Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

221 Results Found

Results per page: 10 40 80

Cisco On-Demand Learning

Video | May 07, 2018

This overview of the Cisco On-Demand Learning portfolio covers the various products and solutions available. Including all access collections, certification e-camps, and individual course titles.  With Cisco On-Demand Learning you can train your workforce easily and effectively.

Top-Paying IT Certifications for 2018

Article | Jan. 15, 2018

Topping this year’s list is ISACA with four IT certifications, followed by AWS, Cisco and Citrix. Our 2018 IT Skills & Salary Report also shows trending areas in cybersecurity, cloud computing, and business—demonstrating what skills you need to become a more valuable and higher-paid IT professional.

Six Scary IT Certification Exams

Article | July 13, 2017

Certifications are the most common way in IT to prove you have the skills to solve various technical and business challenges. In this article, I'll address a range of skill sets. For each certification listed, I've included what the certification measures, the requirements to obtain it.

The Benefits of Cisco ACI in the Data Center

Article | June 19, 2017

In 2013, Cisco released their Software Defined Networking (SDN) solution for the data center known as Cisco Application Centric Infrastructure (ACI). For many years, the networking industry has been asking for an approach to configuring networking devices more efficiently than having to individually configure each and every router and switch.

How to Control IGP Updates with Route Maps and Distribute Lists

Article | May 09, 2017

The purpose of Interior Routing Protocols (IGP), and routing protocols more generally, is to advertise the existence of destination networks. All protocols then have some method of picking what they would consider to be the best path and maintain the information. By...

A Guide to Network Time Protocol (NTP)

Article | May 03, 2017

What is Network Time Protocol (NTP)? Well, it’s a network protocol used to synchronize clocks between computing systems over a packet switched network. It’s been around since the mid-1980s and was developed by David Mills at the University of Delaware; it is one of the oldest protocols still around on the Internet. NTP replaced other time synchronization technologies that didn’t have some capabilities to adjust time based on location of the time source or time server relative to the receiver or adjusting to the variation of delay found on typical data networks.

How Precision Time Protocol (PTP) is Improving Accuracy One Clock at a Time

Article | April 27, 2017

Precision Time Protocol (PTP) is a protocol designed to go beyond what Network Time Protocol (NTP) can offer relative to accuracy. PTP is IEEE standard 1588 that can give local computing systems accuracy within the sub-microsecond range (such as microsecond, nanosecond or picoseconds) whereas NTP is within milliseconds or longer. PTP standard was first released in 2002 and known as 1588-2002. In 2008, the IEEE released a revised standard for PTP, known as 1588-2008, that improved the accuracy and precision of the protocol. It is also known as PTPv2 and is not backward compatible with the older version. PTP was developed for packet based network for control and measurement systems.

How to Reach Devices in Other Domains with IGP Route Redistribution

Article | Feb. 20, 2017

One size does not always fit all. At times there’s a need to run more than one routing protocol and have more than one routing domain: multivendor shops, migration from one protocol to another, scalability issues of a single protocol, political or personal preference, production versus test networks, mergers, and acquisitions.

Know Your Options Before Selecting a Routing Protocol

Article | Feb. 07, 2017

Routers and switches make up the bulk of the network infrastructure and are vulnerable to attack. In a previous article, I talked about some of the different ways of hardening your network devices. In this blog, I’d like to specifically examine the routing protocols used on the major Cisco network operating systems.

How to Troubleshoot Cisco’s Dynamic Multipoint VPN (DMVPN)

Article | Feb. 02, 2017

Dynamic Multipoint Virtual Private Network (DMVPN) is a Cisco network solution for those with many sites that need access to either a hub site or to each other.

Cisco CCNA Routing and Switching Paths

Video | Sep. 28, 2016

Understand the two training options to prepare for the CCNA Routing and Switching certification - traditional and accelerated. Global Knowledge allows you to learn at your pace. The traditional training path features two courses, ICND1 and ICND2, and ten days of training. The accelerated training path combines the content found in ICND1 and ICND2 into a single 5 day course, the CCNAX Routing and Switching Boot Camp. Learn which option is best for you.

Overview of the Cisco Collaboration Curriculum

Video | Sep. 28, 2016

Understand the Cisco Collaboration technology and certification training portfolio. This overview will cover the courses needed to prepare for the CCNA Collaboration and CCNP Collaboration certifications. You will also learn about recommended skills-focused courses covering basic and advanced Unified Communications Manager administration.

Overview of the Cisco Security Curriculum

Video | Sep. 28, 2016

Understand the Cisco Security technology and certification training portfolio. This overview will cover the courses needed to prepare for the CCNA Security and CCNP Security certifications. You will also learn about recommended skills-focused courses covering SourceFire technologies, the ASA security solution, and the ISE access control and authentication platform.

15 Top-Paying Certifications for 2016

Article | June 02, 2016

What were the top paying IT and project management certifications for 2016? his article will help you answer both questions by providing a review of the 15 top-paying certifications.

Defining and Simulating ITIL® Processes Using IBM WebSphere Business Modeler Advanced

White Paper | Feb. 26, 2016

IBM WebSphere Business Modeler (WBM) can be used in conjunction with an adoption of ITIL best practices. It is a full-featured process modeling and simulation tool that fits well with other IBM products that are used to define various service management processes and activities. In this white paper learn more about how WBM provides both the ability to visually define process activities and the ability to define detailed information about processes, including inputs, outputs, cost, revenue, roles and resources.

Advanced Routing Tips and Tricks: Router Path Selection Modification and Optimization with EIGRP and OSPF

Webinar – Recorded | Jan. 19, 2016

This hour-long, information-packed webinar will provide tips and tricks for modifying and optimizing router path selection with EIGRP and OSPF. You will learn about EIGRP redistribution, including redistributing static routes into EIGRP, and about OSPF redistribution. You'll learn about using route maps and prefix lists and about summarization with EIGRP and OSPF. Also, you will receive tips for controlling updates and path selection.

Software Problems and How Docker Addresses Them

White Paper | Jan. 12, 2016

Learn how Docker makes it easy to update, test and debug software with this white paper and gain foundational knowledge about Dockerfile, Docker images and containers.

New RHEL 7.1 Features Ease Business and IT Adoption

White Paper | Jan. 06, 2016

The recent Red Hat Enterprise Linux (RHEL) 7.1 release offers a range of system-wide improvements. Whether you're new to RHEL or a veteran user, this white paper covers essential new tools and upgrades. Dynamic patching, in-place upgrades, easily configuring new deployments or monitoring entire systems represent some of the more significant changes. This white paper not only explores the significance of these modifications, it also provides useful examples, including diagrams and command lines for executing key tasks. RHEL 7.1 represents the first minor release of RHEL 7, which launched in June 2014 and will be supported for a 10-year life cycle.

15 Top-Paying Certifications for 2016

Special Report | Jan. 01, 2016

Which mainstay certifications should be in your list of credentials? What's the next up-and-coming certification? This article will help you answer both questions by providing a review of the 15 top-paying certifications.

Cisco FabricPath: Is it Switching, Routing or a Bit of Both?

White Paper | Dec. 04, 2015

Learn how Cisco FabricPath combines the benefits of Layer 2 Switching and Layer 3 Routing, allowing for the scalability and flexibility of Layer 2 while supporting traditional Layer 3 components such as optimal paths, equal cost multipath routing and a Time to Live (TTL) field.

CCNAX Routing and Switching Boot Camp or ICND1 and ICND2: Which Path Is Best for You?

White Paper | Dec. 02, 2015

What path you decide to take to earn your Cisco Certified Network Associate (CCNA) Routing and Switching certification will depend on a number of factors including your availability, willingness to work long hours and your ability to absorb a lot of information in a short period of time. This white paper includes self-assessments and training recommendations to help you figure out if taking the CCNAX Routing and Switching Boot Camp or taking two separate ICND1 and ICND2 courses is the best fit for you.

Business Process Modeling: From Macro to Micro

Webinar – Recorded | Nov. 12, 2015

Business processes are complicated, and mapping them is not a trivial task. Modelling standards give us the tools to model complex processes, but they do not tell us the best way to approach a model or effectively use the tool. In this hour-long webinar, Global Knowledge instructor Rod Fage will guide you through the best way to develop a model, from determining the goal and scope of the process and measuring its effectiveness, to modelling the process in a hierarchical top-down approach, enabling business analyst to continuously validate the model.

IBM Cloud TechTalks (Part 4 of 4): Maximizing Business Agility with Cloud on a z System

Webinar – Recorded | Nov. 12, 2015

Cloud can be described as the ability for users to provision new environments and/or services in a self-service fashion backed by automation. z Systems use technologies that best allow us to apply the strengths of our platform to cloud methodologies while complying with industry standards and preserving the security and manageability of our platform. This enables us to use the strengths of z Systems scalable multitenant architecture for on-premise cloud deployments. z Systems can also expose valuable enterprise services in a secure manner that feels native to mobile and Web application developers, enabling organizations to use enterprise services on z Systems with a frictionless experience for distributed developers.

A Survey of IBM Power Systems Initiatives in Large-Scale Computing

White Paper | Oct. 23, 2015

The amount of data being produced does not seem to show any sign of slowing; if anything, it may in fact be exceeding projected growth rates. As these absolute limitations on raw hardware capacity begin to be felt, the importance of looking at all of the aspects of a computing infrastructure in order to tackle the future's truly large-scale computing demands, is imperative. This white paper examines how IBM's initiatives like Linux, Cloud Manager with OpenStack and the OpenPower Foundation IBM are meeting this challenge.

Red Hat Taste of Training - RH124

Video | Oct. 15, 2015

Red Hat Taste of Training - RH124

How to Update IBM WebSphere Portal Using the Scripting Interface Tool

White Paper | Oct. 12, 2015

Managing users' access to an organization's resources via portals is convenient with IBM's WebSphere Portal Scripting Interface. Compare tools available to the portal administrator and identify some use cases where IBM's Portal Scripting Interface may be the ideal choice. Review basic commands and find out how to create custom scripts.

Three Key Strategies for Preventing Problems with IBM WebSphere Business Process Manager V8.5

White Paper | Oct. 12, 2015

A major challenge of problem determination is dealing with unanticipated problems. It is much like detective work: finding clues, making educated guesses, verifying suspicions, and other considerations. An ideal strategy for problem prevention is to monitor the system regularly. Use the strategies outlined in this paper to minimize downtime and detective work so you can maximize performance.

Understanding Cisco Security Solutions: Are You Ready for a New Era of Risk?

White Paper | Oct. 06, 2015

The responsibility for securing organizational data has spread beyond the traditional IT professional. While there are more diverse security solutions, there are more diverse and sophisticated security threats. Security awareness and training is essential for everyone within an organization. Learn how Cisco has continued to evolve its security solutions and training.

Cisco Unified Collaboration Solutions Infrastructure Overview

White Paper | Sep. 25, 2015

The Cisco Unified Collaboration solutions offer anytime, anywhere access for organizations who need instant access to clients, vendors and remote employees. Cisco products enable authorized external users to connect to corporate resources, create different user groups and manage large scale deployments. Learn how Cisco Unified Collaboration infrastructure products can help you provide everything from call control which provides signaling and dial plan support to the expressway series providing firewall traversal for external access.

Technology Offers Convenience, Privacy Pays the Price

White Paper | Sep. 25, 2015

Technology is a wonderful thing, but it comes with a price: cybersecurity. Free Web browsers, social media sites and other digital services collect personal information like email addresses, phone numbers, place of employment, buying habits, mortgage data that is shared with advertisers. The availability of this information leaves us vulnerable to hackers. This white paper can help you learn more about what kind of personal data is typically collected, and how to secure your information online.

Cisco Collaboration Endpoints

White Paper | Sep. 17, 2015

Your clients, vendors and workforce don't always operate in the same building, state or country. Cisco Collaboration Endpoint products make communicating with your counterparts across town or on the other side of the world easy. This white paper provides you with product specifications and capabilities for Cisco's phone, desktop, and large screen immersive videoconferencing options.

IBM Cloud TechTalks (Part 3 of 4): Taking Your Power System Higher in the Cloud

Webinar – Recorded | Sep. 17, 2015

Do you want to take your Power System to higher levels of cloud functionality but don't know what's available? Join us for this free webinar, presented by IBM and sponsored by Global Knowledge, to hear senior power cloud consultants Vess Natchev and Kyle Wurgler share an exciting new cloud solution for Power Systems. In this interactive webinar, you'll gain insight on the details and features of the new cloud solution from IBM and VMware.

Taste of Training: Red Hat System Administration II

Video | Sep. 10, 2015

Building on command line skills for Linux administrators.

Aligning IT and Business for Better Results

Webinar – Recorded | Aug. 25, 2015

Businesses today are more dependent on technology than ever. And, more than ever, they're looking to IT for ways to improve employee productivity, customer service and innovation. The challenge is that in order to achieve results with technology, IT and the business have to work collaboratively. IT needs to be able to develop the right relationships and communicate with different stakeholders from a business perspective - not a technical one. As a result, the transformation of the IT department has become a top-level priority for many leading organizations. At the same time, business leaders need to strengthen their business technology IQ and play a more significant role in the governance of IT.

Data Breaches: What Can and Cannot Be Done

White Paper | Aug. 23, 2015

Experts agree that as long as there is data, there will be people trying to steal it. For every defense mechanism put in place, there is someone who will find a way to get around it. Constant vigilance, education of the workforce, and management support are all necessary to implement effective security policies. While a well-trained IT staff is key to protecting data, all employees must understand the importance of protecting company assets, including data.

Benefits of Virtual Classroom Live Cisco Training

Video | Aug. 20, 2015

Learn more about the many benefits of Global Knowledge's Virtual Classroom Live training.

Building Up Network Security: Intrusion Prevention and Sourcefire

Webinar – Recorded | Aug. 20, 2015

In this second webinar in a series dedicated to building up network security, network security specialist Catherine Paquet will fill you in on advanced threat protection that integrates real-time contextual awareness, intelligent security automation and superior performance with industry-leading network intrusion prevention, Sourcefire.

A Guide to Simplifying InfoSphere DataStage Change Management

White Paper | Aug. 19, 2015

Managing the change of DataStage components can often become a test of wills. Picture fitting a square peg in a round hole, and you might start to get the idea. The complexity of what is required to promote components from one environment to another during the development, testing, and eventual implementation in the production environments, should be and is often a controlled activity.

10 Ways Cloud is Changing the World

White Paper | Aug. 14, 2015

The cloud revolution is truly a revolution - the way we work, learn and even play is very different now than it was just 10 or 15 years and will probably be a lot more different in 10 or 15 years. With this in mind, let's look at 10 ways the cloud will (and to a large degree already has) changed the world.

Healthcare Organizations and Data Breach: How to Lower Risk and Reduce Liability

White Paper | Aug. 14, 2015

Discover why healthcare organizations must take an immediate active role in securing their data. It is much more costly, monetarily as well as with regard to reputation, for an organization to react to a breach rather than plan for it.