Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

1032 Results Found

Results per page: 10 40 80

15 Ways to Manage IT Security on a Budget

Article | April 02, 2021

There are several techniques, methods, and tools that can help you reduce your security budget while maintaining or increasing your actual defenses. No security defense is perfect, and you often get what you pay for.

How to Implement 802.1X with Cisco ISE

Article | April 01, 2021

In any operational data network, the two high-level outcome possibilities are connectivity and isolation. If every device can connect to every other device by enabling full connectivity, networking is relatively easy to create, but inherently unsecure. If a network fully isolates all forms of traffic, it is unusable.

How to Implement 802.1X with Cisco ISE

Webinar – Recorded | March 30, 2021

This webinar focuse on addressing the issues of an unsecure campus network and how to address the insecurity with 802.1X. We then will look at how Cisco ISE can centralize campus access with 802.1X. View the slide deck>>

How to Become a Cisco Certified Network Associate

White Paper | March 29, 2021

This certification prep guide provides an overview of the current Cisco Certified Network Associate (CCNA) certification and offers helpful tips that students can use when preparing for the exam.

What You Should Learn from the SolarWinds Attack

Video | March 29, 2021

A career in Cybersecurity means being a lifelong learner. New attacks are constantly being invented, and cybersecurity engineers must respond to them in new ways. This video introduces a new supply chain attack, which provides a fascinating glimpse into the incredible skills of state sponsored professional hackers.

The 5 Phases of Hacking: Gaining Access

Article | March 25, 2021

Gaining access is the most important phase of an attack in terms of potential damage, although attackers don’t always have to gain access to the system to cause damage. For instance, denial-of-service attacks can either exhaust resources or stop services from running on the target system. 

How to Show Your IT Skills and Certifications on LinkedIn (with Video Guides)

Article | March 25, 2021

Learn how to boost your visibility on LinkedIn by listing your skills and certifications and leveraging the courses you’ve taken for professional development. This is especially important to catch the eyes of recruiters and when applying for jobs.

The 5 Phases of Hacking: Maintaining Access

Article | March 25, 2021

Once an attacker gains access to the target system, the attacker can choose to use both the system and its resources and further use the system as a launchpad to scan and exploit other systems, or he can keep a low profile and continue exploiting the system.

What You Should Learn from the SolarWinds Attack

Article | March 25, 2021

The SolarWinds cyberattack is one of the most sophisticated and broad cyberattacks in history and will likely be studied for years by cybersecurity researchers as a case study for a supply chain attack. 

Accelerate your Career with Microsoft Security, Compliance, and Identity

Webinar – Recorded | March 23, 2021

This Microsoft and Global Knowledge 1-hour webinar event gives you an overview to the different Microsoft solutions for managing security in your organization. Explore how Microsoft provides a holistic approach to security, helping you to protect identities, data, applications, and devices across on-premises, cloud, and mobile.

How to Implement 802.1X with Cisco ISE

White Paper | March 23, 2021

In any operational data network, the two high-level outcome possibilities are connectivity and isolation. If every device can connect to every other device by enabling full connectivity, networking is relatively easy to create, but inherently unsecure. If a network fully isolates all forms of traffic, it is unusable.

How ISACA Certifications Deliver Returns to Organizations and Individuals

Article | March 22, 2021

ISACA’s role is to help those in the field of cybersecurity get greater utilization out of the people already in the fold. This means enabling IT professionals to take a leadership role and increase their depth of knowledge. 

The 5 Phases of Hacking: Scanning

Article | March 19, 2021

Attackers use a method called scanning before they attack a network. Often attackers use automated tools such as network/host scanners and war dialers to locate systems and attempt to discover vulnerabilities.

How Data is Delivered

Article | March 18, 2021

Every second of every day, data is being sent and received. Billions of data packets are processed by your company’s network every day. In fact, you received dozens of packets just to read this article, but the vast majority of us have no idea how this works. People have no clue as to what goes on behind the scenes to ensure data actually gets to the right device.

The Pursuit of Microsoft Role-Based Certifications

Webinar – Recorded | March 16, 2021

Microsoft retired the MCSA and MCSE certifications on January 2021. Does that really mean it is the end? It isn’t. Join this webinar to understand the logical next steps and new certification paths. View the slide deck>>

CISSP Exam Changes - 2021 Study Guide

White Paper | March 10, 2021

The updated version of the CISSP exam was released on May 1, 2021. The new version now includes a significant number of new topics.

Building Toward Your ’99.999%’ Availability Goal with a First Hop Redundancy Protocol

Article | March 09, 2021

Many companies have a so-called five-nines goal, meaning that the network needs to be available to the users at least 99.999% of the time. To achieve that goal, IT professionals must consider high availability in the network design, including both physical and logical redundancy.

Fundamentals of Red Hat Enterprise Linux

Webinar – Recorded | March 09, 2021

For organizations getting started with RHEL, Red Hat Training has developed a series of courses to develop the skills needed for basic administration and configuration of Red Hat Enterprise Linux. These courses introduce key command line concepts and enterprise-level tools, laying the foundation for the rapid deployment of Red Hat Enterprise Linux. The curriculum also introduces the basic administration skills needed for resolving configuration issues and integrating Red Hat Enterprise Linux systems with other existing environments. View the slide deck>>

4 Tips to Strengthen Your Troubleshooting Skills

Article | March 05, 2021

Follow these four troubleshooting tips to help you work through a challenging repair and reach a solution without much wasted time and resources.

A Complete Certification Guide: How to Become a Certified Project Management Professional (PMP)

White Paper | March 05, 2021

This Certification Prep Guide provides an overview of the current Project Management Professional (PMP)® certification and offers helpful tips that you can use when preparing for your PMP certification exam.

A Beginner's Guide to Encryption

Article | March 05, 2021

Here's an introduction to encryption. What is it? Why do we need it? It's a complicated area, so we're here to help get your started. You'll understand the general function of three categories of mathematical ciphers: Symmetric, Asymmetric and Hashing. 

CISSP Certification is an Indicator of Cybersecurity Expertise

Article | March 05, 2021

Many certification roadmaps include (ISC)2’s CISSP (Certified Information System Security Practitioner) as a crucial cybersecurity certification to consider in a career and education plan. One example is the CompTIA IT Certification Roadmap, which places CISSP in the “Expert” column of the Information Security pathway. The CompTIA roadmap of IT certifications is not alone in recognizing the importance and value of the CISSP.

Everything You Need to Know About the 2021 CISSP Exam Changes

Article | March 05, 2021

The 2021 revised and updated version CISSP (Certified Information System Security Practitioner) certification exam will be released on May 1, 2021. This new version of the popular CISSP exam will include a modest revision and re-organization of previously included topics, but will integrate a significant number of new topics.

How Switches Work

Article | March 05, 2021

The Ethernet switch has become an integral part of the world’s LAN infrastructure. At its core, the Ethernet is a shared network, each node contending for access to precious bandwidth and dealing with the repercussions of collisions.

What is a LAN and Four Other Types of Area Networks

Article | March 05, 2021

Learn about the five types of area networks.

Five Advantages of Designing with AWS

White Paper | March 03, 2021

Advancing your knowledge of the Amazon Web Services (AWS) cloud can be life-changing.

Layer 2 Device Overview

Video | Feb. 24, 2021

An quick fundamental overview of layer two devices.   To learn more about this and similar topics, enroll in our exclusive Understanding Networking Fundamentals course.

Why Continuous Education for Cybersecurity Professionals is a Must

Article | Feb. 23, 2021

Cybersecurity is one of the most important fields of work in our world today. It’s an ever-changing discipline that requires ongoing education and adaptability, even for cybersecurity experts.

A Complete Guide : How to Become a CompTIA Security+ Certified Professional

White Paper | Feb. 19, 2021

This guide provides an overview of the Security+ certification, including who the certification is for, how to earn and maintain it, the positive impact that it will have on your career, and options for advancement following your Security+ certification.

Security+ SY0-601 Study Guide

White Paper | Feb. 19, 2021

The Security+ certification is a common component of a cybersecurity professional’s resume, which would leave a gap if it is not present. Learn about the new material that will be present on the SY0-601 Security+ exam.

What Separates a Good Cloud Engineer from a Great One

Article | Feb. 16, 2021

The cloud has been around for over a decade, but great cloud engineers are in short supply. What sets a great cloud engineer apart from simply a good one? Experience plays a big part, and the general expectation seems to be that you will become great by putting in your time. However, the truth is that to be a great cloud engineer you do not just slowly grow into your role. You actively aim for ways to improve both your skills and your approach to using technology. Here are three examples of what great cloud engineers do to be highly successful.

5 Tips for Passing Your Security+ Exam

Article | Feb. 15, 2021

The field of cybersecurity is growing, and it is no wonder. Global Knowledge’s 2020 IT Skills and Salary Report confirms the value of security experts, with those functioning in the Cybersecurity/IT Security field in the U.S. reporting an average annual wage of $153,655. Here’s an exclusive Security+ certification profile.

In the Time of COVID-19, Create a Ready-for-anything Workforce

Article | Feb. 15, 2021

COVID-19 has had a significant impact on businesses. Cost-cutting efforts have resulted in organizations having to do more with less. Safety protocols and social distancing guidelines have meant that more employees are working from home. The reality of remote workers and the access, reliability, and security issues that they create are at the forefront of the challenges facing IT departments.

Palo Alto Networks - Firewall Essentials

Webinar – Recorded | Feb. 09, 2021

Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This recorded webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment. View the slide deck>

Build your foundational knowledge of Data & AI with Azure

Webinar – Recorded | Jan. 26, 2021

Explore how Azure provides easy-to-use services to help you get started with building Data and AI solutions. Learn about many areas of AI, including machine learning, and how many modern applications and services depend on predictive machine learning models. We will also talk about the fundamentals of database concepts in a cloud environment and how to build your foundational knowledge of cloud data services within Azure.

Value of AWS Certified Staff, Popular Cross-certifications and AWS Certs Pursued by Age Group

Article | Jan. 25, 2021

The IT Skills and Salary Report covers a lot in the published report, and that’s only the surface. Here are a few snippets of AWS data that weren't included in the published report.

Overview of Microsoft SQL Server and High Availability Options

Webinar – Recorded | Jan. 19, 2021

The session will start with a general introduction to Microsoft SQL Server editions and versions. We will then highlight several scalability features of SQL Server. Next we will look at the High Availability Options of SQL Server. Finally we will look at Azure SQL deployment and Availability solutions. View the slide deck>

4 Mistakes Cloud Engineers Can't Afford to Make in their Jobs

Article | Jan. 18, 2021

Systems engineers are the women and men responsible for keeping your applications running and databases responsive, and while the cloud has removed much of their responsibilities regarding hardware, their jobs are by no means easy. Lack of attention to details is always a factor in most mistakes, but these issues stem from misperception and a lack of understanding regarding the cloud itself.

8 Specializations that Define Successful Cybersecurity Organizations

Article | Jan. 15, 2021

Cybersecurity has matured into a complex and diverse set of functions. Each of these functional specializations represent different roles requiring different knowledge, skills, and abilities.

What Are Common Mistakes in Cloud Security?

Webinar – Recorded | Jan. 15, 2021

Cloud and virtualization technologies have spawned a whole ecosystem of applications. But like any powerful technology, they can be used for bad as well as good. This session reviews the top 10 most common mistakes made in cloud and virtualization security.

Why It’s Critical to Apply the Risk Management Framework to Your IT Modernization Plan

Webinar – Recorded | Jan. 15, 2021

Watch this recorded webinar to understand the basics of the Risk Management Framework (prescribed by NIST Standards) and how to begin to apply it.  

Overview of the Microsoft System Center Configuration Manager Architecture

Webinar – Recorded | Jan. 12, 2021

This webinar will provide a high level overview of Microsoft SCCM 2012R2 and the new features available. You will learn day-to-day management tasks, including how to query data, manage applications, hardware and software inventory and software updates by using Configuration Manager. View the slide deck>

6 Things IT Professionals Can Learn from the Film “Groundhog Day”

Article | Jan. 08, 2021

Aside from plenty of laughs, the 1993 film “Groundhog Day” actually delivers powerful messages about change, love and the too-often-overlooked importance of being courteous to others. Phil is unable to break the time loop until he totally changes who he is. Unless you’re as selfish and heartless as Phil, you probably don’t require this type of transformation to break the repetition. But everyone could stand to make a few smaller changes to get the most out of life and your profession.

How to Deal with Six Types of Difficult Coworkers

White Paper | Jan. 06, 2021

It’s inevitable. At some point in your career, you’ll find yourself working alongside individuals who fall into the general category of “Difficult People.” The effects these people can have on an organization vary greatly but usually involve many problems for the team. This white paper describes some of the more common types of difficult people and provides you with tips on how to handle them.

The Tools and Techniques Useful in Quality Planning, Assurance and Control

White Paper | Jan. 06, 2021

When creating products, providing services and achieving results, consistency is the goal of quality management. This white paper gives you a basic overview of the tools and techniques you need for quality planning and quality assurance. Learn which resources help you to evaluate programs, prioritize objectives or discover problem areas. Featured within this white paper are Kaoru Ishikawa’s seven quality tools which include flowcharts, histograms and cause-and-effect diagrams. 

Three Steps to Ensure the Success of Your IT Projects

White Paper | Jan. 06, 2021

Projects are often complex, made up of a large number of moving pieces and bring numerous challenges. But, by using the three key steps mentioned in this white paper during your project planning and execution phases, your ability to achieve success is greatly enhanced. The steps enable you to identify stakeholders, manage requirements and set a course for achievable expectations.

5 Numbers to Know in the 2020 IT Skills and Salary Report

Article | Dec. 30, 2020

Here are five data points from the 2020 IT Skills and Salary Report that illustrate important trends in professional development, skills gaps, hiring and top-paying certifications.

10 Weak Points of Administrative Security

Article | Dec. 18, 2020

Organizations rely on administrators to do a lot. If you’re admin reading this, you know this far too well.

How to Use MPLS Ping and Traceroute

Article | Dec. 17, 2020

With Multiprotocol Label Switching (MPLS) as popular as it is in the provider space and private MPLS clouds for larger enterprise, we needed some tools to help troubleshoot and maintain these networks. With the providers in mind, the normal ping or traceroute may not be enough.

What’s the Difference Between Hubs, Switches & Bridges?

Article | Dec. 17, 2020

The key difference between hubs, switches and bridges is that hubs operate at Layer 1 of the OSI model, while bridges and switches work with MAC addresses at Layer 2 of the OSI model.

What Separates a Good Cloud Architect from a Great One?

Article | Dec. 16, 2020

Let's start with defining the job of a cloud architect. You are responsible for planning, designing, migrating, and implementing cloud-based infrastructures, but the effectiveness of these specialists is not guaranteed.

4 Mistakes Cloud Architects Can’t Afford to Make in Their Jobs

Article | Dec. 15, 2020

These mistakes can be resume-updating events if you are not careful. Take the time to learn the skills of a cloud architect and both your career and your employer will benefit.

Can One VLAN Reach Another Without a Router or OSI Layer 3 Device?

Article | Dec. 15, 2020

Early one morning, an engineer end user discovered that the Engineer servers were unreachable, and he didn’t know if he could reach the Internet. The administrator investigated the user’s PC with the IPCONFIG /ALL command and verified that the PC was a DHCP client, but it had received an address from the Accounting DHCP server, not the Engineering DHCP server.

Does a MAC Address Mean Apple Invented It?

Article | Dec. 15, 2020

While Apple has created many fine things, they were yet to be created themselves when Xerox PARC scientists created Media Access Control addresses. These MAC addresses are 48 bits or 6 bytes long, so they are also known as MAC-48 or EUI-48. EUI stands for Extended Unique Identifier. It is written in hexadecimal characters as shown below:

From Foundation to Finish Line: Get Your Head in the Microsoft Azure Cloud

Webinar – Recorded | Dec. 08, 2020

Join this exciting journey through the Microsoft cloud. We will discuss how companies have implemented Azure and other Microsoft cloud services and solutions. We will also address hesitations companies may have as they consider cloud technologies. In addition, we will explore practical tips about how to begin or continue your journey as you implement cloud solutions.

10 Things Managers Can Do To Improve Security

Article | Dec. 04, 2020

It is everyone’s job, not solely cybersecurity professionals, to consider how their work affects security.

10 Ways to Test Your Network’s Defenses

Article | Dec. 04, 2020

Hackers are looking for your company’s network. Unless you are offline and have no internet connectivity, the company network is discoverable.

10 Steps to Improve Your Job Position as a Cybersecurity or IT Professional

Article | Nov. 30, 2020

Finding the right job may not always be that easy. For IT and cybersecurity professionals who are searching for a new job, or would just like to hang onto their current one, there are steps you can take to improve your job position. Whether you’re looking to get better at your job or advance up the ranks of your organization, these tips are aimed at you!

Do These Seven Things to Safeguard Your Computer and Network Going into 2021

Article | Nov. 30, 2020

With 2021 quickly approaching, you need to be ready for existing and new threats. If you want to secure your system from hackers, then you need to think like them. In 2020, we saw attacks on many companies such as Twitter, Experian South Africa, British Airlines, DigitalOcean, etc. These companies have trained security teams, but hackers continue to find ways exploit vulnerabilities.

Advantages of Using SonicWALL Route-Based VPN Instead of Site-to-Site VPN

Article | Nov. 19, 2020

There are several advantages to implementing a route-based VPN (a.k.a. tunnel interface VPN) instead of a site-to-site one. Learn more.

DevOps: the leading choice for high velocity business

Webinar – Recorded | Nov. 10, 2020

In this 1-hour webinar, you will learn more about the current DevOps market landscape and how to lead a conversation with the C-suite about how to sustain high-velocity businesses with DevOps training and certifications across three key success factors: Culture, Practices & Automation. View slide deck>

Cisco LAN Switching Fundamentals

Webinar – Recorded | Nov. 05, 2020

Network switching skills are fundamental to administering and maintaining computer networking. This webinar reviews fundamental networking skills from a Cisco perspective. Technical professionals looking to take the next step into Cisco specific networking technologies will benefit from this information. View the slide deck>

How ITIL® Differentiates Problems and Incidents

Article | Nov. 05, 2020

What’s the difference between incidents and problems? This article explains the differences between these ITIL® concepts, how they are related, and why it matters.

Keeping Safe While Video Conferencing

Webinar – Recorded | Oct. 26, 2020

The coronavirus pandemic changed how people around the world work and receive skills training. Virtual meeting services saw incredible growth, they also faced new security challenges. As a key Global Knowledge partner, we worked closely with Gary and the Zoom team as they rapidly upgraded their platform to ensure the maximum possible level of safety for all users. However, technology is only as powerful, or safe as the people who use it. So, in this webinar Gary will provide expert (and entertaining!) advice on how to use virtual meetings safely when there is not a Global Knowledge instructor on-hand to help. Joining Gary is Kevin, our CXO: another big personality with a wealth of IT experience and a passion for ensuring our customers receive the best possible experience, every time they connect with Global Knowledge.

Overview of Microsoft SQL Server and High Availability Options

Webinar – Recorded | Oct. 22, 2020

The session will start with a general introduction to Microsoft SQL Server editions and versions. We will then highlight several scalability features of SQL Server. Next we will look at the High Availability Options of SQL Server. Finally we will look at Azure SQL deployment and Availability solutions. View the slide deck>

A Complete Guide: How to Become Certified in Microsoft Azure Fundamentals

White Paper | Oct. 21, 2020

This Certification Prep Guide provides an overview of the Microsoft Azure Fundamentals certification and offers helpful tips that you can use when preparing for your certification exam.

Deploying MITRE ATT&CK Navigator to Improve Incident Response

Webinar – Recorded | Oct. 20, 2020

The world of Incident Response is evolving. No longer do we focus on indicators of compromise; we now focus on attacker behavior. MITRE has turned attacker behaviors into a usable framework shared both on their website and on GitHub. MITRE provides the MITRE ATT&CK Navigator on GitHub which includes a complete mapping of all techniques and sub-techniques to help you understand the attacker’s behavior. The Navigator can be leveraged to optimize Incident Response, evolving your team from responsive to predictive response.

Importance of Project Schedule and Cost Control in Project Management

Article | Oct. 20, 2020

Keep your project on time and within budget by controlling the baselines, budget, and schedule. View our comprehensive guide to project management, from project scheduling to cost control, from the experts at Global Knowledge.

The Importance of Maintaining Cyber Security Skills in a Virtual World

Webinar – Recorded | Oct. 19, 2020

The Information Technology (IT) profession is a pretty exciting place to be, right now. We’re seeing an unprecedented influx of new technologies and approaches, including AI, robotics, automation, and next-level networking. More importantly, today’s IT workers have become the guardians of identity and curators of information. Given the increased movement to remote working the IT community must be conscious their teams skillset in the midst of increasing and complex cybersecurity threats designed to hit organizations where it hurts...their people. If you’re curious about what it’s like to be part of the IT profession in quickly changing virtual world, then watch CompTIA’s Chief Technology Evangelist, Dr. James Stanger, to learn more. James discusses the pillars of IT that help create our (post)-modern world, and dispel a few myths about the cybersecurity profession. If you’re interested in learning more about the different cybersecurity pathways available to you, and how you can become a unique contributor to the cybersecurity profession, then we welcome you.

Learning Skills for a Successful Career at Microsoft

Webinar – Recorded | Oct. 14, 2020

Have you ever wondered which skills are required for a successful career in technology at Microsoft? Whether you are an aspiring future Microsoft employee, or just looking for expert advice and inspiration on what skills to add to your toolbelt to build a career in the tech premier league, this webinar is for you. Watch this webinar as Andrew Ludlow, Enterprise Security Executive, and Jason Johnson, who leads the Microsoft Aspire Experience program, share discuss in-demand certifications and soft skills for careers at Microsoft, with an additional focus on the importance of cybersecurity skills.

Six Tips for Passing Microsoft Certification Exam (from Someone Who Hates Taking Tests)

Article | Oct. 13, 2020

Prepping for a Microsoft certification exam? Global Knowledge's own Tracy Wallace has you covered with these six tips for passing any Microsoft exam.

Six Tips for Passing a Microsoft Certification Exam (from Someone Who Hates Taking Tests)

Article | Oct. 13, 2020

Prepping for a Microsoft certification exam? Global Knowledge's own Tracy Wallace has you covered with these six tips for passing any Microsoft exam.

The Role of Critical Thinking in Problem Analysis

White Paper | Oct. 13, 2020

Critical thinking allows us to take control of our thinking rather than letting it become hijacked by convenience, mindset, assumptions and bias. This white paper will walk you through understanding the implications of inputs (data) and influences (bias) to the reasoning process. You will learn how to develop a questioning outlook and quality standards that will lead you to make more effective decisions.

Communicate, Communicate, Communicate

White Paper | Oct. 10, 2020

Accelerating Leadership Development provides a proven model to develop high-potential employees to 1) assume critical roles, and 2) develop competencies, intellectual and knowledge capital. The book offers practical and rigorous tools and practices that enable organizations to identify and develop high-potential individuals, follow-up procedures to ensure activities are executed and results are captured; and leadership best practices to assure that leaders are functioning at a high level. The benchmarks of success are a pipeline of ready leaders, high-potential engagement and retention, and the development of intellectual capital.

Working from home – a hacker’s paradise!

Webinar – Recorded | Oct. 09, 2020

The novel coronavirus has changed many aspects of life for millions of people globally, including where they work. With the increase in remote work, it is important for both individuals and companies to be aware of the added cybersecurity risks. Join us as Paula shares real world examples and tips on how we all can be better prepared.

Cybersecurity Awareness Fundamentals

Webinar – Recorded | Oct. 08, 2020

Expert Hesham Mahmoud discusses the importance of cybersecurity, how to secure your IT infrastructure and detect the latest vulnerabilities and threats your organization might encounter. This webinar will cover the latest cybersecurity trends and how to react to data breaches. View the slide deck>  

What is Project Quality Management?

Article | Oct. 07, 2020

Project quality management is the process of determining the quality standards that are applicable to a project and devising a way to satisfy them. Learn more here.

From Analyst to Threat Hunter: How to Build the Skills for Tomorrow’s Hottest Cyber Jobs

Webinar – Recorded | Oct. 06, 2020

Whether you’re a current cyber pro looking to specialize, or new to the industry and looking for direction, Focal Point Academy’s lead cyber workforce expert can give you the insight needed to fast-track a career into today’s most in-demand cyber jobs, like Threat Hunting and Reverse Engineering. We’ll profile the top job roles for the next few years, break down the knowledge, skills, and abilities required in each, and show you how to build a training plan that gets you the job you want. And best of all, we’ll end with a special offer designed to help jump start the process for you and your team. View the slide deck>

What Is Project Scope Management? An Overview

Article | Oct. 01, 2020

Project Scope Management sets the foundation for the creation, development and successful delivery of a project. Learn about the project management process here.

The Next Cyberattack is Right Around the Corner—Are You Ready?

Article | Sep. 23, 2020

There’s a lot of pressure on IT decision-makers to fill the cybersecurity holes in their organization. The cyber skills shortage is palpable and growing. Cybersecurity is the most challenging IT hiring area in the world. Those of you expecting to hire your way out of your cyber skills gaps, we have some bad news for you—it’s not viable.