Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

67 Results Found

Results per page: 10 40 80

Bash Shell Tips and Tricks

Video | Jan. 29, 2015

The Bash shell is a powerful tool for managing Linux servers. This video offers a number of tips and tricks for using Bash to help make working on the Linux command-line easier and faster. It explores time saving tools like tab completion, command history, and brace expasion as well as how to combine commands together to create powerful new tools using piping.

Common Networking Standards and Why They Are Relevant

Webinar – Recorded | July 29, 2014

Often, we don't have time to learn the reasons behind the standards we use. But learning what instigated a standard goes a long way toward not only understanding its importance, but also more easily and effectively applying it in your workplace. In this hour-long webinar, Global Knowledge instructor Keith Sorn will discuss common networking standards and explain how they were determined and why they are relevant. He will fill you in on things like why it's important to use proper color-coding standards when making cable and why the length limitations on wired cable are essential. He will also explain new standards, such as power over fiber.

CompTIA Certifications Are Building Blocks For IT Careers

Article | July 09, 2019

There’s a reason why one out of four certified IT professionals in North America hold at least one CompTIA certification. IT professionals who hold at least one certification have higher salaries, are more productive and generally are more satisfied in their job than their non-certified peers.

Creating and Configuring New File Systems

Video | April 09, 2015

With ever increasing demands for storage, system administrators often find themselves needing to add new storage to servers. This video provides step-by-step examples of how to partition, format, and mount new storage space using Linux.

Creating Reports with Excel's Power Pivot

Webinar – Recorded | Feb. 28, 2019

This recorded webinar will show you how to quickly summarize a large amount of data from different data sources using Power Query.

Cryptography Tools and Techniques

Article | April 09, 2021

Cryptography can be used for many purposes, but there are two types of cryptographic algorithms you need to understand: symmetric and asymmetric. Learn more from the experts at Global Knowledge.

Cybersecurity Necessities: A Firewall, Antivirus, and a Well-Trained Workforce

Webinar – Recorded | Oct. 03, 2013

You have spent money on software and hardware, implemented best practices, and believe you are secure, right? You may have overlooked the weakest link: your employee. Many breaches occur as a result of an employee mistakenly clicking on a link or visiting a site that allows a virus to be unknowingly downloaded, giving hackers access to your network. Today, a well-trained workforce is a necessity and may even be your most important cybersecurity tool. In this webinar, security expert David Willson will discuss how many breaches have occurred and are occurring, the tools and techniques hackers use to trick employees into clicking on links or opening attachments, and how to prevent such behavior.

Cybersecurity: Physical Security

Webinar – Recorded | May 26, 2014

As an IT professional you deal day in and day out with securing operating systems, patching software, installing and configuring firewall and routers But what about the physical infrastructure? Do you understand how simple techniques can allow theft of your company resources? In this session we will discuss how to reduce the possibility of loss of data and equipment. Physical security may not be part of your job but you should be aware and having discussions with the personnel who are responsible. Or does Physical Security become one of your job responsibilities? Come to this session and learn about one of the most important and yet least thought about areas of security by IT professionals.

Develop Your Skills with Unlimited Access to Red Hat Online Learning

Webinar – Recorded | Jan. 31, 2019

The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.

Eleven Myths About 802.11 Wi-Fi Networks

Webinar – Recorded | Oct. 06, 2006

Wi-Fi networks have been misunderstood by much of the IT community since their inception. Even the reasons for this misunderstanding are kind of hard to understand. The result has been that myths about 802.11 (better known as Wi-Fi) networks have grown almost as fast as the technology itself. In this web seminar, we'll examine 11 common Wi-Fi myths and explore ways to use correct information to make your networks scalable, secure and satisfying for your users.