Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Show Filters
Result Filters:

28 Results Found

Results per page: 10 40 80

Fundamentals of Red Hat Enterprise Linux

Webinar – Recorded | March 09, 2021

For organizations getting started with RHEL, Red Hat Training has developed a series of courses to develop the skills needed for basic administration and configuration of Red Hat Enterprise Linux. These courses introduce key command line concepts and enterprise-level tools, laying the foundation for the rapid deployment of Red Hat Enterprise Linux. The curriculum also introduces the basic administration skills needed for resolving configuration issues and integrating Red Hat Enterprise Linux systems with other existing environments. View the slide deck>>

Upcoming changes to the PMP Certification Examination

Webinar – Recorded | May 07, 2020

The PMP certification exam is changing but the PMBOK is not. Everyone planning to pursue their PMP certification in 2020 needs to know what is changing and how it will affect the way they prepare for the exam. In this session we will identify and explore the changes that PMI has announced to the PMP Certification Exam Blueprint, when and how the exam will be affected, and will look at a few examples of potential new questions. View the slide deck>

The Ultimate Guide to ITIL4 Education

Webinar – Recorded | Feb. 03, 2020

In 2020 we will see the complete ITIL4 education portfolio released and in all likelihood the start of the retirement of the ITIL v3 qualifications. Our ITIL guru, Barry Corless lead author for ITIL4 incident and problem management practices, will talk about the course content, the practical skills you’ll learn, and who will benefit from attending each courses. If you plan to continue your ITIL education then you cannot afford to miss this webinar.

Level Up with the PMP Certification

Webinar – Recorded | May 02, 2019

After several decades on the market, the Project Management Professional® certification continues to be one of the most in-demand certifications worldwide. Learn how you can increase your salary, project success, and organizational value with this recorded webinar.

Why Pentesting is Vital to the Modern DoD Workforce

Webinar – Recorded | Feb. 26, 2019

Watch this recorded webinar as CompTIA’s chief technology evangelist and Global Knowledge’s federal sales director discuss how pentesting has morphed.

Develop Your Skills with Unlimited Access to Red Hat Online Learning

Webinar – Recorded | Jan. 31, 2019

The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.

Four-Point Plan for Developing Durable Project Management Talent

Webinar – Recorded | Aug. 13, 2015

Introducing new talent to an established organization can be difficult for many reasons. Seasoned employees may view the incoming new hires as "too green" or as not having the required skills to contribute in a meaningful way. They may worry about having to "waste time" teaching the newbies things that they should already know or get aggravated when the new employees are not familiar with "the way we do things around here." Additionally, it is difficult to know if the right new hires are being put into the right positions for their interests, abilities and talents. After all, a resume and an interview can only tell a hiring manager so much about the person they are bringing on board, and often talented employees are simply being put into a role that is not a good fit.

Proving Project Value

Webinar – Recorded | Aug. 13, 2015

We often discuss how to manage projects, but we overlook an essential step: proving project value. Proving project value ensures that organizational strategies are aligned with project objectives.

The Impact of IIBA's New BABOK® Guide and PMI's New Business Analysis for Practitioners Guide

Webinar – Recorded | June 25, 2015

The past months have seen the release of both the International Institute of Business Analysis (IIBA)'s long-awaited A Guide to the Business Analysis Body of Knowledge (BABOK® Guide) v3 and the Project Management Institute® (PMI®)'s Business Analysis for Practitioners. While both represent interesting developments in the field of business analysis, they also provide lots of information to process. There's no need to go it alone! Join Global Knowledge instructors Cheryl Lee and Adam McClellan for this complimentary, hour- long webinar to learn about the differences between the two guides, how both guides compare to the previous version of the BABOK ® Guide, and where all this might be going.

How to Manage Complex Projects

Webinar – Recorded | April 16, 2015

Complexity has always been a part of projects. But today, globalization, new technologies and changing markets have combined to add to the complexity. Today's projects have more stakeholders, more ambiguity and more politics than ever, and project managers need new tools and approaches to succeed. Join Alexander Stanisic and Michelle Moore of Global Knowledge for an information-packed hour on how to manage the complexity of the 21st-century project.

Portfolio Management and the PMO: Cost Center or Revenue Driver?

Webinar – Recorded | April 09, 2015

In many organizations, the Program/Project Management Office (PMO) is viewed as purely a cost center, so it becomes marginalized by additional layers of bureaucracy, oversight and cost. But the essence of the PMO and portfolio management in general is to add value to the organization. So how do organizations reconcile the cost of the PMO versus the value it adds? The short answer is to flip the conversation on its head and talk about the PMO as a revenue driver rather than a cost center. In this hour-long webinar, Global Knowledge PMP-certified senior product manager Daniel Stober will explain how, by focusing on efficiencies gained and reduced waste, you can shift the conversation from the PMO being a necessary evil to the PMO being critical for organizational success.

How Project Managers Can Influence Their Stakeholders' Perceptions

Webinar – Recorded | Sep. 25, 2014

In this hour-long webinar, Global Knowledge instructor and PMP-certified project management expert Daniel Stober will look beyond the triple constraint model and focus on the true essence of project success: stakeholder satisfaction. Many project managers (PMs) fall into the familiar habit of managing based on the constraints of time, cost and scope. While all of these are important, managing them effectively doesn't guarantee project success if the PM fails to conduct proper stakeholder management. To manage stakeholders effectively, the PM has to set expectations. Once expectations are set, the PM must influence the perception of project performance with the stakeholder. Tune in as Dan explores methods you can use to accomplish that goal.

Common Networking Standards and Why They Are Relevant

Webinar – Recorded | July 29, 2014

Often, we don't have time to learn the reasons behind the standards we use. But learning what instigated a standard goes a long way toward not only understanding its importance, but also more easily and effectively applying it in your workplace. In this hour-long webinar, Global Knowledge instructor Keith Sorn will discuss common networking standards and explain how they were determined and why they are relevant. He will fill you in on things like why it's important to use proper color-coding standards when making cable and why the length limitations on wired cable are essential. He will also explain new standards, such as power over fiber.

Managing Stakeholder Expectations for Project Success

Webinar – Recorded | July 24, 2014

This power session is an introduction to Managing Stakeholder relations. It offers new ways of managing and dealing with projects, which focus more on communications, understanding stakeholders' needs and managing their expectations, as well as learning about organizational politics and culture, and performing value-add activities. It provides a practical approach to managing issues that matter most for project success - communication, stakeholder expectations, risk, change and quality; so that the scope, schedule and cost end up on target, achieving the desired outcomes for the organization.

The Project Manager as Business Analyst

Webinar – Recorded | June 26, 2014

The project manager (PM) and business analyst (BA) have to be key allies in the management of any project. That can be difficult when project work is duplicated because of the overlapping tasks defined by the International Institute of Business Analysis (IIBA®) and the Project Management Institute (PMI®). Still, as long as roles are clearly defined and understood, the two can cooperate and collaborate, instead of competing. In this hour-long webinar, Global Knowledge instructor and PMP-certified project management expert Daniel Stober will explain how to delineate the roles.

Cybersecurity: Physical Security

Webinar – Recorded | May 26, 2014

As an IT professional you deal day in and day out with securing operating systems, patching software, installing and configuring firewall and routers But what about the physical infrastructure? Do you understand how simple techniques can allow theft of your company resources? In this session we will discuss how to reduce the possibility of loss of data and equipment. Physical security may not be part of your job but you should be aware and having discussions with the personnel who are responsible. Or does Physical Security become one of your job responsibilities? Come to this session and learn about one of the most important and yet least thought about areas of security by IT professionals.

PMs Are From Mars, BAs Are From Venus

Webinar – Recorded | May 01, 2014

Whether you're a Project Manager or a Business Analyst, you can certainly relate to a situation where you've felt like your cohort on a project was from a completely different planet! This panel discussion webinar between our PM expert, Ori Schibi, and our BA expert, Cheryl Lee, will explore some of the misconceptions that each role has and learn how to play nicely with each other in the project world.

Prioritization: Start Working Strategically

Webinar – Recorded | April 02, 2014

Today, every project comes with limited resources and an impossible timeline. You have to prioritize, but how do you determine what's most important? The answer is to do more than just prioritize. You have to fully understand your company's strategic direction and make every action align with that strategy. In this hour-long webinar, project management expert Yvan Bastien will show you how to reach that full understanding and make the kinds of informed decisions that lead to success.

Cybersecurity Necessities: A Firewall, Antivirus, and a Well-Trained Workforce

Webinar – Recorded | Oct. 03, 2013

You have spent money on software and hardware, implemented best practices, and believe you are secure, right? You may have overlooked the weakest link: your employee. Many breaches occur as a result of an employee mistakenly clicking on a link or visiting a site that allows a virus to be unknowingly downloaded, giving hackers access to your network. Today, a well-trained workforce is a necessity and may even be your most important cybersecurity tool. In this webinar, security expert David Willson will discuss how many breaches have occurred and are occurring, the tools and techniques hackers use to trick employees into clicking on links or opening attachments, and how to prevent such behavior.

Hacking Back In Self-Defense: Is It Legal? Should It Be?

Webinar – Recorded | Feb. 01, 2012

Your business has been hacked, leaving you with a persistent bot; now what? In this hour-long webinar, security expert David Willson will discuss ways you can eliminate the threat in an act of self-defense or defense of property. As new laws are explored, old ones amended, and solutions sought, you'll take a look at thinking outside the box to give the good guys the advantage-or at least a fighting chance.

Network Forensics Analysis: A New Paradigm in Network Security

Webinar – Recorded | Oct. 26, 2011

In this hour-long webinar, security expert and Global Knowledge instructor Phillip D. Shade will provide insight into the emerging network security science of network forensics analysis, a.k.a. security event analysis and reconstruction. Using case studies, you will examine the role of data retention in network forensics analysis, and you will learn about applying forensics analysis techniques to handle application-based attacks, VoIP call interception, and worms, bots, and viruses.

Private VLANs: Advanced Switching Tips and Tricks

Webinar – Recorded | Oct. 10, 2011

In this hour-long webinar, Global Knowledge instructor John Barnes will guide you through implementing Cisco private VLANs. He will review VLANs and 802.1q, and he will discuss private VLAN fundamentals and operation, covering primary VLANs and secondary VLANs. He will cover VLAN mapping and discuss using private VLANs between multiple switches. He will also provide a use case example.

How to Avoid a Cyber Disaster

Webinar – Recorded | April 27, 2011

Planning for a cyber disaster makes recovering from one much easier. Still, as important as disaster planning is, it's often overlooked or put off until it is too late. In this webinar, Global Knowledge instructor Debbie Dahlin discusses planning for the unexpected -- whether the unexpected means a simple power outage, a network security breach, or a major natural disaster. She'll discuss risk analysis and risk management techniques and explain the importance and process of creating a business continuity plan. Using a fictional company as an example, Debbie will walk you through the disaster planning process a security professional should use, and she will provide simple tricks to reduce your company's downtime before, during, and after a disaster.

How to Successfully Migrate from IPv4 to IPv6

Webinar – Recorded | April 20, 2011

In this webinar, you will examine the need for IPv6 and whether it's possible to survive on IPv6 alone. You will learn ways to phase in IPv6 and how to successfully migrate to IPv6.

Securing Communications

Webinar – Recorded | Feb. 23, 2011

In this webinar, the second of two based on our Cybersecurity Foundations course, you'll build on what you learned in the first of the series, Protecting Your Network with Authentication and Cryptography.

Protecting Your Network with Authentication and Cryptography

Webinar – Recorded | Feb. 09, 2011

In this webinar, the first of two based on our Cybersecurity Foundations course, you will examine the following topics: verifying users and what they can access, ways a user can be validated to computer and network resources, how cryptography is used to protect data, symmetric and asymmetric encryption and hashes.

10 Security Concerns for Cloud Computing

Webinar – Recorded | May 17, 2010

The flexibility, reduced cost, and mobility of cloud computing have made the concept a hot topic. Before implementing this method of computing, however, it is important to consider the security of the "cloud." During this webinar, we will help you understand some of the risks and benefits of cloud computing so you can decide if it is the right solution for you.

Eleven Myths About 802.11 Wi-Fi Networks

Webinar – Recorded | Oct. 06, 2006

Wi-Fi networks have been misunderstood by much of the IT community since their inception. Even the reasons for this misunderstanding are kind of hard to understand. The result has been that myths about 802.11 (better known as Wi-Fi) networks have grown almost as fast as the technology itself. In this web seminar, we'll examine 11 common Wi-Fi myths and explore ways to use correct information to make your networks scalable, secure and satisfying for your users.