Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Brands

Show Filters
Result Filters:

49 Results Found

Results per page: 10 40 80

Top Cybersecurity Certifications to Enhance Your Career in 2019

Article | Oct. 04, 2019

Managers are in dire need of cybersecurity professionals with specific skills. If you’re looking to advance your career, or transfer into the cyber field, now is the time to get certified.

18 IT and Business Certifications Worth Having

Article | Sep. 10, 2019

Here are 18 certification options, in no particular order, that are worth your effort based on site searches, feedback from subject matter experts and data in the Global Knowledge 2019 IT Skills and Salary Report.

New and Emerging Certifications for 2019

Article | Aug. 10, 2019

Looking ahead at new and emerging certifications provides insight into the areas deemed valuable in the IT industry. If you are an early adopter or in a position where you need to show that you have the bleeding-edge expertise of a technology, this list of recent and upcoming certifications is for you. 

CompTIA Certifications Are Building Blocks For IT Careers

Article | July 09, 2019

There’s a reason why one out of four certified IT professionals in North America hold at least one CompTIA certification. IT professionals who hold at least one certification have higher salaries, are more productive and generally are more satisfied in their job than their non-certified peers.

15 Top-Paying IT Certifications for 2019

Article | July 08, 2019

Based on survey responses from the Global Knowledge 2019 IT Skills and Salary Report, this year’s highest-paying certifications reveal a strong emphasis on particular topics, such as cloud computing, cybersecurity, networking and project management. In fact, cloud and project management dominate the top five spots.

What Is Project Scope Management? An Overview

Article | June 21, 2019

Project Scope Management sets the foundation for the creation, development and successful delivery of a project. Learn about the project management process here.

5 Most Popular IT Certifications for 2019

Article | May 13, 2019

While IT professionals are most likely to hold certifications in CompTIA and Microsoft, a greater percentage are pursuing credentials in AWS and Cisco in 2019. Here is a list of the five most sought-after IT certifications this year.

Security+ and Your IT Career

Webinar – Recorded | April 24, 2019

You don’t have to look far to discover how important security is in our organizations. No matter what role you play in your IT department, it is critical to have a foundational understanding of security. CompTIA’s Security+ certification continues to be a minimum standard for IT professionals around the world in a variety of industries.

Why Pentesting is Vital to the Modern DoD Workforce

Webinar – Recorded | Feb. 26, 2019

Watch this recorded webinar as CompTIA’s chief technology evangelist and Global Knowledge’s federal sales director discuss how pentesting has morphed.

Develop Your Skills with Unlimited Access to Red Hat Online Learning

Webinar – Recorded | Jan. 31, 2019

The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.

10 Certification Exam Tips and Tricks from the Experts

Article | Jan. 14, 2019

Global Knowledge subject matter experts know certification exams inside and out. They understand the study methods and test-taking techniques that pay off the most when it’s exam time. Here are 10 certification exam tips and tricks, directly from our experts and Certification Prep Guides, that will best position you for certification success.

Build an IT Career with CompTIA Certifications

White Paper | Nov. 26, 2018

CompTIA has become one of the most recognized and respected names in IT certifications, from the first A+ back in the 1990s to today with over a dozen vendor-neutral certifications covering a variety of topics. At first glance, it may seem daunting trying to figure out which certifications you should pursue and what it takes to pass the exams. But do not fear! CompTIA has streamlined their certification process. Let this white paper be your guide along your CompTIA journey. We will explain the certifications, the order to take them, how to prepare for the exams and the details of the testing experience. 

Top 10 Certifications with Staying Power

Article | Nov. 01, 2018

IT is a very fast changing industry – what is hot today may be a tiny niche market in only a few years and lesser known things may turn out to be huge trends. That having been said, there are many certifications that will be around for a long time. However, this does not imply that recertification and/or continuing education credits are not required to maintain certification. Predicting the future is always challenging, including in IT, but these certifications are good bets.

A Complete Guide: How to Become Certified in CompTIA Cloud+ CVO-002

White Paper | Aug. 21, 2018

This Certification Prep Guide provides an overview of the current CompTIA Cloud+ certification and offers helpful tips that you can use when preparing for your CompTIA Cloud+ certification exam.

DevOps is the Missing Piece for Businesses that Demand Change

White Paper | Feb. 27, 2018

Building upon the IT best practices of Lean, Agile Scrum and IT Service Management, DevOps adds that “missing” layer to tie together the service lifecycle workflow across Development and Operations, while leveraging the latest in automation technology. Demand for skilled, open-minded, and collaborative professionals with DevOps knowledge is rapidly increasing. Are you ready for change?    

Cryptography Tools and Techniques

Article | Jan. 25, 2018

Cryptography can be used for many purposes, but there are two types of cryptographic algorithms you need to understand: symmetric and asymmetric. Learn more from the experts at Global Knowledge.

New Topics on the New Security+ SY0-501 Exam

White Paper | Jan. 25, 2018

It has been over three years since the last revision of the CompTIA Security+ exam back on May 1, 2014. In fall of 2017, the latest version, SY0-501, was released. This revamped exam retains the same six domains as established in SY0-401, which emphasizes security in three main areas: application, data, and host.

How Data is Delivered

Article | Sep. 21, 2017

Every second of every day, data is being sent and received. Billions of data packets are processed by your company’s network every day. In fact, you received dozens of packets just to read this article, but the vast majority of us have no idea how this works. People have no clue as to what goes on behind the scenes to ensure data actually gets to the right device.

What is a LAN?

Article | Sep. 12, 2017

If you’ve been around IT for even a few minutes, you’ve likely heard the acronyms “LAN” and “WAN” used by fellow technicians. But with all of the possible variations of networks—different sizes, different arrangements, and different protocols—how do you tell the difference between a LAN and a WAN and everything in between? The simple answer is one of scope and size.

A Beginner's Guide to Encryption

Article | Aug. 29, 2017

It should come as no surprise that in this modern era of digital data we need encryption. But what exactly is it? How do you know what kind of encryption you need? If you were to ask someone what kind of encryption they use, they may respond with a specific encryption-based product, like full-disk encryption. Or they may mention an encryption-based protocol, like HTTPS (HyperText Transport Protocol over SSL). But encryption is much more complicated than that.

Why You Should Consider a Career as a Computer Support Specialist

Article | Aug. 06, 2017

If you are considering career options or have been in the workforce a few years and are seeking a career change, you might want to consider training to become a computer support specialist.

Top 5 Growth Opportunities for IT Pros

Article | July 13, 2017

IT professionals benefit from gaining skills in data analysis, cybersecurity, cloud computing, virtualization and hyperconvergence, and mobile app development.

Password Complexity: You're Doing It Wrong!

Article | July 12, 2017

Just like the physical keys to your car or house, passwords add a bit of inconvenience in exchange for security. However, if you've ever been frustrated by password rules (complexity, special characters and numbers, etc.), you might be happy about the latest news.

What's New in the CompTIA Network+ (N10-006) Exam

White Paper | Sep. 25, 2015

CompTIA has raised the bar for Network+ candidates. The new certification exam has significant changes to the five "domains" or knowledge areas with new content related to security, cloud, data-center and operational concerns and troubleshooting. There is also a greater emphasis on wireless networking and VoIP. Use this white paper to help you gain an overview of what's new and what's different.

Insider Tips on Microsoft SQL Server 2016

Webinar – Recorded | Aug. 20, 2015

In this hour-long webinar, Global Knowledge course director Brian Egler will examine key new features of Microsoft SQL Server 2016 that demonstrate how it provides automatic end-to-end security, seamless generation of business analytics and elastic integration of data in the cloud.

Are You Ready for Microsoft SQL Server 2016?

White Paper | Aug. 19, 2015

With Microsoft SQL Server 2016, you can distribute your data to the cloud using the Stretch Database feature to improve local access while allowing cloud access to large amounts of historical data. You can also provide transparent end-to-end security using Always Encrypted technology and track changes automatically through temporal data. Download this white paper to learn why these features and more make SQL Server 2016 Microsoft's most important release to date.

2015 IT Skills and Salary Report

Special Report | May 06, 2015

The results are in and analysis is complete from our eighth annual IT Skills and Salary Survey. This was our third in partnership with Windows IT Pro and one of the industry's largest with more than 11,000 North American respondents. Download your copy to learn how your salary compares to your peers, whether you have the skills IT decision-makers are looking for and much more  

New Topics on the 2014 Security+ SYO-401 Exam

White Paper | Sep. 24, 2014

It has been three years since the last revision of the CompTIA Security+ exam. In early summer of 2014, the latest version SY0-401 was released. This revamped exam retains the same six domains as established in SY0-301, which emphasize security in three main areas: application, data, and host. New topics add attention and focus on cloud computing and mobile devices, while greater emphasis has been added to incident response and physical security. In your efforts to prepare for SY0-401, it would be a good idea to pay special attention to the new topics and issues added for this latest revision.

Common Networking Standards and Why They Are Relevant

Webinar – Recorded | July 29, 2014

Often, we don't have time to learn the reasons behind the standards we use. But learning what instigated a standard goes a long way toward not only understanding its importance, but also more easily and effectively applying it in your workplace. In this hour-long webinar, Global Knowledge instructor Keith Sorn will discuss common networking standards and explain how they were determined and why they are relevant. He will fill you in on things like why it's important to use proper color-coding standards when making cable and why the length limitations on wired cable are essential. He will also explain new standards, such as power over fiber.

ReportBuilder 3.0

Video | July 24, 2014

In this video, you will learn about the latest version of ReportBuilder available in SQL Server 2008 R2.

How to Use Policy Based Management in SQL Server 2008

Video | June 12, 2014

In this video, you'll learn how to utilize a great new feature of SQL Server 2008 called Policy Based Management for Multi-Server Management capabilities.

How To Use PowerPivot in SQL Server 2008 R2 and Office 2010

Video | June 12, 2014

In this video, you will learn how to a use a new feature of SQL Server 2008 R2 and Office 2010 called PowerPivot for Self-Service Business Intelligence.

Cybersecurity: Physical Security

Webinar – Recorded | May 26, 2014

As an IT professional you deal day in and day out with securing operating systems, patching software, installing and configuring firewall and routers But what about the physical infrastructure? Do you understand how simple techniques can allow theft of your company resources? In this session we will discuss how to reduce the possibility of loss of data and equipment. Physical security may not be part of your job but you should be aware and having discussions with the personnel who are responsible. Or does Physical Security become one of your job responsibilities? Come to this session and learn about one of the most important and yet least thought about areas of security by IT professionals.

Unlock the Power of Microsoft SQL Server 2014

Webinar – Recorded | April 24, 2014

Join Microsoft SQL Server expert Brian Egler for an hour-long webinar covering the key features and updates in the upcoming release of Microsoft SQL Server 2014! You will get a thorough review, along with demonstrations, of how SQL Server 2014 provides substantial improvements in performance, manageability, and availability that will make your job easier.

Secure Your SQL Server Today!

Webinar – Recorded | Feb. 05, 2014

Your Microsoft SQL Server database often contains the most valuable information in your organization. Get tips for securing it properly and effectively in this free, information-packed webinar with Microsoft SQL Server expert Gidget Pryor. In just an hour, Gidget will demonstrate the layered security approach used by SQL Server. She will step you through the process and best practices of setting up logins, users, roles, schemas, and permissions, and she will review the security model changes that have taken place from SQL Server 2005 through SQL Server 2012. She will also review SQL Server 2012 training and certifications.

15 Most Popular IT and Business Certifications for 2014

Special Report | Jan. 01, 2014

In this report, I've reviewed the 15 most popular certifications according to our more than 12,000 North American respondents to our annual IT Skills and Salary Survey. For each certification, you'll find a brief description, the average salary, and some insight into why it is popular.

Cybersecurity Necessities: A Firewall, Antivirus, and a Well-Trained Workforce

Webinar – Recorded | Oct. 03, 2013

You have spent money on software and hardware, implemented best practices, and believe you are secure, right? You may have overlooked the weakest link: your employee. Many breaches occur as a result of an employee mistakenly clicking on a link or visiting a site that allows a virus to be unknowingly downloaded, giving hackers access to your network. Today, a well-trained workforce is a necessity and may even be your most important cybersecurity tool. In this webinar, security expert David Willson will discuss how many breaches have occurred and are occurring, the tools and techniques hackers use to trick employees into clicking on links or opening attachments, and how to prevent such behavior.

How To Use Transparent Data Encryption in SQL Server 2008

Video | July 18, 2013

In this video, you will learn how to a use a new feature of SQL Server 2008 called Transparent Data Encryption for enhanced security.

High Availability Options in SQL Server 2008

Video | July 11, 2013

In this video, you will learn about the High Availability options in SQL Server 2008: Server Clustering, Database Mirroring, Log Shipping and Peer-to-Peer Replication.

Hacking Back In Self-Defense: Is It Legal? Should It Be?

Webinar – Recorded | Feb. 01, 2012

Your business has been hacked, leaving you with a persistent bot; now what? In this hour-long webinar, security expert David Willson will discuss ways you can eliminate the threat in an act of self-defense or defense of property. As new laws are explored, old ones amended, and solutions sought, you'll take a look at thinking outside the box to give the good guys the advantage-or at least a fighting chance.