Your browser is incompatible with this site. Upgrade to a different browser like Google Chrome or Mozilla Firefox to experience this site.
Spring into Savings — Get 50% Off Your Second Course
1027 Results Found
Policy-based routing (PBR) provides network administrators with agility and flexibility to better manage traffic. With carefully architected policies, you can optimize how segments of your network process data, as well as how bandwidth is managed for business-critical applications.
Microsoft and Global Knowledge are partnering up to showcase the importance of Cybersecurity Awareness Month. Join this event to learn all the tools and tactics to stay safe and secure online throughout the whole year. This webinar event will take you through the new certifications focused on Microsoft Security, Compliance, and Identity (SCI). You'll learn more about the complete portfolio of associate training and certification for Microsoft Security and how it's designed to meet industry and market needs with roles, skills, and capabilities needed for the job, including specializations, hands-on experience, and practice requirements.
Join This QA Session to Hear from Cybersecurity Expert Brad Puckett on Kickstarting Your Career
Join Red Hat Training’s Solution Architect, John Walter, for a virtual, high-level complimentary course introducing you to Linux containers and container orchestration technology using Docker, Kubernetes and Red Hat OpenShift Container Platform.
The Cisco Certified CyberOps Associate certification focuses on the cybersecurity branch of IT security
When it comes to developing new, innovative ways and tools for breaching security, the attackers never stay idle – and so shouldn’t we when it comes to counteracting! Through the past few years, their inventiveness caused substantial damage in the area of supply chain attacks. During this webinar, Paula will demonstrate techniques of using the supply chain method and show tactics used today by cyber-criminals that allow them to deliver it and what are the prevention mechanisms to avoid being attacked by the newest innovations! Bring some coffee before attending!
In this webinar, we will cover what makes a successful team, how to drive high-performance in your team, different stages of team development and other topics. Understanding people skills, process skills, and setting team boundaries and norms will be discussed and how these can build the framework for your high-performance team. View Slide deck>>
Cybersecurity has become a key area of job growth in the last few years. Now more than ever, individuals with computer security skills are needed to fill jobs currently sitting vacant. All the while, new job positions come into existence every month with few qualified applicants.
In this hands-on demonstration, you observe the configuration of IMS, Internet, SOS, and Admin DNN objects (Data Networks Name). These DNNs will then be assigned to several slice descriptors, showing how geography enters into slice implementation. You will then watch the slice configured on a working 5G network. View slide deck>>
The Cisco Certified Network Professional Enterprise is built on the longstanding and well-recognized CCNP Routing and Switching. With the addition of evolving technologies, this makes the certification current and relevant. Having a vendor certification can be hit or miss, depending on the vendor, but with Cisco holding a major percentages of market share in the different technologies and implementations in the networking industry, having a CCNP Enterprise on your resume offers several advantages.