Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Show Filters
Result Filters:

27 Results Found

Results per page: 10 40 80

Technology Offers Convenience, Privacy Pays the Price

White Paper | Sep. 25, 2015

Technology is a wonderful thing, but it comes with a price: cybersecurity. Free Web browsers, social media sites and other digital services collect personal information like email addresses, phone numbers, place of employment, buying habits, mortgage data that is shared with advertisers. The availability of this information leaves us vulnerable to hackers. This white paper can help you learn more about what kind of personal data is typically collected, and how to secure your information online.

Data Breaches: What Can and Cannot Be Done

White Paper | Aug. 23, 2015

Experts agree that as long as there is data, there will be people trying to steal it. For every defense mechanism put in place, there is someone who will find a way to get around it. Constant vigilance, education of the workforce, and management support are all necessary to implement effective security policies. While a well-trained IT staff is key to protecting data, all employees must understand the importance of protecting company assets, including data.

Healthcare Organizations and Data Breach: How to Lower Risk and Reduce Liability

White Paper | Aug. 14, 2015

Discover why healthcare organizations must take an immediate active role in securing their data. It is much more costly, monetarily as well as with regard to reputation, for an organization to react to a breach rather than plan for it.

Human Vulnerabilities in Our Current Threat Landscape

White Paper | Jan. 23, 2015

Times are changing. Attacks are becoming much more sophisticated and hackers are exploiting human vulnerabilities to gain access to enterprise networks and private information. Employees and end users want to help protect your company's sensitive data, we just need to motivate them as to why they should care. By educating your employees on security best practices and current human vulnerabilities, you can take a step forward to ensuring you're not a part of the many organizations that are breached.

What You Don't Know About Cybersecurity CAN Hurt You

Webinar – Recorded | Oct. 21, 2014

The bad guys just keep getting better! No matter how much patching and tweaking we do, the bad guys' constantly changing tactics and techniques continue harming our networks, stealing and damaging data, and just generally screw things up. What motivates someone to do such terrible things in the first place? How have these hackers changed and improved? What kinds of attacks are popular now and why? In this hour-long webinar, security expert, former hacker and Global Knowledge instructor Phillip D. Shade will provide insight into understanding the latest hacking techniques, what the current threat landscape looks like, and suggested countermeasures to mitigate threats. He will include specific examples of the current threat landscape, including data mining, social engineering cyber threat terminology, man-in-the- middle attacks and Denial of Service (DoS) attacks.

Managing Stakeholder Expectations for Project Success

Webinar – Recorded | July 24, 2014

This power session is an introduction to Managing Stakeholder relations. It offers new ways of managing and dealing with projects, which focus more on communications, understanding stakeholders' needs and managing their expectations, as well as learning about organizational politics and culture, and performing value-add activities. It provides a practical approach to managing issues that matter most for project success - communication, stakeholder expectations, risk, change and quality; so that the scope, schedule and cost end up on target, achieving the desired outcomes for the organization.

Cybersecurity: Physical Security

Webinar – Recorded | May 26, 2014

As an IT professional you deal day in and day out with securing operating systems, patching software, installing and configuring firewall and routers But what about the physical infrastructure? Do you understand how simple techniques can allow theft of your company resources? In this session we will discuss how to reduce the possibility of loss of data and equipment. Physical security may not be part of your job but you should be aware and having discussions with the personnel who are responsible. Or does Physical Security become one of your job responsibilities? Come to this session and learn about one of the most important and yet least thought about areas of security by IT professionals.

Preparing for the PMP® Exam Part 2

Video | Feb. 03, 2014

Global Knowledge Senior Business Skills instructor Samuel Brown covers tips for preparing and practicing for the PMP exam.

Preparing for the PMP® Exam Part 1

Video | Jan. 01, 2014

Global Knowledge Senior Business Skills instructor Samuel Brown covers tips for preparing and practicing for the PMP exam.

Developing Effective IT Learning Processes

Webinar – Recorded | Oct. 16, 2013

Business is changing rapidly and Information Technology is at the centre of the trends: mobile, social, cloud and big data,. Forward thinking IT functions must develop and manage the skills of their most critical asset-- their employees. Effective professional development can guard against the pace of change, leading IT units to re-define job roles to include both technical and non-technical competencies and to establish business processes to help their staff develop and maintain these skills. This session will present the components of a holistic process to support learning and development in any IT organization.