Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

11 Results Found

Results per page: 10 40 80

Business Process Modeling: From Macro to Micro

Webinar – Recorded | Nov. 12, 2015

Business processes are complicated, and mapping them is not a trivial task. Modelling standards give us the tools to model complex processes, but they do not tell us the best way to approach a model or effectively use the tool. In this hour-long webinar, Global Knowledge instructor Rod Fage will guide you through the best way to develop a model, from determining the goal and scope of the process and measuring its effectiveness, to modelling the process in a hierarchical top-down approach, enabling business analyst to continuously validate the model.

Are Your IT Skills Going Extinct?

Article | June 15, 2017

If you want to stay relevant as an IT professional, you have two choices: evolve your current skills or make a big change.

10 Network Security Tools and Tests Everyone Should Use

White Paper | Nov. 28, 2017

Whether you are operating a home system, overseeing a small startup, or performing security governance for an enterprise, everyone can benefit from paying attention to security. This white paper provides a list of 10 security tools and tests that will help you check out suspicious issues and keep ahead of new risks and threats.

New Topics on the New Security+ SY0-501 Exam

White Paper | Jan. 25, 2018

It has been over three years since the last revision of the CompTIA Security+ exam back on May 1, 2014. In fall of 2017, the latest version, SY0-501, was released. This revamped exam retains the same six domains as established in SY0-401, which emphasizes security in three main areas: application, data, and host.

How to Build a Winning Cybersecurity Team

White Paper | June 21, 2018

Based on the insight and relationships developed over many years, Global Knowledge has developed a best practices model of a superior cybersecurity organization—bringing our research and experience to bear and validating against hundreds of organizations, from the largest to the smallest. In studying world-class cybersecurity organizations, Global Knowledge discovered several critical characteristics that successful cybersecurity organizations all seem to share. So how does an organization like yours build a winning cybersecurity team? Let’s find out.

How to Create a Better Cyber Defense by Building a Winning Cybersecurity Team

Webinar – Recorded | Oct. 24, 2018

For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.

Why Initial and Ongoing Training are Solutions for IT Skills Gaps

Article | Feb. 28, 2019

As organizations struggle to balance budgets and prioritize training, skills gaps are growing—75% of North American decision-makers report existing skills shortages. And the impacts are potentially disastrous. With so much on the line, initial and ongoing training are instrumental to project and organizational success.

CISSP Certification is an Indicator of Cybersecurity Expertise

Article | March 14, 2019

(ISC)2’s CISSP (Certified Information System Security Practitioner) is a widely desired indicator of cybersecurity knowledge, experience and excellence on the resume of many IT professionals. Learn how to prep for the most comprehensive and in-demand cybersecurity certification.

Everything You Need to Know About the CISSP Exam Changes

Article | March 20, 2019

The CISSP (Certified Information System Security Practitioner) certification exam update in 2018 included a modest revision of the topics and a significant change to the testing process. Preparing for the CISSP exam has become more challenging. Here's everything you need to know about the changes.

Ethical Hacking: A Good Defense Starts with Offensive Security

Article | June 21, 2019

There are two types of networks: those that have been hacked and those that will be. To defend against hacks, cyber professionals can benefit greatly from ethical hacking programs.