Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Show Filters
Result Filters:

18 Results Found

Results per page: 10 40 80

Working from home – a hacker’s paradise!

Webinar – Recorded | Oct. 09, 2020

The novel coronavirus has changed many aspects of life for millions of people globally, including where they work. With the increase in remote work, it is important for both individuals and companies to be aware of the added cybersecurity risks. Join us as Paula shares real world examples and tips on how we all can be better prepared.

Why Pentesting is Vital to the Modern DoD Workforce

Webinar – Recorded | Feb. 26, 2019

Watch this recorded webinar as CompTIA’s chief technology evangelist and Global Knowledge’s federal sales director discuss how pentesting has morphed.

Trends in Cybersecurity

Webinar – Recorded | Feb. 03, 2021

Organizations and individuals are threatened with ever-growing cyber threats and must be prepared to address them. The more we are connected to networks, the more suspectable we are to attacks, therefore enterprises must stay current applying various cybersecurity measures and maintaining awareness of cybersecurity trends. View the slide deck>    

Top Cybersecurity Certifications to Enhance Your Career

Article | Oct. 04, 2019

Managers are in dire need of cybersecurity professionals with specific skills. If you’re looking to advance your career, or transfer into the cyber field, now is the time to get certified.

Three Key Strategies for Preventing Problems with IBM WebSphere Business Process Manager V8.5

White Paper | Oct. 12, 2015

A major challenge of problem determination is dealing with unanticipated problems. It is much like detective work: finding clues, making educated guesses, verifying suspicions, and other considerations. An ideal strategy for problem prevention is to monitor the system regularly. Use the strategies outlined in this paper to minimize downtime and detective work so you can maximize performance.

The Intersection of DevOps and ITIL®

White Paper | July 07, 2015

Change is the order of the day, and if anything, the pace of business and technology change is accelerating. The business and customers are looking to IT service providers to be more responsive, delivering more frequent service changes with higher quality-resulting in services that deliver more value to the business. In order to continue to be relevant and of high value, ITIL must continue to benefit from other complementary best-practices for IT. DevOps, an approach that encourages improved communication, collaboration, and teamwork across development and operations, can have a positive influence in improving ITIL processes across the service life-cycle.

The Importance of Maintaining Cybersecurity Skills in a Virtual World

Webinar – Recorded | Oct. 19, 2020

The Information Technology (IT) profession is a pretty exciting place to be, right now. We’re seeing an unprecedented influx of new technologies and approaches, including AI, robotics, automation, and next-level networking. More importantly, today’s IT workers have become the guardians of identity and curators of information. Given the increased movement to remote working the IT community must be conscious their teams skillset in the midst of increasing and complex cybersecurity threats designed to hit organizations where it hurts...their people. If you’re curious about what it’s like to be part of the IT profession in quickly changing virtual world, then watch CompTIA’s Chief Technology Evangelist, Dr. James Stanger, to learn more. James discusses the pillars of IT that help create our (post)-modern world, and dispel a few myths about the cybersecurity profession. If you’re interested in learning more about the different cybersecurity pathways available to you, and how you can become a unique contributor to the cybersecurity profession, then we welcome you.

PAN-OS - Network Security/Prevention Everywhere

Webinar – Recorded | May 23, 2019

Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This recorded webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment.

Palo Alto Networks - Firewall Essentials

Webinar – Recorded | Feb. 09, 2021

Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This recorded webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment. View the slide deck>

Keeping Safe While Video Conferencing

Webinar – Recorded | Oct. 26, 2020

The coronavirus pandemic changed how people around the world work and receive skills training. Virtual meeting services saw incredible growth, they also faced new security challenges. As a key Global Knowledge partner, we worked closely with Gary and the Zoom team as they rapidly upgraded their platform to ensure the maximum possible level of safety for all users. However, technology is only as powerful, or safe as the people who use it. So, in this webinar Gary will provide expert (and entertaining!) advice on how to use virtual meetings safely when there is not a Global Knowledge instructor on-hand to help. Joining Gary is Kevin, our CXO: another big personality with a wealth of IT experience and a passion for ensuring our customers receive the best possible experience, every time they connect with Global Knowledge.