8 Results Found
The CISSP (Certified Information System Security Practitioner) certification exam update in 2018 included a modest revision of the topics and a significant change to the testing process. Preparing for the CISSP exam has become more challenging. Here's everything you need to know about the changes.
(ISC)2’s CISSP (Certified Information System Security Practitioner) is a widely desired indicator of cybersecurity knowledge, experience and excellence on the resume of many IT professionals. Learn how to prep for the most comprehensive and in-demand cybersecurity certification.
Watch this recorded webinar to understand the basics of the Risk Management Framework (prescribed by NIST Standards) and how to begin to apply it.
The key difference between hubs, switches and bridges is that hubs operate at Layer 1 of the OSI model, while bridges and switches work with MAC addresses at Layer 2 of the OSI model.
Whether you’re a beginner or intermediate Python developer, you’ll want to keep this guide close to your keyboard and Python editors. In it, you’ll find sample use cases for many of the most common language constructs and tasks that you’ll likely need to perform, such as reading a file or working with a database.
Leadership is evolving beyond traditional leadership skills, and it has never been so important. In an era of constant change, digital disruption, increased employee expectations and rising business complexity, today’s leaders require more than the fundamentals. In years past, leadership development focused on helping leaders set performance expectations, communicate effectively, provide feedback, coach and motivate their employees. While these skills remain important, they are no longer sufficient to meet the business requirements of the 21st century. Leaders now require skills and competencies to ensure that they also build highly productive teams, accelerate organizational results and transform customer experiences in a fast-paced, highly competitive and global working environment. In this hour-long webinar, leadership consultant Kim Caughlin will reveal and discuss the new high-demand skills and competencies required to lead effectively in the 21st century.
If any of the following reminiscences ring true to you, have you moved beyond them? If not, it might be time to make some new discoveries.
The process of learning how to subnet IP addresses begins with understanding binary numbers and decimal conversions along with the basic structure of IPv4 addresses. This paper focuses on the mathematics of binary numbering and IP address structure.