22 Results Found
A mobile phone is just like a small computer, that can be hacked. Learn basic mobile phone security practices to lock down this potential entry point to your corporate systems.
Global Knowledge instructor Doug Notini discusses the benefits of our FIREWALL 2.0 - Deploying Cisco ASA Firewall Solutions course.
A firewall is a security tool which may be a hardware or software solution that is used to filter network traffic. Understand the basic functionality of a firewall where traffic is blocked or allowed to enter the network.
An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Understand how an incident response team prepares, plans, and responds to a security breach.
The goal of risk management is to reduce risk down to an acceptable or tolerable level. Understand countermeasures, safeguards, and security controls that can be selected to eliminate or reduce risk.
The Logical Volume Manager (LVM) is a powerful tool for managing storage on Linux servers. This video provides an overview of how LVM works and explores several ways that LVM makes storage management easier and more flexible. Examples include how to expand storage capacity on the fly using LVM and resize2fs, and how to migrate data from local storage to a storage area network (SAN) without downtime using pvmove.
Interested in SharePoint 2013 developer training? Learn from SharePoint instructor Tracy Wallace, if you're ready and which SharePoint 2013 developer class you should take.
Red Hat Taste of Training - JB248
Red Hat Taste of Training - JB348
A brief introduction to the basics of penetration testing.