contact contact contact
 Advertise
 Contact
 SecurityWatch
  Articles | Editorials | Reviews | News | InfoSec Directory | Releases | Submit PR

GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available.

Network Security Software - Sponsored by GFI Network Security.

Free VoIP Assessment for your business

The Evolution of IT Training Strategies
Author: Vince Mayers, Anteo Group
Thursday, 19 May 2005, 18:43 GMT

Since 2000, IT companies and IT departments within corporations have undergone significant reductions in spend across the board – leaving companies to revamp training strategies. There are essentially three forms of training strategies under discussion each with its own advantages and disadvantages for not only the consultant/employee but also for the company: instructor-led training, e-learning and mentoring.

Classroom training led by an instructor is the traditional form of training, but it is expensive and the return on investment for companies is not always apparent. Also, if a project has time constraints, the instructor-led training strategy may not be the best option because of the planning involved and too often this option fails due to poor planning. While many IT managers view training as important, even the most sophisticated training method can't make up for pitfalls in planning and timing or for poor integration between the IT training and the company's overall strategy.

One of the easiest ways to cut departmental costs is to reduce the amount of dollars used to fund training. But training is still going on. Mentoring or the "buddy system" appears to be on the increase in companies on the lookout for new, inexpensive and effective ways to train their IT staff because of its minimal cost, and the fact that very specific knowledge can be passed on to the mentored. Also there is the Internet. E-learning is a more respectable option, and an attractive one, because of its flexibility and infinite subject matter, but e-learning does place the responsibility squarely on the shoulders and pocket of the staff member under the guise of career empowerment. The e-learning approach may work for freelancers, but it is difficult to measure how well it aligns with the growth objectives of employees.

As either a complement to, or a replacement for conventional training, a technology mentoring program can be an essential component of an individual’s professional growth.

Mentor programs are cost effective and have benefits that extend beyond "technology training." With an experienced mentor on the team, you can hit the ground running and achieve technology ramp-up in minimum time. Conventional training programs often focus on the mechanics of new technology, not real world strategies for the application of this technology in delivering the company’s project, product or service; and new users learn through hands-on development of working prototypes. Another benefit is that the mentor also lends his or her talent and experience in systems design and development, which will substantially decrease development time and effort, especially in the initial stages, when many key and far-reaching decisions are made.

Mentors are people in the workplace who have already mastered various technology skills whether they are consultants or FTE's. However, an outside expert can also be brought in to train experienced staff to become mentors. A mentor program requires IT staff to shadow either consultants or more experienced staff who are working with new technology.

Tips for Starting a Mentoring Program:

Make sure that the program is officially part of the organization’s employee development program. This helps to gain the commitment of all involved.

Set program goals and metrics to gauge the success of the program and to help develop future programs.

Decide whether the mentoring program will be on a one to one basis between mentor and protégé or one mentor to a group.

Make sure that the people selected to be mentors have the temperament for the job.

To both mentor and protégé, the program is a commitment of time and effort that cannot be taken lightly if it is to succeed.

Try to match personalities as closely as possible when pairing up mentors and protégés.

Monday, May 23, 2005

Network Security

· Hackers get tricky with pharming
· Hiring a hacker? Think again, experts warn
· Why security vulnerabilities expand beyond operating system, enterprise
· How Dangerous Was The Cisco Code Theft?


Free VoIP Assessment for your business


Wireless Security

· picoChip, Hifn unveil WiMAX basestation reference
· Why wireless devices must be connected to critical applications
· Securing 'strange' Wi-Fi devices
· IT giants fight wireless patent

InfoSec Directory

· Phishing attacks and countermeasures
· Overview of image security techniques with applications in multimedia systems
· Inoculating SSH Against Address-Harvesting Worms
· What is the point of encryption if you don’t know who for?


Free VoIP Assessment for your business


Press Releases

· nCipher helps combat phishing attacks with Chip and PIN
· LANDesk Named to 2005 Red Herring Top 100
· HP Simplifies Business Protection for Small and Mid-size Businesses with New Smart Office Program
· Clifford Chance appoints Redbus Interhouse to Provide Pan-European Services
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter