Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

5 Results Found

Results per page: 10 40 80

Everything You Need to Know About the CISSP Exam Changes

Article | March 20, 2019

The CISSP (Certified Information System Security Practitioner) certification exam update in 2018 included a modest revision of the topics and a significant change to the testing process. Preparing for the CISSP exam has become more challenging. Here's everything you need to know about the changes.

CISSP Certification is an Indicator of Cybersecurity Expertise

Article | March 14, 2019

(ISC)2’s CISSP (Certified Information System Security Practitioner) is a widely desired indicator of cybersecurity knowledge, experience and excellence on the resume of many IT professionals. Learn how to prep for the most comprehensive and in-demand cybersecurity certification.

Understanding Google Cloud Platform: Architecture

White Paper | Nov. 20, 2017

Google Cloud Platform (GCP) is Google’s public cloud offering comparable to Amazon Web Services and Microsoft Azure. The difference is that GCP is built upon Google's massive, cutting-edge infrastructure that handles the traffic and workload of all Google users. There is a wide range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). We will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.

IT Roles Facing Extinction

Article | July 14, 2017

In the future, IT leaders will face a host of multi-dimensional challenges as global business increases in technological complexity; some of the challenges include harnessing mobilization and use of social media for business, developing employee- and customer-facing business applications.

10 Ways Everyone Should Approach Cybersecurity

Article | June 02, 2017

Here are 10 key lessons we need to learn (or learn again) from compromises. Cybersecurity.