Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Brands

Show Filters
Result Filters:

20 Results Found

Results per page: 10 40 80

Manage Time and Priorities Using Microsoft Outlook

Webinar – Recorded | June 05, 2019

Learn to effectively use Microsoft Outlook as a work organization and management tool. This webinar will help participants enhance their personal and team productivity, while giving them more control over activities and information.

ITIL 4: The Changes, What’s New and How it Impacts You

Webinar – Recorded | Feb. 14, 2019

ITIL® is still recognised as the de facto standard in delivering end-to-end, holistic IT services. The 4th iteration retains ITIL’s place as one of the key tools at the disposal of organization’s seeking to manage digital transformations.

Develop Your Skills with Unlimited Access to Red Hat Online Learning

Webinar – Recorded | Jan. 31, 2019

The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.

Guide to ITIL® Certifications and Tips for Exam Success

White Paper | Jan. 03, 2018

This certification and exam guide discusses the various ITIL® certifications and what they might mean to you, your organization, and your career, as well as provide important test-taking tips for the ITIL certification exams. ITIL certifications help individuals validate their ability to demonstrate skills from a foundational to a mastery level of IT service management. ITIL certification can often be a key differentiator in the marketplace as well.

ITIL Ranks Among Top 5 Paying IT Certifications

Article | Nov. 14, 2016

As the technology industry has advanced, the professional certification industry has grown alongside it. The Global Knowledge 2016 IT Skills and Salary Report revealed that Cisco, Microsoft, IT service management, ITIL and security certifications are the most lucrative to obtain.

Cisco Unified Collaboration Solutions Infrastructure Overview

White Paper | Sep. 25, 2015

The Cisco Unified Collaboration solutions offer anytime, anywhere access for organizations who need instant access to clients, vendors and remote employees. Cisco products enable authorized external users to connect to corporate resources, create different user groups and manage large scale deployments. Learn how Cisco Unified Collaboration infrastructure products can help you provide everything from call control which provides signaling and dial plan support to the expressway series providing firewall traversal for external access.

Technology Offers Convenience, Privacy Pays the Price

White Paper | Sep. 25, 2015

Technology is a wonderful thing, but it comes with a price: cybersecurity. Free Web browsers, social media sites and other digital services collect personal information like email addresses, phone numbers, place of employment, buying habits, mortgage data that is shared with advertisers. The availability of this information leaves us vulnerable to hackers. This white paper can help you learn more about what kind of personal data is typically collected, and how to secure your information online.

Cisco Collaboration Endpoints

White Paper | Sep. 17, 2015

Your clients, vendors and workforce don't always operate in the same building, state or country. Cisco Collaboration Endpoint products make communicating with your counterparts across town or on the other side of the world easy. This white paper provides you with product specifications and capabilities for Cisco's phone, desktop, and large screen immersive videoconferencing options.

Data Breaches: What Can and Cannot Be Done

White Paper | Aug. 23, 2015

Experts agree that as long as there is data, there will be people trying to steal it. For every defense mechanism put in place, there is someone who will find a way to get around it. Constant vigilance, education of the workforce, and management support are all necessary to implement effective security policies. While a well-trained IT staff is key to protecting data, all employees must understand the importance of protecting company assets, including data.

Healthcare Organizations and Data Breach: How to Lower Risk and Reduce Liability

White Paper | Aug. 14, 2015

Discover why healthcare organizations must take an immediate active role in securing their data. It is much more costly, monetarily as well as with regard to reputation, for an organization to react to a breach rather than plan for it.