Skip to main Content

Cybersecurity Is for Life - Not Just October

Everyone must remain cyber aware and take security seriously — not just IT professionals. Everyone.

Research shows the average cost of a data breach to organisations is at an all-time high at $4.24 million.1 From remote work to skills gaps, several factors can impact security and the severity of the threats that remain a persistent and formidable presence in daily life.

Join us this October to find helpful resources and participate in a host of events to train up, remain vigilant and stay secure.

Follow us on social media using, #GlobalCyberSolution

(Facebook, Twitter, LinkedIn)

1. Data comes from IBM’s annual Cost of a Data Breach report.




Learn to Keep Your Network Secure Using Nmap

Gain access to this lab and learn to use Nmap, an open-source port-scan tool, for networking discovery, vulnerability scanning and security risk detection. Included with the lab is a guide with exercises and detailed step-by-step instructions to help you get the most from the training. Click here for full lab and guide.

 

Risk Management and Security Practices with Red Hat
Webinar | 14th October 2021

Managing security in your computing environments is a collection of continuous activities. Red Hat offers solutions that enable security in each phase of the continuous security life cycle.

In this webinar, we'll learn about Red Hat's approaches in Risk Management and security practices. We'll also have examples of security features securing RHEL environments including PAM, Audit, SELinux, and OpenSCAP.

Register for the Red Hat Cybersecurity Webinar >>

Fireside Chat: Expert Advice on Starting a Career in Cybersecurity
Q&A Session | 20th October 2021
 
Join This QA Session to Hear from Cybersecurity Expert Brad Puckett on Kickstarting Your Career. This session is ideal for IT professionals who are early in their careers and interested in pursuing a job in cybersecurity. The discussion will benefit those who have not specialized in security yet and want more information on how to approach this new career path.

Register for this Fireside Chat >>

Empower your skills with Microsoft Security, Compliance, and Identity (SCI) certifications
Webinar | 21st October 2021
 
Microsoft and Global Knowledge are partnering up to showcase the importance of Cybersecurity Awareness Month. Join this event to learn all the tools and tactics to stay safe and secure online throughout the whole year.

This webinar event will take you through the new certifications focused on Microsoft Security, Compliance, and Identity (SCI).

Register for the Microsoft Security, Compliance and Identity Certifications Webinar >>

My Password is Too Strong for Attackers

While having a strong password can help keep most bad actors out, it may not keep all out. In this video, James talks about the ways attackers may take advantage of the shortcomings of password authentication and how to avoid becoming a victim.

The cyber myths debunked in this video:

- My password is too strong for an attack

- I’m not important enough to attack

Cyber Attacks Only Come From Outside Sources

It’s hard to believe that attacks may come from internal sources; for some, it’s the last place they’d expect. But, unfortunately, attackers may be closer than you think. James covers a few examples of security incidents from internal sources and the ways to prevent them.

The cyber myths debunked in this video:

- I can always spot or recognise an attacker or a breach

- We've not been breached before, so our security plan is good enough for the future

- I use security products, so I don't have anything to worry about

Social Media: My 'Friends' Wouldn't Scam Me

“We’re friends, right? My friends wouldn’t try to scam me.” In this video, James breaks down the various ways attackers can use a person’s friends list on social media to gain access to sensitive information.

The cyber myths debunked in this video:

- Those I know through social media can't hurt me

- I only visit common websites, so I'm safe

- I can always spot a scam because they are obvious

Resources to Improve Cybersecurity Everywhere for Everyone

10 Ways Everyone Should Approach Cybersecurity

VIEW MORE

Cybersecurity Month - Top Cybersecurity Training from a World Leader

Our vast cybersecurity training portfolio can help you and your team build critical skills — from fundamental to advanced — and prepare for top industry-recognised certifications.


Take a look at our Cybersecurity Roadmap which will guide you through our portfolio of cybersecurity training solutions and certifications.

Why Cybersecurity Training
is so Important

Our research shows 26% of IT professionals believe their cybersecurity skills aren’t where they should be. Further, almost half of IT decision-makers struggle to find qualified talent for vital roles. GK Polaris, our unlimited training subscription, is here to fix that.

VIEW GK POLARIS
Cookie Control toggle icon