49 Results Found
Managers are in dire need of cybersecurity professionals with specific skills. If you’re looking to advance your career, or transfer into the cyber field, now is the time to get certified.
Here are 18 certification options, in no particular order, that are worth your effort based on site searches, feedback from subject matter experts and data in the Global Knowledge 2019 IT Skills and Salary Report.
Looking ahead at new and emerging certifications provides insight into the areas deemed valuable in the IT industry. If you are an early adopter or in a position where you need to show that you have the bleeding-edge expertise of a technology, this list of recent and upcoming certifications is for you.
There’s a reason why one out of four certified IT professionals in North America hold at least one CompTIA certification. IT professionals who hold at least one certification have higher salaries, are more productive and generally are more satisfied in their job than their non-certified peers.
Based on survey responses from the Global Knowledge 2019 IT Skills and Salary Report, this year’s highest-paying certifications reveal a strong emphasis on particular topics, such as cloud computing, cybersecurity, networking and project management. In fact, cloud and project management dominate the top five spots.
Project Scope Management sets the foundation for the creation, development and successful delivery of a project. Learn about the project management process here.
While IT professionals are most likely to hold certifications in CompTIA and Microsoft, a greater percentage are pursuing credentials in AWS and Cisco in 2019. Here is a list of the five most sought-after IT certifications this year.
You don’t have to look far to discover how important security is in our organizations. No matter what role you play in your IT department, it is critical to have a foundational understanding of security. CompTIA’s Security+ certification continues to be a minimum standard for IT professionals around the world in a variety of industries.
Watch this recorded webinar as CompTIA’s chief technology evangelist and Global Knowledge’s federal sales director discuss how pentesting has morphed.
The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.
Global Knowledge subject matter experts know certification exams inside and out. They understand the study methods and test-taking techniques that pay off the most when it’s exam time. Here are 10 certification exam tips and tricks, directly from our experts and Certification Prep Guides, that will best position you for certification success.
CompTIA has become one of the most recognized and respected names in IT certifications, from the first A+ back in the 1990s to today with over a dozen vendor-neutral certifications covering a variety of topics. At first glance, it may seem daunting trying to figure out which certifications you should pursue and what it takes to pass the exams. But do not fear! CompTIA has streamlined their certification process. Let this white paper be your guide along your CompTIA journey. We will explain the certifications, the order to take them, how to prepare for the exams and the details of the testing experience.
IT is a very fast changing industry – what is hot today may be a tiny niche market in only a few years and lesser known things may turn out to be huge trends. That having been said, there are many certifications that will be around for a long time. However, this does not imply that recertification and/or continuing education credits are not required to maintain certification. Predicting the future is always challenging, including in IT, but these certifications are good bets.
This Certification Prep Guide provides an overview of the current CompTIA Cloud+ certification and offers helpful tips that you can use when preparing for your CompTIA Cloud+ certification exam.
Cryptography can be used for many purposes, but there are two types of cryptographic algorithms you need to understand: symmetric and asymmetric. Learn more from the experts at Global Knowledge.
It has been over three years since the last revision of the CompTIA Security+ exam back on May 1, 2014. In fall of 2017, the latest version, SY0-501, was released. This revamped exam retains the same six domains as established in SY0-401, which emphasizes security in three main areas: application, data, and host.
Every second of every day, data is being sent and received. Billions of data packets are processed by your company’s network every day. In fact, you received dozens of packets just to read this article, but the vast majority of us have no idea how this works. People have no clue as to what goes on behind the scenes to ensure data actually gets to the right device.
If you’ve been around IT for even a few minutes, you’ve likely heard the acronyms “LAN” and “WAN” used by fellow technicians. But with all of the possible variations of networks—different sizes, different arrangements, and different protocols—how do you tell the difference between a LAN and a WAN and everything in between? The simple answer is one of scope and size.
It should come as no surprise that in this modern era of digital data we need encryption. But what exactly is it? How do you know what kind of encryption you need? If you were to ask someone what kind of encryption they use, they may respond with a specific encryption-based product, like full-disk encryption. Or they may mention an encryption-based protocol, like HTTPS (HyperText Transport Protocol over SSL). But encryption is much more complicated than that.
If you are considering career options or have been in the workforce a few years and are seeking a career change, you might want to consider training to become a computer support specialist.
IT professionals benefit from gaining skills in data analysis, cybersecurity, cloud computing, virtualization and hyperconvergence, and mobile app development.
Just like the physical keys to your car or house, passwords add a bit of inconvenience in exchange for security. However, if you've ever been frustrated by password rules (complexity, special characters and numbers, etc.), you might be happy about the latest news.
Learn how Cisco FabricPath combines the benefits of Layer 2 Switching and Layer 3 Routing, allowing for the scalability and flexibility of Layer 2 while supporting traditional Layer 3 components such as optimal paths, equal cost multipath routing and a Time to Live (TTL) field.
Technology is a wonderful thing, but it comes with a price: cybersecurity. Free Web browsers, social media sites and other digital services collect personal information like email addresses, phone numbers, place of employment, buying habits, mortgage data that is shared with advertisers. The availability of this information leaves us vulnerable to hackers. This white paper can help you learn more about what kind of personal data is typically collected, and how to secure your information online.
CompTIA has raised the bar for Network+ candidates. The new certification exam has significant changes to the five "domains" or knowledge areas with new content related to security, cloud, data-center and operational concerns and troubleshooting. There is also a greater emphasis on wireless networking and VoIP. Use this white paper to help you gain an overview of what's new and what's different.
Experts agree that as long as there is data, there will be people trying to steal it. For every defense mechanism put in place, there is someone who will find a way to get around it. Constant vigilance, education of the workforce, and management support are all necessary to implement effective security policies. While a well-trained IT staff is key to protecting data, all employees must understand the importance of protecting company assets, including data.
Discover why healthcare organizations must take an immediate active role in securing their data. It is much more costly, monetarily as well as with regard to reputation, for an organization to react to a breach rather than plan for it.
The four-part Cloud TechTalks series shares practical insights and best practices for using the cloud. With exponential growth and unparalleled demand, there are few areas with greater opportunity than storage in the cloud. Join us for this complimentary, hour-long webinar to hear Susan Schreitmueller, IBM distinguished engineer and senior cloud advisor, share IBM's cloud storage solutions. Along with exploring trends and directions around IBM's roadmap for storage in the cloud, Schreitmueller will review Cloud Managed Services and SoftLayer options, as well as software-defined storage and IBM's suite of products.
The results are in and analysis is complete from our eighth annual IT Skills and Salary Survey. This was our third in partnership with Windows IT Pro and one of the industry's largest with more than 11,000 North American respondents. Download your copy to learn how your salary compares to your peers, whether you have the skills IT decision-makers are looking for and much more
This paper explains uplink strategies for traffic coming in and out of a Cisco Unified Computing Solution (UCS) chassis. An uplink can be Ethernet, Fibre Channel, or FCoE and is a physical connection on the FI that leaves the UCS domain directed away from the B Chassis.
Cisco Unified Computing Solution (UCS) is a very popular and powerful solution. Cisco continues to provide updated UCS management options for the full range of data center installations.
While there are differences between the IP Multicast configuration in the IOS and the Nexus OS, the Protocol Independent Multicast (PIM) protocol remains fundamentally the same. If you feel comfortable configuring Multicast in the IOS, you should be able to acclimate fairly easily to the changes in the Nexus OS.
Multicast Sparse Mode and its derivatives are supported in the Nexus OS. This white paper explains how it has been implemented in the Nexus platform to provide optimum performance in both virtual PortChannel and FabricPath environments.
Times are changing. Attacks are becoming much more sophisticated and hackers are exploiting human vulnerabilities to gain access to enterprise networks and private information. Employees and end users want to help protect your company's sensitive data, we just need to motivate them as to why they should care. By educating your employees on security best practices and current human vulnerabilities, you can take a step forward to ensuring you're not a part of the many organizations that are breached.
It has been three years since the last revision of the CompTIA Security+ exam. In early summer of 2014, the latest version SY0-401 was released. This revamped exam retains the same six domains as established in SY0-301, which emphasize security in three main areas: application, data, and host. New topics add attention and focus on cloud computing and mobile devices, while greater emphasis has been added to incident response and physical security. In your efforts to prepare for SY0-401, it would be a good idea to pay special attention to the new topics and issues added for this latest revision.
Often, we don't have time to learn the reasons behind the standards we use. But learning what instigated a standard goes a long way toward not only understanding its importance, but also more easily and effectively applying it in your workplace. In this hour-long webinar, Global Knowledge instructor Keith Sorn will discuss common networking standards and explain how they were determined and why they are relevant. He will fill you in on things like why it's important to use proper color-coding standards when making cable and why the length limitations on wired cable are essential. He will also explain new standards, such as power over fiber.
As an IT professional you deal day in and day out with securing operating systems, patching software, installing and configuring firewall and routers But what about the physical infrastructure? Do you understand how simple techniques can allow theft of your company resources? In this session we will discuss how to reduce the possibility of loss of data and equipment. Physical security may not be part of your job but you should be aware and having discussions with the personnel who are responsible. Or does Physical Security become one of your job responsibilities? Come to this session and learn about one of the most important and yet least thought about areas of security by IT professionals.
In this report, I've reviewed the 15 most popular certifications according to our more than 12,000 North American respondents to our annual IT Skills and Salary Survey. For each certification, you'll find a brief description, the average salary, and some insight into why it is popular.
You have spent money on software and hardware, implemented best practices, and believe you are secure, right? You may have overlooked the weakest link: your employee. Many breaches occur as a result of an employee mistakenly clicking on a link or visiting a site that allows a virus to be unknowingly downloaded, giving hackers access to your network. Today, a well-trained workforce is a necessity and may even be your most important cybersecurity tool. In this webinar, security expert David Willson will discuss how many breaches have occurred and are occurring, the tools and techniques hackers use to trick employees into clicking on links or opening attachments, and how to prevent such behavior.
John Barnes, Global Knowledge's Cisco Course Developer, discusses enhancements to our UCS Troubleshooting Boot Camp and suggestions for students in preparation for this course.