Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

15 Results Found

Results per page: 10 40 80

Custom Cisco CCNP Security Training Labs

Video | Feb. 27, 2013

Course director Jim Thomas explains how our custom labs, which utilize external hosts, ISR routers, and DMZ, provide a real-world environment for students.

FIREWALL 2.0 - Deploying Cisco ASA Firewall Solutions

Video | July 11, 2013

Global Knowledge instructor Doug Notini discusses the benefits of our FIREWALL 2.0 - Deploying Cisco ASA Firewall Solutions course.

Cisco Completes the Security Picture with Sourcefire

White Paper | June 19, 2015

Security attacks have become more advanced; therefore, security solutions have needed to evolve to deal with those threats. Cisco's acquisition of Sourcefire brings a new paradigm to the security landscape. No longer is security a one-time, instantaneous event. Security now is threat based, network cognizant, and continuous. All organizations, public and private, need to be aware not only of the constantly changing threat environment, but must be prepared to respond in kind.

A Guide to Simplifying InfoSphere DataStage Change Management

White Paper | Aug. 19, 2015

Managing the change of DataStage components can often become a test of wills. Picture fitting a square peg in a round hole, and you might start to get the idea. The complexity of what is required to promote components from one environment to another during the development, testing, and eventual implementation in the production environments, should be and is often a controlled activity.

Understanding Cisco Security Solutions: Are You Ready for a New Era of Risk?

White Paper | Oct. 06, 2015

The responsibility for securing organizational data has spread beyond the traditional IT professional. While there are more diverse security solutions, there are more diverse and sophisticated security threats. Security awareness and training is essential for everyone within an organization. Learn how Cisco has continued to evolve its security solutions and training.

Develop Your Skills with Unlimited Access to Red Hat Online Learning

Webinar – Recorded | Jan. 31, 2019

The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.

Operational Technology (OT) Network Security Challenges and Solutions

Webinar – Recorded | March 21, 2019

As cybersecurity threats continue to be a top concern facing organizations today, the Information Technology (IT) Governance team must stay abreast in assuring that the organization is protected. The IT Governance team must continually evaluate the risks to the organization and put in place Processes, Procedures and Technologies to protect the assets of the organization.  

Help Wanted: Cybersecurity Professionals Needed

Article | Sep. 18, 2019

Cybersecurity is a top technology investment area around the globe, with over half of our survey respondents saying it’s a priority. It’s no longer a niche skill—every IT professional needs some cybersecurity knowledge.

Top Cybersecurity Certifications to Enhance Your Career

Article | Oct. 04, 2019

Managers are in dire need of cybersecurity professionals with specific skills. If you’re looking to advance your career, or transfer into the cyber field, now is the time to get certified.

10 Best Cloud Certifications to Pursue in 2020

Article | Jan. 09, 2020

If you’re looking to fortify your cloud expertise, there are a number of certifications to consider. We have compiled 10 cloud certifications that are sure to positively affect your career.