50 Results Found
This quick reference guide will highlight the various certification tracks to help you find your path through the EC-Council programs.
The CISSP (Certified Information System Security Practitioner) certification exam update in 2018 included a modest revision of the topics and a significant change to the testing process. Preparing for the CISSP exam has become more challenging. Here's everything you need to know about the changes.
How can leaders and Human Resources professionals use effective, simple and research-based talent management practices to contribute to their organization's success? Too many leadership development theories provide complex and confusing answers. Join Jocelyn Bérard as he shares the core practices introduced in his new book, Accelerating Leadership Development, which reflects his extensive research and years of experience in making leadership development uncomplicated and practical.
Whether you’re a beginner or intermediate Python developer, you’ll want to keep this guide close to your keyboard and Python editors. In it, you’ll find sample use cases for many of the most common language constructs and tasks that you’ll likely need to perform, such as reading a file or working with a database.
In the world of corporate technology training, blended or hybrid learning is a recent introduction. While a few learning providers have launched offerings, only Global Knowledge has implemented a solution—Blended Live—that utilizes the true potential of a blended learning delivery model.
This Certification Prep Guide provides an overview of ISACA’s Certified Information Security Manager (CISM) certification and offers helpful tips that you can use when preparing for your CISM certification exam.
This Certification Prep Guide provides an overview of ISACA’s Certified in Risk and Information Systems Control (CRISC) certification and offers helpful tips that you can use when preparing for your CRISC certification exam.
For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.
It’s inevitable. At some point in your career, you’ll find yourself working alongside individuals who fall into the general category of “Difficult People.” The effects these people can have on an organization vary greatly but usually involve many problems for the team. This white paper describes some of the more common types of difficult people and provides you with tips on how to handle them.
In this informative webinar, you will learn about the popular and overlooked ways organizations and professionals can purchase training to become more resilient.