Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

4 Results Found

Results per page: 10 40 80

Why Pentesting is Vital to the Modern DoD Workforce

Webinar – Recorded | Feb. 26, 2019

Watch this recorded webinar as CompTIA’s chief technology evangelist and Global Knowledge’s federal sales director discuss how pentesting has morphed.

IT Roles Facing Extinction

Article | July 14, 2017

In the future, IT leaders will face a host of multi-dimensional challenges as global business increases in technological complexity; some of the challenges include harnessing mobilization and use of social media for business, developing employee- and customer-facing business applications.

10 Ways Everyone Should Approach Cybersecurity

Article | June 02, 2017

Here are 10 key lessons we need to learn (or learn again) from compromises. Cybersecurity.

Business Process Modeling: From Macro to Micro

Webinar – Recorded | Nov. 12, 2015

Business processes are complicated, and mapping them is not a trivial task. Modelling standards give us the tools to model complex processes, but they do not tell us the best way to approach a model or effectively use the tool. In this hour-long webinar, Global Knowledge instructor Rod Fage will guide you through the best way to develop a model, from determining the goal and scope of the process and measuring its effectiveness, to modelling the process in a hierarchical top-down approach, enabling business analyst to continuously validate the model.