20 Results Found
Look back at the some of the highest paying IT certifications of 2020.
For organizations getting started with RHEL, Red Hat Training has developed a series of courses to develop the skills needed for basic administration and configuration of Red Hat Enterprise Linux. These courses introduce key command line concepts and enterprise-level tools, laying the foundation for the rapid deployment of Red Hat Enterprise Linux. The curriculum also introduces the basic administration skills needed for resolving configuration issues and integrating Red Hat Enterprise Linux systems with other existing environments. View the slide deck>>
The 2021 revised and updated version CISSP (Certified Information System Security Practitioner) certification exam will be released on May 1, 2021. This new version of the popular CISSP exam will include a modest revision and re-organization of previously included topics, but will integrate a significant number of new topics.
Here are five date points from the 2020 IT Skills and Salary Report that illustrate important trends in professional development, skills gaps, hiring and top-paying certifications.
For women in IT, advancing your career can be a challenge in itself. In the Global Knowledge 2019 IT Skills and Salary Report, only eight percent of senior- and executive-level IT professionals are women. We have pulled data from our research that sheds light on the job roles, skills, challenges, certifications and experience of women in tech who have progressed to the highest levels of an organization.
If you’re looking to fortify your cloud expertise, there are a number of certifications to consider. We have compiled 10 cloud certifications that are sure to positively affect your career.
Managers are in dire need of cybersecurity professionals with specific skills. If you’re looking to advance your career, or transfer into the cyber field, now is the time to get certified.
Cybersecurity is a top technology investment area around the globe, with over half of our survey respondents saying it’s a priority. It’s no longer a niche skill—every IT professional needs some cybersecurity knowledge.
As cybersecurity threats continue to be a top concern facing organizations today, the Information Technology (IT) Governance team must stay abreast in assuring that the organization is protected. The IT Governance team must continually evaluate the risks to the organization and put in place Processes, Procedures and Technologies to protect the assets of the organization.
The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.
Learn how Cisco FabricPath combines the benefits of Layer 2 Switching and Layer 3 Routing, allowing for the scalability and flexibility of Layer 2 while supporting traditional Layer 3 components such as optimal paths, equal cost multipath routing and a Time to Live (TTL) field.
The responsibility for securing organizational data has spread beyond the traditional IT professional. While there are more diverse security solutions, there are more diverse and sophisticated security threats. Security awareness and training is essential for everyone within an organization. Learn how Cisco has continued to evolve its security solutions and training.
Security attacks have become more advanced; therefore, security solutions have needed to evolve to deal with those threats. Cisco's acquisition of Sourcefire brings a new paradigm to the security landscape. No longer is security a one-time, instantaneous event. Security now is threat based, network cognizant, and continuous. All organizations, public and private, need to be aware not only of the constantly changing threat environment, but must be prepared to respond in kind.
This paper explains uplink strategies for traffic coming in and out of a Cisco Unified Computing Solution (UCS) chassis. An uplink can be Ethernet, Fibre Channel, or FCoE and is a physical connection on the FI that leaves the UCS domain directed away from the B Chassis.
Cisco Unified Computing Solution (UCS) is a very popular and powerful solution. Cisco continues to provide updated UCS management options for the full range of data center installations.
While there are differences between the IP Multicast configuration in the IOS and the Nexus OS, the Protocol Independent Multicast (PIM) protocol remains fundamentally the same. If you feel comfortable configuring Multicast in the IOS, you should be able to acclimate fairly easily to the changes in the Nexus OS.
Multicast Sparse Mode and its derivatives are supported in the Nexus OS. This white paper explains how it has been implemented in the Nexus platform to provide optimum performance in both virtual PortChannel and FabricPath environments.
John Barnes, Global Knowledge's Cisco Course Developer, discusses enhancements to our UCS Troubleshooting Boot Camp and suggestions for students in preparation for this course.
Global Knowledge instructor Doug Notini discusses the benefits of our FIREWALL 2.0 - Deploying Cisco ASA Firewall Solutions course.
Course director Jim Thomas explains how our custom labs, which utilize external hosts, ISR routers, and DMZ, provide a real-world environment for students.