Cisco and Pearson VUE Improve Security Innovations in Global Test Delivery
Cisco and Pearson VUE are continuing to change the way IT certification testing is designed, delivered, and secured. As part of an ongoing plan for security enhancements, Cisco is now requiring all Pearson VUE test centers delivering Cisco certification exams to collect digital photos and digital signatures during the admissions process, in addition to the current identification requirements. This new layer of identity authentication will help to ensure candidate identity and result in increased assurance that individuals are presenting accurate certification records in the marketplace. The new authentication technology will be implemented in phases around the globe over the next 12 months.
Looking ahead, Cisco and Pearson VUE will continue to innovate new ways to protect the integrity of Cisco certification and combat exam fraud. We will continue to advise you of this initiative's next steps in the coming year.
Find out more information about Cisco Exam Policies and Pearson VUE Admissions online, or check out the Cisco Certifications FAQs.
TechWiseTV: "Invisible Attackers: Stop the Bot"
Every day, hackers use stealth techniques to gain access to computer systems. Many companies, agencies, universities, and other organizations unwittingly provide a home on their networks for these silent attackers.
This TechWiseTV episode will show you the latest tools and techniques these hackers use and what you can do to limit their ability to penetrate your network. You will learn practical steps you can take now to identify and control these threats, without buying additional hardware or software. You will also find out about security solutions from Cisco and IronPort that can help you better safeguard your resources and valuable information.
You will learn:
- How attackers hide in plain sight and what you can do to identify their presence
- How attackers use normal system features to perform abnormal and malicious acts
- Six simple steps you can take today to severely limit their ability to hide their tracks
- The evolution of the botnet and how it works
- The feedback loop that perpetuates spam, worms, and botnets and how to avoid becoming an enabler
- How attackers use indirection to communicate freely in and out of your network
- Where you can start building a dynamic and intelligent defense plan
Learn more and register to view video.
Upcoming "Ask the Expert" Events and TechTalks from Networking Professionals Connection.
- Ask the Expert
- "Configuring and Troubleshooting Cisco AS5x00 Access Servers for ISDN/Modems/PPP Connectivity," now through January 25
- "Group Encrypted Transport (GET VPN)," now through January 25
- "Cisco Wireless Control System (WCS)," January 28 through February 8
- "Enhancing Your Communication with Cisco Unity Express," January 28 through February 8
Note: "Ask the Expert" events are subject to rescheduling. Please refer to the URL above for the most current schedule.
To attend an event or participate in a discussion forum, visit Networking Professionals Connection today.