27 Results Found
The flexibility, reduced cost, and mobility of cloud computing have made the concept a hot topic. Before implementing this method of computing, however, it is important to consider the security of the "cloud." During this webinar, we will help you understand some of the risks and benefits of cloud computing so you can decide if it is the right solution for you.
For the fourth year in a row, Global Knowledge and TechRepublic have partnered to create a comprehensive IT salary survey. With over 12,000 responses, the 2011 report has turned out to be one of this year's most relevant and revealing salary surveys in the industry. Below is our complete list of Salaries by Popular Certifications and Salaries by State.
Get a look at how your numbers compare to your peers and neighbors with our comprehensive lists below. A Note About Our Certification List For the condensed list of certifications in our 2013 IT Skills & Salary Report, we included only certifications that received enough responses to be statistically relevant. The list below is more inclusive. Certification data is for informational purposes only, as the values of some of the more exclusive certifications are based on few responses and, therefore, are less reliable.
In this seminar, discover how OpenStack can simplify your cloud infrastructure management. Experts from Red Hat, the leading contributor to the OpenStack project, will fill you in on how organizations have solved problems and increased business value with open-source cloud technology. They will also give you a peek into the future of Red Hat OpenStack and reveal how Red Hat training and certification can ensure the success of your cloud deployment.
IBM Tivoli Endpoint Manager (ITEM) is a product designed to let enterprises automatically manage computers, allowing thousands of them to be managed by just a few support staff. With ITEM, tasks such as patch application, software distribution, and security policy enforcement can be performed on all of an organization's computers with minimal supervision.
The Logical Volume Manager (LVM) is a powerful tool for managing storage on Linux servers. This video provides an overview of how LVM works and explores several ways that LVM makes storage management easier and more flexible. Examples include how to expand storage capacity on the fly using LVM and resize2fs, and how to migrate data from local storage to a storage area network (SAN) without downtime using pvmove.
The bad guys just keep getting better! No matter how much patching and tweaking we do, the bad guys' constantly changing tactics and techniques continue harming our networks, stealing and damaging data, and just generally screw things up. What motivates someone to do such terrible things in the first place? How have these hackers changed and improved? What kinds of attacks are popular now and why? In this hour-long webinar, security expert, former hacker and Global Knowledge instructor Phillip D. Shade will provide insight into understanding the latest hacking techniques, what the current threat landscape looks like, and suggested countermeasures to mitigate threats. He will include specific examples of the current threat landscape, including data mining, social engineering cyber threat terminology, man-in-the- middle attacks and Denial of Service (DoS) attacks.
The Bash shell is a powerful tool for managing Linux servers. This video offers a number of tips and tricks for using Bash to help make working on the Linux command-line easier and faster. It explores time saving tools like tab completion, command history, and brace expasion as well as how to combine commands together to create powerful new tools using piping.
With ever increasing demands for storage, system administrators often find themselves needing to add new storage to servers. This video provides step-by-step examples of how to partition, format, and mount new storage space using Linux.
Recruit great talent. Red Hat Certifications