Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

1042 Results Found

Results per page: 10 40 80

TRANSFORM YOUR TECH: GET STARTED ON YOUR CERTIFICATION JOURNEY WITH MICROSOFT POWER BI

Webinar – Recorded | Dec. 12, 2021

If you enjoy analyzing data and using Power BI to discover and unlock data insights, this could be the ideal certification for you – especially if you use those insights to provide easy-to-understand data visualizations that can help drive the success of your team and organization. Join Skillsoft in the second of our Transformative Tech Microsoft Certification series, where we leverage our expert knowledge in Microsoft Power BI to inform you on the potential benefits for your business when utilizing Power BI. In this webinar you will learn: Watch Now

6 Reasons You Should Consider Earning Your VMware Certified Professional - Data Center Virtualization Certification

Article | Dec. 09, 2021

VMware software and products are popular among enterprises. However, they are also highly proprietary. So, unless you have had experience with VMware products, any experience with other software can only serve as a foundation for using vSphere and other software that VMware offers.

A Beginner’s Introduction to Virtual Machines and Hypervisors

Article | Dec. 09, 2021

Virtualization is a constantly evolving process, with new platforms introducing tools every day that are designed to make the process of moving to the cloud simpler.

An Introduction to Value Stream Mapping

Webinar – Recorded | Dec. 07, 2021

Value stream mapping can be a dramatically transformational event – expanding empathy across teams, sharing points of view, and solving gaps in understanding which may be robbing everyone of productivity. This webinar will quickly equip attendees with a high-level understanding of value stream mapping and will teach practical tips on how to run a value stream mapping exercise within their teams and organizations.

Virtualization for Newbies: Five Types of Virtualization

Article | Nov. 29, 2021

While the recent trend towards cloud computing might make it seem like virtualization is new, it has existed in some form for many decades.

Your Guide to NTFS Vs. Share Permissions Best Practices

Article | Nov. 29, 2021

Most of us have heard of "oversharing" in the social sense (i.e. giving out too many details of your personal life), but how about "under sharing" in the Windows Server realm? What does that even mean? Well, I sort of just made that up, but it does actually make some sense when you think about it in terms of creating a Windows Share that doesn’t provide enough permissions.

Cisco Certified CyberOps Associate Webinar

Webinar – Recorded | Nov. 23, 2021

As the sophistication, stealth, and frequency of cybersecurity threats continue to increase, the complexity of attacks means every organization needs security expertise before, during, and after an attack. For this reason, the demand for cybersecurity operations (CyberOps) personnel keeps going up.

Virtualization: What Challenges Appear When Moving a Data Center to the Cloud?

Article | Nov. 19, 2021

There are many challenges that come to the forefront as you begin the process of virtualizing the data center and moving away from the current physical network setup.

Palo Alto Networks - Firewall Essentials

Webinar – Recorded | Nov. 18, 2021

Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This live webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment.

10 Ways to Strengthen Your Privacy Online

Article | Nov. 16, 2021

The Internet is not automatically a secure or safe place to be. We need to re-evaluate what it means to be secure in our online activities. 

The Pros and Cons of Mobile Payment Applications: Is Convenience Worth the Risk?

Article | Nov. 16, 2021

Mobile payment applications or systems have become commonplace with the expansive growth and popularity of smartphones and other mobile devices.

Do You Need a VPN or a Firewall or Both?

Article | Nov. 12, 2021

Protecting your IT assets from threats is an essential part of business and personal digital activities. VPNs and firewalls are two commonly used security tools to help reduce risk while maintaining usability. When used in concert, IT communications are filtered and encrypted.

How to Select the Right Certification for You

Article | Nov. 08, 2021

According to our IT Skills and Salary Report, 85% of professionals possess at least one certification. That’s a ton of competition in the industry. And the general consensus is the more certifications, the better. So why are so many IT pros and decision-makers putting such an emphasis on certifications? Why is so much investment devoted to training?

An Introduction to Automating Cloud Infrastructure

Webinar – Recorded | Nov. 04, 2021

As cloud platforms provide ever greater infrastructure capability, automating and managing infrastructure is becoming critical to our strategy and process. Tooling environments are also heavily impacted. Tools like Terraform, configuration automation tools (Chef, Ansible, etc.) and cloud-native infrastructure solutions completely change cost models and workflows. This presentation is an introduction to infrastructure automation in the cloud, a few popular automation tools, and how to tie automation to larger cloud (and business) strategy.

10 Benefits of IT Certification for You (and Your Employer)

Article | Oct. 29, 2021

An IT certification is a recognized benchmark mapped to a specific skill set based on standardized testing. A certification demonstrates your dedication, motivation and technical knowledge on a specific platform.

10 Excel Features You Need to Know About

Article | Oct. 29, 2021

From analyzing your data and allowing to ask natural language questions to working with and building huge data models, this version of Excel has a lot to offer. These are some of the best features that Excel has to offer. Some haven’t finished their evolution yet either.

Understanding Next Hop Resolution Protocol Commands

Article | Oct. 29, 2021

Next Hop Resolution Protocol enables businesses to have a way for next-hop servers and next-hop clients to communicate with each other directly, bypassing a central hub and preventing potential bottlenecks.

The Power of Experiential Skills Development

Webinar – Recorded | Oct. 27, 2021

Discover how to accelerate the development of your security skills and competencies by incorporating experiential learning activities such as cyber ranges into training. Cyber ranges have emerged as excellent vehicles for helping IT professionals learn by doing. These realistic, hands-on simulations prepare you for when — not if — you’re attacked. And we’ve added them to GK Polaris!

Policy-Based Routing: What Is It and How Is It Used?

Article | Oct. 22, 2021

Policy-based routing (PBR) provides network administrators with agility and flexibility to better manage traffic. With carefully architected policies, you can optimize how segments of your network process data, as well as how bandwidth is managed for business-critical applications.

Empower your skills with Microsoft Security, Compliance, and Identity (SCI) certifications

Webinar – Recorded | Oct. 21, 2021

Microsoft and Global Knowledge are partnering up to showcase the importance of Cybersecurity Awareness Month. Join this event to learn all the tools and tactics to stay safe and secure online throughout the whole year. This webinar event will take you through the new certifications focused on Microsoft Security, Compliance, and Identity (SCI). You'll learn more about the complete portfolio of associate training and certification for Microsoft Security and how it's designed to meet industry and market needs with roles, skills, and capabilities needed for the job, including specializations, hands-on experience, and practice requirements.

Fireside Chat: Expert Advice on Starting a Career in Cybersecurity

Webinar – Recorded | Oct. 20, 2021

Join This QA Session to Hear from Cybersecurity Expert Brad Puckett on Kickstarting Your Career

Technical Deepdive with Containers, Kubernetes, Red Hat OpenShift

Webinar – Recorded | Oct. 13, 2021

Join Red Hat Training’s Solution Architect, John Walter, for a virtual, high-level complimentary course introducing you to Linux containers and container orchestration technology using Docker, Kubernetes and Red Hat OpenShift Container Platform.

How to Become a Cisco Certified Cyberops Associate

White Paper | Oct. 07, 2021

The Cisco Certified CyberOps Associate certification focuses on the cybersecurity branch of IT security

The Enemy Inside: How to Detect Supply Chain Attack & Stop it Before It’s Too Late

Webinar – Recorded | Oct. 06, 2021

When it comes to developing new, innovative ways and tools for breaching security, the attackers never stay idle – and so shouldn’t we when it comes to counteracting! Through the past few years, their inventiveness caused substantial damage in the area of supply chain attacks. During this webinar, Paula will demonstrate techniques of using the supply chain method and show tactics used today by cyber-criminals that allow them to deliver it and what are the prevention mechanisms to avoid being attacked by the newest innovations! Bring some coffee before attending!

Maximizing Team Results

Webinar – Recorded | Sep. 28, 2021

In this webinar, we will cover what makes a successful team, how to drive high-performance in your team, different stages of team development and other topics. Understanding people skills, process skills, and setting team boundaries and norms will be discussed and how these can build the framework for your high-performance team. View Slide deck>>

10 Reasons You Should Consider a Career in Cybersecurity

Article | Sep. 23, 2021

Cybersecurity has become a key area of job growth in the last few years. Now more than ever, individuals with computer security skills are needed to fill jobs currently sitting vacant. All the while, new job positions come into existence every month with few qualified applicants.

5G Practical Network Slicing

Webinar – Recorded | Sep. 23, 2021

In this hands-on demonstration, you observe the configuration of IMS, Internet, SOS, and Admin DNN objects (Data Networks Name). These DNNs will then be assigned to several slice descriptors, showing how geography enters into slice implementation. You will then watch the slice configured on a working 5G network. View slide deck>>

Cisco Certified Network Professional Enterprise

Article | Sep. 23, 2021

The Cisco Certified Network Professional Enterprise is built on the longstanding and well-recognized CCNP Routing and Switching. With the addition of evolving technologies, this makes the certification current and relevant. Having a vendor certification can be hit or miss, depending on the vendor, but with Cisco holding a major percentages of market share in the different technologies and implementations in the networking industry, having a CCNP Enterprise on your resume offers several advantages.

The Importance of OSPF Type 1, 3 and 5 Link State Advertisements and the benefits of understanding them

Article | Sep. 23, 2021

Many Enterprise companies use Open Shortest Path First (OSPF) as their Interior Gateway Protocol (IGP). OSPF relies on Link State Advertisements (LSAs) in order to advertise and learn subnets so whether it’s for CCNA or CCNP Enterprise or simply for a basic understanding of OSPF, it is important to understand the purpose of the various LSA types and how far the LSAs flood.

Networking Foundations

Webinar – Recorded | Sep. 14, 2021

Despite rapid advances in technology, and widespread use of networks over the last few decades, the Fundamentals of Networking have not changed much. It is also quite surprising to see significant gaps or deficiencies in the foundational knowledge of many networking and IT professionals. This webinar attempts to highlight the common areas of such gaps and how to overcome them.

Disadvantages of Indexing in SQL Server

Article | Sep. 09, 2021

Getting the best possible performance from a SQL server can become more complicated as you add more operations to your database.

This Is What You Can Do To Promote Cybersecurity Awareness Month

Article | Sep. 08, 2021

National Cybersecurity Awareness Month has grown into a global effort, with both individuals and organizations taking part — and for good reason.

ITIL 4 guiding principles in 30 minutes

Webinar – Recorded | Sep. 07, 2021

A quick 30 minute look at ITIL 4 Service Value System focusing on the guiding principles –part of the core guidance of ITIL4. This webinar includes an example of how this guidance might be applied in an organization.  

Trends in Cybersecurity

Webinar – Recorded | Aug. 31, 2021

Organizations and individuals are threatened with ever-growing cyber threats and must be prepared to address them. The more we are connected to networks, the more suspectable we are to attacks, therefore enterprises must stay current applying various cybersecurity measures and maintaining awareness of cybersecurity trends. View slide deck>>

CCNP Enterprise Preparation

Webinar – Recorded | Aug. 26, 2021

This webinar is examining the process of how to best prepare for the Cisco Certified Network Professional in Enterprise skill set. We will look at the process to become certified including which exams to take; look at the available resources for study, including the blueprint for the exams and courses that are applicable. We will look at why someone might want to get certified as a CCNP Enterprise. We will also examine the process to maintain the certification. View slide deck>>

How to Build a Winning Cybersecurity Team

Article | Aug. 26, 2021

For every organization, effective cybersecurity depends on a careful deployment of technology, processes, and people. And if you get the people right, they’ll take care of the other two factors. Just like sports teams, cybersecurity teams need to be carefully bult and managed to reach optimum performance. They don’t just take shape naturally.

Achieve Highest Degree of Visibility on Network Traffic with Cisco ACI

Article | Aug. 24, 2021

In any operational data center, it is critical to have the highest degree of visibility on network traffic for operations and application troubleshooting. In this white paper, we discuss how to achieve optimal visibility of any type of application traffic with Cisco Application Centric Architecture, or ACI.

How to Monitor Traffic Flow with Cisco ACI

White Paper | Aug. 24, 2021

In any operational data center, it is critical to have the highest degree of visibility on network traffic for operations and application troubleshooting.

Learn to Keep Your Network Secure Using NMAP

White Paper | Aug. 18, 2021

Gain access to this lab and learn to use NMAP, an open-source port-scan tool, for networking discovery, vulnerability scanning and security risk detection.

How to Become a Microsoft Certified Azure Solutions Architect Expert

White Paper | Aug. 13, 2021

This Certification Prep Guide provides an overview of the Microsoft Azure Solutions Architect Expert certification and offers helpful tips that you can use when preparing for your certification exam.