Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Show Filters
Result Filters:

21 Results Found

Results per page: 10 40 80

Windows 7 Certification and Skills Learning Tracks

Video | Feb. 28, 2013

Chief Technical Architect Craig Brown discusses the Windows 7 certification and skills tracks available to Global Knowledge students.

What's New in Windows 10

Webinar – Recorded | Oct. 15, 2015

Whether you've already upgraded to Windows 10 or you're interested to learn more, this webinar will help familiarize you with the major updates and features. Join Microsoft instructor, John Panagakos, for an hour-long webinar that will dive into the exciting new features Windows 10 has to offer.

What You Don't Know About Cybersecurity CAN Hurt You

Webinar – Recorded | Oct. 21, 2014

The bad guys just keep getting better! No matter how much patching and tweaking we do, the bad guys' constantly changing tactics and techniques continue harming our networks, stealing and damaging data, and just generally screw things up. What motivates someone to do such terrible things in the first place? How have these hackers changed and improved? What kinds of attacks are popular now and why? In this hour-long webinar, security expert, former hacker and Global Knowledge instructor Phillip D. Shade will provide insight into understanding the latest hacking techniques, what the current threat landscape looks like, and suggested countermeasures to mitigate threats. He will include specific examples of the current threat landscape, including data mining, social engineering cyber threat terminology, man-in-the- middle attacks and Denial of Service (DoS) attacks.

What Can You Do with Microsoft Power BI?

Webinar – Recorded | April 25, 2019

Power BI is a business analytics solution that lets you visualize your data and share insights across your organization or embed them in your app or website. Connect to hundreds of data sources and bring your data to life with live dashboards and reports. Join us during this recorded webinar to see what Power BI can do for you and your organization.

What Can Excel Do for You?

Webinar – Recorded | Jan. 23, 2019

Microsoft’s Excel program is a staple in many business environments, but very few people take full advantage of this tool. This webinar is a great opportunity to introduce yourself to formulas, data validation, pivot tables, and power query.  

Unravelling The Mysteries Of Microsoft Office 365

Webinar – Recorded | Nov. 12, 2019

Whether you are a seasoned computer user or new to the MS Office environment, we are sure you have some questions regarding Office 365. This webinar will help demystify the differences between Office 365 in the Cloud and on your PC. Find out when to use one over the other. Have you wondered when should you use OneDrive over SharePoint. Can you just use PowerBi Desktop or should you subscribe to the PowerBI Service? What is Delve? Is Flow a useful tool and how could you use it?

Six Tips for Passing a Microsoft Certification Exam (from Someone Who Hates Taking Tests)

Article | Oct. 13, 2020

Prepping for a Microsoft certification exam? Global Knowledge's own Tracy Wallace has you covered with these six tips for passing any Microsoft exam.

Seven Security Myths of Windows 7

White Paper | May 10, 2012

Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do to keep your systems safe and implementing a layered approach. If you depend on one program or feature to secure your computer, then when (not if, but when) that dependency is breached, you may have personal information stolen or even have your computer taken over.

Protect Software Applications with IBM Security AppScan

Webinar – Recorded | May 28, 2015

Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.

Printing PowerPoint Slides with Notes

Article | June 11, 2009

If you create presentations using the notes feature in PowerPoint, you probably have found yourself wanting to print multiple slides on one page (handouts) with the notes associated with those slides displayed on the same page. This layout can often help you better p...