Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Brands

Show Filters
Result Filters:

16 Results Found

Results per page: 10 40 80

How to Troubleshoot Group Policy in Windows 10

Webinar – Recorded | June 06, 2019

In this live excerpt from Supporting and Troubleshooting Windows 10 (M10982), Windows 10 expert and Microsoft Certified instructor, John Panagakos, will lead you through one of the most popular modules in this course.

Develop Your Skills with Unlimited Access to Red Hat Online Learning

Webinar – Recorded | Jan. 31, 2019

The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.

Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6.5 to 6.7

Webinar – Recorded | Dec. 13, 2018

VMware vSphere: ICM 6.7 is the foundation for most other VMware technologies in the software-defined data center. The recent update from 6.5 brings important new features and enhancements.

Software Problems and How Docker Addresses Them

White Paper | Jan. 12, 2016

Learn how Docker makes it easy to update, test and debug software with this white paper and gain foundational knowledge about Dockerfile, Docker images and containers.

What's New in Windows 10

Webinar – Recorded | Oct. 15, 2015

Whether you've already upgraded to Windows 10 or you're interested to learn more, this webinar will help familiarize you with the major updates and features. Join Microsoft instructor, John Panagakos, for an hour-long webinar that will dive into the exciting new features Windows 10 has to offer.

Protect Software Applications with IBM Security AppScan

Webinar – Recorded | May 28, 2015

Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.

Managing Windows Libraries

Video | Jan. 26, 2015

In this video, instructor Glenn Weadock explains the Windows 7 library concept and how it replaces the traditional "My Documents" user profile folder by adding the Public profile to the user profile.

What You Don't Know About Cybersecurity CAN Hurt You

Webinar – Recorded | Oct. 21, 2014

The bad guys just keep getting better! No matter how much patching and tweaking we do, the bad guys' constantly changing tactics and techniques continue harming our networks, stealing and damaging data, and just generally screw things up. What motivates someone to do such terrible things in the first place? How have these hackers changed and improved? What kinds of attacks are popular now and why? In this hour-long webinar, security expert, former hacker and Global Knowledge instructor Phillip D. Shade will provide insight into understanding the latest hacking techniques, what the current threat landscape looks like, and suggested countermeasures to mitigate threats. He will include specific examples of the current threat landscape, including data mining, social engineering cyber threat terminology, man-in-the- middle attacks and Denial of Service (DoS) attacks.

Critical Concepts of the 200-120 CCNA Routing and Switching Exam

White Paper | May 29, 2014

In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing to pass the latest version of the CCNA Routing and Switching exam.

Getting the Most Out of Your Tivoli Endpoint Manager Deployment

White Paper | May 21, 2014

IBM Tivoli Endpoint Manager (ITEM) is a product designed to let enterprises automatically manage computers, allowing thousands of them to be managed by just a few support staff. With ITEM, tasks such as patch application, software distribution, and security policy enforcement can be performed on all of an organization's computers with minimal supervision.