Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Resource Library

Filter By

Topics

Show Filters
Result Filters:

1132 Results Found

Results per page: 10 40 80

You’ve Completed ITIL® Foundation: Now How to Implement It

White Paper | Nov. 30, 2016

Shortly after being awarded an ITIL® Foundation certification, a recipient’s natural inclination is to ask: “Now what? How do I take the best practices I’ve learned and apply them to my organization?”

“Reasonable Security” Best Practices: Learning From Notable Data Breaches

White Paper | Nov. 28, 2016

Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a breach. But what is "reasonable security," and is there a definition?

Understanding Pen Testing

Video | Nov. 23, 2016

A brief introduction to the basics of penetration testing.

ITIL Ranks Among Top 5 Paying IT Certifications

Article | Nov. 14, 2016

As the technology industry has advanced, the professional certification industry has grown alongside it. The Global Knowledge 2016 IT Skills and Salary Report revealed that Cisco, Microsoft, IT service management, ITIL and security certifications are the most lucrative to obtain.

A Guide to Making High-Quality Decisions

White Paper | Oct. 21, 2016

When a decision matters, there are certain steps you will want to follow. In this white paper, we provide guidelines for approaching decisions. The steps in this white paper are a series of interconnected techniques used in problem analysis and decision making.

How Top C-Suite Cybersecurity Concerns Become Your Own

Webinar – Recorded | Oct. 20, 2016

Company reputation damage, financial loss and compromised intellectual property are just a few of the major issues that need to be conveyed and clearly understood. Collaboration and education throughout an organization are key to facing and overcoming the devastating effects of a data breach. Learn the issues, how to educate employees companywide and help your leaders move forward quickly with a cybersecurity action plan.

Why Upgrade to Windows Server 2016?

Article | Oct. 18, 2016

On September 26, 2016, Microsoft announced the general availability of Windows Server 2016. We already have a taste of what the user interface looks like from Windows 10. In actuality, there are a few other features that Windows 10 picked up first, such as PowerShell 5.0 and the latest version of Hyper-V, that are also part of Windows Server 2016. Many other heavy-hitting server-only features will be here soon.

Best Paying Jobs in IT

Article | Oct. 16, 2016

In reviewing the list of best-paying jobs in IT, you’ll see some areas you might expect like cloud computing and other areas you probably didn’t, like business technology or enterprise infrastructure management. The top 10 functional areas are based on the 2016 IT Skills and Salary Survey conducted by Global Knowledge in October 2015. Note that all references to “average” represent the mean, not the median or other statistical measures.

Using VMware NSX for the Microsegmentation of Security

White Paper | Oct. 12, 2016

The methods we have used in the past to secure our networks won’t work for tomorrow’s networks. Cloud-based applications and multi-tenant environments require greater scalability, agility and control. Software-defined networking (SDN), such as that provided by VMware NSX, can deliver a new platform that transforms networking and provides for much more specific control of the security of your data and networked applications.  In this white paper, author Bill Ferguson describes the microsegmentation of security and illustrates how you can use NSX to provide security that works on today’s and tomorrow’s networks

Real-World IT Horror Stories

Article | Oct. 03, 2016

If you work in IT, there is no doubt that you've lived through more than a few IT nightmares. In celebration of Halloween, we've asked a few of our instructors to share some of the horror stories from their own consulting careers.