1087 Results Found
Part of IBM's new training approach includes a carefully selected group of four Global Training Providers. Tom Rosamilia explains the detailed process and criteria IBM used to select the four Global Training Providers, including worldwide reach and innovation in delivery methods. These IBM Global Training Providers are experts in skills education and will help IBM meet our goal of providing clients the right skill set to quickly and efficiently leverage the full power of IBM solutions.
Whether you are just getting started in business analysis or want to gain a better understanding of certain aspects of business analysis, we have compiled a list of frequently used terms to help you get started.
It doesn't take pure imagination to realize that when it comes to your career, inspiration may come from the least likely of places. It also doesn't seem possible that four decades ago "Willy Wonka and the Chocolate Factory" hit the silver screen. Growing up, it was one of the few movies I always made sure to watch whenever it was on TV. I'm sure I wasn't alone.
IT is a very fast changing industry – what is hot today may be a tiny niche market in only a few years and lesser known things may turn out to be huge trends. That having been said, there are many certifications that will be around for a long time. However, this does not imply that recertification and/or continuing education credits are not required to maintain certification. Predicting the future is always challenging, including in IT, but these certifications are good bets.
System Administrators, or SysAdmins, are the “installation specialists,” “configuration specialists” and “fixers” in IT. If you’ve ever seen Pulp Fiction, SysAdmins are like Winston Wolfe — their job is to solve problems.
Rather than looking back over the past year, organizations and individuals need to start assessing cybersecurity threats that lie ahead in the New Year. While there is always the chance for a new threat or risk to be unearthed this year, often the risks of the New Year are predicable from the trends of attacks from the previous year. However, other factors need to be considered as well, including new technologies, new software and applications, mobility, etc. Here are my predictions of the areas to watch for new security threats. When it comes to cybersecurity, we have a lot to look out for, take precautions against and be paranoid about.
Microsoft Lync Server 2013 requires a proactive approach during deployment. This white paper provides valuable recommendations as well as the technical links that help you avoid common mistakes during a Microsoft Lync Server 2013 deployment.
These technology job roles are proven to be essential during a crisis as enterprises scramble to change strategies and meet goals. The skills demonstrated by IT professionals in these 10 positions can make the difference between business success and failure, especially during a recession.
You might already know what cloud computing is, and you might already be implementing it into your business, but are you able to have a conversation about it? The lingo surrounding this newer technology can be a bit, well, cloudy. Here are just some of the terms we keep hearing as cloud computing spreads from organization to organization.
General character attributes every IT pro should have and on the things that every IT pro should know or do.
There are two basic types of addresses used in Local Area Networking (LAN): logical addresses and physical addresses. Understanding the differences between the two addresses begins with developing an understanding of the following terms.
The Cyber Risk landscape is rapidly evolving leaving Cybersecurity professionals dazzled and lost in prioritizing their cybersecurity needs. Limited budget and low cyber resilience lead organizations in adopting re-active defensive measures. In this webinar, we will go through a methodological approach for assessing top cyber-risks a typical enterprise might encounter. And will address different scenarios for mitigating, transferring, or avoiding encountered risks.
IT professionals benefit from gaining skills in data analysis, cybersecurity, cloud computing, virtualization and hyperconvergence, and mobile app development.
Discover the top 5 highest-paying and popular Cisco certifications from the IT Skills and Salary Report. Learn how to get certified and unlock IT career opportunities.
Technology trends such as these show no signs of abating, and IT administrators need to be prepared. Having a well-rounded and versatile team of IT practitioners is becoming increasingly necessary. In the following article, we examine five key skills that every IT department should have covered, regardless of the size of the company.
Global Knowledge is your partner when deciding which learning solution is the best fit for you and your organization, supporting your team throughout the process. Talk with us now to learn what you should consider when evaluating solutions.
Learn about the most important and surprising findings from the Global Knowledge 2017 IT Skills and Salary Report. Topics discussed include top salaries, skills gaps, workloads and certifications.
As organizations look to do more with fewer resources and better leverage scarce knowledge across their entire organization, they have found that the traditional hierarchical management structure no longer meets the needs of the business. Enterprises have turned to the matrix organizational structure for increased flow of information across departments and greater flexibility and responsiveness.
If you’re looking to fortify your cloud expertise, there are a number of certifications to consider. We have compiled 10 cloud certifications that are sure to positively affect your career.
Managers are in dire need of cybersecurity professionals with specific skills. If you’re looking to advance your career, or transfer into the cyber field, now is the time to get certified.
With the growth of bring your own device (BYOD) and mobility, users are increasingly asking for computing anywhere from any device at any time. Users now expect productivity on the go with a desktop that can be freely accessed and secure. We're no longer a society that sits at a desk to be productive. The VMware Horizon Suite allows the datacenter administrators to satisfy the accelerated mobility needs of the workforce while still maintaining an IT solution that is easily managed and secure.
A range of factors can influence the data center you choose. You should consider all of the factors listed in this white paper before deciding where to place your servers.
Global Knowledge subject matter experts predict the top trends for 2020 in IT training, Microsoft, Cisco, AWS, cybersecurity and more.
Microsoft SQL Server has evolved over the years as a scalable, robust database management system and is now competing in the VLDB (Very Large Database) space with Oracle and IBM. The market share for the product continues to grow, based on total cost of ownership and ease of use. This white paper outlines some of the important fundamentals of Microsoft SQL Server 2008 that every DBA should know.
In many of today’s enterprise data warehouses and decision support teams, data scientists and data visualization specialists have reached near rock star status. This is in large part due to their ability to produce unique, clever and insightful perspectives with company information. These analytical gems often bypass obstacles to explain complex business data. This line of work is both an art and a science, and is generally most effective when the right blend of business intelligence tools are in place.
Dell SonicWALL's CSSA (Certified SonicWALL Security Administrator) exam is an open book, online certification exam that certifies a student’s understanding of the SonicOS Unified Threat Management (UTM) operating system. The exam tests a student’s network security knowledge, and their ability to use the GUI menu structure for configuration of standard network security scenarios.
Many employees are not as well-versed in their company’s security policy as they should be. This may result in workers performing tasks that might seem innocent or benign on the surface, but which actually put the organization at risk of a security breach. Understanding what you are doing (as an employee) or what your users are doing (as a boss or manager), can help you work toward a viable resolution to these situations. In most cases, user behavior changes as well as implementation of new technological solutions can curb exposure to risk and increase security policy compliance.
The Internet is not a safe place. We see that more than ever with the security breaches of businesses and individuals in the news on a daily basis. As Internet citizens, we need to take our protection into our own hands, as obviously most online services are not doing their best to protect us.
Dynamic Access Control (DAC) in Windows Server 2012 lets you manage access to documents in ways that go beyond classic NTFS (New Technology File System) permissions. For example, if you want to allow a set of users in an office across the country or across the globe read-only access to files relating to the Wind Turbine Project, DAC can do the job.
VMware announced Horizon 7 in February and subsequently released the software updates. Horizon 7 provides a more streamlined, high-performance virtual desktop and application experience. New updates include features such as Instant Clones, Smart Policies, Blast Extreme and greater scalability with Cloud Pod Architecture. Let’s dig into the seven key features that Horizon 7 brings!
It’s been about 10 years since public cloud offerings like AWS opened up the world of big data analytics. This post examines the top five most useful architectures used for big data stacks to learn the sweet spots of each.
Kirsten Lora, Global Knowledge Senior Product Director, discusses the benefits of our IT Project Management course.
“Traceroute” is a utility that’s commonly used when troubleshooting IP networks, but many network managers at the CCNA level and beyond aren’t really sure how it works or what you can do with it. One reason for this might be that, unlike most things in the IP world, there are no standards documents describing how “Traceroute” functions. Thus the implementations are vendor-specific, and not even the utilities’ names are standardized. With Cisco IOS and Unix, it’s called “traceroute”, in the Microsoft world, it’s “tracert”, and other operating systems have similar utilities, such as “tracepath” for Linux.
Explore how IT decision-makers’ training views have changed since we first released our annual IT Skills and Salary Report 11 years ago. Once viewed as an expense, IT leadership now sees professional development as an investment. Even with shrinking budgets and a recent rise in skills gaps, the value of training is currently at an all-time high.
Chaos and disorganization are commonplace as organizations struggle to manage IT-enabled services, which can have a serious impact on the Helpdesk. Skillsoft has the solution with ITIL. The Foundation, Advanced, and Extension Modules will provide knowledge and training so that you can proactively build and manage a blueprint for IT. This will enable you to effectively address real-world issues that impact your service organizations and their individual contributors alike. Watch Now
If you enjoy analyzing data and using Power BI to discover and unlock data insights, this could be the ideal certification for you – especially if you use those insights to provide easy-to-understand data visualizations that can help drive the success of your team and organization. Join Skillsoft in the second of our Transformative Tech Microsoft Certification series, where we leverage our expert knowledge in Microsoft Power BI to inform you on the potential benefits for your business when utilizing Power BI. In this webinar you will learn: Watch Now
Join Skillsoft, as part of our Transformative Tech series, as we demonstrate how we can educate your organization to foster a culture of cybersecurity and unify all employees to manage risk and encourage agility and vigilance. Watch Now
Whether you’re a business user, administrator, or embarking on your technical career, this certification provides an opportunity to prove yourself as a cloud evangelist. In addition to validating your knowledge of Microsoft 365 capabilities, earning this certification makes it clear to your organization that you understand the benefits of adopting cloud services, the basics of a Software as a Service (SaaS) cloud model, and the value of implementing Microsoft 365 cloud services. Join Skillsoft in the third of our Transformative Tech Microsoft Certification series, where we demonstrate foundational-level knowledge of cloud services, such as standard practices, considerations, and benefits. Watch Now
To stay competitive in the industry, your employers and clients rely on you to stay ahead of the tech curve. Maybe they look to you when they evaluate a move to the cloud, or maybe they bring you a problem and point to an existing tech stack for solutions you may or may not be able to create. Whatever the scenario, you can be sure that the skills you bring to the table are critical on many levels. We will take a look at the cybersecurity Architect Expert certification track. This is the first expert-level certification in Microsoft’s Security, Compliance, and Identity portfolio. This certification will focus on designing elements of a cybersecurity architecture and evaluating the tradeoffs between different solutions. Watch Now
The main reason for Python’s explosive growth is that it’s very easy to learn, use, and deploy, and in this 45-minute webinar, we’ll take a high level look at Python’s syntax, and explore some of the other reasons for Python’s ubiquity, including its very active and evangelical user community, and the availability of a huge collection of add-ons and libraries, including hundreds for data science and machine learning. Join Skillsoft as we focus on the role that Python can play in almost every area of your business, including as a productivity tool for employees and domains that you might not necessarily associate with a programming function. Watch Now
Explore the key features and benefits of Azure Active Directory Identity Protection. You'll learn how this powerful tool can help you detect and mitigate identity risks, automate threat response, and provide real-time protection against suspicious activities.
Since PeopleCert’s acquisition of the ITIL Body of Knowledge in 2021, they have worked to modernize, refine, and improve the guidance it provides so that businesses that adopt it facilitate better collaboration between IT and its stakeholders, experience greater user satisfaction when utilizing IT services, and deliver improved business outcomes. During that time, the certification program has continued to evolve to better align to the people doing the work, the roles they hold, and the types of practices they perform in the co-creation of value for the organization. We plan to discuss the value & benefits that ITIL certification brings to organizations, to describe the re-certification pathways of the recently announced recertification program, and to illustrate how you can leverage the modern components of the ITIL framework to grow your ITSM practice. We hope you’ll join us, along with our partners from Peoplesoft, for this robust discussion on the modern practices of the ITIL®4 framework, and how Skillsoft can help you implement them. Watch Now
Organizations and individuals are threatened with ever-growing cyber threats and must be prepared to address them. The more we are connected to networks, the more suspectable we are to attacks, therefore enterprises must stay current applying various cybersecurity measures and maintaining awareness of cybersecurity trends. View slide deck>>
The triple constraints model has been one of the main staples for teaching project management for as long as I can remember. The model is generally represented by a triangle with Scope on the horizontal leg, Time on the left leg, Cost or Resources on the right leg an...
One aspect of Unified Communications is this concept of trunk groups. I will discuss what they are, what benefit they can provide and how to configure them for Cisco gateways. First of all the official definition of a trunk group is “A group of trunks serving the s...
Last blog we looked at how we can use Trunk groups to ease the configuration of dial-peers and digit manipulation using analog FXO ports for an E911 solution. Now let’s take a look on how it can be used for T-1 CAS configurations and ISDN channel selection. The firs...
Relational databases are important not only because of the information they store but, more importantly, for the data we retrieve from them. The select statement allows us to ask the database a question. It’s the way we retrieve information from the database system.
The VMware NSX platform combines networking and security functionality directly in the hypervisor and it interoperable with a vast majority of VMware’s products. The platform provides a set of logical networking elements and services, using logical switching, routing, load balancing, VPN, firewall, etc. This product decouples network functionality from the physical devices.
Cloud computing is a big force in IT today, and it isn't going away. In fact, cloud adoption is going up geometrically, both for end users (think apps on your phone or tablet) as well as for organizations of all sizes. In fact, many smaller organizations may not have any on-premises infrastructure at all, other than networking infrastructure to get connected to the cloud. With this transformation in IT, it behooves all of us in the industry to understand it and adapt or risk being out of a job, like punch card operators.
John Barnes, Global Knowledge's Cisco Course Developer, discusses enhancements to our UCS Troubleshooting Boot Camp and suggestions for students in preparation for this course.
UFFA, which stands for “Use it, Flag it or Fix it, Add it,” is the responsibility of every support professional in the knowledge management process. It comes from the Knowledge-Centered Support (KCS) methodology where knowledge management is based on collaboration and a shared ownership of the knowledge base. Let’s break it down.
Learn how to leverage e-Learning to its full potential from someone who has succeeded in e-Learning. E-Learning is considered the way of the future for good reason: attractive cost-savings, flexibility, and convenience. To realize these benefits, you need to craft the training to meet a number of rigorous objectives. Join Kevin Kernohan, senior production manager at Global Knowledge, and Ann Schuler, learning and development consultant at the Government of Alberta Human Services Ministry, as they lead you from beginning to end of the e-Learning development cycle. In partnership with the Government of Alberta, Global Knowledge developed the Critical Thinking in Action training program for employees throughout the province. Discover why this e-Learning program earned a CSTD Award for Training Excellence and how you can assimilate these best practices into your organization.
Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.
Where should you apply the CSS, and why are there two places to apply it? One approach is to pick one of the parameters and apply the permissions there. Quite often, an administrator will pick the phone-level CSS and configure it there so that it applies to all calls made from all lines. The goal is to specify what partitions are allowed to be called.
The responsibility for securing organizational data has spread beyond the traditional IT professional. While there are more diverse security solutions, there are more diverse and sophisticated security threats. Security awareness and training is essential for everyone within an organization. Learn how Cisco has continued to evolve its security solutions and training.
Google Cloud Platform (GCP) is Google’s public cloud offering comparable to Amazon Web Services and Microsoft Azure. The difference is that GCP is built upon Google's massive, cutting-edge infrastructure that handles the traffic and workload of all Google users. There is a wide range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). We will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.
ITIL (short for Information Technology Infrastructure Library) is a widely accepted series of five books that outline best practices for the management of IT services. It is praised for offering a simple and practical framework for the alignment of IT services with the larger needs of a business or organization. ITIL is recognized for its ability to bring smart improvements to any IT service management process.
Kubernetes automates container management. The process of container orchestration is so complex that trying to manage containers by hand has become impossible. There are many, components to container orchestration, but one of the most misunderstood is networking. In this 1-hour webinar we’ll explore how k8s actually performs IP networking and service discovery, two of the most critical components for successfully delivering microservices. We’ll examine how kubernetes carries the burden of cloud networking and lastly what it takes to pass the CKAD/CKA Certifications.
Global Knowledge Product Manager Tori Easterly discusses the benefits of our Understanding Networking Fundamentals course.
Next Hop Resolution Protocol enables businesses to have a way for next-hop servers and next-hop clients to communicate with each other directly, bypassing a central hub and preventing potential bottlenecks.
A brief introduction to the basics of penetration testing.
If you are coming to AIX from another UNIX system, the Object Data Manager (ODM) will be new to you. Fortunately, it is not so very complicated. This white paper explains how ODM is structured and how to use these databases in order to meet the goals the architects had for the ODM.
In this hour-long webinar, Global Knowledge instructor and ITIL Expert Michael Scarborough will share his knowledge and expertise on various aspects of incident management and problem management processes. He will help you understand the difference between incidents and problems and between incident and problem management, providing examples from his own experience to drive the concepts home. Michael will also provide an overview of who performs various incident and problem management activities in an organization.
There is a wide-range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). In the first part of this series, we will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.
One of the most difficult concepts for me as I was learning database syntax was joins. Of course, I tried reading and understanding articles and books that dealt with this topic. In almost every case, I was faced with the Venn diagram examples.
So far, in our discussion of Router Information Protocol (RIP), we’ve discussed the basics and also verified and reviewed RIP version1. We stated that RIP version 1 is a classful routing protocol that used FLSM and sent it routing updates without the subnet mask. In...
A strong event management process that is able to detect changes of state throughout an organization’s IT environment is a key aspect of a complete suite of service management processes. Event management ultimately helps an organization maintain control through an understanding of the state of things, and how the state of those things changes in an IT environment.
Join Microsoft SQL Server expert Brian Egler for an hour-long webinar covering the key features and updates in the upcoming release of Microsoft SQL Server 2014! You will get a thorough review, along with demonstrations, of how SQL Server 2014 provides substantial improvements in performance, manageability, and availability that will make your job easier.
Skillsoft Global Knowledge is offering a series of free Copilot bootcamps on Percipio. Designed to empower individuals and organizations with the latest in Copilot technology, these bootcamps cover a range of essential topics, ensuring you gain comprehensive knowledge and practical skills.
Whether you are a seasoned computer user or new to the MS Office environment, we are sure you have some questions regarding Office 365. This webinar will help demystify the differences between Office 365 in the Cloud and on your PC. Find out when to use one over the other. Have you wondered when should you use OneDrive over SharePoint. Can you just use PowerBi Desktop or should you subscribe to the PowerBI Service? What is Delve? Is Flow a useful tool and how could you use it?
Explore how Skillsoft Global Knowledge, an award-winning training provider, upskills and reskills through high-quality training courses and certifications.
The PMP certification exam is changing but the PMBOK is not. Everyone planning to pursue their PMP certification in 2020 needs to know what is changing and how it will affect the way they prepare for the exam. In this session we will identify and explore the changes that PMI has announced to the PMP Certification Exam Blueprint, when and how the exam will be affected, and will look at a few examples of potential new questions. View the slide deck>
If you're running SharePoint 2007, learn what had changed in SharePoint 2013 for administrators and developers.
If you're running SharePoint 2010, learn how SharePoint 2013 is different and what you'll need to learn to deploy it effectively.
If you are upgrading to ESXi 5.1, there are some important facts that you should consider first. Upgrading involves many stages and processes that must be performed in a specific order. Many of these processes are one-way and do not provide a "back button." If you do not use care and consideration in your upgrade plan, you could possibly lose important data and configuration; and potentially even lose contact with your servers.