Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Brands

Show Filters
Result Filters:

12 Results Found

Results per page: 10 40 80

How to Troubleshoot Group Policy in Windows 10

Webinar – Recorded | June 06, 2019

In this live excerpt from Supporting and Troubleshooting Windows 10 (M10982), Windows 10 expert and Microsoft Certified instructor, John Panagakos, will lead you through one of the most popular modules in this course.

Develop Your Skills with Unlimited Access to Red Hat Online Learning

Webinar – Recorded | Jan. 31, 2019

The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.

Top 10 Certifications with Staying Power

Article | Nov. 01, 2018

IT is a very fast changing industry – what is hot today may be a tiny niche market in only a few years and lesser known things may turn out to be huge trends. That having been said, there are many certifications that will be around for a long time. However, this does not imply that recertification and/or continuing education credits are not required to maintain certification. Predicting the future is always challenging, including in IT, but these certifications are good bets.

How to Build a Web Server with Lambda

Webinar – Recorded | Sep. 14, 2018

The idea of building and running applications without thinking about the servers (AKA serverless computing) is a developers dream come true.  Watch expert Rich Morrow to understand: The benefits of using serverless computing Different architectures that use serverless computing How AWS services, like Lambda, S3, API Gateway and DynamoDB work together to enable faster and more flexible application deployment and management. This video also features a live demo: Building a web app with only serverless components.

What's New in Windows 10

Webinar – Recorded | Oct. 15, 2015

Whether you've already upgraded to Windows 10 or you're interested to learn more, this webinar will help familiarize you with the major updates and features. Join Microsoft instructor, John Panagakos, for an hour-long webinar that will dive into the exciting new features Windows 10 has to offer.

Managing Windows Libraries

Video | Jan. 26, 2015

In this video, instructor Glenn Weadock explains the Windows 7 library concept and how it replaces the traditional "My Documents" user profile folder by adding the Public profile to the user profile.

2014 IT Skills and Salary Report

Special Report | April 04, 2014

The results are in, and analysis is complete from our seventh annual IT Skills and Salary Survey. This was our second in partnership with Windows IT Pro and one of the industry's largest with more than 12,000 North American respondents. Download your copy to learn how your salary, bonus, job function, and other factors compare to your peers.

2013 IT Skills and Salary Report

Special Report | April 05, 2013

Get a look at how your numbers compare to your peers and neighbors with our comprehensive lists below. A Note About Our Certification List For the condensed list of certifications in our 2013 IT Skills & Salary Report, we included only certifications that received enough responses to be statistically relevant. The list below is more inclusive. Certification data is for informational purposes only, as the values of some of the more exclusive certifications are based on few responses and, therefore, are less reliable.

Windows 7 Certification and Skills Learning Tracks

Video | Feb. 28, 2013

Chief Technical Architect Craig Brown discusses the Windows 7 certification and skills tracks available to Global Knowledge students.

Seven Security Myths of Windows 7

White Paper | May 10, 2012

Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do to keep your systems safe and implementing a layered approach. If you depend on one program or feature to secure your computer, then when (not if, but when) that dependency is breached, you may have personal information stolen or even have your computer taken over.