Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

1023 Results Found

Results per page: 10 40 80

A Complete Guide : How to Become a CompTIA Security+ Certified Professional

White Paper | Feb. 19, 2021

This guide provides an overview of the Security+ certification, including who the certification is for, how to earn and maintain it, the positive impact that it will have on your career, and options for advancement following your Security+ certification.

A Complete Certification Guide: How to Become a Certified Project Management Professional (PMP)

White Paper | March 05, 2021

This Certification Prep Guide provides an overview of the current Project Management Professional (PMP)® certification and offers helpful tips that you can use when preparing for your PMP certification exam.

A Complete Guide: How to Become a Google Certified Professional Cloud Architect

White Paper | April 05, 2021

This Certification Prep Guide provides an overview of the current Google Certified Professional Cloud Architect certification and offers helpful tips that you can use when preparing for your GCP certification exam.

A Complete Guide: How to Become a Google Certified Professional Data Engineer

White Paper | April 05, 2021

This Certification Prep Guide provides an overview of the current Google Cloud Platform (GCP) Certified Data Engineer certification and offers helpful tips that you can use when preparing for your GCP certification exam.

A Complete Guide: How to Become a Microsoft Certified Solutions Expert in Cloud Platform and Infrastructure

White Paper | Aug. 21, 2018

This Certification Prep Guide provides an overview of the current MCSE: Cloud Platform and Infrastructure certification and offers helpful tips that you can use when preparing for your MCSE certification exam.

A Complete Guide: How to Become an AWS Certified Architect

White Paper | May 14, 2021

This Certification Prep Guide provides an overview of the current AWS Certified Solutions Architect – Associate certification and offers helpful tips that you can use when preparing for your AWS Architect certification exam.

A Complete Guide: How to Become Certified in CompTIA Cloud+ CVO-002

White Paper | Aug. 21, 2018

This Certification Prep Guide provides an overview of the current CompTIA Cloud+ certification and offers helpful tips that you can use when preparing for your CompTIA Cloud+ certification exam.

A CompTIA-Certified Professional’s Guide to Maintaining Your Certifications

Article | July 13, 2021

You have earned a CompTIA certification. The next step is to ensure that your certification remains current and valid. Some certifications are good for life, while others require renewal. Let’s look at what certifications require renewal, the options that you have for maintaining your certifications, and steps to get it done.

A Guide for Maximizing your Training Dollars

Special Report | Jan. 01, 2014

You know you need to invest in training, but how do you get the best return on investment (ROI) from your training dollars? To help you make smart training decisions, we've put together this guide, which illustrates some alternative and little-known payment options, the types of discounts and promotions available with training and a suggested list of courses that give you excellent value.

A Guide to Making High-Quality Decisions

White Paper | Oct. 21, 2016

When a decision matters, there are certain steps you will want to follow. In this white paper, we provide guidelines for approaching decisions. The steps in this white paper are a series of interconnected techniques used in problem analysis and decision making.

A Guide to Password use in WebSphere Application Server

White Paper | April 21, 2014

Nearly every WebSphere administrator has desired a deeper understanding of how passwords are created, used, stored, and encrypted. Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.

A Guide to Simplifying InfoSphere DataStage Change Management

White Paper | Aug. 19, 2015

Managing the change of DataStage components can often become a test of wills. Picture fitting a square peg in a round hole, and you might start to get the idea. The complexity of what is required to promote components from one environment to another during the development, testing, and eventual implementation in the production environments, should be and is often a controlled activity.

A Guide to Smarter Year-End Spending: Choose the Right IT Training Company

Article | April 02, 2018

End of year IT project spending has a higher chance of failure. Instead, invest your funds in the resources that manage and own the technology—your people. Learn how to choose the best IT training company for you at the last minute..

A New Look at Subnetting an IP Address

White Paper | Nov. 29, 2017

The process of subnetting is both a mathematical process and a network design process. Mathematics drives how subnets are calculated, identified, and assigned. The network design and requirements of the organization drive how many subnets are needed and how many hosts an individual subnet needs to support. Binary basics and IPv4 address structure were covered in part one of this two-part paper.

A New Trend in Agile - Incorporating Program Management

White Paper | Dec. 06, 2016

How can organizations in diverse industries continue to use familiar waterfall practices and at the same time be more agile? The answer is to use program management that is designed to be agile.

A Practical View of NIST's Cloud Definition

White Paper | July 14, 2014

The National Institute of Standards and Technology (NIST) created a cloud definition that has been well-accepted across the IT industry. NIST was mandated to assist government agencies to adopt cloud computing for their IT operations. As part of their mandate, NIST created multiple working groups to define cloud computing, its architecture, and requirements. In this paper we explore the center core of NIST's cloud definition.

A Survey of IBM Power Systems Initiatives in Large-Scale Computing

White Paper | Oct. 23, 2015

The amount of data being produced does not seem to show any sign of slowing; if anything, it may in fact be exceeding projected growth rates. As these absolute limitations on raw hardware capacity begin to be felt, the importance of looking at all of the aspects of a computing infrastructure in order to tackle the future's truly large-scale computing demands, is imperative. This white paper examines how IBM's initiatives like Linux, Cloud Manager with OpenStack and the OpenPower Foundation IBM are meeting this challenge.

A Toolkit for Project Time Estimation

White Paper | Jan. 06, 2017

Resource management is always an issue in any project, especially when the stakeholders from whom we need time have operational duties to perform.  If our requirements team was at our disposal 100 percent, always completed activities on target, and worked a full eight hour day without distraction or a loss of productivity, then estimating time would be simple. Here, we explore standard approaches to time estimation, the dangers of multi-tasking, and estimation alternatives, which consider work habits and productivity norms.

A Unified Model for Describing a Project Plan

White Paper | June 05, 2013

This paper proposes a unifying model for project plans. A distinction will be made between the outputs of project planning and the project plan itself. The significance of this distinction is to allow projects of all types to be described at a high level, in a common language, regardless of the type of analysis used to develop the plan.

ABCs of ITIL®

White Paper | Feb. 27, 2015

Learn the ITIL® concepts of accountability, boundaries, and consistency (the ABCs) and discover how ITIL helps establish, manage, and maintain the ABCs.

A Beginner's Guide to Encryption

Article | March 05, 2021

Here's an introduction to encryption. What is it? Why do we need it? It's a complicated area, so we're here to help get your started. You'll understand the general function of three categories of mathematical ciphers: Symmetric, Asymmetric and Hashing. 

Accelerate your Career with Microsoft Security, Compliance, and Identity

Webinar – Recorded | March 23, 2021

This Microsoft and Global Knowledge 1-hour webinar event gives you an overview to the different Microsoft solutions for managing security in your organization. Explore how Microsoft provides a holistic approach to security, helping you to protect identities, data, applications, and devices across on-premises, cloud, and mobile.

Accelerate Your Path to Cisco Routing and Switching Certification

Article | Jan. 17, 2019

The CCNAX - CCNA Routing and Switching Boot Camp is a great option to obtain Cisco Routing and Switching skills while pursuing the CCNA Routing and Switching certification. 

Accelerating with Ansible

Webinar – Recorded | March 28, 2019

Watch John Walter, Solution Architect for Red Hat's Training and Certification team as he discusses the emergence of radically simple Ansible automation and answers your questions.

Access Control Lists (ACLs) – Part 2

Article | May 29, 2009

In ACLs - Part 1 we learned the basics of access lists, including the facts that ACLs: Are created in global config mode End with an implicit “deny any” (which can be overridden) Must be placed into service somewhere to have any effect Thus, the commands: Rout...

Access Control Lists (ACLs) – Part 5

Article | June 19, 2009

Having discussed general ACL rules and syntax, let’s now turn to the differences between standard and extended ACLs. As you might recall, numbered ACLs fall into several ranges: 1 – 99: Standard IP 100 – 199: Extended IP 1300 - 1999: Standard IP (expanded rang...

Access Control Lists (ACLs) – Part 6

Article | June 23, 2009

As you may recall, we can use extended IP ACLs to filter packets based on source address, destination address, transport layer protocols, and other options, as follows: access-list 106 permit tcp host 1.2.3.4 host 5.6.7.8 eq telnet For a packet to be permitted by...

Achieve Highest Degree of Visibility on Network Traffic with Cisco ACI

Article | Aug. 24, 2021

In any operational data center, it is critical to have the highest degree of visibility on network traffic for operations and application troubleshooting. In this white paper, we discuss how to achieve optimal visibility of any type of application traffic with Cisco Application Centric Architecture, or ACI.

ACUCW1 or ACUCW2 - Which Course is Right for You?

Video | July 21, 2011

Global Knowledge Course Director and Lab Topology Architect Joey DeWiele, a specialist in Unified Communications, explains the difference between our Cisco Unified Communications courses - ACUCW1 & ACUCW2.

Address Resolution Protocol (ARP)

Article | Aug. 28, 2009

When sending data end-to-end through a network, routers are used in internetworking to create a virtual network from one device to another, either locally or globally. Routers are configured to operate with most common network protocols. That means they know the form...

Advanced Functions of Excel Formulas: Part 1

Webinar – Recorded | Jan. 26, 2018

Watch this 1-hour recorded webinar and learn how to build and troubleshoot formulas and master advanced functions. Whether you are a beginner or an experienced user looking for some extra or new tips, this is a webinar you don’t want to miss. Part 1 of this 2 part series will show you how to – Understand Mathematical Operators Use AutoFunctions Use Relative and Absolute References Explore the Function Ribbon Use the Insert Function Wizard & Dialog Box Use Basic Text, Financial, Date, & Logical Functions Name and Use Ranges of Cells in Formulas Trace and Remove Trace Arrows Use a Watch Window View Part 2 here > Recommended Excel Courses: Microsoft Excel- Level 1/ Intro (2010, 2013, 2016)Microsoft Excel - Level 2 / Med (2010, 2013, 2016)Microsoft Excel 2010 - Level 3 / AdvancedMicrosoft Excel 2013 - Level 3 / AdvancedMicrosoft Excel 2016 - Level 3 / AdvancedPower BI Fundamentals for End Users-2016

Advanced Functions of Excel Formulas: Part 2

Webinar – Recorded | Feb. 12, 2018

Watch the second installment of this 2-part webinar series and learn how to build and troubleshoot even more formulas and advanced functions. Whether you are a beginner or an experienced user looking for some extra or new tips, this is a webinar you don’t want to miss. Part 2 part will show you how to – Array Formulas Subtotal Formulas More date and time functions Concatenate vs. Flash Fill Index and Match vs. VLookup Variations of the Round Function View Part 1 here > Recommended Excel Courses: Microsoft Excel- Level 1/ Intro (2010, 2013, 2016)Microsoft Excel - Level 2 / Med (2010, 2013, 2016)Microsoft Excel 2010 - Level 3 / AdvancedMicrosoft Excel 2013 - Level 3 / AdvancedMicrosoft Excel 2016 - Level 3 / AdvancedPower BI Fundamentals for End Users-2016

Advantages of Agile Software Development

Article | Sep. 01, 2018

There is a reason why Agile training methods are becoming mainstream. They can work! Although every Agile practice is not necessarily appropriate for every organization, each practice has delivered real value to many organizations, and some Agile practices can be used by anyone!

Advantages of Using SonicWALL Route-Based VPN Instead of Site-to-Site VPN

Article | Nov. 19, 2020

There are several advantages to implementing a route-based VPN (a.k.a. tunnel interface VPN) instead of a site-to-site one. Learn more.

Agile and Business Analysts – Is There a Place For Us?

Webinar – Recorded | May 11, 2017

As organizations embark on agile initiatives, business analysts can serve a critical role in ensuring the success of those initiatives. This one-hour webinar will explore why business analysts embody core values and skills to thrive in an agile world. In this one-hour webinar, you will learn: Common myths about agile and business analysis, Agile roles for business analysts, BA skills for succeeding in an agile world, and Maximizing value – at the core of the BA role.

A Guide to Concept Training Methodology

Article | Feb. 19, 2018

When Global Knowledge and ctc TrainCanada joined forces in August 2017, Global Knowledge added Concept Training, an innovative and industry-leading training methodology, to course deliveries. Going forward, when you take a Microsoft Office course with us, you’ll get to experience our Concept Training methodology. But what does that really mean?

A Guide to Network Time Protocol (NTP)

Article | May 03, 2017

What is Network Time Protocol (NTP)? Well, it’s a network protocol used to synchronize clocks between computing systems over a packet switched network. It’s been around since the mid-1980s and was developed by David Mills at the University of Delaware; it is one of the oldest protocols still around on the Internet. NTP replaced other time synchronization technologies that didn’t have some capabilities to adjust time based on location of the time source or time server relative to the receiver or adjusting to the variation of delay found on typical data networks.

AI + Coronavirus + DI: Using Technology to Restart Your Business Safely

Webinar – Recorded | May 13, 2020

What is the role of data, AI, and analytics in mitigating the risks of COVID-19 to the workplace or public space? COVID-19 represents new risks for organizations as workers return physically to their jobs, and as people return to public spaces. Based on the presenter’s recent interviews with several organizations, along with decades of experience delivering applied AI solutions, this talk reviews the latest thinking about how some organizations are tackling this difficult problem, and includes demonstrations of some new approaches. View the slide deck>

Aligning IT and Business for Better Results

Webinar – Recorded | Aug. 25, 2015

Businesses today are more dependent on technology than ever. And, more than ever, they're looking to IT for ways to improve employee productivity, customer service and innovation. The challenge is that in order to achieve results with technology, IT and the business have to work collaboratively. IT needs to be able to develop the right relationships and communicate with different stakeholders from a business perspective - not a technical one. As a result, the transformation of the IT department has become a top-level priority for many leading organizations. At the same time, business leaders need to strengthen their business technology IQ and play a more significant role in the governance of IT.

Allow or Disallow All IPSec Traffic through the Firewall?

Article | June 02, 2010

The subject of this week’s post was actually prompted by a question from a former colleague.  Soon after the PIX Firewall added support for IPSec Virtual Private Networks, a command was added to the command-line, sysopt connection permit-ipsec. This command was subse...