA), the leading trade association representing the business interests of the global information technology (IT) industry. He is responsible for leading strategy, development and growth efforts for the association.
“Overall demand for
trained and certified IT professionals is increasing,” Sarder said. “But it is not increasing across the board— in every career track. Some segments, such as software development, are declining in demand. The hot areas today are wireless, security, and database management. “There is definitely a need for nearly every IT professional to certify in project management, not only because more and more IT professionals are involved in projects, but also because employers now place high value on communication skills and teamwork.” The changes in IT employment go deeper, however, than hot and cold areas of the profession and the growing importance of soft skills. The requirements for most career tracks are changing significantly, and many people may not be aware of the ramifications of these changes. “Five years ago, if one of our learners trained for and earned one or two certifications, we could confidently expect him or her to land a $40,000 to $45,000 technician or network administration job,” Sarder observed. “Today, to successfully compete for that same job, the individual must demonstrate foundational mastery by earning CompTIA A+® and Network+® and have relevant certifications from Microsoft and Cisco as well.”
Certification provides many advantages: independent validation of skills mastery, a demonstrated commitment to learning, and the higher productivity of trained, careerminded workers Sarder added, “Comprehensive career track IT training today includes many more related skills than only a few years ago. The overall quality of the IT educational experience has had to improve to meet this need. The training industry now offers a greater number of highly skilled, certified, and experienced instructors. Schools and training centers are more attuned to the needs of employers. Training organizations typically provide excellent online materials that supplement the classroom experience. There is a greater availability of well equipped labs and strong emphasis for hands-on training. The training environment is different from it was like only a few years ago, and the difference shows in the quality of the technicians coming out of today’s programs.” The demand by employers for IT professionals to be certified has dramatically increased according to Sarder. This applies to those already employed and for individuals seeking an open position. Three years ago at NetCom perhaps 50 percent of students enrolled in a class mapped to a certification would opt to take the exam. Today that number is approaching 90 percent. IT offers career potential for those who like and understand technology and can relate those skills to enabling the mission of the organization. The reasons that people train and certify are more important today than at any time in the past. -CTm
Meeting the Challenges of Securing Your Business
Ironclad Security Practices a “Must” with Microsoft
By Russell Sarder President & CEO NetCom Information Technology www.netcominfo.net
By Mary Shacklett
E
vents in the news during the past few years have taught us all many lessons. However, the primary lesson that all businessmen should have learned, is the need to keep their businesses secure in an ever changing and increasingly malevolent world. From fears about Y2K to the tragic events of September 11, the need for heighten security is readily apparent. Heightened alert is a worldwide status. “Security is no longer a should-have; it’s a must-have,” says Jim Lima, channel marketing manager at Check Point Software Technologies, Redwood City, Calif. All institutions face intrinsic risks as part of doing business. There are built-in risks in their operations and in their interactions with customers and partners. The recent flood of viruses, worms, and Internet attacks has caused significant damage and massive loss of productivity within many enterprises. According to VAR Business Magazine, “There will always be new viruses to eradicate and hackers to hold off.” Moreover, the recent growth eruption in wireless technologies and communications has only exacerbated these issues. As a result, everyone is continuing to spend more to combat these ever evolving threats, yet security capabilities have often not risen to meet the needs of the business. Executives have to insure that they are getting their money’s worth. Delivering a well-rounded solution is a well-orchestrated event, it requires the application of physical, logical and privacy boundaries to users, processes and resources. Meeting the challenges To successfully achieve the desired results, several steps need to be taken. The first recommended step is the creation of a virtual security team. This team should contain representatives from across all of the main functional areas of the business, from IT to HR to Legal to accounting. The main objective of this team is to develop a process to understand the risks and risk management processes of the institution. Working as a team, they will assist all functional areas to assess, detect, protect, correct and recover from security exposures in their IT and physical security environments. Full support from executive management should given to this team and communicated to all employees. They should also be given ample room to operate without fear of reprisal from their respective areas.
Training No security plan is complete without provisions for ongoing awareness training. Employees, vendors, and contractors can make or break the security of your network, and they should all receive computer security training when hired and thereafter annually. The training should explain the reasons for security and ensure that everyone fully understands his or her responsibilities. Some employers have made security certification training a formal step in their workforce development programs. At NetCom Information Technology, we have seen a great increase in enrollment for our security certification training courses. In recent months, we have more than doubled the amount classroom time allocated to security training and certification. In addition, at customer request, NetCom has designed specific courses tailored to a specific client’s security needs and have delivered these course on-site to minimize operational disruptions. The most popular security certification course offered by NetCom is Security+ Certification from CompTIA. The Security+ certification is an internationally recognized validation of the technical knowledge required of foundation-level security practitioners. A Security+ certified individual, after completion of the course, will have successfully proven a foundation-level of skill and knowledge in General Security Concepts, Communication Security, Infrastructure Security, Basics of Cryptography and Operational / Organizational Security. Of course NetCom offers a variety of security certification course too, such as CISSP, CCSA, CCSE, CCSE Certification from Check Point and Certified Ethical Hacking and Computer Forensic Investigator from EC-Council. Conclusion Security is never absolute. There is no such thing as complete safety or complete freedom from doubt or fear–people and organizations always face risks. Some risks can be eliminated, some can be reduced, and some can be accepted. There should always be an expectation that any security can be breached. Therefore, vigilance should always be maintained. According to IBM security experts, “An organization is ‘secure’ when it understands the risks, and is able to manage them so that, the costs used to reduce risk are commensurate with the expected business value.” As an operator of business, you have to balance the cost of a security with the benefits to your business. -CTm
It may be necessary to engage a security consultant to get the effort off the ground, but this should not be totally left in their hands unless there are some unusual circumstances. A qualified team leader, directly reporting to a high level executive, should be put in place to coordinate the activities of the group, provide briefings and updates to the executive team and to interface with any consultants who are retained. Source: IBM Corporation
A
2006 FBI survey reveals that computer crime in U.S. businesses has soared to around $678 billion per annum. The amount is staggering. FBI numbers show that 64% of all surveyed business respondents suffered financial loss from computer security incidents, and that the average per company cost was $24,000.
at home–and don’t do it right. These employees are often aware of company security policies, but are lax in applying them in an “outside” environment. Away from the office, employees are tempted to use their PCs for non-work purposes like shopping, or to open unknown e-mail messages while using non-trusted wireless links.
Security breaches can impact a company with its customers and with its bottom line. Some of the major security culprits are viruses, staff misuse and hacking. Add to that a particularly alarming and emerging threat in 2006: the activity of “botnets” that capture Microsoft Windows systems and servers during attacks and then “seed” them with software that receives commands from a remote attacker. In botnets alone, a billion dollar underground thrives on lax security practices at companies. They do it by compromising business and customer security. Identity theft and phishing attacks lead the way in botnet activity–and they can destroy the reputation of a company in an eye blink.
These security threats go hand in hand with Microsoft’s dominating position as the operating system and network of choice in over 90% of global business computers. When market share is so large, it is only logical that hackers and others with criminal intent focus their efforts on compromising Microsoft hardware, software and networks.
But botnets aren’t the only security threat out there when you are talking about Microsoft systems and networks. Buffer-overflow vulnerabilities still occur frequently with Microsoft operating systems. The overflows clog up machines and networks and can render corporate information systems inoperable. A third and leading source of security breaches is employees themselves. There is the traditional example of the disgruntled employee who tries to sabotage the system–but there are also many more examples of remote- or home-based employees who hook themselves up wirelessly
Several years ago, Bill Gates made it a corporate mandate for Microsoft to improve its quality assurance, with one of the chief goals being tighter security. However, Microsoft has only so many resources to devote to security and quality assurance testing for hardware, software and networks. Compare this to a Linux server with an Open Source operating system. Linux/OS literally has an entire global population of Open Source programmers testing and retesting software, hardware and networks. It is not a popular target for hackers and others with malicious intent. When it comes to security, the message for business is very clear: Continue to use Microsoft solutions if they are adopted in your business, because you already have an investment and your employees are comfortable with it. At the same time, take every step to ensure that your security software, hardware and practices give you every possible security protection. This includes ensuring that your IT staff has the knowledge and the experience to ensure that maximum security measures, practices and mitigation techniques are in place. -CTm
Controlling Your Network’s Microsoft Updates with WSUS By Allan Jacobs
L
et’s face it, users of Microsoft’s Operating Systems and Applications cannot avoid the installation of the updates and patches that the company provides at least once each month. There are far too many exploits created each day by all manner of lowlifes. Patches and updates are a crucial first step in establishing a secure computer system.
log. Then, based upon the needs of your enterprise, the updates will be approved as appropriate. Many administrators will automatically approve the updates for their workstations and laptop machines. This will insure that no significant delay in deploying the patches will occur. For your server systems, approval is best done after some testing of the update.
For home users running Windows XP the procedure is easy; you simply turn on Automatic Updates and the process takes care of itself. The Microsoft Update Service will download the software and install it on your system. While some of the downloaded fixes can cause problems, home users can hardly go through a careful testing and approving process.
There are several deployment scenarios for WSUS. Small to medium sized businesses with one physical location can easily manage their updates from a single WSUS server. Larger organizations, with a more dispersed infrastructure, will likely choose a hierarchical WSUS operation. In distributed WSUS you will likely choose to centrally download and manage your updates from a single “master” server, allowing simplified administration.
Those of us who manage business networks, must maintain greater command of our desktops, laptops and servers. Fortunately, Microsoft has provided us with the Windows Server Update Service (WSUS), which provides network administrators the necessary granularity to effectively organize our systems and approve updates prior to their deployment. Not only is WSUS a solid and dependable service, it is available as a free download from our friends in Redmond. WSUS can be installed on Windows Server 2003 Standard or Enterprise Edition, and while it can still be installed on Windows 2000 Server and Advanced Server (with SP4), the impending end of support of those products would make such a move shortsighted. Prior to performing the installation, there are several dependant services that must be running, including Microsoft’s web service IIS and its download manager BITS. The WSUS software and supporting documents can be obtained from the Microsoft website at http://www.microsoft. com/windowsserversystem/updateservices/downloads/WSUSSP1. mspx. Following the download, installation of the service is straightforward. The next step is the synchronization of the WSUS server with the Microsoft Update site. This will cause a download of the update cata-
To advertise with Computer Training Magazine Please Call 646-747-5682 To Subscribe Go to www.netcominfo.net/promo/subscribe
On the client side, each machine must be configured to point to the appropriate WSUS server, rather than the Microsoft Update site, for its patches. While you can edit the registry of each machine individually, virtually everyone with a Microsoft network is using Active Directory (AD). Using the Group Policy feature of AD you will be able to point machines to the necessary WSUS boxes with little effort. WSUS provides reports to confirm conformity with your update plans. These reports can provide information on particular computers in your network or the individual patches that you have approved. That information can prove quite valuable in assessing the health of your network. Permitting each work station in your network to obtain its updates directly from the Microsoft Updates site not only generates unnecessary traffic to the internet, but removes your ability to prevent some of those updates from being deployed. The capability to control what is installed on your computers and when it is installed is essential for all network administrators. WSUS gives you that control. -CTm
Allan Jacobs is a Senior Instructor at NetCom Information Technology and is a Microsoft Certified Trainer, a Microsoft Certified Systems Engineer, Microsoft Certified Systems Administrator and Microsoft Certified Desktop Support Technician. He also holds CompTIA’s Certified Technical Trainer designation as well as their Security+, Network+ and A+ certifications, among others. At NetCom Allan teaches the full range of Microsoft’s Operating System and Server System courseware, as well as the CTT+ preparation course.
Log Shipping
with
by Baya Pavliashvii
L
og shipping is one of several high availability solutions supported with SQL Server 2005. Unlike SQL Server 2000 the new version supports log shipping with Standard as well as Enterprise Editions–this is a welcome change for small to medium sized businesses that could not afford or don’t have a need for the Enterprise Edition. Log shipping concept is not new; it simply automates the process of backing up transaction logs of the primary database, copying the backups to the secondary server and applying the transaction log backups at the secondary database. The secondary server is always somewhat behind the primary server since it receives transactions only once in a while when transaction log backup is restored. However, the lag between the primary and secondary server databases can be minimized by shipping transaction logs frequently. When a disaster strikes and the primary server becomes unusable the secondary server can be brought online to handle application requests. The other component of log shipping is the optional monitoring server. Monitoring server simply allows you to check the status of SQL Server jobs that backup, copy and restore transaction logs. A separate monitoring server isn’t required–you can monitor log shipping from the primary or secondary server. Furthermore, you can use any edition of SQL Server for monitoring log shipping. The advantages of log shipping include easy set up, very little (if any) maintenance, no expensive hardware requirement and no single point of failure. Log shipping can be setup by configuring database properties as you’ll see shortly. The DBA must ensure that there is plenty of disk space on both primary and secondary servers to host numerous transaction log backups–typically no other maintenance is required. Unlike clustering log shipping doesn’t require expensive hardware certified by their manufacturers; you can easily configure log shipping between two laptop computers. Since primary and secondary servers do not share any common piece of hardware there is no single point of failure.
The drawback is that log shipping doesn’t support automatic failover. If you want your secondary server to automatically take over the application when the primary server becomes unavailable you’ll have to resort to more expensive solutions, such as failover clustering or database mirroring. With log shipping you’ll have to ensure that the secondary server has the most up-to-date transactions and that after the primary server fails the application connections point to the secondary server. Note that you can ship transaction log backups from a single primary database to multiple secondary servers, thereby minimizing the risk of downtime. For example, you could ship logs to several different data centers–if one data center loses power or experiences some other type of disaster you can resort to hosting your database at a different physical location. Another welcome improvement to log shipping functionality is that you can set it up through scripts. With SQL Server 2000 you had to run through database maintenance plan wizard to configure log shipping. Running through the wizard isn’t complicated but can get tedious if you want to configure multiple environments similarly. Furthermore, as any reasonable IT professional will admit it’s nice to have your system documented. The only way to document your wizard is to take screenshots of every step. The script is self-documenting and can be handed to relatively junior DBA’s without a risk of them choosing incorrect wizard options. To set up log shipping simply right click on the database and choose properties. Click on Transaction Log Shipping page within the resulting dialog (shown below) and check the box that says “enable this as the primary database in log shipping configuration.” Once you have configured backup details you need to advise SQL Server where to ship transaction logs the dialog box shown next. Before you can apply transaction log backups you need to take a full backup of the primary database and restore it on the secondary server–this process is called initializing the secondary database. You can let SQL Server initialize the secondary database for you or you can restore it manually. Once the database is initialized
10
11 it can remain in either standby or no-recovery mode; the standby mode allows read-only queries against the database whereas norecovery mode allows no user connections. I prefer the standby mode because it allows me to direct database developers to the log-shipped database if they need to troubleshoot any production issues. You can specify how often the transaction log backups should be restored, how frequently the backup files should be deleted and the location where backups should be copied on the secondary server.
ary server or a separate server for monitoring the status of log shipping jobs. You can review the status of log shipping by connecting to the monitoring server using SQL Server Management Studio, click on Summary tab and choosing Transaction Log Shipping Status from the Reports menu. -CTm Baya Pavliashvii is a senior database administrator serving as an independent database consultant for various businesses in Middle Tennessee.
At this point you’re finished specifying the necessary options for log shipping–you can click OK button on the dialog to add log shipping jobs or click Script Configuration button to review the system stored procedures used to setup log shipping. You should save the configuration script even if you wish to setup log shipping using the graphical user interface. As I mentioned earlier you can use the primary server, the second-
He has managed database administrator teams as well as terabyte size databases and data warehouses. His primary strengths include data warehousing with Analysis Services, replication and performance tuning.
Advance Your Skills. Prepare for Microsoft SQL Server 2005 now. Microsoft SQL Server 2005 is a significant release with hundreds of new and
Maximize effectiveness with training.
improved features. The
of the curve by taking advantage of Microsoft SQL Server 2005 courses. As a
largest SQL Server release
MS Certified Partner for Learning Solutions, we currently offer two Boot Camps:
Training helps you improve your productivity and stay competitive. Get ahead
to date, it will provide the most dependability, scala-
MCTS: SQL Server 2005 - Boot Camp
bility, and security features
2780: Maintaining a Microsoft SQL Server 2005 Database - Accelerated Version (2.5 days)
of any previous version of SQL Server. Changes to the architecture, toolset, and
Overview This instructor-led course provides students with product knowledge and skills needed to maintain a Microsoft SQL Server 2005 database.
features focus on fundamental advancements in
2779: Implementing a Microsoft SQL Server 2005 Database - Accelerated Version (2.5 days)
three key areas:
Overview This Instructor-led course provides students with product knowledge and skills needed to implement a Microsoft SQL Server 2005 database.
ENTERPRISE DATA MANAGEMENT
• High availability for enterprise applications • Key security and performance features
Target Audience These courses are intended for IT Professionals wanting to become skilled on SQL Server 2005 product features and technologies for implementing a database.
• Focus on self-manageability and optimization DEVELOPER PRODUCTIVITY
• Integration with Visual Studio and .NET
The new generation will be composed of:
®
• Native XML technology
Credentials
• Interoperability via Web services
Figure 1.
Figure 2.
BUSINESS INTELLIGENCE
Establishing the primary database is a necessary early step in setting up log shipping.
SQL Server can initialize the secondary database for you; alternatively, you can restore it manually.
• Integrate and transform data
Based on a survey by Certification Magazine out of the 850 certifications and more than 200 certification programs in today’s IT certification landscape here are the top 10. 1. 2. 3. 4. 5.
Certified Professional Information Technology Consultant (CPITC) Cisco Career Certifications (Associate, Professional and Specialist) Cisco Certified Internet-work Expert (CCIE) Novell Certified Linux Engineer (CLE) Novell Certified Linux Professional (CLP)
6. 7.
Oracle Database 10g Administrator Certified Master (OCM) Oracle Database 10g Administrator Certified Professional (OCP) 8. Red Hat Certified Engineer (RHCE) 9. Red Hat Certified Technician (RHCT) 10. Sniffer Certified Master
For information on certification requirements please see NetCom Information Technology’s enclosed catalog or visit their Web site at www.netcominfo.net/certifications.
2781: Designing Microsoft SQL Server 2005 Server-Side Solutions- Acc. Vers. (2.5 days)
Overview This instructor-led course provides students with product knowledge and skills needed to maintain a Microsoft SQL Server 2005 database. 2782: Designing Microsoft SQL Server 2005 Databases- Acc. Vers. (1.5 days)
Overview This two-day instructor-led course provides students with the knowledge and skills to design databases for Microsoft SQL Server 2005 using business requirements to guide their decisions. 2783: Designing the Data Tier for Microsoft SQL Server 2005- Acc. Vers. (1 days)
Overview Microsoft Certified IT Professional: Database Developer (MCITP: Database Developer) is the premier certification for database designers and developers. 2784: Tuning and Optimizing Queries using Microsoft SQL Server 2005- Acc. Vers. (2 days)
Overview Microsoft Certified IT Professional: Database Developer (MCITP: Database Developer) is the premier certification for database designers and developers.
• Analyze, store, and mine data Target Audience These courses are intended for current professional database developers who have three or more years of on-the-job experience developing SQL Server database solutions in an
• Report and interact with data
TOP 10 IT CERTIFICATIONS
Certifications
MCITP: DB Developer SQL Server 2005 Boot Camp
Get ready for Microsoft SQL Server 2005. Contact NetCom today ! www.netcominfo.com
NetCom Information Technology 350 5th Ave, 717 New York, NY 10118 1.888.563.8266
©2005 Microsoft Corporation. All rights reserved. Microsoft and SQL Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
12
13
Proving Yourself
W hat C e r t i f i c a t i o n s Can D o f o r Yo u a n d H o w B y M u d i t M i t t a l , GM N e t C o m I n f o r m a t i o n T e c h n o l o g y
H
ow do you convince others that you really have the computer skills you say you have? You could tell your peers about your expertise or list your proficiencies on your resume for the benefit of prospective employers, but a more convincing and impressive way to market yourself is to become certified. Certifications are recognized as industry standards or benchmarks. People in the know understand what certifications represent – and recognize that if you are certified, you know what you say you know. Let’s consider an example: An employer would like to hire a networking engineer to plan, design and implement a Microsoft-based infrastructure network for the organization. A network engineer must know how to install, configure, administer and maintain the network as well as design and support server systems and software. Candidates who demonstrate that they have several certifications leading up to the required qualifications make the search easier for the employer and also have a higher chance of landing the job. A candidate with the following certifications will stand out: • • • • •
A+, Network+, and Security+ certifications from CompTIA CCNA (Cisco Certified Network Associate) MCSA (Microsoft Certified System Administrator) MCSE (Microsoft Certified System Engineer) CCNP (Cisco Certified Network Professional)
to
Get Them
many candidates fall prey to distractions and the lengthy lead time required by self-study. Instead, a preferred method for ensuring success is to take training classes to prepare specifically for certification exams. In an instructor-led training class, other students will share your objectives, which helps serve as an excellent motivator to help you prepare for the exams. Ideally, an expert instructor can also help you identify nuances and tricks that will help you pass the exams. One popular training format that helps prepare students for certifications is known as bootcamps. While providing training and some hands-on labs, bootcamps also focus on certification preparation. Bootcamps are not for everyone; students who do not have the right background would not benefit from the class and can slow the class down. A good training company will help you determine your strengths and offer you alternative ways to prepare for certification, such as a pre-requisite bootcamp or a regular paced class.
by Eileen Mullin
W
hether the Web site you’re in charge of producing will be designed by committee or micromanaged by an especially picky client, you may find yourself in need of a fast way to present–and quickly make changes to - several design mock-ups. In this situation, Photoshop can come to the rescue; you can avoid the time-consuming work of coding an entire template that may later require significant redesigning, and showcase several color schemes by simply adding layers to the .PSD file containing your site layout. This tutorial will introduce several real-world Photoshop tips, tricks and techniques you can use when mocking up your next Web site. You’ll also discover shortcuts for reproducing the look of elements that are standard fare in HTML and CSS–dashed lines, for example– that may not be obvious to create when working in Photoshop.
Use Smart Objects to create buttons
Do your research. Some things to look for and ask before you decide
Even experienced designers sometimes miss out on using the latest powerful features in programs like Photoshop because they’re used to completing tasks a certain way. If you’re not familiar with Smart Objects, added in Photoshop CS2, you’ll be relieved to discover that it can eliminate much of the tedium associated with creating and editing a series of images that share many of the same formatting characteristics–for example, buttons on a navigation bar.
include: • Who would your instructor be? Does he or she have the certification you are going to be studying for? How many years of teaching and industry experience does the instructor have? • Is there real learning or would you end up cramming and regurgitate the answers to become certifiied. What kind of test preparation tools does the company use? What kind of facility, classroom setup and equipment would be available to you? Where would you take the exams once you feel ready? Can this be done at the training location or do you have to schedule it separately? Most importantly, always ask for references or look for testimonials!
Do organizations really see the value of certifications? The answer is a resounding YES!
•
For organizations, certifications identify credentials that can be used to search for the right employee. Many organizations also offer training and certification as motivators and benefits to staff members, while enabling those employees to maintain their IT skills for business needs.
•
On an individual level, IT professionals have learned that certifications will help them stand out. Besides demonstrating a certain level of competency, a certification proves to an organization that these employees are committed to their cause and have invested time and money to prove it. Certifications also make the holder more valuable as an employee, and can often result in raises and promotions.
Mudit Mittal has been in the technology training industry for over six years; he has been instrumental in bringing certification solutions to organizations and IT professionals. He started and spearheaded the bootcamp division for NetCom Information Technology. NetCom’s bootcamp training division has become a nationally reckoned name in less than 2 years, recognzed for high quality training and custome oriented service. Mudit, holds an MBA with a Technology and Marketing focus, from Indiana University’s Kelley School of Business and a Bachelor of Technology from Indian Institute of Technology.
So how can you get certified? You must pass certain exams specific to your area of expertise. While some certifications like Network+ or Security+ require only one exam each, certifications like CCNP require four and MCSE require seven. The key is to preparing yourself sufficiently to take and pass the exams. It’s possible to prepare for the exams by studying on one’s own, but
Designing Corporate Web Layouts with Photoshop
What should you look for in choosing a class?
Credit where credit is due
How to show what you know
When Image is Everything:
•
•
Figure 2. You can automatically update your buttons’ design with a navigation bar based on Smart Objects. Edit just the original, and all instances of that button will change.
Let’s create a new document with a plain button on its own layer. To convert this button layer into a Smart Object choose Layer>Smart Objects>Group into New Smart Object. Duplicate the Smart Object button layer to make additional buttons, each on its own layer, and use the Move tool to drag each one to its own position along the navigation bar. Now let’s start formatting the look-and-feel of your buttons. You can change the size or style of just one of the Smart Object buttons and the rest will change at once to match. To do this, select your first Smart Object’s layer in the Layers palette, choose Layer>Smart Objects>Edit Content, and click then OK. Your original button opens in a separate window, where you can resize it (Edit>Free Transform) or apply a new style (e.g., choose a chrome style from the Style palette). When you’re done making changes, choose File>Save As, which will save the button as a .psb file in a temporary folder. Now return to your original Photoshop document; you will find that all of the navigation bar buttons have updated their size and style. Repeat as often as you need to fine-tune the button’s design; all of the work involved in updating the button’s copies will be done for you every time–which can save you a great deal of time when designing any recurring site elements.
Mix-and-match color Schemes Switching color schemes easily is an important component of designing Web sites, whether you’re making multiple tints of a single template or just trying to get the site’s theme exactly right. Photoshop streamlines this process with two good-to-know-about features: fill layers and clipping masks.
Figure 1. Converting a Web button graphic into a Smart Object.
14
15
Industry News
Let’s start by creating a fill layer containing any solid color you like. Choose Layer>New Fill Layer>Solid Color. Next, we’ll create a clipping mask that can utilize the color you chose a moment ago in your fill layer. The main trick to using clipping masks is that the colored layer (the fill layer you created above) must appear above the layer you intend to mask it to in the Layers palette. The layer underneath the fill layer–let’s call it Content1–should contain content whose color you want to experiment with changing–for example, buttons, lines, drop-down menus, or colored icons. While you have your color layer selected in the Layers palette, choose Layer>Create Clipping Mask. The color in your color layer should now replace the color in the underlying Content1 layer, wherever content appears. If you look at the Layers palette, you’ll see that your color layer appears to have shifted slightly to the right, with a tiny down arrow pointing down to the Content1 layer beneath it. The most useful part of this technique is that you can easily change the color of an element by double-clicking on your Color Fill layer and choosing a new solid color.
Microsoft Software Assurance Overview Software Assurance Gives You a Business Edge
B
usinesses rely on Microsoft software to help achieve objectives, solve business problems, and gain an edge in today’s competitive environment. As software continues to evolve and improve, businesses and IT professionals would like tools and assistance to facilitate deployment and maximize operational efficiency. With Microsoft® Software Assurance, you can acquire tomorrow’s technology at today’s prices, and access training and deployment resources that enable employees to work more efficiently than ever.
Figure 4. There are a number of workaround techniques for creating dashed and dotted lines in Photoshop; one of the most straightforward is to use the Brushes palette.
each instance of the brush tip’s appearance. Increase the roundness if you want to stretch the dash into a longer line. To make vertical dashed lines easily–useful for sketching in vertical rules and adding bordered boxes in a Web page mock-up–you just change the Angle setting in the Brushes palette to 90 degrees. When you’re happy with the way your new brush looks, be sure to give it a meaningful name; this may turn out to be one of the brushes you’ll use most frequently!
Figure 3. You can use clipping masks to change the color scheme in a Web page mock-up quickly and easily.
At its heart, what makes Photoshop particularly nice for creating layouts is its capacity for letting you visualize and then execute the design details you want. At that point, you–or another HTML coder, if one is available–can create the CSS code to generate your template’s look-and-feel and go from there.
In listening to our customers and understanding how technology is used, Microsoft strives to develop software that meets your organization’s ever-changing needs. An important part of maintaining a business edge is the ability to keep software and technological assets current in the most cost-effective manner possible. This is why the Volume Licensing programs available from Microsoft, in conjunction with Software Assurance, are powerful resources to help your organization maintain a competitive advantage. Software Assurance gives your business the edge to: • Succeed in the competitive business world by taking advantage of the latest technology and the ability to spread payments annually. • Respond to your customers’ demands for real-time business solutions using the latest Microsoft software. • Capture new business opportunities quickly and effectively by greatly streamlining the procurement process. Software Assurance can help you realize more value from your software with several key benefits that can save time and money and help your business realize its fullest potential.
Creating dashed lines and borders You can create your own version of dotted and dashed lines within Photoshop easily by editing one of the brushes in the Brushes palette, as shown in Figure 4. This palette features a Spacing option that lets you create evenly spaced dashes. The Roundness option in the Brushes palette lets you flatten a square brush into a flat, elongated dash. First, choose a tool that uses brushes, such as the Pencil Tool or Brush tool. Now make sure that the Brushes palette is visible, using the Window menu if necessary to display it. Choose a brush to start with, based on your preferences for how thick, square, or round the dots or dashes should be. Now drag the slider to increase the spacing in the Brushes palette; you’ll see a preview of how the enlarged spacing ha separated
Enables Easier Budgeting For companies that want greater flexibility in managing technology expenditures, Software Assurance lets you spread payments annually, instead of incurring one up-front payment. This lets you reduce initial costs and forecast annual software budget requirements up to three years in advance. Extends the Workplace to the Home Office Software Assurance provides a simple way to help increase employee productivity and maximize the value of your Microsoft Office investment by enabling employees to work at home. Through the Home Use Program, your employees can get a licensed copy of select Microsoft Office desktop programs for which they are licensed at work to install and use on a home computer.
Enhances Productivity Through Training and Support Software Assurance not only provides your employees with the latest software, it also offers eLearning and instructor-led training so they can quickly take advantage of the most innovative technology and work more efficiently. IT professionals also have convenient access to support resources to stay up to date on the latest technical information, find answers to their questions, and get problem resolution support to help keep business systems running. Learn More About Software Assurance Training Vouchers As a Microsoft Certified Partner for Learning Solutions (formerly known as Microsoft Certified Technical Education Center), NetCom Information Technology proudly accepts Microsoft Software Assurance Electronic Training Vouchers. If your organization participates in Microsoft Software Assurance, you can attend Microsoft technical training at NetCom Information Technology for free! Call 8 8 8 . 5 6 3 . 8 2 6 6 or send an e-mail to info@netcominfo.net
Eileen Mullin Eileen Mullin is a graphic designer and computer consultant who handles contract work for a variety of corporate clients. Eileen provides computer tutoring for families through her sole proprietorship GenuineClass (www.genuineclass.com). She is the author of five computer how-to books on XML, Internet services and Adobe Photoshop. Previously, Eileen was vice president of global HR Internet Strategy for Merrill Lynch, where she oversaw human resources Web sites and applications for the firm worldwide. Before that, she served as program director, content programming for ibm.com, and as an editor for several computer industry book and magazine publishers.
Facilitates Deployment Tools included with Software Assurance make it easier for IT professionals to deploy new product versions, updates, and other content to all desktops and servers, at their own pace. As a result, you save time and resources, and ensure that all employees are working in the same software environment. Offers Access to Latest Software Software Assurance gives you the rights to run new versions of licensed software as they become available during the term of your agreement. You can reduce the costs associated with acquiring new version releases and avoid lengthy purchasing cycles, while still reaping the benefits of technology that helps you stay competitive.
16
17
Industry News
Industry News 02 November 2006
Novell & Microsoft Collaborate Customers Win.
“Too often technology companies ask their customers to adapt to them. Today WE are adapting to our customers.” Ron Hovsepian CEO, Novell Microsoft and Novell, starting today, have agreed to build and market solutions so that Novell’s technology works on Microsoft’s and vice versa. Specifically, customers will now be able to run virtualized SUSE Linux Enterprise on Windows or Windows on SUSE Linux Enterprise. This landmark agreement also calls for both Microsoft and Novell to provide patent coverage to each others’ customers for our respective products. Why is that important? It’s important because our customers shouldn’t have to worry about legal matters when it comes to which operating system they use. They also shouldn’t have to worry about barriers such as intellectual property agreements, who owns which patent portfolio, and indemnification. None of those issues move their business forward. Now many of those barriers have been removed. I am also proud to tell you that earlier today Novell and Microsoft demonstrated, by our words and actions, that we can work together for the mutual benefit of our customers. Steve Ballmer, Microsoft’s CEO, was very passionate and genuine in his support for this agreement. He
spoke about how it will help customers leverage both the Microsoft Windows platform as well as our SUSE Linux Enterprise platform. He said this combined solution will give customers choice and flexibility in building their technology environment. As we all know, choice and flexibility are both something our partners often complain are in short supply. We’re determined to change that. I titled this a “landmark” announcement, and I truly believe it is. Transformational in its scope and important to us, our customers and our partners on many levels. You may wonder how this changes our relationship with Microsoft. It’s no secret we’ve competed with them in the past. And we still will. However, it’s also important for us all to remind ourselves that all organizations, particularly those in our industry, need to adapt and change. Further, for whatever differences we’ve had with Microsoft over the years, we also share a number of the same values. A strong belief in building solutions for our customers and an unwavering belief in the power of technology and innovation. This is the beginning of a new and exciting chapter for Novell. It’s also a new and exciting opportunity for us together. Working together we can do a better job for the customers we serve. I’m truly excited about this transformational announcement. The payoff will be better results where it counts most. On helping us deliver innovative solutions so our customers can grow and innovate. We look forward to working together.
N
ovember 13, 2006. In a historic move, Sun is opening the door to greater innovation by open sourcing key Java implementations such as Java Platform Standard Edition (Java SE), Java Platform Micro Edition (Java ME), and Java Platform Enterprise Edition (Java EE)—under the GNU General Public License version 2 (GPLv2), the same license as GNU/Linux. Sun is now the biggest contributor to the open-source community. Already Sun has released open-source implementations of its Solaris Operating System, NetBeans, Project Looking Glass, Project JXTA, Jini, OpenOffice, OpenSPARC, and Java EE technologies and is continuing on its path to open all of its middleware. By adding a second GPLv2 license to Java EE, which was previously available under the CDDL license through Project Glassfish, Sun is now open sourcing all core Java technologies under the same license.
Through this move, Sun is helping to: •
•
FAQ Q. What are they announcing? Novell and Microsoft are announcing an historic bridging of the divide between open source and proprietary software. They have signed three related agreements which, taken together, will greatly enhance interoperability between Linux and Windows and give customers greater flexibility in their IT environments. Under a technical cooperation agreement, Novell and Microsoft will work together in three primary areas to deliver new solutions to customers: virtualization, web services management and document format compatibility. Under a patent cooperation agreement, Microsoft and Novell provide patent coverage for each others customers, giving customers peace of mind regarding patent issues. Finally, under a business cooperation agreement, Novell and Microsoft are committing to dedicate marketing and sales resources to promote joint solutions.
Q. What does this mean for Linux? Novell and Microsoft recognize that many customers have, and will continue to have, multiple platforms, including Linux and Windows, in their environments. Customers are asking for highly reliable, secure, and interoperable solutions. Enabling easy and powerful virtualization of Linux on Windows and Windows on Linux is a great
step forward towards this goal. Novell will continue to promote Linux as the premier platform for core infrastructure and application services. This deal strengthens Novell’s commitment to the community through leading-edge development projects as well as the continued promotion of Linux in the marketplace. Novell recognizes the significant contribution open source developers have made to Linux and their reliance on the General Public License. The patent agreement signed by Novell and Microsoft was designed with the principles and obligations of the GPL in mind. Under this agreement, customers of SUSE Linux Enterprise know they have patent protection from Microsoft in connection with their use of SUSE Linux Enterprise, further encouraging the adoption of Linux in the marketplace.
•
Fuel innovation and build broader developer communities by enabling interested Java developers, as well as developers in the GNU/Linux community, to contribute more easily to the evolution of Java technology Drive faster evolution of the Java platform and adoption by new developers and in new markets while ensuring platform quality and flexibility Allow the 5 million Java developers worldwide to leverage platform enhancements and speed time to market for new applications
Enlisting the World to Innovate For the past 11 years, Java technology has enabled developers to Write Once, Run Anywhere. Sun’s commitment to compatibility and choice has made Java the most widely deployed application platform. Java technology is currently used on more than 4 billion devices worldwide and the Java ME platform ships on more than eight of every 10 mobile handsets.
Q. Will Novell and Microsoft stop competing? This agreement is focused on building a bridge between business and development models, not removing competition in the marketplace. We will continue to compete in a number of arenas, including the desktop, identity and security management, and systems and resource management. At the product level, Windows and SUSE Linux Enterprise will continue to compete; however, the agreement is focused on making it easier for customers who want to run both Windows and Linux to do so. This is a very common relationship for large businesses where we simultaneously partner and compete in different areas.
Sun believes Java technology has reached the right level of maturity, adoption, and innovation—with widespread use across enterprises and devices—to move into the next stage of its evolu-
tion. In the largest single contribution under the GNU GPL, Sun is releasing all of its key Java implementations under this widely respected free-software license:
Open-Source Opportunities By open sourcing its Java implementations, Sun will open new market opportunities, fuel innovation, and drive broader adoption of this Web 2.0 platform while minimizing fragmentation in the mobile community by delivering a consistent application platform across devices. Developers and ISVs can build differentiated Java technologybased applications and value-added Web. 2.0 services more quickly through access to the latest Java source code. Developers can improve platform quality and functionality by contributing feature enhancements, bug fixes, and testing results to the open-source Java initiatives. Customers can lower costs and protect technology investments by taking full advantage of open-source business models that allow for free substitution of alternative operating systems, architectures, middleware, and devices on industry-standard hardware. Governments and educational institutions can reap the benefits of open-source Java technologies while ensuring security, privacy, and datacenter control. GNU/Linux distributors can add no-cost Java implementations to their distributions, while customers with stringent open-source requirements can deploy a free, reliable Java software stack on most GNU/Linux distributions. Sun is taking careful and deliberate action as it open sources its Java technology implementations to help ensure that Java remains a central unifying standard for the Internet. Whether developers and customers choose to use Sun’s commercial Java platforms or new open-source implementations, Java technology will continue to deliver the compatibility, stability, and quality required to turn Web 2.0 advancements into competitive advantage.
Need Java Training? Contact NetCom Information Technology, The Technical Training Leader ™ at 888.563.8266 or visit www.netcominfo.net
18
19
Employment Opportunities
Employment Opportunities
EMPLOYMENT OPPORTUNITIES...
...AT NETCOM INFORMATION TECHNOLOGY
About NetCom NetCom is an authorized training center recognized by industry leaders such as Adobe, Autodesk, Cisco, Citrix, CIW, CWNP, Check Point, CompTIA, EC-Council, IBM, IWA, Linux Institute, Microsoft, Novell, Quark, Sair Linux and Zend. NetCom is also an authorized testing center for Sylvan Prometric and VUE, and is a NY Workforce Training Provider and a Licensed School registered with the New York State Education Department.
NetCom is a fun and fast-paced place to work. We focus on providing the best solution to our clients. We offer our clients a wide range of training options – from open enrollment classes to creating customized training solutions delivered at their location or ours. We utilize various delivery mediums to provide training including instructor led in-class or online, or self study options. We provide training on technology as well as application courses, with a focus on improving work productivity for our clients.
TECHNICAL TRAINERS / INSTRUCTORS
To apply, please visit our site and create a new profile https://portal.netcominfo.com/instructors
SALES MANAGER
SALES POSITIONS
• Can you motivate people to perform at their highest level? • Do you like a fast-paced work environment?
The Opportunity This is an amazing opportunity to join NetCom Information Technology. We are growing rapidly and have immediate needs for multiple sales positions. • Educational Consultants / Account Executive • Sales Manager • Enterprise Account Manager
EDUCATIONAL CONSULTANT / ACCOUNT EXECUTIVE This is an inside sales position. You will receive incoming leads for prospects interested in training. The main responsibility is to identify business opportunities within incoming leads, explore client needs and suggest training solutions. Candidate must be able to gain a solid understanding of NetCom’s course offerings during new-hire training program to be able to suggest appropriate training solutions. Responsibilities include:
The Opportunity
Our ideal Sales Manager candidate should have 4+ years of direct sales experience selling to corporate upper level Decision Makers and a strong history of leadership in building, managing and establishing a successful sales team. You will be a coach and mentor to our sales team while you help them through goal progression into senior level salespeople. Integrity, honesty and creative thinking are all part of the everyday job role! Your primary focus will be to develop a sales team of 16 – 20 salespeople through our proven Sales System. We will train you on how to successfully implement this “System”, which dominates our computer training industry. Prior training industry and/or technology sales experience a plus. As a Sales Manager you will report to the General Manager and be an integral part of a close-knit center management team.
The Successful Candidate should possess:
This is an amazing opportunity to join NetCom Information Technology. As a customer-service focused company, we pride ourselves in being able to help our clients define and meet their growth objectives by providing pertinent and high-quality training.
• • • •
Creating proposals and maintaining client relationships Meeting sales and collection goals Cloing deals over a short sales cycle Following NetCom’s account management policies
We are growing rapidly and have immediate needs for the qualified instructors. Effective instruction is an integral reason of our growth and we rely on expert instructors for providing our clients with the same. We highly value customer service and value our instructors the same way we value our clients.
• Sales experience required, IT training industry preferred • Excellent communication and negotiation skills • Demonstrated ability to build and maintain a strong sales pipeline • High productivity with minimal supervision • Dynamic, straightforward and honest team player • Excellent customer service skills • Excellent follow-up skills • Excellent phone skills • Excellent organizational skills • Computer / MS office / Internet savvy
Qualifications include:
We are always looking for certified individuals, with hands-on as well as teaching expertise in various technology areas. NetCom will help and train the right candidates to excel as technical trainers.
Areas include Autodesk, Check Point, Cisco®, CISSP, Citrix, CIW, CompTIA, CWNP, EC-Council, Linux Professional Institute, Microsoft MBS, Novell, Oracle A
In this section we will present you with a list of IT related positions In the Tri-State area. Be sure to check our next issue for more opportunities
• • • • • • • •
Experience in prospecting and getting appointments Strong negotiating skills with C level management DM’s Ability to learn and coach others on our training offerings S.P.I.N. or Microsoft Solutions Selling a plus Excellent inside and face-to-face corporate sales experience Ability to think out of the box to provide custom solutions Excellent verbal and written communication skills Proficiency in computer desktop software applications
ENTERPRISE ACCOUNT MANAGER Looking for a great career, offering strong financial rewards in one of today’s hottest industries? If you have the desire to be a part of a winning team you may be a candidate for this outstanding opportunity in Enterprise Learning
Solutions at NetCom Information Technology. The pace is fast, the atmosphere positive and exciting, and the rewards and opportunities unlimited.
Responsibilities: The primary responsibility of the Enterprise Account Manager is to cultivate relationships and sell NetCom’s product to major account prospects and clients such as Fortune 1000 and larger based companies.
Your specific responsibilities will include: • • • • •
Generating revenue by selling to enterprise customers Responsible for reviewing proposals Setting strategies to assure overall client satisfaction Expected to close a minimum of $2 million in annual sales The EAM integrates strategic sales techniques into sales training programs to improve the overall performance of the team
Qualifications: The ideal Enterprise Account Manager is a leader, a seasoned sales veteran, and a true team player. Successful EAM’s will demonstrate well developed presentation skills, strong business acumen and successful background in IT Training sales and/or demonstrated success in selling similar IT service to major accounts is essential. Strong communication and negotiating skills a must!
Requirements: • • • • •
College degree required 3-5 years in major account sales in IT training or services Experience nurturing successful C- level relationships Dynamic team player with excellent presentation skills Training in SPIN Selling techniques a plus
To apply, send resume and cover letter to jobs@netcominfo.net. Please mention position in the subject line.