computer and information literacy

There are three key areas of skill demand – remote tech support, cloud computing and cybersecurity. Plunkett shared that on Cyberseek, there are currently 500,000 jobs posted with 307,822 open jobs within operating and maintaining with the rest for Cybersecurity engineer, cybersecurity analyst and similar jobs.

We are seeing a major spike for remote tech support for fairly obviously reasons,” Stanger said. “And, we are seeing more device diversity than we saw before COVID. When the country went into work from home mode, many employees had company issued laptops, but a lot didn’t. So, they were basically working from home on their home computers, meaning there is a lot of device diversity. Working in the cloud, being able to migrate, not just everything to the cloud, but working in a hybrid environment is an important skill and a lot of security jobs are also changing and morphing and there’s continued need for support,” he added.

Both Plunkett and Stanger emphasized that new skills and competencies are essential for IT training programs and offered some resource recommendations:
CompTIA’s IT Outlook 2020 – for understanding where to go and what is important in terms of essential IT skills in the workplace.
CyberSeek.org – provides data about job supply demand including a heat map showing the number employed in cybersecurity jobs and the number of unfilled cybersecurity jobs and the type of skills companies are looking for.
CompTIA’s Cyberstates report – guide to national, state, and metropolitan area tech sector and tech workforce analytics.
Burning Glass – context-specific, geographically aware site that delivers job market analytics on cybersecurity and IT jobs.

In today’s environment, it is critical for IT workers to have the proper foundation and high level of computer and information literacy. With technology changing rapidly even someone with many years of experience needs to stay relevant.

Comments

Popular posts from this blog

DDoS Attack Mean for My Security?

Profiling Hackers in the MITRE ATT&CK Navigator

The Importance of Post-Attack Analysis