60 Results Found
The CISSP (Certified Information System Security Practitioner) certification exam update in 2018 included a modest revision of the topics and a significant change to the testing process. Preparing for the CISSP exam has become more challenging. Here's everything you need to know about the changes.
(ISC)2’s CISSP (Certified Information System Security Practitioner) is a widely desired indicator of cybersecurity knowledge, experience and excellence on the resume of many IT professionals. Learn how to prep for the most comprehensive and in-demand cybersecurity certification.
As organizations struggle to balance budgets and prioritize training, skills gaps are growing—75% of North American decision-makers report existing skills shortages. And the impacts are potentially disastrous. With so much on the line, initial and ongoing training are instrumental to project and organizational success.
Do you remember that teacher that made the most difficult concepts easy to understand? The one who amazed you with their complete understanding of the subject matter. We remember those teachers too and the concepts they imparted on us. We know that a good teacher can have a lifelong impact on their students. That’s why we employ only the best and brightest instructors at Global Knowledge.
For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.
There is a reason why Agile training methods are becoming mainstream. They can work! Although every Agile practice is not necessarily appropriate for every organization, each practice has delivered real value to many organizations, and some Agile practices can be used by anyone!
Based on the insight and relationships developed over many years, Global Knowledge has developed a best practices model of a superior cybersecurity organization—bringing our research and experience to bear and validating against hundreds of organizations, from the largest to the smallest. In studying world-class cybersecurity organizations, Global Knowledge discovered several critical characteristics that successful cybersecurity organizations all seem to share. So how does an organization like yours build a winning cybersecurity team? Let’s find out.
Though there are several sources for agile certifications, the Project Management Institute (PMI)® Agile Certified Practitioner (PMI-ACP)® has established itself as the world’s fastest growing agile credential. The PMI-ACP certification formally recognizes your knowledge of agile principles and your skill with agile techniques.
So you want to be more agile, but is it possible in a waterfall world? The short answer is yes! Waterfall can be combined with principles of agility. The trick is to recognize how agile practices lead to organizational agility. Any organization can become more agile, but there are trade-offs that need to be considered. In this hour-long webinar, instructor and presenter Brian Egan will help you understand how to make agile work within your organization. In it you will learn: Agile best practices Discover how organizations can be more agile Agile vs. Waterfall: Discuss the pros and cons of each Dispense the myth that agile can only be used for software development Watch this webinar today and learn how and why your organization should become more agile! Recommended Agile Project Management courses: Introduction to Agile Agile Project Management Transitioning from Waterfall to Agile PMI Agile Certified Practitioner (PMI-ACP)® Boot Camp
It has been over three years since the last revision of the CompTIA Security+ exam back on May 1, 2014. In fall of 2017, the latest version, SY0-501, was released. This revamped exam retains the same six domains as established in SY0-401, which emphasizes security in three main areas: application, data, and host.