Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

218 Results Found

Results per page: 10 40 80

Master your Agile Transformation with Scrum & DevOps

Webinar – Recorded | June 29, 2021

Many organizations have already embarked on their Agile Transformation journey, yet despite having agile methodologies in place they have still not matured their competencies to the desired level. Still, there are some unicorns who have managed to master the process and are now delivering value faster and more efficiently. Frameworks like DevOps and Scrum help organizations stay ahead of the curve by facilitating cultural transformation, adoption of a lean mindset, and increased automation.

EC-Council Certification List

Article | June 17, 2021

This quick reference guide will highlight the various certification tracks to help you find your path through the EC-Council programs.

10 Things Security Experts Wish End Users Knew

White Paper | April 08, 2021

Security is complicated, which has led to the many misconceptions and misunderstandings about security. By paying attention to these 10 concerns that security experts want you to know, you can gain knowledge and understanding about security and be securer both at work and in your personal life.

How Active Listening Makes You a Better Leader

Webinar – Recorded | April 08, 2021

Every manager wants to get the most out of every employee and maximize team cohesion and efficiency. Making your team members feel as if they are being heard, understood, and acknowledged is critical to any management strategy. Actively listening to team members’ thoughts, ideas, and challenges drives employee engagement and satisfaction, which drives better results. View the slide deck>>

The 5 Phases of Hacking: Gaining Access

Article | March 25, 2021

Gaining access is the most important phase of an attack in terms of potential damage, although attackers don’t always have to gain access to the system to cause damage. For instance, denial-of-service attacks can either exhaust resources or stop services from running on the target system. 

The 5 Phases of Hacking: Maintaining Access

Article | March 25, 2021

Once an attacker gains access to the target system, the attacker can choose to use both the system and its resources and further use the system as a launch pad to scan and exploit other systems, or he can keep a low profile and continue exploiting the system.

How ISACA Certifications Deliver Returns to Organizations and Individuals

Article | March 22, 2021

ISACA’s role is to help those in the field of cybersecurity get greater utilization out of the people already in the fold. This means enabling IT professionals to take a leadership role and increase their depth of knowledge. 

The 5 Phases of Hacking: Scanning

Article | March 19, 2021

Attackers use a method called scanning before they attack a network. Often attackers use automated tools such as network/host scanners and war dialers to locate systems and attempt to discover vulnerabilities.

How Data is Delivered

Article | March 18, 2021

Every second of every day, data is being sent and received. Billions of data packets are processed by your company’s network every day. In fact, you received dozens of packets just to read this article, but the vast majority of us have no idea how this works. People have no clue as to what goes on behind the scenes to ensure data actually gets to the right device.

A Complete Certification Guide: How to Become a Certified Project Management Professional (PMP)

White Paper | March 05, 2021

This Certification Prep Guide provides an overview of the current Project Management Professional (PMP)® certification and offers helpful tips that you can use when preparing for your PMP certification exam.