248 Results Found
Microsoft’s Excel program is a staple in many business environments, but very few people take full advantage of this tool. This webinar is a great opportunity to introduce yourself to formulas, data validation, pivot tables, and power query.
In this informative webinar, participants will learn about Global Knowledge's approach to blended learning, Blended Live, and explore the benefits of this challenge-based, flipped classroom model.
VMware vSphere: ICM 6.7 is the foundation for most other VMware technologies in the software-defined data center. The recent update from 6.5 brings important new features and enhancements.
The way Microsoft certifies Azure skills has changed. In this recorded webinar, we’ll cover what these changes mean for your Azure Certification path.
Watch this recorded webinar to learn about Microsoft Teams. Our industry expert will show you what Microsoft Teams can do for your team and how it can help you manage your time more effectively. In this 45 minute webinar, you will see what Microsoft Teams can offer you and your organization and how you can use it.
Learn more about Red Hat Ansible like what it is, what job roles work with it, and more in our Global Knowledge Tech Talk hosted by Brent Brandow and joined by Red Hat experts John Walter and Scott Stewart. John Walter is a solution architect for Red Hat's certification and training team and Scott Stewart is the senior partner manager for Red Hat's training and certification team.
Watch this recorded webinar to understand how Cisco Intent-Based Networks and SDN technologies will transform your network to be the cornerstone of your digital success.
In this one-hour webinar, AWS consultant and instructor Ryan Dymek, will discuss how to optimize your AWS architecture design.
For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.
The Cyber Risk landscape is rapidly evolving leaving Cybersecurity professionals dazzled and lost in prioritizing their cybersecurity needs. Limited budget and low cyber resilience lead organizations in adopting re-active defensive measures. In this webinar, we will go through a methodological approach for assessing top cyber-risks a typical enterprise might encounter. And will address different scenarios for mitigating, transferring, or avoiding encountered risks.