Cyber Hero Stan Stahl Brings Community to Cybersecurity

LOS ANGELES — No matter how sophisticated technology becomes, solving problems related to cybersecurity will require a human innovation and connection. These themes run throughout Stan Stahl’s work in the public and private sectors and fuel his passion for cybersecurity education. 

Stahl is the founder and president of SecureTheVillage, a non-profit that turns people and organizations into CyberGuardians having the knowledge, skills, and commitment needed to meet the ongoing challenges of cyber crime, cyber privacy and information security. He is also co-founder and president of Citadel Information Group, an information security management services firm recently acquired by Miller Kaplan, a Top-100 CPA firm. 

Stahl began his career as a mathematics professor and eventually transitioned into information security when he was working for the U.S. government. When he met the CyberGuild team, he immediately saw parallels to the work that SecureTheVillage does to educate California’s residents about cybersecurity. 

“Bill Gates had a goal of putting a computer on every desk in America; our goal is to put a CyberGuardian in every seat,” says Stahl.  

Meeting that goal requires collaboration between industry, government and educational partners. Stahl saw those connections in action last year when he attended the California Mayors Cyber Cup, a California statewide cybersecurity competition organized by the CyberGuild to raise awareness about the importance of cybersecurity education in workforce development. Stahl also had the opportunity to visit the presentation of the Cyber Cup to the Los Angeles City Council.   

“The energy that the students brought I found just phenomenal … I was blown away,” Stahl said. “These are the projects I want to continue and do more of through the CyberGuardian program at SecureTheVillage.” 

Stahl sees cybersecurity as one of the greatest challenges of our time, a challenge that will be met when everyone is doing their part to protect their information and their computers. He talks about our need to mobilize CyberGuardians the way Winston Churchill mobilized the British people during the battle of Dunkirk in 1940.  

Stahl draws inspiration from John F. Kennedy’s challenge of “doing hard things” to meet ambitious goals like putting a man on the moon.  

He is also inspired by a sense of patriotism and pride in the U.S. that moves beyond the political tensions that prevent forward progress. He sees the potential to weave a new social fabric based on common interests like cybersecurity. 

“Even as we have stumbled very far from our ideals, we do have our ideals and we drive them forward,” Stahl said. “For people who are really interested in cybersecurity, there is a community waiting to be built. Weaving that community together is what drives me.”  

About SecureTheVillage 

SecureTheVillage turns people and organizations into CyberGuardians through cybersecurity community building and education. 

About Citadel Information Group 

Citadel Information Group — now Miller Kaplan — based in Los Angeles, CA, provides information security management services to businesses and the not-for-profit community. 

About SynED 

SynED is a non-profit organization that acts as a catalyst to help colleges and other higher education partners equip students with the skills they need to enrich their lives through education and knowledge and skill acquisition, giving them rich career opportunities. SynED is home to the Cyber-Guild and Mayors Cyber Cup. 

 

Cyber Hero Keith Clement Opens Cybersecurity Career Education Pipelines and Pathways for Students

The old saying “it takes a village” definitely applies to cybersecurity education. There are a lot of teachers, coaches, and institutions involved at every step of the educational pathway, which can lead to a lot of silos and unknowing duplication of effort. 

At a time when the need for skilled cybersecurity professionals has never been greater, it’s critical that everyone is on the same page about achieving systemic change. Keith Clement is perhaps the perfect person to help make that happen.  

Clement is a professor of criminology at California State University, Fresno. He also serves as California Governor’s Cybersecurity Task Force, Workforce Development and Education Subcommittee Chair. He came to cybersecurity through the similarly “emerging high need areas” of homeland security and emergency management.  

He has designed model curricula, academic standards, and much other educational programming. Professor Clement received a Scientific Leadership Early Career Faculty Award from the U.S. Department of Homeland Security (DHS) and ran a California State University Faculty Affinity Group, CSU Council for Emergency Management and Homeland Security (CEMHS) for eight years.  

“Cyber is also a newly emerging specialization and we need to make a solid connection,” Clement said. “I am a connector of people and organizations in the public and private sector, including nonprofits and education/higher education communities at all levels of education.” 

Technology also runs in Clement’s family. His father was a programmer and systems analyst and his family owned a TRS 80, one of the first personal computers to hit the market.  

Clement has developed the California Cybersecurity Career Education Pipeline and Pathway Project (CCCEPP), an initiative to prepare 50,000 qualified cybersecurity professionals for the State of California between January 2020 and December 2030. 

He was inspired to get involved in the effort to improve cybersecurity education after seeing a lack of coordination and facilitation among key partners and major stakeholders, including out-of-date college course materials that were not preparing students for what industry will require of them.  

“Industry and tech are moving so far forward so quickly that the education community and our programs can’t keep up,” Clement said. “We are very behind. I’ve seen syllabi that haven’t been updated in years and looks like they belong in the museum.”  

To meet the CCCEPP’s goals, Clement said cybersecurity education needs to start in earnest as early as middle school or younger and continue through a bachelor’s degree or higher. Along the way, students need to supplement their education with apprenticeships, professional certifications, and other hands-on experiences. 

The approach also calls for increased focus on extracurricular activities like cyber competitions and calls the process of giving them more weight in the educational process a “serious overhaul” to the status quo.  

“People who do competitions and leagues are better able to make the connection between the classroom and real-world experiences,” Clement said. “We call competitions essential to the process.”  

Clement hopes phase 1 of the CCCEPP’s work (cyber programs from middle school through a bachelor’s degree) will be implemented by 2021. Efforts to expand to elementary school and post-baccalaureate degrees will occur in phase 2.   

Though there are a lot of moving parts to make these large-scale changes happen, Clement said he wouldn’t have it any other way.  

“I do hear the word ‘tenacious’ a lot and that I’m not inclined to take no for an answer,” he said. “It’s all a matter of time and organization and putting in the sweat equity. I want to be considered part of the network linking pulling all of these people together across California and getting them on the same page.” 

What student developers want in a job (hint: it’s not ping pong)

Developers about to enter the workforce are looking for professional learning and work/life balance more than corporate perks, according to HackerRank.

Originally Posted On: techrepublic.com

Organizations desperate for software engineering talent tend to follow similar plays when it comes to attracting student developers about the enter the workforce, including offering perks like free food, beer, and ping pong. However, student developers have a much stronger appetite for other workplace elements when making employment decisions, according to a Tuesday report from HackerRank.

The three most important criteria students look for in job opportunities are professional growth and learning (58%), work/life balance (52%), and having interesting problems to solve (46%), according to a survey of 10,350 student developers worldwide. These far outpaced compensation (18%) and perks (11%), which they view as “nice to haves” rather than deal breakers, the survey found.

This should serve as a wake-up call to companies looking to attract new graduates, who need to take these career preferences in mind as they design and market software developer jobs, the report noted.

SEE: IT Hiring Kit: Programmer (Tech Pro Research)

For many student developers, a computer science degree is not enough to teach them the skills they will need in the workforce, the report found. Nearly two-thirds (65%) said they rely partially on self-teaching to learn to code, and 27% say they are totally self-taught. Only 32% said they were entirely taught at school, the survey found.

Student developers are most likely to turn to Stack Overflow (77%) and YouTube (73%) to learn new programming languages, followed by books (60%), competitive coding sites (46%) and MOOCs (46%), according to the survey.

There also exists a discrepancy between what coding languages developers learn in computer science curriculum, and what employers are actually looking for, the report found (you can see more results about the programming languages most in-demand by employers versus those students actually know here).

“Today’s average CS curriculum is not a clear indicator that a student will possess the skills needed to enter the workforce,” Vivek Ravisankar, CEO and co-founder of HackerRank, said in a press release. “Our mission is to connect all developers to the right jobs. Part of this is educating recruiters on the unique DNA of student software programmers, and helping them understand how critical it is to look beyond university degrees.”

The big takeaways for tech leaders:

  • The three most important criteria student developers look for in job opportunities are professional growth and learning (58%), work/life balance (52%), and having interesting problems to solve (46%). — HackerRank, 2018
  • 65% of student developers said they rely partially on self-teaching to learn to code, and 27% say they are totally self-taught. — HackerRank, 2018

ICT Dual Enrollment Classes Spike in Central Region

Like the almond and pistachio trees in California’s Central Region, careful crop tending and patience were the keys to success in building dual enrollment in ICT courses. 

Dennis Mohle, ICT-DM Deputy Sector Navigator in the Central Region, said CyberPatriot was the catalyst that sparked the increase in enrollment. 

“Three years ago, we had three CyberPatriot teams in the region, today we have more than 50,” Mohle said. “The high school students in CyberPatriot are natural ICT dual enrollment candidates. If you have enthusiastic coaches (high school teachers) and supportive community college administrators, then you have the proper climate for technical articulation programs such as dual enrollment.” 

Fresno City College turned CyberPatriot teams into full-time students using the dual enrollment program. Timothy Woods, the college’s Dean of Business, created a conceptual pathway from high school to technical employment using CyberPatriot, CompTIA A+ certification, and college credit. 

“With help from the Career Ladders Project and the Strong Workforce Program Metrics, college faculty and high school teachers were immediately engaged,” Woods said. “One high school CyberPatriot coach is now a qualified community college adjunct instructor teaching Fresno City’s A+ curriculum to his CyberPatriot high school students.” 

Woods said CyberPatriot students could complete the CompTIA A+ certification after earning college credit and be prepared to transition into an IT support position after graduating. 

“We serve a lot of first-generation college students, and when underserved high school students gain confidence by learning how to fix a computer, and then get a part-time job doing something technical that they’re good at, well, that’s life-changing stuff,” Woods said. 

Modesto Junior College has also seen success from CyberPatriot. More than 40 students attended the college’s cybersecurity summer camp, and the school is already making plans to scale up for next year. Four high schools in the region have already formed new CyberPatriot teams since the school year began. 

“We are now working on a process to support schools that have decided to continue with the CyberPatriot program by creating competition teams at their schools,” said Brent Wedge, Cybersecurity Lead Faculty at Modesto Junior College. “The teachers, students, district IT and district administration of the Modesto City Schools District have all been very supportive. We are learning together and have a lot to organize but everyone is eager and seem to be up to the challenge.” 

Like Woods, Wedge sees CyberPatriot as a gateway to college for students who might not have otherwise considered higher education. 

“Over the years I’ve had a few high school students take some of my [college] classes and if properly prepared they can do very well and will be much further ahead of their peers in the long run,” Wedge said. 

Mohle said he’s proud of the work that’s been done so far and expects more good things to come for cybersecurity in the Central Region. 

“It took a while, but we are finally reaping the benefits of CyberPatriot. College classes, CompTIA certification, self-confidence – these are the seeds of success that our technology-oriented, yet underserved, students needed. Talk about moving the needle … you’ll see impressive things from the Central Region this year,” Mohle said.

CompTIA IT Fundamentals+ (ITF+) is an introduction to basic IT knowledge and skills


About the exam

The new CompTIA IT Fundamentals+ (FC0-U61) exam ​is now live!

The beta exam has ended.
For those who took the CompTIA ITF+ beta exam (FC1-U61), your exam results will be emailed to you after September ​11. Thank you for supporting the IT industry by taking the beta exam. 

The CompTIA IT Fundamentals+ exam focuses on the essential IT skills and knowledge needed to perform tasks commonly performed by advanced end-users and entry-level IT professionals alike, including:

  • Using features and functions of common operating systems and establishing network connectivity
  • Identifying common software applications and their purpose
  • Using security and web browsing best practices

This exam is intended for candidates who are advanced end users and/or are considering a career in IT. The exam is also a good fit for individuals interested in pursuing professional-level certifications, such as A+.

More information on both versions of the exam is available at this link.

computer desktop developer 113850

Cybersecurity Excuses You Hear All the Time — and the Best Ways to Respond

cybersecurity excuses blog entryWhen you run into excuses like “There’s no HIPPA police,” or “I have cybersecurity insurance,” here are some measured ways you can respond.

‘Cybersecurity’s not in the budget.’ 

The CompTIA cybersecurity search report says nearly 60 percent of companies don’t have top notch IT security because it costs too much. When you hear “It’s not in our budget,” help them develop a better budget, said Neal Bradbury, vice president of channel development for Barracuda MSP and vice chair of CompTIA’s IT Security Community.

Bradbury advises asking clients: “Is downtime or data loss in the budget? What about the cost of a break in?” For clients that deal with patients, like hospitals, a data breach can cost $400 per head. Clients who bill by the hour will lose money every minute the system is down. Get your client to quantify their risk, he recommended, and then offer to do a free data assessment. Show clients the real cost of a security breach and make your price tag look like a bargain.

‘We’re just a small business.’ 

People think their data isn’t valuable to hackers because they have small client lists and data that doesn’t appear valuable from the outside. Convince your clients that all data is valuable — even data from small businesses — and point out that small businesses can be an easier target for hackers. As more and more companies get hacked, you’re going to be challenged by your customers to see that you’re complying, Bradbury said. 

‘We just did a cybersecurity assessment. Why do we need another?’ 

Information and networks change daily, and a security assessment is a snapshot in time. Because security changes frequently, assessments truly should be a lifecycle done periodically, said Andrew Bagrin, CEO of OmniNet Inc., also a member of CompTIA’s IT Security Community.

“By the time you present a pen-test to a customer, things have already changed,” Bagrin said. “You can say, ‘Here’s your risk today, that changes tomorrow.’ And the longer you wait to do an assessment, the more risk and change there is.” 

Every time you do a risk assessment it’s a snapshot in time that helps IT security experts remain proactive, which is why Bagrin sells clients on security assessments as a lifecycle. 

“They need to be done periodically,” he said. “It’s not a one-and-done activity.” 

‘My people know cybersecurity. We don’t need outside help.’ 

CompTIA’s new cybersecurity research reports 43 percent of companies use third-party firms for security projects. From the half that tries to make do with security in-house, you’ll hear a lot of “My IT guy already does our security” or “Security is everyone’s responsibility.” 

“Ask yourself: If your people found a problem that would get them fired, would they tell you?” Bradbury said. Specialized security teams have a responsibility to mitigate risk and their own reputation to uphold. It’s their job to protect your employees.

‘I have cybersecurity insurance.’

Some companies think they can insure themselves against hackers, but buying a policy isn’t enough, Bradbury said. “The chances are it doesn’t really cover everything you’re looking to prevent from happening,” he said. 

When clients bring up cyber-insurance over IT security, ask if they know what the policy covers and if they had a security assessment prior to purchasing the policy. As a third-party security team, you can work with insurance providers to help clients understand and implement a cybersecurity plan that complies with the coverage. 

For more on how companies are building third-party IT security teams and how you can offer services companies want to hire, click here to download 2018 Trends in Cybersecurity: Building Effective Cybersecurity Teams and here to get involved with CompTIA’s IT Security Community.

Michelle Lange is a writer and designer living in Chicago.

IT Salary Survey 2018: How Much Do IT Pros Earn?

Those who identified themselves as managers experienced a median pay increase from $120,000 to $125,000. That’s the highest mark ever in this survey; the previous record was $121,000 set in 2016.

For women working in IT, the news wasn’t quite as good. They averaged about $10,000 less per year than their male counterparts. Female staff made $80,000, compared to $90,000 for male staff. Female managers earned a median salary of $115,000 compared to $125,000 for male managers. However, women did see sharper increases between 2017 and 2018 than the men did, so the gender gap appears to be narrowing.

Overall, IT professionals are happy with their pay. Fifty-seven percent said they were satisfied or very satisfied with their pay, and only 3% were very dissatisfied. That seems to translate well into job satisfaction because 59% said they were satisfied or very satisfied with all aspects of their jobs.

And, when asked what matters to them most about their jobs, respondents said it really is the money. Among participants, 54% selected base pay and 47% said benefits were among the most important aspects of their jobs (up to seven responses were allowed).

The following slides dive into the salary data in more detail and include median total compensation for 12 of the most popular job titles in IT, from the CIO all the way down to the help desk. You can download the full report here.

Cynthia Harvey is a freelance writer and editor based in the Detroit area. She has been covering the technology industry for more than fifteen years. View Full Bio

00SalaryIntro

10 Top Strategic Predictions for 2019

Here’s Gartner’s list of Top Strategic Predictions for 2019

1. Through 2020, 80% of AI products will remain alchemy, run by wizards whose talents won’t scale widely in the organization.

Skills will continue to be a major concern as organizations look to bring their artificial intelligence products up to speed and scale. Plummer said that organizations need to rally the skills that they have in data science, computer engineers, application engineers and DevOps specialists first.

“Those are the people you need to be tapping on the shoulder and saying ‘AI, AI, how do we get there?'” Plummer said.

What to watch for in the near term: By the end of 2019, research in data science automation will increase faster than AI data complexity, allowing skills to begin to catch up.

2. By 2023 there will be an 80% reduction in missing people in mature markets compared to 2018 due to AI face recognition.

That means we are going to find people faster, Plummer said. AI recognition can be scaled by taking pictures of all of us all the time. 

“When you are walking along the street in a major city you pass on average 15 cameras for every city block,” he said. “What happens when mobile phone devices are also used to capture people in the background and facial recognition is used to identify people?”

What to watch for in the near term: Through 2019, fears of public shootings will reduce outrage about public surveillance.

3. By 2023 emergency department visits will be reduced by 20 million due to enrollment of chronically ill patients in AI-enhanced virtual care. 

Only 30% of visits to the emergency room are for accidents, Plummer said. The rest are patients with chronic conditions, and the ER departments can’t handle the load.

But AI and monitoring devices deployed with patients who have these chronic conditions can instantly detect when something is going wrong and can help with preventative and reactive care. These patients can be cared for without their going to the ER.

“AI allows wellness and preventative care to scale,” Plummer said.

What to watch for in the near term: By year-end 2019 an affordable care organization will have acquired an AI-based mobile trainer/coach company.

4. By 2023 25% of organizations will require employees to sign an affidavit to avoid cyberbullying, but 70% of these initiatives will fail. 

Cyberbullying is much more common than you think, Plummer said. Anytime someone uses any kind of electronic media to talk about you in a false and negative way, whether you realize they are doing it or not, that’s cyberbullying. And 52% of cyberbullying comes from managers, Plummer said.

One of the tasks will be to teach people to recognize cyberbullying. Organizations must also make sure that leaders model respectful behavior.

What to watch for in the near term: By 2019 there will be 44% more federal lawsuits related to workplace harassment than in 2017.

5.Through 2022, 75% of organizations with frontline decision-making teams reflecting diversity and inclusive culture will exceed their financial targets. 

“That’s because of productivity. That’s because of ideas. That’s because of better delivery,” Plummer said.  “Teams perform better when they are diverse and inclusive.”

Yet only 40% of employees agree managers foster an inclusive environment. What can you do? Create a diversity and inclusion impact scorecard. You can also build scale and engagement of this with technologies.

What to watch for in the near term: By 2020, 15% of large enterprises will be recognized as inclusive workplaces through consistent identification of related behaviors.

6. By 2021 75% of public blockchains will suffer “privacy poisoning” — inserted personal data that renders the blockchain non-compliant with privacy laws.  

Blockchain has a lot of open text fields.

“If you use an open text field to put in personal information, either maliciously or carelessly without encrypting it, that information goes into the blockchain, and the blockchain is immutable, through the evolution of its life it can’t be deleted,” Plummer said. You can’t delete it, and it’s not compliant with privacy laws.

“Privacy may be the Achilles heel of blockchain if we don’t address it quickly,” he said.

To do that organizations should embrace privacy by design principals.

What to watch for in the near term: Active enforcement of ePrivacy regulation will become reality before Q1 of 2020.

7. By 2023 ePrivacy legislation will increase online costs by minimizing the use of “cookies” thus crippling the current internet ad revenue machine.

That means at some point consumers may no longer offer their personal information for free. 

Ad-based revenue will decline, and direct pay models for premium content and features will increase.

What to watch for in the near term: By year end 2019, advertising revenue for five major commerce marketing technology companies will decline by 10%.

8. Through 2022, a fast path to digital will be converting internal capabilities to external revenue-generating products.

Many internal IT organizations have developed unique capabilities that may be viable to sell on the commercial market. You should identify external prospects who might benefit from your data and algorithms

“Start looking at the internal things you do and consider, ‘can we sell it?'” Plummer said. You may fail in some of these efforts, but when you fail, you learn.

Need help to get from here to there? Consider acquiring an analytics technology company to fill in any holes you have in capabilities.

What to watch for in the near term: In 2019, top performers will shift from cost cutting to revenue building.

9. By 2022, companies leveraging the “gatekeeper” position of the digital giants will capture 40% of global market share on average in their industry.

“The top 4 companies in any industry are going to have 40% or more of the total market share,” Plummer said. “All the rest will have to divvy up the remaining 60%. We are saying market concentration is going to happen. Top players will have more and more of your money.”

In that kind of an environment that is dominated by digital giants such as Google, Amazon, and Facebook, organizations should balance interoperability efficiencies against single ecosystem risks. Plummer said you will need to deal with multiple partners rather than finding a single long-term partner.

What to watch for in the near term: By the end of 2019, market concentration will spread from a national to a global trend.

10. Through 2021, social media scandals and security breaches will have effectively zero lasting consumer impact.

Plummer admits that this conflicts with what another analyst said during Gartner’s opening keynote this week about how people are deleting their social media accounts. Plummer asked the audience how many of them had deleted their Facebook accounts and counted about five people who raised their hands. 
“You guys keep using this stuff, so stop complaining,” he said. “You got no privacy! Give it up!”

What to watch for in the near term: The number of people using social media every day will increase steadily through 2019.

Jessica Davis has spent a career covering the intersection of business and technology at titles including IDG’s Infoworld, Ziff Davis Enterprise’s eWeek and Channel Insider, and Penton Technology’s MSPmentor. She’s passionate about the practical use of business intelligence, … View Full Bio

 

Predictions Gartner2018

Cyber Hero Kenneth Slaght: Making San Diego a Cyber Leader

Cyber Hero Kenneth SlaghtSlaght is a firm believer that internships and apprenticeships are the way to meet this demand by providing a clear pathway from high schools and community colleges to cybersecurity jobs. The CCOE’s Internship and Apprenticeship Pipeline and Link2Cyber programs connect students and recent graduates with career opportunities in the region.

The CCOE is working to create what Slaght calls cyber’s “blue collar workforce,” or a new class of employees who are working secure, high-paying jobs that do not require college degrees. Read more

IT Technician Pathway Leads to High-Paying Jobs in California


The pathway is divided into the following segments:

  • Phase one: Computer retail sales
  • Phase two: Help desk/user support
  • Phase three: IT technician
  • Phase four: Cybersecurity or networking specialization

The pathway is offered as part of the Information Communication Technologies and Digital Media (ICT-DM) sector in the Doing What Matters for Jobs and the Economy — Strong Workforce Program.

Shawn Monsen, a faculty member at Sierra College and ICT-DM product development lead, is working to align the pathway’s recommended courses with four-year colleges so that students can earn a good job right away and create the foundation to earn a bachelor’s degree and increase their earning potential even more.

“This program provides students with a path to gain industry certifications to get better paying skilled jobs,” Monsen said.

Articulation pathways have been established between California Community Colleges and National University which allows courses taken in the pathway to be used toward NUs Cybersecurity and IT Management bachelor’s degrees. In the end, the more universities that

offer these degrees and provide articulation pathways that lead to those degrees, the better positioned California will be to meet its current and future IT needs.

“The industry has a desperate need for these skilled workers,” Monsen said. “The pathway provides a means for students to get those skills, earn those industry certifications and move into those jobs.”

The IT technician Pathway also aligns with efforts to increase cybersecurity education at the K-12 level through CyberPatriot and other cyber competitions. These events bring students from all walks of life together to learn how to keep networks safe against cyber threats.

Middle and high school students participating in cyber competitions already have many of the foundational skills needed for the IT technician and can advance through it to a high-paying job even faster.

The California Cyberhub coordinates cybersecurity education efforts across the state and is a key partner in the IT Technician Pathway, particularly the cybersecurity specialization.

While the impact on students is immense, it’s not the only benefit to utilizing the pathway model for IT education. By forging partnerships between community colleges and four-year universities, California is positioning itself as a leader in technology education and creating a model that can be implemented nationwide.

“Over 27,000 students take one or more IT courses at the California Community Colleges per year. With 64 Cisco Academies, 24/7 online computer labs, and over 330 IT Faculty — 70 percent with master’s degrees — they are the best kept secret in the cybersecurity solution, said Information Communication Technologies-Digital Media Sector Navigator Steve Wright. “The IT Technician Pathway is a uniform statewide guided pathway for entry level and advanced upskilling workers. Articulation to a four year degree completes the journey to a professional education and better wages.”

For more information on the IT Technician Pathway, visit ict-dm.net.

About Doing What Matters for Jobs and the Economy – Strong Workforce Program

Doing What MATTERS for jobs and the economy is a four-pronged framework to respond to the call of our nation, state, and regions to close the skills gap. The four prongs are: Give Priority for Jobs and the Economy » Make Room for Jobs and the Economy » Promote Student Success » Innovate for Jobs and the Economy.

The goals of Doing What Matters for Jobs and the Economy are to supply in-demand skills for employers, create relevant career pathways and stackable credentials, promote student success, and get Californians into open jobs.

ai codes coding 247791

KB Table of Content

close-link
KB Table of Content

Newsletter

X