Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

1010 Results Found

Results per page: 10 40 80

There’s Nothing Average About a Global Knowledge Instructor

Article | Jan. 11, 2019

Do you remember that teacher that made the most difficult concepts easy to understand? The one who amazed you with their complete understanding of the subject matter. We remember those teachers too and the concepts they imparted on us. We know that a good teacher can have a lifelong impact on their students. That’s why we employ only the best and brightest instructors at Global Knowledge.

The Role of Cisco Unified Communications Manager in Video Conferencing

Article | April 10, 2014

If you’re in IT, you’ve likely heard the saying, “In technology, the only thing constant is change itself,” and boy is that right! For technical companies, if you are not moving forward, then you’re falling behind. There is no such thing as standing still! A perfect example of this mindset is in Cisco’s evolution of video conferencing and telepresence.

The shun Command on the PIX/ASA

Article | March 24, 2011

One command that had a fairly long history first with the PIX Firewall and now the ASA is the shun command. In this post we’ll examine this command’s history, why it’s useful, and its new-found resurgence in threat detection implementation.

This Is What You Can Do To Promote Cybersecurity Awareness Month

Article | Sep. 08, 2021

National Cybersecurity Awareness Month has grown into a global effort, with both individuals and organizations taking part — and for good reason.

This is Why You Should Cross-Certify

Article | Dec. 15, 2017

Each year as the data from the Global Knowledge IT Skills and Salary Survey is put through the analysis process, certain trends become clearer. One of those is the prevalence of IT professionals who pursue certifications across multiple categories.

Three Key Strategies for Preventing Problems with IBM WebSphere Business Process Manager V8.5

White Paper | Oct. 12, 2015

A major challenge of problem determination is dealing with unanticipated problems. It is much like detective work: finding clues, making educated guesses, verifying suspicions, and other considerations. An ideal strategy for problem prevention is to monitor the system regularly. Use the strategies outlined in this paper to minimize downtime and detective work so you can maximize performance.

The Three Rs for Recovery in Windows 8: Refreshing, Resetting, and Restoring

Webinar – Recorded | Jan. 20, 2016

Join us for a detailed, hour-long webinar in which Microsoft Windows expert and Global Knowledge instructor Jeff Peters will review and demonstrate the key tools needed to rescue a problematic computer. He will explore the ins and outs of the powerful Windows 8 Reset, Refresh, and Restore options, enabling you not only to get your business running smoothly again with minimal troubleshooting, but also to save the day for you and your end users.

Three Steps to Ensure the Success of Your IT Projects

White Paper | Jan. 06, 2021

Projects are often complex, made up of a large number of moving pieces. This brings numerous challenges. By using the three key steps mentioned in this white paper, your projects will run more smoothly from start to finish.

Three Key Areas ITIL® 4 Addresses

Article | Oct. 22, 2018

Digital transformation means different things to different people. One fact they all agree on is that the capability needed to manage this new paradigm will lead to new ways of working, new skills, new technology and embracing more collaborative ways of co-creating value. That challenge has been the driving force for the latest iteration of ITIL®.

Time of Day Call Routing

Article | Aug. 17, 2010

I recently came across an opportunity to use a relatively new feature in Cisco Unified Communications Manager (CUCM). Suppose you are the telecom administrator at a community hospital. During business hours, the Facilities Department is staffed and team members simpl...

Tips and Tricks to Speed AWS Deployment

White Paper | Feb. 06, 2014

Amazon Web Services (AWS) offers increased agility, developer productivity, pay-as-you-go pricing and overall cost savings. But you might wonder where to start, what pitfalls exist and how can you avoid them? How can you best save time and money? Learn what you need to know and where to start before launching an AWS-hosted service.

Tips on Preparing for and Passing the VCP5-DCV Exam

White Paper | May 22, 2014

This paper is aimed at IT professionals who are interested in earning a VMware Certified Professional on Data Center Virtualization (VCP5-DCV) certification. It provides the benefits of having the certification, details for earning the certification and tips for passing the exam.

4 Tips to Select a Course Like a Pro

Article | Feb. 02, 2019

Ask yourself these four questions and you'll pick the best course for your needs.

To Certify or Not to Certify? That's the $100,000 Question

Webinar – Recorded | Jan. 29, 2015

Does an IT certification guarantee you a ticket to a $100,000 job? Not anymore! Are IT certifications a thing of the past? Not even close. But, the certification landscape is definitely changing - and it's changing rapidly. Organizations are empowered with more technology options than ever before, vendors are changing their products to address the need for cloud-based services, and open-source technology is becoming mainstream. In this hour- long session, we will review the current certification landscape and answer questions.

Tom Rosamilia on IBM Training: Our Trusted Global Training Providers

Video | July 24, 2014

Part of IBM's new training approach includes a carefully selected group of four Global Training Providers. Tom Rosamilia explains the detailed process and criteria IBM used to select the four Global Training Providers, including worldwide reach and innovation in delivery methods. These IBM Global Training Providers are experts in skills education and will help IBM meet our goal of providing clients the right skill set to quickly and efficiently leverage the full power of IBM solutions.

Top 10 Business Analysis Terms

Article | June 15, 2017

Whether you are just getting started in business analysis or want to gain a better understanding of certain aspects of business analysis, we have compiled a list of frequently used terms to help you get started.

Top 10 Career Tips I Learned from Willy Wonka

Article | Oct. 16, 2018

It doesn't take pure imagination to realize that when it comes to your career, inspiration may come from the least likely of places. It also doesn't seem possible that four decades ago "Willy Wonka and the Chocolate Factory" hit the silver screen. Growing up, it was one of the few movies I always made sure to watch whenever it was on TV. I'm sure I wasn't alone.

Top 10 Certifications with Staying Power

Article | Nov. 01, 2018

IT is a very fast changing industry – what is hot today may be a tiny niche market in only a few years and lesser known things may turn out to be huge trends. That having been said, there are many certifications that will be around for a long time. However, this does not imply that recertification and/or continuing education credits are not required to maintain certification. Predicting the future is always challenging, including in IT, but these certifications are good bets.

Top 10 Courses for System Administrators

Article | July 27, 2021

System Administrators, or SysAdmins, are the “installation specialists,” “configuration specialists” and “fixers” in IT. If you’ve ever seen Pulp Fiction, SysAdmins are like Winston Wolfe — their job is to solve problems.

Top 10 Cybersecurity Risks: How Prepared Are You for 2013?

White Paper | Jan. 24, 2013

Rather than looking back over the past year, organizations and individuals need to start assessing cybersecurity threats that lie ahead in the New Year. While there is always the chance for a new threat or risk to be unearthed this year, often the risks of the New Year are predicable from the trends of attacks from the previous year. However, other factors need to be considered as well, including new technologies, new software and applications, mobility, etc. Here are my predictions of the areas to watch for new security threats. When it comes to cybersecurity, we have a lot to look out for, take precautions against and be paranoid about.

Top 10 Mistakes Deploying and Upgrading Lync Server 2013

White Paper | Feb. 25, 2014

Microsoft Lync Server 2013 requires a proactive approach during deployment. This white paper provides valuable recommendations as well as the technical links that help you avoid common mistakes during a Microsoft Lync Server 2013 deployment.

Top 10 Recession-Proof IT Jobs

Article | June 05, 2020

These technology job roles are proven to be essential during a crisis as enterprises scramble to change strategies and meet goals. The skills demonstrated by IT professionals in these 10 positions can make the difference between business success and failure, especially during a recession.

Top 10 Ten Cloud Computing Terms You Should Know

Article | Oct. 16, 2017

You might already know what cloud computing is, and you might already be implementing it into your business, but are you able to have a conversation about it? The lingo surrounding this newer technology can be a bit, well, cloudy. Here are just some of the terms we keep hearing as cloud computing spreads from organization to organization.

Top 10 Traits of Successful IT Pros

Article | Oct. 11, 2017

General character attributes every IT pro should have and on the things that every IT pro should know or do.

Top 15 Networking Terms You Should Know

Article | May 01, 2018

There are two basic types of addresses used in Local Area Networking (LAN): logical addresses and physical addresses. Understanding the differences between the two addresses begins with developing an understanding of the following terms.

Top 5 Cyber Risks Targeting Modern Enterprise

Webinar – Recorded | Oct. 10, 2018

The Cyber Risk landscape is rapidly evolving leaving Cybersecurity professionals dazzled and lost in prioritizing their cybersecurity needs. Limited budget and low cyber resilience lead organizations in adopting re-active defensive measures. In this webinar, we will go through a methodological approach for assessing top cyber-risks a typical enterprise might encounter. And will address different scenarios for mitigating, transferring, or avoiding encountered risks.  

Top 5 Growth Opportunities for IT Pros

Article | July 13, 2017

IT professionals benefit from gaining skills in data analysis, cybersecurity, cloud computing, virtualization and hyperconvergence, and mobile app development.

Top 5 Highest-Paying Cisco Certifications

Article | Jan. 09, 2024

Discover the top 5 highest-paying and popular Cisco certifications from the IT Skills and Salary Report. Learn how to get certified and unlock IT career opportunities.

Top 5 Must-Have Skills for IT Departments

Article | Sep. 01, 2018

Technology trends such as these show no signs of abating, and IT administrators need to be prepared. Having a well-rounded and versatile team of IT practitioners is becoming increasingly necessary. In the following article, we examine five key skills that every IT department should have covered, regardless of the size of the company.

Top 5 Things You Need to Know from the 2017 IT Skills and Salary Report

Article | June 05, 2017

Learn about the most important and surprising findings from the Global Knowledge 2017 IT Skills and Salary Report. Topics discussed include top salaries, skills gaps, workloads and certifications.

Top 6 Keys to Working Successfully in a Matrix Organization

Article | Jan. 12, 2022

As organizations look to do more with fewer resources and better leverage scarce knowledge across their entire organization, they have found that the traditional hierarchical management structure no longer meets the needs of the business. Enterprises have turned to the matrix organizational structure for increased flow of information across departments and greater flexibility and responsiveness.

10 Best Cloud Certifications to Pursue in 2020

Article | Jan. 09, 2020

If you’re looking to fortify your cloud expertise, there are a number of certifications to consider. We have compiled 10 cloud certifications that are sure to positively affect your career. 

Top Cybersecurity Certifications to Enhance Your Career

Article | Oct. 04, 2019

Managers are in dire need of cybersecurity professionals with specific skills. If you’re looking to advance your career, or transfer into the cyber field, now is the time to get certified.

Top Five Reasons Your Company Needs VMware Horizon View 5.2

White Paper | July 23, 2013

With the growth of bring your own device (BYOD) and mobility, users are increasingly asking for computing anywhere from any device at any time. Users now expect productivity on the go with a desktop that can be freely accessed and secure. We're no longer a society that sits at a desk to be productive. The VMware Horizon Suite allows the datacenter administrators to satisfy the accelerated mobility needs of the workforce while still maintaining an IT solution that is easily managed and secure.

Top Four Considerations When Choosing Your SoftLayer Data Center Location

White Paper | May 07, 2015

A range of factors can influence the data center you choose. You should consider all of the factors listed in this white paper before deciding where to place your servers.

Top Tech Trends and Predictions for 2020

Article | Dec. 06, 2019

Global Knowledge subject matter experts predict the top trends for 2020 in IT training, Microsoft, Cisco, AWS, cybersecurity and more.

Top Ten Things Every DBA Should Know About SQL Server

White Paper | March 04, 2010

Microsoft SQL Server has evolved over the years as a scalable, robust database management system and is now competing in the VLDB (Very Large Database) space with Oracle and IBM. The market share for the product continues to grow, based on total cost of ownership and ease of use. This white paper outlines some of the important fundamentals of Microsoft SQL Server 2008 that every DBA should know.

Top 10 Reasons for Choosing SAP BusinessObjects

Article | March 18, 2015

In many of today’s enterprise data warehouses and decision support teams, data scientists and data visualization specialists have reached near rock star status. This is in large part due to their ability to produce unique, clever and insightful perspectives with company information. These analytical gems often bypass obstacles to explain complex business data. This line of work is both an art and a science, and is generally most effective when the right blend of business intelligence tools are in place.

Top 12 SonicWALL CSSA Exam Prep Tips

Article | Aug. 21, 2013

Dell SonicWALL's CSSA (Certified SonicWALL Security Administrator) exam is an open book, online certification exam that certifies a student’s understanding of the SonicOS Unified Threat Management (UTM) operating system. The exam tests a student’s network security knowledge, and their ability to use the GUI menu structure for configuration of standard network security scenarios.

Top 5 Common Activities that Break Company Security Policy

Article | July 16, 2021

Many employees are not as well-versed in their company’s security policy as they should be. This may result in workers performing tasks that might seem innocent or benign on the surface, but which actually put the organization at risk of a security breach. Understanding what you are doing (as an employee) or what your users are doing (as a boss or manager), can help you work toward a viable resolution to these situations. In most cases, user behavior changes as well as implementation of new technological solutions can curb exposure to risk and increase security policy compliance.

Top 5 Risky Internet Behaviors

Article | July 15, 2021

The Internet is not a safe place. We see that more than ever with the security breaches of businesses and individuals in the news on a daily basis. As Internet citizens, we need to take our protection into our own hands, as obviously most online services are not doing their best to protect us.

Top 5 Ways Dynamic Access Control Provides Flexibility in Windows Server 2012

Article | March 23, 2015

Dynamic Access Control (DAC) in Windows Server 2012 lets you manage access to documents in ways that go beyond classic NTFS (New Technology File System) permissions. For example, if you want to allow a set of users in an office across the country or across the globe read-only access to files relating to the Wind Turbine Project, DAC can do the job.

Top 7 Key Features of VMware Horizon 7

Article | June 27, 2016

VMware announced Horizon 7 in February and subsequently released the software updates. Horizon 7 provides a more streamlined, high-performance virtual desktop and application experience. New updates include features such as Instant Clones, Smart Policies, Blast Extreme and greater scalability with Cloud Pod Architecture. Let’s dig into the seven key features that Horizon 7 brings!

Top Five Big Data Architectures

Article | July 12, 2021

It’s been about 10 years since public cloud offerings like AWS opened up the world of big data analytics. This post examines the top five most useful architectures used for big data stacks to learn the sweet spots of each.

Topics Covered in IT Project Management

Video | June 19, 2014

Kirsten Lora, Global Knowledge Senior Product Director, discusses the benefits of our IT Project Management course.

Training is an Investment, Not an Expense

Article | Aug. 30, 2019

Explore how IT decision-makers’ training views have changed since we first released our annual IT Skills and Salary Report 12 years ago. Once viewed as an expense, IT leadership now sees professional development as an investment. Even with shrinking budgets and a recent rise in skills gaps, the value of training is currently at an all-time high.

TRANSFORM YOUR TECH: ALLEVIATE CHAOS AND DISORGANIZATION WITH REAL-WORLD SKILLS NOW

Webinar – Recorded | Sep. 16, 2022

Chaos and disorganization are commonplace as organizations struggle to manage IT-enabled services, which can have a serious impact on the Helpdesk. Skillsoft has the solution with ITIL. The Foundation, Advanced, and Extension Modules will provide knowledge and training so that you can proactively build and manage a blueprint for IT. This will enable you to effectively address real-world issues that impact your service organizations and their individual contributors alike.   Watch Now

TRANSFORM YOUR TECH: GET STARTED ON YOUR CERTIFICATION JOURNEY WITH MICROSOFT POWER BI

Webinar – Recorded | Dec. 01, 2022

If you enjoy analyzing data and using Power BI to discover and unlock data insights, this could be the ideal certification for you – especially if you use those insights to provide easy-to-understand data visualizations that can help drive the success of your team and organization. Join Skillsoft in the second of our Transformative Tech Microsoft Certification series, where we leverage our expert knowledge in Microsoft Power BI to inform you on the potential benefits for your business when utilizing Power BI. In this webinar you will learn: Watch Now

TRANSFORM YOUR TECH: LEARN AND BUILD AGILE, PREPARED AND SECURITY-FOCUSED TEAMS

Webinar – Recorded | Oct. 11, 2022

Join Skillsoft, as part of our Transformative Tech series, as we demonstrate how we can educate your organization to foster a culture of cybersecurity and unify all employees to manage risk and encourage agility and vigilance.   Watch Now

Transform Your Tech: Manage Your Frontline Workforce With Microsoft 365 Certification

Webinar – Recorded | Jan. 10, 2023

Whether you’re a business user, administrator, or embarking on your technical career, this certification provides an opportunity to prove yourself as a cloud evangelist. In addition to validating your knowledge of Microsoft 365 capabilities, earning this certification makes it clear to your organization that you understand the benefits of adopting cloud services, the basics of a Software as a Service (SaaS) cloud model, and the value of implementing Microsoft 365 cloud services. Join Skillsoft in the third of our Transformative Tech Microsoft Certification series, where we demonstrate foundational-level knowledge of cloud services, such as standard practices, considerations, and benefits. Watch Now

TRANSFORM YOUR TECH: MODERNIZE SECURITY AND DEFEND AGAINST THREATS WITH MICROSOFT CERTIFICATIONS

Webinar – Recorded | Nov. 08, 2022

To stay competitive in the industry, your employers and clients rely on you to stay ahead of the tech curve. Maybe they look to you when they evaluate a move to the cloud, or maybe they bring you a problem and point to an existing tech stack for solutions you may or may not be able to create. Whatever the scenario, you can be sure that the skills you bring to the table are critical on many levels. We will take a look at the cybersecurity Architect Expert certification track. This is the first expert-level certification in Microsoft’s Security, Compliance, and Identity portfolio. This certification will focus on designing elements of a cybersecurity architecture and evaluating the tradeoffs between different solutions.   Watch Now

TRANSFORM YOUR TECH: PYTHON EVERYWHERE

Webinar – Recorded | Feb. 16, 2023

The main reason for Python’s explosive growth is that it’s very easy to learn, use, and deploy, and in this 45-minute webinar, we’ll take a high level look at Python’s syntax, and explore some of the other reasons for Python’s ubiquity, including its very active and evangelical user community, and the availability of a huge collection of add-ons and libraries, including hundreds for data science and machine learning. Join Skillsoft as we focus on the role that Python can play in almost every area of your business, including as a productivity tool for employees and domains that you might not necessarily associate with a programming function. Watch Now

Transform Your Tech: User risk and Sign-in Risk Policies using Microsoft Azure Identity Protection

Webinar – Recorded | April 18, 2023

Explore the key features and benefits of Azure Active Directory Identity Protection. You'll learn how this powerful tool can help you detect and mitigate identity risks, automate threat response, and provide real-time protection against suspicious activities.

Transform Your Tech: What’s New in PeopleCert’s Global Best Practices Programs

Webinar – Recorded | March 09, 2023

Since PeopleCert’s acquisition of the ITIL Body of Knowledge in 2021, they have worked to modernize, refine, and improve the guidance it provides so that businesses that adopt it facilitate better collaboration between IT and its stakeholders, experience greater user satisfaction when utilizing IT services, and deliver improved business outcomes. During that time, the certification program has continued to evolve to better align to the people doing the work, the roles they hold, and the types of practices they perform in the co-creation of value for the organization. We plan to discuss the value & benefits that ITIL certification brings to organizations, to describe the re-certification pathways of the recently announced recertification program, and to illustrate how you can leverage the modern components of the ITIL framework to grow your ITSM practice. We hope you’ll join us, along with our partners from Peoplesoft, for this robust discussion on the modern practices of the ITIL®4 framework, and how Skillsoft can help you implement them. Watch Now

Trends in Cybersecurity

Webinar – Recorded | Feb. 03, 2021

Organizations and individuals are threatened with ever-growing cyber threats and must be prepared to address them. The more we are connected to networks, the more suspectable we are to attacks, therefore enterprises must stay current applying various cybersecurity measures and maintaining awareness of cybersecurity trends. View the slide deck>    

Triple Constraints Model

Article | June 01, 2009

The triple constraints model has been one of the main staples for teaching project management for as long as I can remember. The model is generally represented by a triangle with Scope on the horizontal leg, Time on the left leg, Cost or Resources on the right leg an...

Troubleshoot Domain Controllers with Dcdiag.exe

Article | Feb. 15, 2011

Dcdiag is an often overlooked tool that can discover problems in a domain controller’s configuration. If client computers can't locate a domain controller or if domain controllers can't replicate Active Directory, you can run tests with Dcdiag to look for a solution.

Trunk Groups - Why bother?

Article | Jan. 08, 2010

One aspect of Unified Communications is this concept of trunk groups.  I will discuss what they are, what benefit they can provide and how to configure them for Cisco gateways. First of all the official definition of a trunk group is “A group of trunks serving the s...

Trunk Groups with Digital Ports

Article | Jan. 13, 2010

Last blog we looked at how we can use Trunk groups to ease the configuration of dial-peers and digit manipulation using analog FXO ports for an E911 solution. Now let’s take a look on how it can be used for T-1 CAS configurations and ISDN channel selection. The firs...

T-SQL Basics: Anatomy of the Select Statement

Article | Sep. 19, 2011

Relational databases are important not only because of the information they store but, more importantly, for the data we retrieve from them. The select statement allows us to ask the database a question. It’s the way we retrieve information from the database system.

Two Great Security Features of VMware’s NSX Network Virtualization Platform

Article | Aug. 30, 2016

The VMware NSX platform combines networking and security functionality directly in the hypervisor and it interoperable with a vast majority of VMware’s products. The platform provides a set of logical networking elements and services, using logical switching, routing, load balancing, VPN, firewall, etc. This product decouples network functionality from the physical devices.

Types of Cloud Deployments

White Paper | June 23, 2015

Cloud computing is a big force in IT today, and it isn't going away. In fact, cloud adoption is going up geometrically, both for end users (think apps on your phone or tablet) as well as for organizations of all sizes. In fact, many smaller organizations may not have any on-premises infrastructure at all, other than networking infrastructure to get connected to the cloud. With this transformation in IT, it behooves all of us in the industry to understand it and adapt or risk being out of a job, like punch card operators.

UCS Troubleshooting Boot Camp

Video | Aug. 15, 2013

John Barnes, Global Knowledge's Cisco Course Developer, discusses enhancements to our UCS Troubleshooting Boot Camp and suggestions for students in preparation for this course.

UFFA Is Every Support Professional’s Responsibility

Article | April 14, 2014

UFFA, which stands for “Use it, Flag it or Fix it, Add it,” is the responsibility of every support professional in the knowledge management process. It comes from the Knowledge-Centered Support (KCS) methodology where knowledge management is based on collaboration and a shared ownership of the knowledge base. Let’s break it down.

Uncover e-Learning Best Practices from a CSTD Award-Winning Project

Webinar – Recorded | June 26, 2013

Learn how to leverage e-Learning to its full potential from someone who has succeeded in e-Learning. E-Learning is considered the way of the future for good reason: attractive cost-savings, flexibility, and convenience. To realize these benefits, you need to craft the training to meet a number of rigorous objectives. Join Kevin Kernohan, senior production manager at Global Knowledge, and Ann Schuler, learning and development consultant at the Government of Alberta Human Services Ministry, as they lead you from beginning to end of the e-Learning development cycle. In partnership with the Government of Alberta, Global Knowledge developed the Critical Thinking in Action training program for employees throughout the province. Discover why this e-Learning program earned a CSTD Award for Training Excellence and how you can assimilate these best practices into your organization.

Understanding AIX Logical Volume Management

White Paper | May 14, 2014

Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

Understanding Calling Search Space Usage at the Phone and Line Level

Article | Oct. 14, 2014

Where should you apply the CSS, and why are there two places to apply it? One approach is to pick one of the parameters and apply the permissions there. Quite often, an administrator will pick the phone-level CSS and configure it there so that it applies to all calls made from all lines. The goal is to specify what partitions are allowed to be called. 

Understanding Cisco Security Solutions: Are You Ready for a New Era of Risk?

White Paper | Oct. 06, 2015

The responsibility for securing organizational data has spread beyond the traditional IT professional. While there are more diverse security solutions, there are more diverse and sophisticated security threats. Security awareness and training is essential for everyone within an organization. Learn how Cisco has continued to evolve its security solutions and training.

Understanding Google Cloud Platform: Architecture

White Paper | Nov. 20, 2017

Google Cloud Platform (GCP) is Google’s public cloud offering comparable to Amazon Web Services and Microsoft Azure. The difference is that GCP is built upon Google's massive, cutting-edge infrastructure that handles the traffic and workload of all Google users. There is a wide range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). We will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.

Understanding Kubernetes Networking

Webinar – Recorded | July 15, 2020

Kubernetes automates container management. The process of container orchestration is so complex that trying to manage containers by hand has become impossible. There are many, components to container orchestration, but one of the most misunderstood is networking. In this 1-hour webinar we’ll explore how k8s actually performs IP networking and service discovery, two of the most critical components for successfully delivering microservices. We’ll examine how kubernetes carries the burden of cloud networking and lastly what it takes to pass the CKAD/CKA Certifications.

Understanding Networking Fundamentals

Video | Aug. 22, 2013

Global Knowledge Product Manager Tori Easterly discusses the benefits of our Understanding Networking Fundamentals course.

Understanding Next Hop Resolution Protocol Commands

Article | Oct. 29, 2021

Next Hop Resolution Protocol enables businesses to have a way for next-hop servers and next-hop clients to communicate with each other directly, bypassing a central hub and preventing potential bottlenecks.

Understanding Pen Testing

Video | Nov. 23, 2016

A brief introduction to the basics of penetration testing.

Understanding the AIX Object Data Manager

White Paper | June 18, 2014

If you are coming to AIX from another UNIX system, the Object Data Manager (ODM) will be new to you. Fortunately, it is not so very complicated. This white paper explains how ODM is structured and how to use these databases in order to meet the goals the architects had for the ODM.

Understanding the Difference Between Incident Management and Problem Management

Webinar – Recorded | April 02, 2015

In this hour-long webinar, Global Knowledge instructor and ITIL Expert Michael Scarborough will share his knowledge and expertise on various aspects of incident management and problem management processes. He will help you understand the difference between incidents and problems and between incident and problem management, providing examples from his own experience to drive the concepts home. Michael will also provide an overview of who performs various incident and problem management activities in an organization.

Understanding Google Cloud Platform Infrastructure Services

Article | Sep. 26, 2017

There is a wide-range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). In the first part of this series, we will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.

Understanding Inner and Outer Joins

Article | June 12, 2013

One of the most difficult concepts for me as I was learning database syntax was joins. Of course, I tried reading and understanding articles and books that dealt with this topic. In almost every case, I was faced with the Venn diagram examples.

Understanding RIP v2

Article | Aug. 05, 2009

So far, in our discussion of Router Information Protocol (RIP), we’ve discussed the basics and also verified and reviewed RIP version1. We stated that RIP version 1 is a classful routing protocol that used FLSM and sent it routing updates without the subnet mask.  In...

Understanding the Objectives of the Event Management Process

Article | July 03, 2015

A strong event management process that is able to detect changes of state throughout an organization’s IT environment is a key aspect of a complete suite of service management processes. Event management ultimately helps an organization maintain control through an understanding of the state of things, and how the state of those things changes in an IT environment.