12 Results Found
During this Blockchain overview webinar we will discuss what blockchain is, how it can provide value, and how it is currently being used by organizations around the world to effect transformative organizational change. View the slide deck>
Business processes are complicated, and mapping them is not a trivial task. Modelling standards give us the tools to model complex processes, but they do not tell us the best way to approach a model or effectively use the tool. In this hour-long webinar, Global Knowledge instructor Rod Fage will guide you through the best way to develop a model, from determining the goal and scope of the process and measuring its effectiveness, to modelling the process in a hierarchical top-down approach, enabling business analyst to continuously validate the model.
I am a VMware Certified Instructor and every single time I teach, I get questions regarding certification. IT certifications always seem to be a controversial topic, and the question is always, "Why should I become certified?"
(ISC)2’s CISSP (Certified Information System Security Practitioner) is a widely desired indicator of cybersecurity knowledge, experience and excellence on the resume of many IT professionals. Learn how to prep for the most comprehensive and in-demand cybersecurity certification.
This quick reference guide will highlight the various certification tracks to help you find your path through the EC-Council programs.
The CISSP (Certified Information System Security Practitioner) certification exam update in 2018 included a modest revision of the topics and a significant change to the testing process. Preparing for the CISSP exam has become more challenging. Here's everything you need to know about the changes.
This Certification Prep Guide provides an overview of ISACA’s Certified Information Security Manager (CISM) certification and offers helpful tips that you can use when preparing for your CISM certification exam.
This Certification Prep Guide provides an overview of ISACA’s Certified in Risk and Information Systems Control (CRISC) certification and offers helpful tips that you can use when preparing for your CRISC certification exam.
For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.
You don’t have to look far to discover how important security is in our organizations. No matter what role you play in your IT department, it is critical to have a foundational understanding of security. CompTIA’s Security+ certification continues to be a minimum standard for IT professionals around the world in a variety of industries.