Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

1042 Results Found

Results per page: 10 40 80

Quality of Service, Part 11: CBWFQ

Article | Feb. 16, 2010

Part 10 of this blog series looked at Weighted Fair Queuing, so now we move on to the next queue mechanism; Class Based Weighted Fair Queuing (CBWFQ).CBWFQ provides user defined traffic classes allowing for more control and functionality then weighted Fair Queuing. C...

Quality of Service, Part 12 – Low Latency Queuing

Article | Feb. 18, 2010

Part 11 of this blog series looked at Class Based Weighted Fair Queuing. This blog will explore the next queue mechanism; Low Latency Queuing (LLQ). As seen in the previous section of this QoS series, CBWFQ provides user defined traffic classes allowing for more con...

Top Ten Things Every DBA Should Know About SQL Server

White Paper | March 04, 2010

Microsoft SQL Server has evolved over the years as a scalable, robust database management system and is now competing in the VLDB (Very Large Database) space with Oracle and IBM. The market share for the product continues to grow, based on total cost of ownership and ease of use. This white paper outlines some of the important fundamentals of Microsoft SQL Server 2008 that every DBA should know.

Leadership and Learning Forecast for Business Leaders

White Paper | March 08, 2010

This report presents the results of a Canadian National survey, conducted by Global Knowledge in 2010. Its focus is on the future learning needs of business leaders. Four hundred twenty business leaders and managers responded to the survey, representing both corporate and government/public organizations as well as a wide range of industries and functional areas.  

Cloud Computing: What It Is and What It Can Do for You

White Paper | March 10, 2010

The definition of cloud computing depends largely on whether you are a consumer or producer. The public cloud is geared more for the individual consumer or small company, while the private cloud is geared more for a medium-to-large company. In addition, the private cloud is branching out to incorporate the ability to have some data and applications serviced from the public cloud. This white paper examines the different types of cloud computing and shows what cloud computing can offer you.

10 Security Concerns for Cloud Computing

White Paper | March 11, 2010

The flexibility, reduced cost, and mobility of cloud computing have made the concept a hot topic. Before implementing this method of computing, however, it is important to consider the security of the "cloud." In this white paper, you will learn some of the risks and benefits of cloud computing to be sure it is the right solution for you.

Supporting Windows 7 Group Policy Settings with Windows Server 2003 Domain Controllers

Article | March 16, 2010

Recently, I was asked the following question: “We plan to implement Windows 7 in our network very soon. We want to use Windows 2003 Domain Controllers for the next couple of years. Can we make the hundreds of new Group Policy setting available to Windows 7 Windows Server 2003 DCs?” This is not an unusual situation. Some organizations find they need to replace their desktop computers immediately because of age or obsolescence and others wish to upgrade to Windows 7 because of its superior security and performance. But there may be no budget or desire to upgrade to Windows 2008 or 2008 R2. Luckily, it is not difficult to adapt Server 2003 to work with Windows 7.

Where Did That 169.254.x.x IP Address Come From?

Article | March 22, 2010

In my last post, we learned that the Dynamic Host Configuration Protocol (DHCP) is a computer networking protocol used by hosts, identified as DHCP clients, to retrieve IP address assignments and other configuration information. DHCP uses a client-server architectur...

VoIP Networks and One Way Audio

Article | March 30, 2010

There are many interesting new issues that seem to have come with the addition of voice and video to the data network. Most of the engineers that are now working on VoIP networks come from either a pure data network background or a traditional phone system background...

QOS Bandwidth vs Bandwidth Remaining

Article | April 14, 2010

Learn how to calculate QOS Bandwidth Percent vs Bandwidth Remaining Percent using a Cisco-defined formula. Read on for answers and examples from the experts at Global Knowledge!

Detailed File Share Auditing allows you to monitor access to Windows 7 file shares

Article | May 04, 2010

Windows 7 can be a good file server on very small workgroup networks. Although Windows 7 is limited to only 10 concurrent client connections as a file server it can do a good job making files accessible over a network. Windows 7 shares a great deal of code with Windo...

MPLS – Part 6

Article | May 11, 2010

We have three major issues that we need to deal with in order to successfully use routers within a WAN provider’s cloud: Multiple routing tables in RAM Excessive latency Address-space collisions Let’s assume that we have a WAN provider with two customers, “A” an...

10 Security Concerns for Cloud Computing

Webinar – Recorded | May 17, 2010

The flexibility, reduced cost, and mobility of cloud computing have made the concept a hot topic. Before implementing this method of computing, however, it is important to consider the security of the "cloud." During this webinar, we will help you understand some of the risks and benefits of cloud computing so you can decide if it is the right solution for you.

Enabling  the Active Directory Recycle Bin in Windows 2008 R2

Article | May 17, 2010

Even in professionally managed network environments it is still possible for mistakes to happen. If an Active Directory object such as a user or computer account is accidentally deleted  network access will be lost. Worker productivity will decline until the account...

Allow or Disallow All IPSec Traffic through the Firewall?

Article | June 02, 2010

The subject of this week’s post was actually prompted by a question from a former colleague.  Soon after the PIX Firewall added support for IPSec Virtual Private Networks, a command was added to the command-line, sysopt connection permit-ipsec. This command was subse...

MPLS – Part 10

Article | June 16, 2010

Welcome back! Previously, we decided that in order for a Layer-3 MPLS VPN to function correctly, the ingress PE is going to need to push two labels onto each data packet. Let’s say that we have a data packet going from site A2 to site A3, using the topology shown in...

10 Ways Malicious Code Reaches Your Private Network

White Paper | July 13, 2010

Private networks are under constant threat of attack, even when steps have been taken to "secure" them. The large volume of malicious codes, and their ability to evolve and adapt, requires security professionals and common computer/internet users alike to be mindful of their actions and constantly play defense. This white paper focuses on 10 common ways that malicious code can penetrate a network. Knowledge of these methods and the ability to recognize them are the first steps in preventing them from succeeding in harming your network.

Remote Desktop on Windows 7 now has AERO

Article | July 15, 2010

Windows Vista introduced AERO, a desktop experience that had four major elements; Windows Flip, Windows Filmstrip, AERO Glass transparency and fully realized thumbnail views on the Taskbar. Windows 7 added several new features to AERO, including AERO Snap, AERO Shake...

Using ASDM with Minimum User Privileges

Article | July 30, 2010

Occasionally as I'm teaching a Cisco training class, I get an idea for a blog post and it happened again this week. The Securing Networks with ASA Fundamentals curriculum is mostly based on the Adaptive Security Device Manager (ASDM). While the class describes the us...

Time of Day Call Routing

Article | Aug. 17, 2010

I recently came across an opportunity to use a relatively new feature in Cisco Unified Communications Manager (CUCM). Suppose you are the telecom administrator at a community hospital. During business hours, the Facilities Department is staffed and team members simpl...

BranchCache Reduces Traffic between HQ and Branch Offices

Article | Aug. 20, 2010

Windows Software Update Services (WSUS) is commonly used to distribute security patches and updates for Windows operating systems and Microsoft applications. WSUS is a web application that runs within Internet Information Services (IIS) on Windows Server. When client...

Djoin.exe Simplifies and Automates Joining Computers to a Domain

Article | Sep. 14, 2010

Adding a new computer to an Active Directory domain can be a disruptive process, particularly if that computer is part of a large, high-speed deployment. Djoin.exe is a command line tool that permits the joining of a Windows 7 or Server 2008 R2 computer to Active Dir...

Examining IPSec Perfect Forward Secrecy

Article | Sep. 17, 2010

A feature common to IPSec Virtual Private Network implementations throughout the Cisco product line is Perfect Forward Secrecy (PFS). This optional additional component is now a default supplied configuration setting with the Adaptive Security Device Manager (ASDM) I...

ASA ACL Logging

Article | Oct. 10, 2010

As any network administrator will tell you, the ASA Security appliance (as well as its forerunner, the PIX) are capable of generating massive amounts of log messages, especially when the firewall/security appliance is set to log messages at debug level to the syslog...

ASA Service Policies with Priority and Policing

Article | Nov. 03, 2010

As is sometimes the case, the idea for this article originated with a student question I received during one of the Securing Networks with ASA Fundamentals classes I have taught this summer. The course material mentions a simple scenario whereby IP Telephony traffic...

13 Skills Every IT Pro Should Know

Article | Nov. 12, 2010

No matter which IT field you're working in, there are several skills that are useful for every IT professional to know. Here, seven experienced IT professionals working in the networking, programming, project management, and security fields, share what they believe a...

Slash 32

Article | Nov. 15, 2010

Ever seen a /32 prefix in the IP routing table? A /32 prefix is commonly referred to as a host route since it identifies a route to a specific IP host address. Since most (but not all) host computers don't run routing protocols, we could create a host route on a rou...

ASDM Demo Mode Tour

Article | Nov. 17, 2010

As is frequently the case these days, I get a brainstorm for an article during a Cisco Security training class I conduct. This summer I taught the Securing Networks with ASA Fundamentals class, which concentrates heavily on the Adaptive Security Device Manager (ASDM)...

Implementing Dynamic DNS on Cisco IOS Router and ASA

Article | Dec. 09, 2010

When the hostname.domainname associated with my Small Office Home Office (SOHO) failed to update after a power outage, and a new DHCP-assigned external address was assigned to my router, I was reminded of the need for Dynamic DNS. This article will explore the implem...

12 Advantages of Agile Software Development

White Paper | Dec. 21, 2010

Organizations can find significant value in adopting Agile methodologies and techniques. Agile practices can help ensure you meet customer expectations, deliver products on time, and create a motivated environment that is able to quickly adapt to change. This white paper explores 12 benefits of Agile development and management, explaining why you should consider incorporating Agile methodologies into your current standards and processes.

Geek Speak: A Glossary of Common IT Terms v3.0

Special Report | Jan. 03, 2011

Need to know the difference between copper and optical fiber? Want to learn what the acronyms PBX, PC, PCI, PCIe, PCM, PDA, and PDU mean? Our "Geek Speak v3.0" can teach you all this and more. An update to our popular v2.0 "Geek Speak", this white paper will teach you more than 925 popular IT words, phrases, and acronyms.

Introduction to Negotiation: A Primer for "Getting to Yes"

White Paper | Jan. 05, 2011

Negotiation is a dialogue intended to resolve disputes, to produce an agreement on courses of action, to bargain for individual or collective advantage, or to craft outcomes to satisfy various interests. It is the primary method of alternative dispute resolution. This white paper focuses primarily on the negotiation process, different negotiation styles, and the various elements of communication that affect the outcome, including: Negotiation Communications, Constructive Questioning, Communication Obstacles (and overcoming those obstacles), Challenging Negotiation Situations and "Traps," and, finally, completing Successful Negotiations, a.k.a. "Getting to Yes"

Traceroute: Determining the Topology

Article | Jan. 19, 2011

“Traceroute” is a utility that’s commonly used when troubleshooting IP networks, but many network managers at the CCNA level and beyond aren’t really sure how it works or what you can do with it. One reason for this might be that, unlike most things in the IP world, there are no standards documents describing how “Traceroute” functions. Thus the implementations are vendor-specific, and not even the utilities’ names are standardized. With Cisco IOS and Unix, it’s called “traceroute”, in the Microsoft world, it’s “tracert”, and other operating systems have similar utilities, such as “tracepath” for Linux.

Protecting Your Network with Authentication and Cryptography

Webinar – Recorded | Feb. 09, 2011

In this webinar, the first of two based on our Cybersecurity Foundations course, you will examine the following topics: verifying users and what they can access, ways a user can be validated to computer and network resources, how cryptography is used to protect data, symmetric and asymmetric encryption and hashes.

The History Behind EIGRP

Article | Feb. 16, 2011

Interior Gateway Routing Protocol (IGRP) was a Cisco-proprietary Distance-Vector (D-V) classful routing protocol - basically an improved version of RIPv1. Like other D-V protocols, each IGRP router periodically flooded its routing table, but it differed from RIP in two ways. First, RIP’s advertisement interval was thirty seconds but IGRP’s was ninety seconds, which allowed IGRP to scale to larger networks than RIP. Second, RIP used a simple hop count metric, but IGRP’s more sophisticated metric was based on minimum path bandwidth and total path delay, with options to include link reliability and interface loading.

Securing Communications

Webinar – Recorded | Feb. 23, 2011

In this webinar, the second of two based on our Cybersecurity Foundations course, you'll build on what you learned in the first of the series, Protecting Your Network with Authentication and Cryptography.

The shun Command on the PIX/ASA

Article | March 24, 2011

One command that had a fairly long history first with the PIX Firewall and now the ASA is the shun command. In this post we’ll examine this command’s history, why it’s useful, and its new-found resurgence in threat detection implementation.

How to Successfully Migrate from IPv4 to IPv6

Webinar – Recorded | April 20, 2011

In this webinar, you will examine the need for IPv6 and whether it's possible to survive on IPv6 alone. You will learn ways to phase in IPv6 and how to successfully migrate to IPv6.

Are Production Server Reboots Standard Changes?

Article | April 27, 2011

I attended a meeting this week with a customer of mine and a potential new vendor. The new vendor was there to pitch his configuration and setup service offerings for a specific ITSM toolset. My customer has already had one bad experience with an ITSM tool configuration vendor who promised one thing and delivered much less. He ended up with a tool that’s minimally used and not configured to match his business needs. He’s looking for a vendor that can understand his business needs and priorities and quickly help him get his tool configured and working in a short time frame. Then the topic of standard changes came up. My customer asked for examples of standard changes. The vendor responded, “Server reboots are an example of standard changes.”

How to Avoid a Cyber Disaster

Webinar – Recorded | April 27, 2011

Planning for a cyber disaster makes recovering from one much easier. Still, as important as disaster planning is, it's often overlooked or put off until it is too late. In this webinar, Global Knowledge instructor Debbie Dahlin discusses planning for the unexpected -- whether the unexpected means a simple power outage, a network security breach, or a major natural disaster. She'll discuss risk analysis and risk management techniques and explain the importance and process of creating a business continuity plan. Using a fictional company as an example, Debbie will walk you through the disaster planning process a security professional should use, and she will provide simple tricks to reduce your company's downtime before, during, and after a disaster.