Professional certification (computer technology)

(Learn how and when to remove this template message)

Professional certifications in computer technology are non-degree awards made to those who have achieved qualifications specified by a certifying authority. Depending on the particular certification, qualifications may include completing a course of study, proof of professional accomplishments, achieving a specified grade on an examination. The intention is to establish that an individual holding a certification is technically qualified to hold certain types of position within the field.

Certifications, generally, need to be renewed periodically, or may be valid for a specific period (e.g. the lifetime of the product upon which the individual is certified). As a part of a complete renewal of an individual's certification, it is common for the individual to show evidence of continual learning — often termed continuing education — or earning continuing education units (CEU). Certification is often used in the professions of information technology industry.

Some certification programs are oriented toward specific technologies, and are managed by the vendors of these technologies. These certification programs are tailored to the institutions that would employ people who use these technologies.

General certification

General certification of software practitioners has struggled. The ACM had a professional certification program in the early 1980s, which was discontinued due to lack of interest. Today, the IEEE is certifying software professionals, but only about 500 people have passed the exam by March 2005.

Information systems security

In an information systems environment that requires formal security accreditation, Certification refers to the comprehensive evaluation of the technical and non-technical security features of an information system.

Certification is formally defined by Krutz and Vines as:[This quote needs a citation]

The comprehensive evaluation of the technical and non-technical security features of an information system and the other safeguards, which are created in support of the accreditation process to establish the extent to which a particular design and implementation meets the set of specified security requirements.

Software testing

Criticisms

The current proliferation of IT certifications (both offered and attained)[citation needed] has led some technologists to question their value. Advanced training content that has been distributed on the Internet allows some to gain credentials without the implied depth or breadth of expertise beyond the certification material. Certifying agencies have responded in various ways: some now incorporate hands-on elements, anti-cheating methodologies or have expanded their content. Others have expired and restructured their certificate programs, and/or raised their fees to deter abuse.

Education

Research on college students and high school students has been done to determine whether relevant Information Technology industry certification is an asset to the teaching profession as they appear to be in the business world.

The studies investigated CIS/IT student perceptions and outcomes of certified and non-certified instructors. As observed by Adelman, many post-secondary CIS/IT faculty were unconcerned about the emergence in the 1990s of “a new, parallel universe of postsecondary credentials”, Anderson and Reimers found that CIS/IT students were keenly aware if their instructors had them. For example, certain certifications DOD 8570.1M are the only commercial certifications that the Department of Defense will accept towards meeting their Information Assurance hiring requirements.

The studies found a significant difference in learning outcomes between technology courses taught by certified and non-certified instructors; students whose instructors held IT industry certifications had higher levels of achievement than their non-certified peers and that college undergraduate students showed a significantly greater perception of their instructor’s effectiveness, teaching skills, professor technical expertise, and their own engagement in their classes with certified professors. Randall & Zirrkle (2005) noted a distinction between high school students and college students result benefit and the type of certification (vendor neutral and vendor-specific).

IT Certifications are considered as a standard of IT knowledge by most of the giant technology companies around the world. Best knowledge of up to date technologies is ensured by continuously updating the versions of certifications by the specific vendors.

DoD Directive 8570.1 and DoD Directive 8140

The U.S. Department of Defense Directive 8570.1, signed in August 2004, requires every full- and part-time military service member, defense contractor, a civilian and foreign employee with privileged access to a DoD system, regardless of job series or occupational specialty, to obtain a commercial certification credential that has been accredited by the American National Standards Institute (ANSI). 8570.1 established certification requirements in 3 levels: Level I, II, and III were categorized into IAM - Information Assurance Management and IAT - Information Assurance Technician. Since its implementation, the IT enterprise landscape has changed dramatically with the implementation of mobility, cloud computing, and cybersecurity areas of increased emphasis.

As a result, the National Initiative for Cybersecurity Education was established to form the National Initiative for Cybersecurity Careers and Studies portal. This initiative was a public/private collaboration and resulted in the publishing of The Framework 1.0. Since the initial framework has been established it has been enhanced and published as The Framework 2.0 and has morphed into the DoD 8140 Directive which is anticipated to be in full implementation by December 2015. This framework breaks down into seven (7) categories and establishes 31 KSA's (Key Specialty Areas), which fundamentally are silos within the IT landscape.

See also


This page was last updated at 2021-11-19 17:25 UTC. Update now. View original page.

All our content comes from Wikipedia and under the Creative Commons Attribution-ShareAlike License.


Top

If mathematical, chemical, physical and other formulas are not displayed correctly on this page, please useFirefox or Safari