14 Results Found
Look back at the some of the highest paying IT certifications of 2020.
Here are five date points from the 2020 IT Skills and Salary Report that illustrate important trends in professional development, skills gaps, hiring and top-paying certifications.
The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.
The 2021 revised and updated version CISSP (Certified Information System Security Practitioner) certification exam will be released on May 1, 2021. This new version of the popular CISSP exam will include a modest revision and re-organization of previously included topics, but will integrate a significant number of new topics.
For organizations getting started with RHEL, Red Hat Training has developed a series of courses to develop the skills needed for basic administration and configuration of Red Hat Enterprise Linux. These courses introduce key command line concepts and enterprise-level tools, laying the foundation for the rapid deployment of Red Hat Enterprise Linux. The curriculum also introduces the basic administration skills needed for resolving configuration issues and integrating Red Hat Enterprise Linux systems with other existing environments. View the slide deck>>
Cybersecurity is a top technology investment area around the globe, with over half of our survey respondents saying it’s a priority. It’s no longer a niche skill—every IT professional needs some cybersecurity knowledge.
In this live excerpt from Supporting and Troubleshooting Windows 10 (M10982), Windows 10 expert and Microsoft Certified instructor, John Panagakos, will lead you through one of the most popular modules in this course.
In this video, instructor Glenn Weadock explains the Windows 7 library concept and how it replaces the traditional "My Documents" user profile folder by adding the Public profile to the user profile.
Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do to keep your systems safe and implementing a layered approach. If you depend on one program or feature to secure your computer, then when (not if, but when) that dependency is breached, you may have personal information stolen or even have your computer taken over.
If you’re looking to fortify your cloud expertise, there are a number of certifications to consider. We have compiled 10 cloud certifications that are sure to positively affect your career.