Is your salary on par with others in your field? Learn more in Skillsoft's 2024 IT Skills and Salary Report. Click Here.

Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Resource Library

Filter By

Topics

Show Filters
Result Filters:

1076 Results Found

Results per page: 10 40 80

How to Become a Cisco Certified Network Professional in Security

White Paper | April 19, 2021

This certification prep guide provides an overview of the current Cisco Certified Network Professional-Security certification and offers helpful tips.

10 Steps to Better, Stronger Passwords

Article | April 22, 2021

Passwords aren't as secure as you think, but there are ways to improve their effectiveness against hackers' attempts to gain access.

Why Password Authentication Isn’t as Secure as You Might Think

Article | April 22, 2021

Hackers are everywhere, and they have a sophisticated array of tools for cracking your passwords. The primary purpose of this white paper is to help you understand that easy-to-remember passwords are no longer considered a secure form of authentication

How to Secure a Campus Network with Cisco ISE

Webinar – Recorded | April 29, 2021

This webinar will focus on addressing the issues of an unsecure campus network and how to address the insecurity with ISE. We then will look at how Cisco ISE can add security to devices beyond initial connectivity. View the slide deck>>

Optimizing DNS for Better Performance, Filtering, and Security

Article | May 03, 2021

Most Internet users don't realize that often a website or other service that seems slow to respond is actually working fine. Instead, it’s the resolution of DNS that is putting a glitch in your giddy up. Fortunately, there are several steps you can take to optimize your DNS to get better performance.

10 Reasons to Embrace Diversity and Inclusion in Your Workplace

Article | May 04, 2021

Diversity in the workplace means that a company employs a wide range of individuals with different characteristics. By nurturing a more accepting, diverse culture, organizations will experience a substantial positive effect on individuals and a stronger bond within teams. 

OpenShift Technical Overview & Key Features

Webinar – Recorded | May 04, 2021

Containers and Red Hat OpenShift have quickly become the de facto solution for agile development and application deployment. Administrators and developers are increasingly seeking ways to improve application time to market and improve maintainability. Red Hat Training has developed a course that provides the gateway to container adoption by providing an understanding of the potential of DevOps using a container-based architecture. Orchestrating a container-based architecture with Kubernetes and Red Hat OpenShift improves application reliability and scalability, decreases developer overhead, and facilitates continuous integration and continuous deployment. View the slide deck>>

8 Ways to Get Employees to Follow IT Security Policies

Article | May 10, 2021

As an IT security leader, you understand the importance of having and following corporate policies to protect and defend your systems and the assets that they retain. You and your security team work diligently to know the latest threats, prepare for possible intrusion, and harden your network.

How to Secure a Campus Network with Cisco ISE

Article | May 10, 2021

In any operational data network, the two high-level outcome possibilities are connectivity and isolation. If every device can connect to every other device by enabling full connectivity, networking is relatively easy to create, but inherently unsecure. If a network fully isolates all forms of traffic, it is unusable.

A Complete Guide: How to Become an AWS Certified Architect

White Paper | May 14, 2021

This Certification Prep Guide provides an overview of the current AWS Certified Solutions Architect – Associate certification and offers helpful tips that you can use when preparing for your AWS Architect certification exam.

Hot Standby Router Protocol Vs. Virtual Router Redundancy Protocol, What’s the Difference?

Article | May 18, 2021

This is the second of a two-part series on First Hop Redundancy Protocols (FHRP). In Part 1 of this topic, we reviewed the fundamentals of networking, the importance of the Default Gateway to an endpoint, and how to solve redundancy of Default Gateway by using an FHRP such as Hot Standby Router Protocol (HSRP)

Empower your skills with Microsoft Security, Compliance, and Identity (SCI) Associate Level certifications

Webinar – Recorded | May 20, 2021

Join us for this exciting journey through Microsoft Security, Compliance, and Identity (SCI) new security-focused certifications. We will discover the complete portfolio of associate training and certification for Microsoft Security, designed to meet industry and market needs, with roles, skills and capabilities needed for the job, including specializations, hands-on experience and practice requirements. We will also discuss the skills gap in security professionals. View the slide deck>>

10 Reasons to Embrace Diversity and Inclusion in Your Workplace

Webinar – Recorded | May 27, 2021

Despite the obvious benefits, organizations are still struggling to successfully implement Diversity and Inclusion in the WorkPlace. This webinar discusses the benefits as well as the factors limiting diversity and inclusion in the workplace. View the slide deck>>

How to Secure a Data Center with Cisco ACI

Webinar – Recorded | June 08, 2021

This Webinar will focus on addressing the issues of an unsecure data center network and how to address the security concerns with Cisco ACI. The key components of how to create an ACI whitelist will be covered. View slide deck>>

EC-Council Certification List

Article | June 17, 2021

This quick reference guide will highlight the various certification tracks to help you find your path through the EC-Council programs.

How to Build an IT Career with CompTIA Certifications

Article | June 18, 2021

CompTIA has become one of the most recognized and respected names in IT certifications, from the first A+ back in the 1990s to today with over a dozen vendor-neutral certifications covering a variety of topics.

How to Convince Your Manager of the Benefits of Training

Article | June 18, 2021

After reading this article, whether you’re requesting training for yourself or your team, you will be better prepared to build and state your case for the business-delivering value of training.

The 4 Best Practices IT Pros Should Follow to Get a Raise

Article | June 18, 2021

With a constant demand for support, specialized skills and technology, IT professionals are under a good deal of pressure at work. And if they’re not compensated for it, they might just leave — causing disruption at the company, but also their own lives.

TCP/IP Foundations

Webinar – Recorded | June 22, 2021

Despite rapid advances in technology, and widespread use of networks over the last few decades, the TCP/IP v4 is still the predominant protocol in use. It is also quite surprising to see significant gaps or deficiencies in the foundational TCP/IP knowledge of many networking and IT professionals. This 1-hour webinar attempts to highlight the common areas of such gaps and how to overcome them. View slide deck >>

Between Connectivity and Isolation: Achieve Optimal Data Center Security with Cisco ACI

Article | June 28, 2021

In this article, we discuss how to achieve that optimal security approach in the data center with Cisco Application Centric Architecture, or ACI.

How to Become a Cisco Certified Network Professional in Enterprise

White Paper | June 28, 2021

The CCNP Enterprise certification is the newest CCNP level certification. It replaces the CCNP Routing and Switching certification that has had multiple iterations throughout the years.

How to Become a CISSP Certified Professional

White Paper | June 29, 2021

CISSP is a widely desired indicator of knowledge, experience, and excellence on the resume of many IT professionals.

Master your Agile Transformation with Scrum & DevOps

Webinar – Recorded | June 29, 2021

Many organizations have already embarked on their Agile Transformation journey, yet despite having agile methodologies in place they have still not matured their competencies to the desired level. Still, there are some unicorns who have managed to master the process and are now delivering value faster and more efficiently. Frameworks like DevOps and Scrum help organizations stay ahead of the curve by facilitating cultural transformation, adoption of a lean mindset, and increased automation.

How to Become Certified in Risk and Information Systems Control

White Paper | July 06, 2021

Digital transformation has bred equal parts innovation and risk. And it’s not just the IT department that’s been disrupted—technology is now the most critical risk factor for the entire organization.

CISSP Career Benefits and Salary

Article | July 08, 2021

CISSP remains one of the most respected and sought-after cybersecurity certifications. With the most recent update released in May 2021, (ISC)2 has maintained the high bar it set to validate the knowledge and skills of senior cybersecurity managers.

How to Become a Microsoft Certified Azure Administrator Associate

White Paper | July 09, 2021

This Certification Prep Guide provides an overview of the Microsoft Azure Administrator Associate certification and offers helpful tips that you can use when preparing for your certification exam.

Top Five Big Data Architectures

Article | July 12, 2021

It’s been about 10 years since public cloud offerings like AWS opened up the world of big data analytics. This post examines the top five most useful architectures used for big data stacks to learn the sweet spots of each.

A CompTIA-Certified Professional’s Guide to Maintaining Your Certifications

Article | July 13, 2021

You have earned a CompTIA certification. The next step is to ensure that your certification remains current and valid. Some certifications are good for life, while others require renewal. Let’s look at what certifications require renewal, the options that you have for maintaining your certifications, and steps to get it done.

Top 5 Risky Internet Behaviors

Article | July 15, 2021

The Internet is not a safe place. We see that more than ever with the security breaches of businesses and individuals in the news on a daily basis. As Internet citizens, we need to take our protection into our own hands, as obviously most online services are not doing their best to protect us.

Why It’s Critical to Use a VPN at Home, for Work, and on Mobile

Article | July 15, 2021

The use of public networks is risky. Whether wireless or wired, any public access Internet connection is putting you and your data at risk. It may be convenient to use a hotel, restaurant, or coffee shop Internet link, but the likelihood of attack or compromise is greater than accessing a private network.

Top 5 Common Activities that Break Company Security Policy

Article | July 16, 2021

Many employees are not as well-versed in their company’s security policy as they should be. This may result in workers performing tasks that might seem innocent or benign on the surface, but which actually put the organization at risk of a security breach. Understanding what you are doing (as an employee) or what your users are doing (as a boss or manager), can help you work toward a viable resolution to these situations. In most cases, user behavior changes as well as implementation of new technological solutions can curb exposure to risk and increase security policy compliance.

10 Ways Everyone Should Approach Cybersecurity

Article | July 20, 2021

This paper reviews many key issues and focuses attention on 10 responses that we all need to adopt in our approach to security.

Contingency Planning: How Do You Plan for Failures?

Article | July 21, 2021

Despite an organization's best efforts to prevent downtime and avoid compromises, failures will still happen from time to time. “I am convinced that there are only two types of companies: those that have been hacked, and those that will be,” said Robert Mueller, former FBI Director, in a statement. “Even that is merging into one category: those that have been hacked and will be again.” So, what is your organization doing about it? How do you plan for failures and security breaches?

How to Plan a Career Path in Cybersecurity

Article | July 22, 2021

Cybersecurity is the arena of technology, methodology, and practice that focuses on protecting electronic information and the systems supporting it against compromise and attack.

Communication Skills for IT Professionals: The Benefits for Your Career

Article | July 27, 2021

For every IT professional, there comes a point when the realization hits: technical skill will only get you so far. You may have your foot in the door (or the IT cave), but in order to advance your career and set yourself apart, you need to bolster a critical soft skill: learning effective communication skills for IT professionals

How to monitor traffic flow with Cisco ACI

Webinar – Recorded | July 27, 2021

This Webinar will focus on addressing the factors behind traffic flow in Cisco ACI. The key components of how to monitor traffic flow in ACI will be covered. View slide deck>>

Top 10 Courses for System Administrators

Article | July 27, 2021

System Administrators, or SysAdmins, are the “installation specialists,” “configuration specialists” and “fixers” in IT. If you’ve ever seen Pulp Fiction, SysAdmins are like Winston Wolfe — their job is to solve problems.

Who Are Systems Administrators? A Job Outlook and Salary Profile

Article | July 28, 2021

Systems Administrators, or SysAdmins for short, are most often frontline IT staff who are problem-solvers, (metaphorical) fire extinguish-ers, and, simply, doers.

How to earn the Certified Information Systems Auditor Certification

White Paper | Aug. 04, 2021

CISA is now one of the most sought-after and highest-paying IT certifications

How to Earn the Nutanix Multicloud Infrastructure Certification?

White Paper | Aug. 06, 2021

This Certification Prep Guide provides an overview of the current Multicloud Infrastructure certification offered by Nutanix and offers helpful tips that you can use when preparing for your certification exam

TCP/IP Foundations

Webinar – Recorded | Aug. 10, 2021

Despite rapid advances in technology, and widespread use of networks over the last few decades, the TCP/IP v4 is still the predominant protocol in use. It is also quite surprising to see significant gaps or deficiencies in the foundational TCP/IP knowledge of many networking and IT professionals. This 1-hour webinar attempts to highlight the common areas of such gaps and how to overcome them. View slide deck>>

How to Become a Microsoft Certified Azure Solutions Architect Expert

White Paper | Aug. 13, 2021

This Certification Prep Guide provides an overview of the Microsoft Azure Solutions Architect Expert certification and offers helpful tips that you can use when preparing for your certification exam.

Learn to Keep Your Network Secure Using NMAP

White Paper | Aug. 18, 2021

Gain access to this lab and learn to use NMAP, an open-source port-scan tool, for networking discovery, vulnerability scanning and security risk detection.

Achieve Highest Degree of Visibility on Network Traffic with Cisco ACI

Article | Aug. 24, 2021

In any operational data center, it is critical to have the highest degree of visibility on network traffic for operations and application troubleshooting. In this white paper, we discuss how to achieve optimal visibility of any type of application traffic with Cisco Application Centric Architecture, or ACI.

How to Monitor Traffic Flow with Cisco ACI

White Paper | Aug. 24, 2021

In any operational data center, it is critical to have the highest degree of visibility on network traffic for operations and application troubleshooting.

CCNP Enterprise Preparation

Webinar – Recorded | Aug. 26, 2021

This webinar is examining the process of how to best prepare for the Cisco Certified Network Professional in Enterprise skill set. We will look at the process to become certified including which exams to take; look at the available resources for study, including the blueprint for the exams and courses that are applicable. We will look at why someone might want to get certified as a CCNP Enterprise. We will also examine the process to maintain the certification. View slide deck>>

How to Build a Winning Cybersecurity Team

Article | Aug. 26, 2021

For every organization, effective cybersecurity depends on a careful deployment of technology, processes, and people. And if you get the people right, they’ll take care of the other two factors. Just like sports teams, cybersecurity teams need to be carefully bult and managed to reach optimum performance. They don’t just take shape naturally.

Trends in Cybersecurity

Webinar – Recorded | Aug. 31, 2021

Organizations and individuals are threatened with ever-growing cyber threats and must be prepared to address them. The more we are connected to networks, the more suspectable we are to attacks, therefore enterprises must stay current applying various cybersecurity measures and maintaining awareness of cybersecurity trends. View slide deck>>

ITIL 4 guiding principles in 30 minutes

Webinar – Recorded | Sep. 07, 2021

A quick 30 minute look at ITIL 4 Service Value System focusing on the guiding principles –part of the core guidance of ITIL4. This webinar includes an example of how this guidance might be applied in an organization.  

This Is What You Can Do To Promote Cybersecurity Awareness Month

Article | Sep. 08, 2021

National Cybersecurity Awareness Month has grown into a global effort, with both individuals and organizations taking part — and for good reason.

Disadvantages of Indexing in SQL Server

Article | Sep. 09, 2021

Getting the best possible performance from a SQL server can become more complicated as you add more operations to your database.

Networking Foundations

Webinar – Recorded | Sep. 14, 2021

Despite rapid advances in technology, and widespread use of networks over the last few decades, the Fundamentals of Networking have not changed much. It is also quite surprising to see significant gaps or deficiencies in the foundational knowledge of many networking and IT professionals. This webinar attempts to highlight the common areas of such gaps and how to overcome them.

10 Reasons You Should Consider a Career in Cybersecurity

Article | Sep. 23, 2021

Cybersecurity has become a key area of job growth in the last few years. Now more than ever, individuals with computer security skills are needed to fill jobs currently sitting vacant. All the while, new job positions come into existence every month with few qualified applicants.

5G Practical Network Slicing

Webinar – Recorded | Sep. 23, 2021

In this hands-on demonstration, you observe the configuration of IMS, Internet, SOS, and Admin DNN objects (Data Networks Name). These DNNs will then be assigned to several slice descriptors, showing how geography enters into slice implementation. You will then watch the slice configured on a working 5G network. View slide deck>>

Cisco Certified Network Professional Enterprise

Article | Sep. 23, 2021

The Cisco Certified Network Professional Enterprise is built on the longstanding and well-recognized CCNP Routing and Switching. With the addition of evolving technologies, this makes the certification current and relevant. Having a vendor certification can be hit or miss, depending on the vendor, but with Cisco holding a major percentages of market share in the different technologies and implementations in the networking industry, having a CCNP Enterprise on your resume offers several advantages.

The Importance of OSPF Type 1, 3 and 5 Link State Advertisements and the benefits of understanding them

Article | Sep. 23, 2021

Many Enterprise companies use Open Shortest Path First (OSPF) as their Interior Gateway Protocol (IGP). OSPF relies on Link State Advertisements (LSAs) in order to advertise and learn subnets so whether it’s for CCNA or CCNP Enterprise or simply for a basic understanding of OSPF, it is important to understand the purpose of the various LSA types and how far the LSAs flood.

Maximizing Team Results

Webinar – Recorded | Sep. 28, 2021

In this webinar, we will cover what makes a successful team, how to drive high-performance in your team, different stages of team development and other topics. Understanding people skills, process skills, and setting team boundaries and norms will be discussed and how these can build the framework for your high-performance team. View Slide deck>>

The Enemy Inside: How to Detect Supply Chain Attack & Stop it Before It’s Too Late

Webinar – Recorded | Oct. 06, 2021

When it comes to developing new, innovative ways and tools for breaching security, the attackers never stay idle – and so shouldn’t we when it comes to counteracting! Through the past few years, their inventiveness caused substantial damage in the area of supply chain attacks. During this webinar, Paula will demonstrate techniques of using the supply chain method and show tactics used today by cyber-criminals that allow them to deliver it and what are the prevention mechanisms to avoid being attacked by the newest innovations! Bring some coffee before attending!

How to Become a Cisco Certified Cyberops Associate

White Paper | Oct. 07, 2021

The Cisco Certified CyberOps Associate certification focuses on the cybersecurity branch of IT security

Technical Deepdive with Containers, Kubernetes, Red Hat OpenShift

Webinar – Recorded | Oct. 13, 2021

Join Red Hat Training’s Solution Architect, John Walter, for a virtual, high-level complimentary course introducing you to Linux containers and container orchestration technology using Docker, Kubernetes and Red Hat OpenShift Container Platform.

Fireside Chat: Expert Advice on Starting a Career in Cybersecurity

Webinar – Recorded | Oct. 20, 2021

Join This QA Session to Hear from Cybersecurity Expert Brad Puckett on Kickstarting Your Career

Empower your skills with Microsoft Security, Compliance, and Identity (SCI) certifications

Webinar – Recorded | Oct. 21, 2021

Microsoft and Global Knowledge are partnering up to showcase the importance of Cybersecurity Awareness Month. Join this event to learn all the tools and tactics to stay safe and secure online throughout the whole year. This webinar event will take you through the new certifications focused on Microsoft Security, Compliance, and Identity (SCI). You'll learn more about the complete portfolio of associate training and certification for Microsoft Security and how it's designed to meet industry and market needs with roles, skills, and capabilities needed for the job, including specializations, hands-on experience, and practice requirements.

Policy-Based Routing: What Is It and How Is It Used?

Article | Oct. 22, 2021

Policy-based routing (PBR) provides network administrators with agility and flexibility to better manage traffic. With carefully architected policies, you can optimize how segments of your network process data, as well as how bandwidth is managed for business-critical applications.

The Power of Experiential Skills Development

Webinar – Recorded | Oct. 27, 2021

Discover how to accelerate the development of your security skills and competencies by incorporating experiential learning activities such as cyber ranges into training. Cyber ranges have emerged as excellent vehicles for helping IT professionals learn by doing. These realistic, hands-on simulations prepare you for when — not if — you’re attacked. And we’ve added them to GK Polaris!

10 Excel Features You Need to Know About

Article | Oct. 29, 2021

From analyzing your data and allowing to ask natural language questions to working with and building huge data models, this version of Excel has a lot to offer. These are some of the best features that Excel has to offer. Some haven’t finished their evolution yet either.

Understanding Next Hop Resolution Protocol Commands

Article | Oct. 29, 2021

Next Hop Resolution Protocol enables businesses to have a way for next-hop servers and next-hop clients to communicate with each other directly, bypassing a central hub and preventing potential bottlenecks.

An Introduction to Automating Cloud Infrastructure

Webinar – Recorded | Nov. 04, 2021

As cloud platforms provide ever greater infrastructure capability, automating and managing infrastructure is becoming critical to our strategy and process. Tooling environments are also heavily impacted. Tools like Terraform, configuration automation tools (Chef, Ansible, etc.) and cloud-native infrastructure solutions completely change cost models and workflows. This presentation is an introduction to infrastructure automation in the cloud, a few popular automation tools, and how to tie automation to larger cloud (and business) strategy.

How to Select the Right Certification for You

Article | Nov. 08, 2021

According to our IT Skills and Salary Report, 85% of professionals possess at least one certification. That’s a ton of competition in the industry. And the general consensus is the more certifications, the better. So why are so many IT pros and decision-makers putting such an emphasis on certifications? Why is so much investment devoted to training?

Do You Need a VPN or a Firewall or Both?

Article | Nov. 12, 2021

Protecting your IT assets from threats is an essential part of business and personal digital activities. VPNs and firewalls are two commonly used security tools to help reduce risk while maintaining usability. When used in concert, IT communications are filtered and encrypted.

10 Ways to Strengthen Your Privacy Online

Article | Nov. 16, 2021

The Internet is not automatically a secure or safe place to be. We need to re-evaluate what it means to be secure in our online activities. 

The Pros and Cons of Mobile Payment Applications: Is Convenience Worth the Risk?

Article | Nov. 16, 2021

Mobile payment applications or systems have become commonplace with the expansive growth and popularity of smartphones and other mobile devices.

Palo Alto Networks - Firewall Essentials

Webinar – Recorded | Nov. 18, 2021

Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This live webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment.

Virtualization: What Challenges Appear When Moving a Data Center to the Cloud?

Article | Nov. 19, 2021

There are many challenges that come to the forefront as you begin the process of virtualizing the data center and moving away from the current physical network setup.

Cisco Certified CyberOps Associate Webinar

Webinar – Recorded | Nov. 23, 2021

As the sophistication, stealth, and frequency of cybersecurity threats continue to increase, the complexity of attacks means every organization needs security expertise before, during, and after an attack. For this reason, the demand for cybersecurity operations (CyberOps) personnel keeps going up.

Virtualization for Newbies: Five Types of Virtualization

Article | Nov. 29, 2021

While the recent trend towards cloud computing might make it seem like virtualization is new, it has existed in some form for many decades.

Your Guide to NTFS Vs. Share Permissions Best Practices

Article | Nov. 29, 2021

Most of us have heard of "oversharing" in the social sense (i.e. giving out too many details of your personal life), but how about "under sharing" in the Windows Server realm? What does that even mean? Well, I sort of just made that up, but it does actually make some sense when you think about it in terms of creating a Windows Share that doesn’t provide enough permissions.

An Introduction to Value Stream Mapping

Webinar – Recorded | Dec. 07, 2021

Value stream mapping can be a dramatically transformational event – expanding empathy across teams, sharing points of view, and solving gaps in understanding which may be robbing everyone of productivity. This webinar will quickly equip attendees with a high-level understanding of value stream mapping and will teach practical tips on how to run a value stream mapping exercise within their teams and organizations.

6 Reasons You Should Consider Earning Your VMware Certified Professional - Data Center Virtualization Certification

Article | Dec. 09, 2021

VMware software and products are popular among enterprises. However, they are also highly proprietary. So, unless you have had experience with VMware products, any experience with other software can only serve as a foundation for using vSphere and other software that VMware offers.

A Beginner’s Introduction to Virtual Machines and Hypervisors

Article | Dec. 09, 2021

Virtualization is a constantly evolving process, with new platforms introducing tools every day that are designed to make the process of moving to the cloud simpler.