Global Knowledge is now a Skillsoft company.  LEARN MORE >

Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

161 Results Found

Results per page: 10 40 80

Python – The World’s Most Useful Language

Webinar – Recorded | Jan. 21, 2020

This webinar will discuss our Python offerings and how it is proving to be the language of Data Science, Artificial Intelligence and Deep Learning. View the slide deck>

Palo Alto Networks - Firewall Essentials

Webinar – Recorded | Dec. 17, 2019

Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment. View the slide deck>

Top Tech Trends and Predictions for 2020

Article | Dec. 06, 2019

Global Knowledge subject matter experts predict the top trends for 2020 in IT training, Microsoft, Cisco, AWS, cybersecurity and more.

Top Cybersecurity Certifications to Enhance Your Career

Article | Oct. 04, 2019

Managers are in dire need of cybersecurity professionals with specific skills. If you’re looking to advance your career, or transfer into the cyber field, now is the time to get certified.

Help Wanted: Cybersecurity Professionals Needed

Article | Sep. 18, 2019

Cybersecurity is a top technology investment area around the globe, with over half of our survey respondents saying it’s a priority. It’s no longer a niche skill—every IT professional needs some cybersecurity knowledge.

Training is an Investment, Not an Expense

Article | Aug. 30, 2019

Explore how IT decision-makers’ training views have changed since we first released our annual IT Skills and Salary Report 12 years ago. Once viewed as an expense, IT leadership now sees professional development as an investment. Even with shrinking budgets and a recent rise in skills gaps, the value of training is currently at an all-time high.

IT Certifications: 5 New Realities

Article | Aug. 27, 2019

The value of IT certifications has grown considerably over the last decade. Examine the evolution of certification trends, see the top-paying certifications and learn how decision-makers are struggling to hire certified employees.

5 Highest-Paying ISACA Certifications

Article | July 09, 2019

ISACA certifications are some of the most popular and highest-paying in the Global Knowledge 2019 IT Skills and Salary Report. Eleven percent of IT professionals in the United States and Canada are ISACA-certified, and their salaries are 12% above the North American average.

Why is CISSP a Top-Paying IT Certification?

Article | July 09, 2019

This year, CISSP-certified IT professionals have the third highest global salary ($116,573) and the 10th highest in North America ($123,815). This is nothing new—CISSP has ranked in the top 10 in the U.S. each year since 2015, even coming in first in 2018. CISSP is a top-paying certification year after year. But how has it remained so relevant and valuable?

Ethical Hacking: A Good Defense Starts with Offensive Security

Article | June 21, 2019

There are two types of networks: those that have been hacked and those that will be. To defend against hacks, cyber professionals can benefit greatly from ethical hacking programs.

PAN-OS - Network Security/Prevention Everywhere

Webinar – Recorded | May 23, 2019

Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This recorded webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment.

A Question about “Hacking Back” — Is it Legal?

Article | April 09, 2019

Should an organization that is the victim of an intentional nefarious hacking activity resort to retaliation? It’s a question that has been gathering a lot of attention. Retaliating against bad actors might seem appealing, but what are the legal ramifications? In this article, find out if there is a legal precedent to "hacking back."

Why Pentesting is Vital to the Modern DoD Workforce

Webinar – Recorded | Feb. 26, 2019

Watch this recorded webinar as CompTIA’s chief technology evangelist and Global Knowledge’s federal sales director discuss how pentesting has morphed.

Cybersecurity Specializations – Penetration Testing

Video | Nov. 26, 2018

This video focuses on the roles and responsibilities of penetration testing job functions at successful cybersecurity organizations.  

Cybersecurity Specializations – Secure Software Development

Video | Nov. 26, 2018

This video focuses on the roles and responsibilities of secure software development job functions at successful cybersecurity organizations.

Cybersecurity Specializations – Incident Response and Forensic Analysis

Video | Oct. 31, 2018

This video focuses on the roles and responsibilities of incident response and forensic analysis job functions at successful cybersecurity organizations. 

Cybersecurity Specializations – Secure DevOps

Video | Oct. 31, 2018

This video focuses on the roles and responsibilities of secure devops and devsecops job functions at successful cybersecurity organizations. 

Cybersecurity Specializations - Identity and Access Management

Video | Oct. 26, 2018

This video focuses on the roles and responsibilities of identity and access management job functions at successful cybersecurity organizations.  

How to Create a Better Cyber Defense by Building a Winning Cybersecurity Team

Webinar – Recorded | Oct. 24, 2018

For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.

Cybersecurity Specializations – Governance, Risk, and Compliance

Video | Oct. 23, 2018

This video focuses on the roles and responsibilities of governance, risk, and compliance job functions at successful cybersecurity organizations.  

Cybersecurity Specializations - Data Loss Prevention

Video | Oct. 18, 2018

This video focuses on the roles and responsibilities of cybersecurity data loss prevention engineers at successful cybersecurity organizations.  

Cybersecurity Specializations – Architecture and Policy

Video | Oct. 17, 2018

This video focuses on the roles and responsibilities of cybersecurity architecture and policy job functions at successful cybersecurity organizations.  

Basic Password Do’s and Don’ts

Video | Oct. 11, 2018

Understand how password length and complexity can make your passwords easy to guess or virtually impossible to bypass.

Data Protection for Mobile Phones

Video | Oct. 11, 2018

A mobile phone is just like a small computer, that can be hacked.  Learn basic mobile phone security practices to lock down this potential entry point to your corporate systems.

Top 5 Cyber Risks Targeting Modern Enterprise

Webinar – Recorded | Oct. 10, 2018

The Cyber Risk landscape is rapidly evolving leaving Cybersecurity professionals dazzled and lost in prioritizing their cybersecurity needs. Limited budget and low cyber resilience lead organizations in adopting re-active defensive measures. In this webinar, we will go through a methodological approach for assessing top cyber-risks a typical enterprise might encounter. And will address different scenarios for mitigating, transferring, or avoiding encountered risks.  

How a Firewall Functions

Video | Oct. 08, 2018

A firewall is a security tool which may be a hardware or software solution that is used to filter network traffic. Understand the basic functionality of a firewall where traffic is blocked or allowed to enter the network.

How to Create a Security Breach Incident Response Plan

Video | Oct. 08, 2018

An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Understand how an incident response team prepares, plans, and responds to a security breach.

How to Manage Security Risks

Video | Oct. 08, 2018

The goal of risk management is to reduce risk down to an acceptable or tolerable level. Understand countermeasures, safeguards, and security controls that can be selected to eliminate or reduce risk.

What is Malware, Ransomware, and Social Engineering

Video | Oct. 08, 2018

Networks are under attack as hackers try to access systems to compromise or steal sensitive data and information. Understand the threats posed by malware, ransomware and social engineering.

How Secure is PowerShell?

Article | Aug. 20, 2018

Have you been afraid to implement PowerShell in your environment because of security fears? The reality of PowerShell security doesn’t always match the perception. When compared to other scripting languages, PowerShell is actually more secure by default.

DDoS Is Still a Threat and It Matters How You Handle It

Article | July 18, 2018

Despite a growing awareness and preparation for distributed denial-of-service (DDoS) attacks, the overall arc of DDoS attacks is not weakening, but actually gaining more attention from the companies and personnel who have experienced these threats first-hand.

Success in the Digital Age: The Value of Investing in People

Special Report | July 06, 2018

In the digital age, people and intellectual property have supplanted physical assets as the most important criteria for determining the value of an organization. It is the employees who develop the next big product or improve the practices, processes, services and internal culture that add significant value to an organization.

Google Cloud Platform Security: A Data Fortress

Article | June 26, 2018

Google takes security to a whole new level thanks to their years of experience as one of the most popular targets on the internet for would-be hackers and denial of service bots. This led Google to build a sophisticated security infrastructure the likes of which few companies or organizations can claim. Google approaches security holistically and involves everything from the physical data centers, to the data pipelines between them, down to the training of each employee that is responsible for managing the infrastructure.

Cryptography Tools and Techniques

Article | June 25, 2018

Consider how many financial transactions are performed on the Internet everyday. Protecting all this data is of upmost importance. Cryptography can be defined as the process of concealing the contents of a message from all except those who know the key. Cryptography can be used for many purposes, but there are two types of cryptographic algorithms you need to understand, symmetric and asymmetric. Symmetric uses a single key, whereas asymmetric uses two keys. What else is required to have a good understanding of cryptography? It’s important to start with an understanding of how cryptography relates to the basic foundations of security: authentication, integrity, confidentiality, and non-repudiation.

What is Cryptojacking and How Can I Protect Myself?

Webinar – Recorded | Feb. 02, 2018

Driven by recent increases in cryptocurrency values, Cryptojacking is poised to be the center of conversation in 2018. It’s one of the latest innovations in hacking in which a victim’s computer is enlisted to mine cryptocurrency. Unlike ransomware, this attack steals processor cycles in an attempt to mine Monero and other currencies, typically without the user’s knowledge or consent. Watch this timely 1-hour webinar where we will discuss – A quick overview of cryptocurrencies. A walk-through of a typical attack. The economics of the attackers. Possible mitigation strategies to keep you and your organization safe. With miners trying to take advantage of the rising cryptocurrency industry, join us as we investigate this cyber-crime and learn how you can protect yourself and your organization. View our complete Cybersecurity curriculum for courses that help you build fundamental to advanced cybersecurity techniques, prepare for top industry-recognized certifications or master product-specific skills.

New Topics on the New Security+ SY0-501 Exam

White Paper | Jan. 25, 2018

It has been over three years since the last revision of the CompTIA Security+ exam back on May 1, 2014. In fall of 2017, the latest version, SY0-501, was released. This revamped exam retains the same six domains as established in SY0-401, which emphasizes security in three main areas: application, data, and host.

10 Network Security Tools and Tests Everyone Should Use

White Paper | Nov. 28, 2017

Whether you are operating a home system, overseeing a small startup, or performing security governance for an enterprise, everyone can benefit from paying attention to security. This white paper provides a list of 10 security tools and tests that will help you check out suspicious issues and keep ahead of new risks and threats.

Analyzing a Decade of IT Trends

White Paper | Nov. 16, 2017

The Global Knowledge IT Skills and Salary Report is a window into the inner workings of IT departments, revealing insights and opinions held by professionals around the world. For 10 years, we have surveyed over 120,000 men and women in IT about the state of the industry. With a decade of data at our fingertips, we analyzed 10 years’ worth of reports and noticed four major trending areas: certifications, salaries, cloud computing and cybersecurity. 

This Is What You Can Do To Promote Cyber Security Awareness Month

Article | Oct. 01, 2017

Whether or not you work in cybersecurity, National Cyber Security Awareness Month (NCSAM) is a great time to start promoting online safety awareness. Every October when NCSAM rolls around, we at Global Knowledge find it is an opportune time to do our part as an NCSAM Champion to spread the word about cybersecurity.

“Reasonable Security” Best Practices: Learning From Notable Data Breaches

White Paper | Nov. 28, 2016

Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a breach. But what is "reasonable security," and is there a definition?