45 Results Found
There are two types of networks: those that have been hacked and those that will be. To defend against hacks, cyber professionals can benefit greatly from ethical hacking programs.
Creativity is the “due diligence” of effective problem analysis. It is through creativity that the best possible solution for a problem is discovered. Without creativity, decisions are often one-dimensional, superficial, and near-sighted.
In this video, you will learn about the High Availability options in SQL Server 2008: Server Clustering, Database Mirroring, Log Shipping and Peer-to-Peer Replication.
Based on the insight and relationships developed over many years, Global Knowledge has developed a best practices model of a superior cybersecurity organization—bringing our research and experience to bear and validating against hundreds of organizations, from the largest to the smallest. In studying world-class cybersecurity organizations, Global Knowledge discovered several critical characteristics that successful cybersecurity organizations all seem to share. So how does an organization like yours build a winning cybersecurity team? Let’s find out.
For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.
In this informative webinar, you will learn about the popular and overlooked ways organizations and professionals can purchase training to become more resilient.
In this video, you'll learn how to utilize a great new feature of SQL Server 2008 called Policy Based Management for Multi-Server Management capabilities.
In this video, you will learn how to a use a new feature of SQL Server 2008 R2 and Office 2010 called PowerPivot for Self-Service Business Intelligence.
In this video, you will learn how to a use a new feature of SQL Server 2008 called Transparent Data Encryption for enhanced security.
In this hour-long webinar, Global Knowledge course director Brian Egler will examine key new features of Microsoft SQL Server 2016 that demonstrate how it provides automatic end-to-end security, seamless generation of business analytics and elastic integration of data in the cloud.