15 Results Found
This Certification Prep Guide provides an overview of ISACA’s Certified in Risk and Information Systems Control (CRISC) certification and offers helpful tips that you can use when preparing for your CRISC certification exam.
This Certification Prep Guide provides an overview of ISACA’s Certified Information Security Manager (CISM) certification and offers helpful tips that you can use when preparing for your CISM certification exam.
This quick reference guide will highlight the various certification tracks to help you find your path through the EC-Council programs.
Networks are as different as the people and organizations that use them. Despite those differences, there are some foundational components that all networks share. This session will explore different types of networks and the common components that must exist in these networks.
This recorded webinar will help you understand the basics of switch functionality in Cisco networks. In this setting, a SWITCH is functioning at OSI Layer 2. Before SWITCHES we used BRIDGES to segment within the same network.
You don’t have to look far to discover how important security is in our organizations. No matter what role you play in your IT department, it is critical to have a foundational understanding of security. CompTIA’s Security+ certification continues to be a minimum standard for IT professionals around the world in a variety of industries.
The CISSP (Certified Information System Security Practitioner) certification exam update in 2018 included a modest revision of the topics and a significant change to the testing process. Preparing for the CISSP exam has become more challenging. Here's everything you need to know about the changes.
(ISC)2’s CISSP (Certified Information System Security Practitioner) is a widely desired indicator of cybersecurity knowledge, experience and excellence on the resume of many IT professionals. Learn how to prep for the most comprehensive and in-demand cybersecurity certification.
For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.
I am a VMware Certified Instructor and every single time I teach, I get questions regarding certification. IT certifications always seem to be a controversial topic, and the question is always, "Why should I become certified?"