NETWORK WORLD NEWSLETTER: LINDA LEUNG ON IT EDUCATION AND TRAINING 11/03/04 Today's focus: What's on the training agenda for 2005?
Dear [EMAIL PROTECTED], In this issue: * A training company identifies four key growth areas for ��training in 2005 * Links related to IT Education and Training * Featured reader resource _______________________________________________________________ This newsletter is sponsored by Red Hat Software RED HAT TRAINING: Enroll now and get gear Improve your skills and boost your career with Red Hat's performance-based training courses--RHCE, RHCT, and more! Learning has never been easier; test your smarts and identify your course level with our free online pre-assessment exams. Then, enroll today and get cool Red Hat gear, a $100 value! http://www.fattail.com/redir/redirect.asp?CID=85796 _______________________________________________________________ NW TECHNOLOGY INSIDER: STORAGE ILM With real benefits in terms of saving money and making business run more smoothly, information lifecycle management deserves a closer look. In this in-depth technology review, we profile users who are on the cutting edge of ILM and describe how ILM can be one of the building blocks of the new data center. Click here: http://www.fattail.com/redir/redirect.asp?CID=86084 _______________________________________________________________ Today's focus: What's on the training agenda for 2005? By Linda Leung Information security, VoIP, Java and Linux are key growth areas for training in 2005, according to training provider The Training Camp. The company, which is projecting 2004 revenue growth from its security, Java and Linux training courses to be 54%, 32% and 27%, respectively, says the demand for Linux and Java certification training will continue to grow next year. And as an illustration of the high demand for security training, The Training Camp anticipates that security will make up a third of its revenue this year, from zero two years ago, says Chris Porter, president at The Training Camp. Why should any of this be of interest to you? Because the programs that training companies offer are a good reflection of the technologies customers are demanding in the market, and also, the attendee profile is a good indicator of where a certain technology is in its cycle. For example, the cost-savings promise of VoIP has caused a demand in training in this technology. Porter says it was The Training Camp's customers who first brought VoIP to his company's attention. The company first rolled out its practitioner-level VoIP training program six months ago and now runs a public class every month, from one class every two months when the program was first introduced. It will also provide between 20 and 30 private classes over the next quarter. Most of the students are from consulting firms, which indicate that end-user organizations are at an evaluation stage and are demanding VoIP consultancy from their business partners. Porter expects to see more students from end-user organizations next year, as they begin to adopt VoIP. He adds that he is also seeing interest in VoIP training from the military, government agencies, and telco carriers and equipment manufacturers. The Training Camp's information security course is targeted at senior managers charged with building a security strategy. The demand for such training reflects the higher focus that organizations are assigning to security and the companies' desire to develop an enterprise-wide secure strategy that brings all their security efforts together. The Training Camp's program covers penetration testing, ethical hacking and forensics, and students are prepared for the Certified Information Systems Security Professional exam, which is governed by (ISC)2. Linux is another growth area for The Training Camp, which offers exams for the systems administration certification of the Linux Professional Institute. Porter believes there are several issues driving the demand for Linux training, including companies seeking to lower TCO and lessen their reliance on Microsoft technology. Interestingly, Porter says The Training Camp has seen a lot of interest in Linux training from the auto industry - perhaps this has to do with the increased competition in this industry, which is leading auto manufacturers to seek lower cost computing environments? It was surprising that The Training Camp singled out Java as a training growth area in 2005. "With the proliferation of mobile devices and set-top boxes, Java development is a core competency that Web application firms are looking for to build hardware-independent applications," says Porter, adding that Java enrollment has run full over the past six months. RELATED EDITORIAL LINKS More about The Training Camp http://www.trainingcamp.com/us/flashed.asp _______________________________________________________________ To contact: Linda Leung Linda Leung is associate online news editor at Network World and is responsible for editing many of Network World's e-mail newsletters and news stories for Network World Fusion. She is a regular contributor to Network World's Management Strategies section, which examines the career and management issues of network executives.She can be reached at <mailto:[EMAIL PROTECTED]> Network Security Structuring an aggressive defense no enterprise is exempt from attack - protected or not. The difference between safe and sorry? Preparation. This foundation event helps managers build the integrated shield and deploy the rapid response needed when a network is tested. Free to qualified professionals. <http://www.nwfusion.com/NSF4N9> _______________________________________________________________ This newsletter is sponsored by Red Hat Software RED HAT TRAINING: Enroll now and get gear Improve your skills and boost your career with Red Hat's performance-based training courses--RHCE, RHCT, and more! Learning has never been easier; test your smarts and identify your course level with our free online pre-assessment exams. Then, enroll today and get cool Red Hat gear, a $100 value! http://www.fattail.com/redir/redirect.asp?CID=85795 _______________________________________________________________ ARCHIVE LINKS Newsletter archives http://www.nwfusion.com/newsletters/ _______________________________________________________________ FEATURED READER RESOURCE NW CLEAR CHOICE TESTS The Network World Lab Alliance is a coalition of industry experts, network integration consultants, independent test labs and universities who conduct single-product reviews and head-to-head comparative tests in real enterprise network settings. Find out which products get the "thumbs-up" in categories such as web front-end devices, WLAN security, anti-spam and more at: <http://www.nwfusion.com/reviews/> _______________________________________________________________ May We Send You a Free Print Subscription? You've got the technology snapshot of your choice delivered at your fingertips each day. Now, extend your knowledge by receiving 51 FREE issues to our print publication. Apply today at http://www.subscribenw.com/nl2 International subscribers click here : http://nww1.com/go/circ_promo.html _______________________________________________________________ SUBSCRIPTION SERVICES To subscribe or unsubscribe to any Network World e-mail newsletters, go to: <http://www.nwwsubscribe.com/Changes.aspx> To unsubscribe from promotional e-mail go to: <http://www.nwwsubscribe.com/Preferences.aspx> To change your e-mail address, go to: <http://www.nwwsubscribe.com/ChangeMail.aspx> Subscription questions? Contact Customer Service by replying to this message. This message was sent to: [EMAIL PROTECTED] Please use this address when modifying your subscription. _______________________________________________________________ Have editorial comments? Write Jeff Caruso, Newsletter Editor, at: <mailto:[EMAIL PROTECTED]> Inquiries to: NL Customer Service, Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 For advertising information, write Kevin Normandeau, V.P. of Online Development, at: <mailto:[EMAIL PROTECTED]> Copyright Network World, Inc., 2004 ------------------------ This message was sent to: [EMAIL PROTECTED]
