Friday, May 29, 2020

Consensus Around Key Principles

While there are some disagreements about what national privacy legislation would entail, there are several key areas where industry, consumers, and policymakers agree. This includes for companies to adopt safeguards to ensure the information they gather is secured, build privacy and security protections into their products at the development stage, and provide easily accessible and understandable information to consumers about the data they are collecting and how it’s being used. Panelists also emphasized that companies should take proactive steps to adopt these measures and publish privacy principles of their own rather than waiting on government to take action.

Also, upcoming, is a miscellaneous tariff bill designed to give the opportunity for certain products with a certain value to be deemed duty free for at least three years. This is still in the works.

Finally, Bivens Collinson mentioned the proposed trade agreements with the EU, UK, and Japan all starting right now, as a great opportunity for the U.S. to get in and set rules and standards for new technology, data transfer and cross-border communications.

“You should look to those agreements to get your industry’s issues codified,” she said.

CompTIA filed comments with the Office of the U.S. Trade Representative with respect to the new trade agreements. You can view the documents below.

CompTIA Comments on the U.S.-UK Trade Agreement

CompTIA Comments on the U.S.-EU Trade Agreement

CompTIA US-Japan Trade Agreement Comments
More Info: a+ certification salary

Thursday, May 28, 2020

From IT to Project Management and Back Again

Nightengale has also been hard at work outside of the office, pursuing a master’s degree in cybersecurity management and policy at the University of Maryland University College. With decades combined as an IT pro and project manager, he’s accumulated knowledge of how systems work from every angle. In building this knowledge, he’s assessed where the need is greatest – and now aims to focus on the area where the tech knowhow is most critical and the stakes are highest.

“[Cybersecurity is] a field that’s not going away,” Nightengale said. “It’s more of a problem now than ever before with all the cybercrime going on.”

If Nightengale moves into a more cybersecurity-focused role, he’ll undoubtedly be exploring higher-level CompTIA cybersecurity certifications to hone and validate his skills. And as he takes the first steps down his own new path, he has advice for others.

Whether someone is interested in cybersecurity, project management or any other of the myriad fields that IT touches, Nightengale advises CompTIA certifications as a great starting point.

“It’s going to be a great addition to any resume for anybody,” Nightengale said.

Wondering where to start? Check out the IT Certification Roadmap to see what certifications can help you reach your career goals.

More Info: a+ certified technician

Wednesday, May 27, 2020

Research What Cybersecurity Skills Are in Demand

Be prepared to explain the link between cybersecurity trends, emerging threats and gaps in your skill set or the capabilities of your cybersecurity team. At least 3 out of 10 organizations detailed in the 2018 Trends in Cybersecurity report believe they need “significant improvement” in the following areas:
Vulnerability knowledge
Incident detection and response
Educational ability
Risk management
Penetration testing

Prepare to demonstrate a clear link between the skills covered by cybersecurity certifications, performance in your current role and how these factors will impact your organization’s risk posture. By creating a link between in-demand skills, the strategic goals of your business and your chosen path for certification, you can illustrate value.

Build your case further by selecting certifications that not only test your knowledge but also assess your skills. The certifications along the CompTIA Cybersecurity Career Pathway are performance certifications, which means they require you to put your knowledge to work by completing hands-on tasks related to cybersecurity jobs.
More Info: comptia a jobs

Tuesday, May 26, 2020

Ways to Get IT Experience for the Job

You may think it’s what you do while you’re at work that will help you get ahead. But, if you’re not being challenged at the office, or your looking to expand into a new IT career, what you do on your own time can have just as much (or maybe more) of an impact. Read on to see how activities like volunteer work, side hustles and continuing education can help you beef up your resume and, in turn, help you land your ideal IT job.
Volunteer Work

Just because you didn’t get a paycheck doesn’t mean volunteer work doesn’t have a rightful place on your resume. It’s quite the opposite, in fact! Take a look at how this example weaves in relevant and desirable technical skills with soft skills like project management. This example also highlights measurable results which is always a bonus!
IT Helpdesk Volunteer, Local Humane Society, June 2018-present
Support and troubleshoot hardware and software needs for 25 employees
Implement and train employees on software applications
Create and edit documentation of internal processes and procedures
Provide general tech support and communicate changes

What if your volunteer work isn’t related to the industry you’re trying to break into? That’s okay. Any type of volunteer work shows that you possess leadership and character – both enviable qualities for a job candidate.
More Info: comptia certification jobs

Friday, May 22, 2020

Key to Embracing Emerging Technology

Although channel players aren’t known for burying their heads in the sand, it can be easy to get complacent. However, the channel needs to adopt not only emerging technology, but also new and emerging channel business models.

It’s important not to get carried away with trending technology but, rather, to cultivate a strong and deep understanding of customer needs. That way, vendors and channel partners can deliver the products and solutions that customers want and need rather than trying to create demand for untested technologies.

There is much excitement in the industry about new mobile and SaaS applications, as well as the key emerging trends of blockchain, Internet of Things, drones, artificial intelligence, machine learning and more. And modern go-to-market models seem to include direct selling and non-standard channels.

More and more, I’m seeing brand new, well-funded businesses emerge into the Australian technology scene with scant regard for the well-formed channel models that, for most of us, are our bread and butter.

For example, Atlassian, Australia’s ISV unicorn, had a small partner program until recently. Instead, it relied on creating raving fans of its product set directly, ending up with the channel beating down its door to be a part of it.

So, here’s the point. I strongly believe that the vendor, not the distributor or partner, needs to create demand for its own products.

If you examine the way the traditional behemoths have become successful, it is through creating strong demand for their products, with the channel acting to fulfil this demand.
More Info: what jobs can i get with a+ certification

Thursday, May 21, 2020

Solve the Soft Skills Dilemma with Training

In the verticals where Hensley/Elam’s clients operate there’s a high demand for regulatory compliance with regard to how technology is deployed, secured and used. And there’s a lot of cutting-edge technology that companies are looking for. With clients always expanding – for instance, opening new bank branches or implementing new technology like interactive teller machines (ITMs) – Hensley/Elam engineers are on the scene bi-weekly if not even more frequently to assess needs and discuss options. So, the techs need to know how to talk to people, which can be tough for those whose professional focus has been strictly screen-facing. Hensley has found, though, that training can markedly improve a tech’s interpersonal skills.

Hensley’s method involves a personality assessment at the time of the job interview and then an ongoing plan using training resources to get a new tech hire up to speed in terms of being professionally personable. Hiring for hard skills, then using training and teamwork to build soft skills, is a method he’s seen demonstrate results.

“We’ll try to take someone who may not have soft skills and bring them into the help-desk environment first before we turn them into a field engineer,” Hensley said. “They work with the team and bring up their maturity levels or other skill-sets that they need to have to be able to go into the field.”

While these two experts work in different segments of the tech world and are located in different geographical locations, the advice and observations they offered matched up in some noteworthy ways, providing surefire tips on how companies throughout the tech world and IT channel can attract, cultivate and keep the top-tier talent talent they need.
More Info: a+ certification jobs near me

Wednesday, May 20, 2020

Show You Care and Coach Yourself

Grening made note of the remote sites mentioned in the job posting and used Google Earth to see if he could spot them. He brought a printout of his findings to the interview and asked if these would be the buildings he’d likely be supporting.

“Turned out there were a couple more,” he said, laughing. “I was just using publicly available information to my advantage, but you want to show initiative. Show them you’re not just somebody blowing in for an interview.”

Grening had the benefit of having his CompTIA A+ material fresh in his mind when he sat for the job interview’s technical assessment, a standard part of an entry-level job interview.

“A lot of people are using them to screen their employees, so if you want to get past the technical assessment, make sure you’re competent in your knowledge,” he said.

When it came to that technical assessment, almost all the material covered was also found on the CompTIA A+ exam.

“I studied hard for those certification exams, so I knew almost all of the answers,” Grening said. “For people going into an interview, if you’re working the CompTIA certifications, even if you passed them the first time, go over the material so it’s fresh in your mind. You really want to prove you know your stuff.”
More Info: a+ certification jobs with no experience

Tuesday, May 19, 2020

What Is CompTIA Linux+

Until recently, CompTIA Linux+ comprised two exams covering the same content as the two exams for the Linux Professional Institute's (LPI) LPIC-1 (LPI Level 1 - Linux Administrator).

However, the latest version of CompTIA Linux+ (XK0-004) is no longer reciprocal with LPIC-1. Instead, it's a single exam that tests the fundamental usage and administrative tasks that are common to nearly all Linux distributions and UNIX flavors, but with an added focus on security, troubleshooting, server configuration and cloud technologies to match current industry needs.

The assumption is that in your tenure as an intern, you took advantage of the opportunity to absorb as much as you could from those with more experience. This would be a good time to let them know what you learned, and to ask if they would be interested in being a reference for you. Be sure to look beyond the CEO. An ideal reference would be from your supervisor or manager, the highest ranking person you actually know in the company, but also from other levels, such as the HR manager, the office coordinator, or the internship coordinator. A glowing review from company infrastructure could hold more weight than a generic letter from the CEO, who doesn’t know your work personally.

But what if….

...you hated your internship and are counting the days until you can walk out for good? That is unfortunate, but a good exercise for you personally would be to reflect on what went wrong and what steps you took—or could have taken—to help solve the problem before this point. Sharing that with HR or the internship coordinator in a professional manner is still valuable because an internship is always a learning opportunity for both the company and the intern. It takes both parties to make it work.
More Info: what jobs can you get with an a+ certification

Monday, May 18, 2020

Git Commands to Know

Dallas is also blooming as a tech hotspot. More than 9,300 tech jobs opened in the Dallas last year, the sixth most of any city, and with 42 fortune 1000 companies calling the Dallas-Fort Worth area home, tech employment is projected to grow 10.2 percent by 2026.

The median IT salary in Dallas is $83,907 -- 92 percent higher than the average for all occupations -- and this salary goes further since the cost of living in Dallas is 1.2 percent below the national average.

Here is a summary of git commands that you should find useful at this point:
git config = Sets general Git parameters like username and email
git init = Creates a Git repo within the current directory (also creates .git folder)
git add <filenames> = Adds the specified filenames to the Git index (called staging)
git rm <filenames> = Removes the specified filenames from the Git index
git commit -m <description> = Creates a snapshot/commit with a specified description
git status = Views the status of a repo
git log = Views the commit history of a repo
git reset --hard <commit_ID> = Reverts files within a repo to a previous commit

Texas hotbeds like Austin and Dallas are not only attracting IT talent from across the country, but also venture capital dollars. Startups across Texas raised $1.5 billion in 2018, the fifth most of any U.S. state.

The 2019 Cyberstates report provides a promising snapshot of what’s to come for the future of tech in Texas.

The Lone Star State’s combination of home-grown talent and out-of-state investment has ushered in a new era of innovation that will spur job growth and economic opportunity for decades to come.


More Info: a+ network+ security+ salary

Friday, May 15, 2020

CompTIA Cybersecurity Career Pathway

With cybercrime on the rise and vulnerabilities constantly being exposed, it is imperative that organizations take a proactive stance to protecting assets and employing skilled cybersecurity professionals. In fact, the U.S. Bureau of Labor Statistics predicts that the number of information security jobs will increase 28 percent from 2016 to 2026, making it one of the fastest-growing fields. Jobs requiring cybersecurity skills continue to grow rapidly, with more than 313,000 cybersecurity job openings, according to Cyberseek. Employers, from government to Fortune 500 companies, value CompTIA as an authority in cybersecurity certifications.

More than Financial Contributions: The Charitable Giving Committee not only manages the financial contributions to charitable organizations but also plans hands-on events that support those in need. Last year, we created “Hope Bags” for the National Center for Missing & Exploited Children. These donated bags were filled with basic necessities, such as toiletries, a change of clothes and shoes, and snacks, which were then given to child victims of sex trafficking.

Our hands-on event this year will be held on Wednesday, July 17, from 5 pm until 8 pm, in Washington, DC. We will be providing dinner and a game night at the D.C. Fisher House. We scheduled this event on the evening before our July HSITAG meeting, so please join us! It will be a great way to serve those families who serve our country. More details to follow soon!
More Info: what jobs can i get with comptia a+

Thursday, May 14, 2020

Making Compliance Work for Cybersecurity

The reason the full list is so fascinating is that any one of these technologies—or any combination of them—could prove to be a valuable solution for a given company or vertical segment. As CompTIA’s 2019 IT Industry Outlook described, there is no single “next big thing” that will be sold or supported. Instead, companies are exploring and experimenting with many things at once, hoping to find a unique approach that will deliver impressive results.

I can’t name the health care organization that she worked for, but I can tell you why she felt that compliance – if done right – can really work. I found her argument to be absolutely compelling.

As proof, she stated that her organization had made the following changes over the past two years:
They hired a cybersecurity and physical security compliance officer who has complete oversight over the current network, as well as the physical premises of the organization.
The CIO and CISO now have a dotted-line reporting relationship to the compliance officer, which means they oversee some of the compliance officer’s activities, but she does not fully report to them.
All current – and future – network plans must be reviewed and approved by the compliance officer. The compliance officer I spoke with emphasized the importance of having someone who understands the implications of what is being proposed.
All new hires must be reviewed by the compliance officer.
Security analytics reports and pen testing results must be presented to the compliance officer for consideration and approval.

In short, this health care organization had created an office and officer that has the authority to approve or alter its physical and cyber assets. I’ve found this to be a relatively rare situation. While most organizations have compliance officers, they don’t all seem to have the kind of authority that she has.

She agreed that taking a checkbox approach to security never really works. But it’s also not quite fair to reduce the efforts of a properly enabled compliance officer to any checklist.
More Info: comptia a+ careers

Wednesday, May 13, 2020

Cloud, edge and 5G form the modern economic infrastructure

The modern digital economy is based on three parts: cloud computing; edge computing; and 5G. Cloud brings greater control and flexibility to IT activities. Edge computing extends the principles of cloud computing from a centralised location to the places where data is being captured. And 5G networks provide fast and robust connections between each node.

Together, these three fundamentals signal a new way of thinking about IT applications. True transformation starts with rebuilding applications to take advantage of cloud computing’s unique properties, and this transformation will accelerate as those applications also factor in the location awareness of edge computing and the dynamic capabilities of 5G networking. Fully-evolved applications will be the mechanisms for new economic activity, and IT skills will likewise evolve to support the new structure.

The ability to identify important trends and build them into business practices can be critical for solution providers to establish or maintain leadership in their respective markets. Coincidentally, leadership was also a hot topic at the ANZ Channel Community’s recent meeting in Sydney, where Moheb Moses, co-founder and director of Channel Dynamics, and director of ANZ Channel Community, welcomed 120 attendees, and keynote speaker Brent Valle, founder, The Future Phase, shared personal stories demonstrating the important traits and values industry members should have as they move into leadership positions.

Now, the game center, for me, was pretty cool. You go up here and it has different matching games to where you’re timed, you get a score from when you go through it, and all that good stuff, so for me, I thought this was really interesting and interactive for me to not just do the same studying over and over. I can actually go through something like the game center and keep myself alert and sharp and have a little fun when I’m studying for these certification exams
More Info: jobs with comptia a+

Tuesday, May 12, 2020

What Can a CompTIA Security+ Certification

Today we‘re going to answer the question, what can a CompTIA Security+ certification do for your career?

This is a question I get a lot from various students that are in some of my classes. I teach all over the place, whether it‘s private sector, public sector, military: there‘s a lot of different types of students in my classes.

So, what can this do for your career?

Now just a little bit of a disclaimer before I get too far into this video. This video is being sponsored by CompTIA. However, all of the opinions are solely mine. They haven‘t given me a script of things that I have to say or any sort of view that I have to espouse, so this is totally my opinion here.

For example, Group50 is talking with a company in the firearms industry, where establishing a true chain of custody is incredibly important, Gitney said. Blockchain will do that. “We want to be on the forefront with this. It will impact so much of everything we do. Since we’ve gotten involved in blockchain and IoT, our supply chain business has doubled because we’re able to talk about blockchain, which helps us get recognized as subject-matter experts.”

Use Cases, Smart Contracts Will Spur Adoption

Blockchain is a tool that facilitates “disruption innovation” which, once understood, has almost universal application possibilities, said Neeraj Satija, a co-chair of CompTIA’s Blockchain Advisory Council and CEO/CTO at Concordus Applications, a Roseville, Calif.-based company.

Satija realized the implications for blockchain while researching a problem his organization had paying commissions to agents. Namely, the company was issuing a large number of service tickets around commission payments, more than any other area, Satija said. The issue affected employee productivity and impacted the whole business.

More Info: comptia a+ jobs salary

Monday, May 11, 2020

Tech Education Initiative Connects Industry Professionals

From middle schoolers to recent grads, providing a helping hand that offers support, guidance and resources for a technology-fueled future is the mission of BYTE, an education initiative from CompTIA’s Future Leaders Community. The purpose of BYTE—which fittingly stands for Bringing Youth Tech Education—is to connect current leaders in the industry with students who are interested in technology.

Launched last year at the Technology Student Association’s (TSA) national conference, BYTE is an indispensable resource for every spoke on the wheel of tech education—it’s a hub of engaging information for students and teachers; a support toolkit for parents; and a resource for mentorships for tech professionals who can help usher in the next batch of innovators and industry leaders. And, BYTE is determined to make education in tech as seamless and integrative as reading and writing.

“The Future Leaders Community is all about bringing youth to tech and into tech spaces and careers,” said Heather Ptak, chair of the Future Leaders Executive Council and director, field marketing, at ConnectWise. “We created BYTE as a toolkit that tech professionals can use to help young people in their community really grow and showcase how awesome it is to have a tech career.”

Developed by CompTIA’s Future Leaders Community, the BYTE initiative is multipronged by design, and in addition to targeting industry professionals, includes resources for people like parents and teachers who can offer support and guidance along the way.
More Info: jobs with comptia a+ certification

Friday, May 8, 2020

What Kinds of Cybersecurity Jobs Are There

Now keep in mind that cybersecurity is a really broad field. So there’s a bunch of different things that you can specialize in. So, one of the things that some people look at is things like physical security. In fact, I’ve actually even got a little lock-picking toolkit right here that I usually demonstrate in the security classes that I teach. With two tiny little pieces of metal, granted this one’s a see-through lock, just so students can actually see how these little padlocks work. But you stick these in here in just the right way, and without even really looking at it, it shouldn’t really take that long to actually pick a little lock like this. And this is actually taking a little bit longer than I normally take, but as you can see, I wasn’t looking at the lock. I was looking at the camera here. And getting past these types of things is something that some of the hackers and the people in cybersecurity really actually enjoy. And I can certainly see why.

But besides physical security of course there’s also things like software security and operating systems. You’ve got getting past routers, breaking into IoT devices or internet of things. So there’s a bunch of different things that you can do to get into cybersecurity.

If we don’t do this, then we don’t get this good transfer of knowledge and we don’t get the best solutions possible by learning from mistakes and incorporating new ideas and new techniques.

I learned this really early on when I started working at the age of 12 and was working with adults primarily. I wasn’t working with my peers, so I got a chance to interact with adults and learn how they behaved, how they work and the things that motivated them. And I think that really helped me a lot later in my career and separated me from my peers in some way by being more aware of that.

In fact, when I was older and in my teens, I actually felt more comfortable at times around adults than I did around my peers because I had worked with them and interacted with them in different and interesting ways.

I think the people who get that experience early on are better equipped when they come into the workforce rather than just interacting with their peers. They’re not so awed by the whole experience of having to work with individuals whom they see as their parents or their superiors or their older brother or sister. They can see them as a coworker and not necessarily as an authority figure.
More info: net+ certification salary

Thursday, May 7, 2020

What Are the Best IT Certifications

It’s no secret that IT certifications are a boon to an information technology professional’s career. Many IT pros would agree that earning in-demand certifications can increase your paycheck, improve your chances of securing the highest-paying jobs in IT and boost your confidence by optimizing your tech skills.

But with a sea of certifications to choose from, how do you know what are the best IT certifications? I mean, if you ask us, we’ll say CompTIA. But it’s not just us saying this. See what other IT industry publications have to say about CompTIA certifications

Local governments by tradition and civic service regulations are often rooted in principals dating back a hundred years. It is not unusual for technology staff to be classified with non-transferable classifications such as “technician” 1, 2, etc. The issue here is not how staff are classified internally – it is having public titles that more closely reflect one’s real responsibilities. According to numerous interviews with seasoned public technology managers, this is important and the solution need not cost a penny! Studies show that titles do matter to staff and contribute to staff self-esteem and perceived value. When you add it all up, lack of career development opportunities and recognition, non-competitive salaries and declining benefits, and lack of training and development opportunities, the enterprise is left with a less than motivated and enthusiastic employee in a critical area of need.

Lack of realistic strategic planning. Approximately one third of local government CIOs still report through a finance official and far fewer are routinely invited to sit at the head table when key plans, policies or decisions are being made. Most public managers view the IT shop as a support function only, which is problematic in many ways. If the local government technology manager is not involved in every step of program development and planning, how can they be expected to support any program or service without adequate information? For technology to be fully optimized the IT operations and infrastructure must be continuously reviewed and with senior staff tasked with seeking ways to align technology with that of the business needs of the all departments and agencies.
More Info: entry level comptia a+ jobs

Wednesday, May 6, 2020

Businesses Regulations are Confusing and Complex

t’s not uncommon to find businesses unfamiliar with UAS flying regulations and standards—which makes them quite nervous, according to Spotted Eagle.

“As soon as you say ‘federal government,’ it scares the heck out of people,” Spotted Eagle said. “If you’re a cattle farmer, you have fences to corral your assets. It defines clearly what’s what and who’s who and where’s where. When you have the Wild West and there are no rules, chaos develops. The whole purpose of fences is to generate organization.”

Confusion about regulations demonstrates the primary reason to work with drone solution providers, Frechette said. “Regardless of the actual use case, there is almost always regulations involved at the federal, state and/or local level.”

“It’s like every new and emerging technology,” added Schaefer. “Yes, it takes some time to feel your way around. But with a little effort, you can understand the regulations, get your unmanned pilot certification and start flying commercially.”
Myth 3: Businesses Can Run Drones on Their Own

While businesses may be capable of operating drones on their own, drone solution providers offer the training, processes and services to ensure that autonomous operation of drones is successful, Schaefer said. “Internal operations are key. There are some steps to take. You can’t just take it out of the box and fly. Spend time with a partner to learn how a professional drone operator would complete the job. Then build your program around the things you learn,” he said.

Many businesses fail with drones, or don’t get what they want out of them because they haven't planned properly, said Richard Lopez, National UAS Operation executive with Hensel Phelps Construction.

It’s critical to implement a drone operation plan—to expect the unexpected. “You need to understand all the site conditions and potential obstacles for your project: trees, power line, construction cranes, etc., as well as informing onsite crews that there will be drone activity on site,” Lopez said. This planning comes with training, experience, and working with certified partners, he added.
More Info: comptia a+ certified jobs

Tuesday, May 5, 2020

Characteristics of an Advanced Persistent Threat

Hard to detect
Never stop
Highly coordinated
May be state sponsored
Often carried out through social engineering.

For example, a victim may be fooled into double-clicking an e-mail attachment with malware, which connects to a command-and-control center. The hacker controls the system, lurks on networks for days or months, finds valuable targets and exfiltrates them.

APTs can also modify software, rendering it ineffective or insecure. For example, the Apple software development toolkit (SDK) was recently hacked, rewritten and distributed by bad actors. Many Apple software developers downloaded the new toolkit from a third-party site, not the Apple site, because they felt the Apple site was running slow.

Software developers were basically unwilling to wait for the Apple site download times, so they were tricked into downloading from the third-party sites. Unfortunately, all software developed and uploaded to the Apple store with the hacked SDK was malicious.

The Apple SDK hack was effective and well-coordinated. Bad actors took advantage of an opportunity – the slow Apple SDK download site. Third-party distribution sites around the world promoted the SDK malware as a legitimate software package. If the software had been tested by a penetration tester or a cybersecurity analyst for vulnerabilities, the problem would have been identified immediately.
More Info: a+ certification job opportunities

Monday, May 4, 2020

What Skills Does CompTIA PenTest+ Cover?

If you’re wondering about the PenTest+, it’s basically a offensive certification rather than the CompTIA Cybersecurity Analyst (CySA+), which is its counterpart, is a defensive certification when it comes to security. You’re going into organizations, penetration testing, and looking for vulnerabilities, and reporting them to the agencies that you’re working for.

Some other keynotes from the CompTIA PenTest+ is it’s an intermediate-level security certification for IT professionals tasked with hands-on penetration testing to identify, exploit, report and manage vulnerabilities on a network.

CompTIA PenTest+ includes hands-on, performance-based questions to ensure that each candidate possesses the skills, knowledge and ability to perform tasks on systems. It covers hands-on penetration testing and vulnerability assessment and management skills used to plan, scope and manage weaknesses, not just exploit them.

The CompTIA PenTest+ is unique because it requires a candidate to demonstrate hands-on ability and knowledge to test devices in new environments, such as cloud and mobile, in addition to traditional desktops and servers.

Now, to me, just right off the bat, for those of you that are really interested in penetration testing, I do believe that this certification will be a valuable certification in the long run. In the short run, it’s going to give you a whole bunch of skills and knowledge, I believe, to get you in the industry. Because let’s talk about this.

When you look at other CompTIA certifications, when you look at the Security+ and the CASP+, which is a CompTIA Advanced Security Practitioner certification exam, and then you also look at the CySA+, this will be right up with those certifications, I believe, in the long run, and the reason why I say that is that for one, the CySA+ is defensive and the PenTest+ is offensive.
More Info: comptia a+ description