Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

250 Results Found

Results per page: 10 40 80

A Complete Guide: How to Become an AWS Certified Architect

White Paper | May 14, 2021

This Certification Prep Guide provides an overview of the current AWS Certified Solutions Architect – Associate certification and offers helpful tips that you can use when preparing for your AWS Architect certification exam.

A Guide to Cybersecurity Frameworks for IT Leaders

White Paper | May 04, 2021

When trying to keep your intellectual property safe, the right cybersecurity framework is important. Gain a general overview of different cybersecurity frameworks and why they matter to your organization.

10 Things Security Experts Wish End Users Knew

White Paper | April 08, 2021

Security is complicated, which has led to the many misconceptions and misunderstandings about security. By paying attention to these 10 concerns that security experts want you to know, you can gain knowledge and understanding about security and be securer both at work and in your personal life.

A Complete Guide: How to Become a Google Certified Professional Cloud Architect

White Paper | April 05, 2021

This Certification Prep Guide provides an overview of the current Google Certified Professional Cloud Architect certification and offers helpful tips that you can use when preparing for your GCP certification exam.

The 5 Phases of Hacking: Gaining Access

Article | March 25, 2021

Gaining access is the most important phase of an attack in terms of potential damage, although attackers don’t always have to gain access to the system to cause damage. For instance, denial-of-service attacks can either exhaust resources or stop services from running on the target system. 

The 5 Phases of Hacking: Maintaining Access

Article | March 25, 2021

Once an attacker gains access to the target system, the attacker can choose to use both the system and its resources and further use the system as a launch pad to scan and exploit other systems, or he can keep a low profile and continue exploiting the system.

How ISACA Certifications Deliver Returns to Organizations and Individuals

Article | March 22, 2021

ISACA’s role is to help those in the field of cybersecurity get greater utilization out of the people already in the fold. This means enabling IT professionals to take a leadership role and increase their depth of knowledge. 

The 5 Phases of Hacking: Scanning

Article | March 19, 2021

Attackers use a method called scanning before they attack a network. Often attackers use automated tools such as network/host scanners and war dialers to locate systems and attempt to discover vulnerabilities.

A Beginner's Guide to Encryption

Article | March 05, 2021

Here's an introduction to encryption. What is it? Why do we need it? It's a complicated area, so we're here to help get your started. You'll understand the general function of three categories of mathematical ciphers: Symmetric, Asymmetric and Hashing. 

Everything You Need to Know About the 2021 CISSP Exam Changes

Article | March 05, 2021

The 2021 revised and updated version CISSP (Certified Information System Security Practitioner) certification exam will be released on May 1, 2021. This new version of the popular CISSP exam will include a modest revision and re-organization of previously included topics, but will integrate a significant number of new topics.