Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Show Filters
Result Filters:

22 Results Found

Results per page: 10 40 80

How to Navigate the Transition to ITIL® 4

Article | March 19, 2019

Answer the questions posed in our ITIL Decision Tree to see if you should pursue ITIL 4. It’s easy-to-follow and no matter how you answer, it will provide a distinct next step for your ITIL journey.

ITIL 4: The Changes, What’s New and How it Impacts You

Webinar – Recorded | Feb. 14, 2019

ITIL® is still recognised as the de facto standard in delivering end-to-end, holistic IT services. The 4th iteration retains ITIL’s place as one of the key tools at the disposal of organization’s seeking to manage digital transformations.

ITIL is Updating: ITIL 4 Foundation Now Addresses Evolving Best Practices

Article | Feb. 04, 2019

The ITIL 4 update is the first since 2011, and will address the new processes, vocabulary, and methods used in modern IT, including DevOps, Agile, and Lean IT development.

Bridge Your Knowledge from ITIL v3 to ITIL 4

Article | Feb. 01, 2019

ITIL® 4 Foundation Bridge is a new Global Knowledge course that addresses the specific needs of professionals who have already achieved the ITIL v3 Foundation certification and wish to upgrade to ITIL 4. 

10 IT CERTIFICATIONS EMPLOYERS LOOK FOR

Article | Nov. 01, 2018

How do you measure the experience and knowledge of an IT professional? One way is through certifications. Earning any certification is a notable achievement, though not all certifications carry the same perceived worth.

Guide to ITIL® Certifications and Tips for Exam Success

White Paper | Jan. 03, 2018

This certification and exam guide discusses the various ITIL® certifications and what they might mean to you, your organization, and your career, as well as provide important test-taking tips for the ITIL certification exams. ITIL certifications help individuals validate their ability to demonstrate skills from a foundational to a mastery level of IT service management. ITIL certification can often be a key differentiator in the marketplace as well.

You’ve Completed ITIL® Foundation: Now How to Implement It

White Paper | Nov. 30, 2016

Shortly after being awarded an ITIL® Foundation certification, a recipient’s natural inclination is to ask: “Now what? How do I take the best practices I’ve learned and apply them to my organization?”

What's New in the CompTIA Network+ (N10-006) Exam

White Paper | Sep. 25, 2015

CompTIA has raised the bar for Network+ candidates. The new certification exam has significant changes to the five "domains" or knowledge areas with new content related to security, cloud, data-center and operational concerns and troubleshooting. There is also a greater emphasis on wireless networking and VoIP. Use this white paper to help you gain an overview of what's new and what's different.

Common Networking Standards and Why They Are Relevant

Webinar – Recorded | July 29, 2014

Often, we don't have time to learn the reasons behind the standards we use. But learning what instigated a standard goes a long way toward not only understanding its importance, but also more easily and effectively applying it in your workplace. In this hour-long webinar, Global Knowledge instructor Keith Sorn will discuss common networking standards and explain how they were determined and why they are relevant. He will fill you in on things like why it's important to use proper color-coding standards when making cable and why the length limitations on wired cable are essential. He will also explain new standards, such as power over fiber.

Network Forensics Analysis: A New Paradigm in Network Security

Webinar – Recorded | Oct. 26, 2011

In this hour-long webinar, security expert and Global Knowledge instructor Phillip D. Shade will provide insight into the emerging network security science of network forensics analysis, a.k.a. security event analysis and reconstruction. Using case studies, you will examine the role of data retention in network forensics analysis, and you will learn about applying forensics analysis techniques to handle application-based attacks, VoIP call interception, and worms, bots, and viruses.