The most in-demand technologies for IT professionals

IT operations professionals

Although platforms such as Linux, Ubuntu, macOS, and Microsoft Windows dominate the list, technologies such as Docker and Amazon S3 show the growing importance of cloud computing in the enterprise.

Top 10 in-demand: IT operations

  1. Linux
  2. Ubuntu
  3. Microsoft Windows
  4. macOS
  5. HTTP
  6. Docker
  7. PowerShell
  8. TCP/IP
  9. Microsoft Office 365
  10. Microsoft SharePoint

Top 10 fastest growth rate: IT operations

  1. Exam 70-688
  2. Microsoft Intune
  3. Azure App Service
  4. CompTIA Network+
  5. VMWare Certified Associate
  6. Citrix CCA-V
  7. Azure Logic Apps
  8. AWS Certified DevOps Engineer
  9. CCIE Routing and Switching
  10. CCENT

“The speed of technology innovation is faster than ever before, and technology leaders need to stay informed on the changing nature of enterprise tech in order to ensure they have sufficient resources to keep up with the pace of change,” Walkingshaw said in the press release.

SEE: Microsoft Azure: An insider’s guide (free PDF) (TechRepublic)[4]

Information Security Professionals

As security threats continue to grow, data breaches are getting more common and more expensive, forcing enterprises to stay abreast of the latest security tools to protect their data and assets.

Top 10 in-demand: Security

  1. Kali Linux
  2. CISSP
  3. CloudFlare
  4. CompTIA Security+
  5. Certified Ethical Hacker (CEH)
  6. CISA
  7. OpenSSL
  8. OWASP
  9. JSON Web Tokens (JWT)
  10. Cisco Identity Services Engine (ISE)

Top 10 fastest growth rate: Security

  1. BriMor Labs Live Response Collection
  2. Scout2
  3. PaloAlto Networks DNS Security
  4. Cyber Triage
  5. Amazon Inspector
  6. Checkmarx CxIAST
  7. Azure MFA
  8. Contrast Assess
  9. CloudFlare
  10. Chronicle Backstory

“Security is a top of mind concern for all technology leaders, especially heads of security and CISOs,” Walkingshaw said. “As cyber threats evolve and adapt, enterprises must stay on top of the most relevant, up-to-date technologies to ensure that sensitive company and user data is protected from attacks and breaches.”

Also see

Focused developer coding on computer monitors working late in officeFocused developer coding on computer monitors working late in office

Image: Getty Images/iStockphoto

1 2 3 4 5