Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

184 Results Found

Results per page: 10 40 80

Cybersecurity Specializations - Identity and Access Management

Video | Oct. 26, 2018

This video focuses on the roles and responsibilities of identity and access management job functions at successful cybersecurity organizations.  

How to Create a Better Cyber Defense by Building a Winning Cybersecurity Team

Webinar – Recorded | Oct. 24, 2018

For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.

Cybersecurity Specializations – Governance, Risk, and Compliance

Video | Oct. 23, 2018

This video focuses on the roles and responsibilities of governance, risk, and compliance job functions at successful cybersecurity organizations.  

Cybersecurity Specializations - Data Loss Prevention

Video | Oct. 18, 2018

This video focuses on the roles and responsibilities of cybersecurity data loss prevention engineers at successful cybersecurity organizations.  

Cybersecurity Specializations – Architecture and Policy

Video | Oct. 17, 2018

This video focuses on the roles and responsibilities of cybersecurity architecture and policy job functions at successful cybersecurity organizations.  

Basic Password Do’s and Don’ts

Video | Oct. 11, 2018

Understand how password length and complexity can make your passwords easy to guess or virtually impossible to bypass.

Data Protection for Mobile Phones

Video | Oct. 11, 2018

A mobile phone is just like a small computer, that can be hacked.  Learn basic mobile phone security practices to lock down this potential entry point to your corporate systems.

Top 5 Cyber Risks Targeting Modern Enterprise

Webinar – Recorded | Oct. 10, 2018

The Cyber Risk landscape is rapidly evolving leaving Cybersecurity professionals dazzled and lost in prioritizing their cybersecurity needs. Limited budget and low cyber resilience lead organizations in adopting re-active defensive measures. In this webinar, we will go through a methodological approach for assessing top cyber-risks a typical enterprise might encounter. And will address different scenarios for mitigating, transferring, or avoiding encountered risks.  

How a Firewall Functions

Video | Oct. 08, 2018

A firewall is a security tool which may be a hardware or software solution that is used to filter network traffic. Understand the basic functionality of a firewall where traffic is blocked or allowed to enter the network.

How to Create a Security Breach Incident Response Plan

Video | Oct. 08, 2018

An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Understand how an incident response team prepares, plans, and responds to a security breach.

How to Manage Security Risks

Video | Oct. 08, 2018

The goal of risk management is to reduce risk down to an acceptable or tolerable level. Understand countermeasures, safeguards, and security controls that can be selected to eliminate or reduce risk.

What is Malware, Ransomware, and Social Engineering

Video | Oct. 08, 2018

Networks are under attack as hackers try to access systems to compromise or steal sensitive data and information. Understand the threats posed by malware, ransomware and social engineering.

A Cyber Tale: How Failed Security Policies Exposed 40 Million Customers

Webinar – Recorded | Oct. 04, 2018

The Target breach exposed the credit card information of 40 million customers and made huge international headlines. But, the entry point should have been the real story. No matter how solid a company’s cyber defense, they have to be concerned with their entire cybersecurity exposure, including supply, partner and support chains. In the Target case, there were errors throughout. It was a breach waiting to happen.

A Complete Guide: How to Become a Google Certified Professional Cloud Architect

White Paper | Aug. 30, 2018

This Certification Prep Guide provides an overview of the current Google Certified Professional Cloud Architect certification and offers helpful tips that you can use when preparing for your GCP certification exam.

8 Specializations that Define Successful Cybersecurity Organizations

Article | Aug. 23, 2018

Cybersecurity has matured into a complex and diverse set of functions. Each of these functional specializations represent different roles requiring different knowledge, skills, and abilities.

What Are Common Mistakes in Cloud Security?

Webinar – Recorded | Aug. 22, 2018

Cloud and virtualization technologies have spawned a whole ecosystem of applications. But like any powerful technology, they can be used for bad as well as good. This session reviews the top 10 most common mistakes made in cloud and virtualization security.

A Complete Guide: How to Become an AWS Certified Architect

White Paper | Aug. 21, 2018

This Certification Prep Guide provides an overview of the current AWS Certified Solutions Architect – Associate certification and offers helpful tips that you can use when preparing for your AWS Architect certification exam.

How Secure is PowerShell?

Article | Aug. 20, 2018

Have you been afraid to implement PowerShell in your environment because of security fears? The reality of PowerShell security doesn’t always match the perception. When compared to other scripting languages, PowerShell is actually more secure by default.

How to Build a Pluggable IoT Pipeline in AWS

White Paper | July 23, 2018

As far as modern architectures go, there are few more complicated than an IoT pipeline. You’ve got to consider an ingestion layer (typically streaming) that may undergo manic load. You’ve got to think of data tagging, storage (probably across multiple engines), archival and access—both internal and external. And all of it has to scale like crazy, be as cost effective as possible, and use automation wherever it can. Oh, and your boss needs the IoT pipeline built by tomorrow. Short timelines? Tight budget? Unrealistic expectations? Unfortunately, these asks are realities for many cloud professionals. AWS knows this and is here to help.  

DDoS Is Still a Threat and It Matters How You Handle It

Article | July 18, 2018

Despite a growing awareness and preparation for distributed denial-of-service (DDoS) attacks, the overall arc of DDoS attacks is not weakening, but actually gaining more attention from the companies and personnel who have experienced these threats first-hand.

Success in the Digital Age: The Value of Investing in People

Special Report | July 06, 2018

In the digital age, people and intellectual property have supplanted physical assets as the most important criteria for determining the value of an organization. It is the employees who develop the next big product or improve the practices, processes, services and internal culture that add significant value to an organization.

Google Cloud Platform Security: A Data Fortress

Article | June 26, 2018

Google takes security to a whole new level thanks to their years of experience as one of the most popular targets on the internet for would-be hackers and denial of service bots. This led Google to build a sophisticated security infrastructure the likes of which few companies or organizations can claim. Google approaches security holistically and involves everything from the physical data centers, to the data pipelines between them, down to the training of each employee that is responsible for managing the infrastructure.

Cryptography Tools and Techniques

Article | June 25, 2018

Consider how many financial transactions are performed on the Internet everyday. Protecting all this data is of upmost importance. Cryptography can be defined as the process of concealing the contents of a message from all except those who know the key. Cryptography can be used for many purposes, but there are two types of cryptographic algorithms you need to understand, symmetric and asymmetric. Symmetric uses a single key, whereas asymmetric uses two keys. What else is required to have a good understanding of cryptography? It’s important to start with an understanding of how cryptography relates to the basic foundations of security: authentication, integrity, confidentiality, and non-repudiation.

How to Build a Winning Cybersecurity Team

White Paper | June 21, 2018

Based on the insight and relationships developed over many years, Global Knowledge has developed a best practices model of a superior cybersecurity organization—bringing our research and experience to bear and validating against hundreds of organizations, from the largest to the smallest. In studying world-class cybersecurity organizations, Global Knowledge discovered several critical characteristics that successful cybersecurity organizations all seem to share. So how does an organization like yours build a winning cybersecurity team? Let’s find out.

The Future is Now with AWS Certifications

Article | June 15, 2018

Yes, there’s big money in AWS Certification, which tends to outpace other cloud certification salaries, but there’s more to the cloud than dollars and cents.

What is Cryptojacking and How Can I Protect Myself?

Webinar – Recorded | Feb. 02, 2018

Driven by recent increases in cryptocurrency values, Cryptojacking is poised to be the center of conversation in 2018. It’s one of the latest innovations in hacking in which a victim’s computer is enlisted to mine cryptocurrency. Unlike ransomware, this attack steals processor cycles in an attempt to mine Monero and other currencies, typically without the user’s knowledge or consent. Watch this timely 1-hour webinar where we will discuss – A quick overview of cryptocurrencies. A walk-through of a typical attack. The economics of the attackers. Possible mitigation strategies to keep you and your organization safe. With miners trying to take advantage of the rising cryptocurrency industry, join us as we investigate this cyber-crime and learn how you can protect yourself and your organization. View our complete Cybersecurity curriculum for courses that help you build fundamental to advanced cybersecurity techniques, prepare for top industry-recognized certifications or master product-specific skills.

New Topics on the New Security+ SY0-501 Exam

White Paper | Jan. 25, 2018

It has been over three years since the last revision of the CompTIA Security+ exam back on May 1, 2014. In fall of 2017, the latest version, SY0-501, was released. This revamped exam retains the same six domains as established in SY0-401, which emphasizes security in three main areas: application, data, and host.

4 Tips to Strengthen Your Troubleshooting Skills

Article | Dec. 01, 2017

Follow these four troubleshooting tips to help you work through a challenging repair and reach a solution without much wasted time and resources.

Improve Your Time Management With Microsoft Outlook

Webinar – Recorded | Nov. 30, 2017

The profusion of email we receive every day is often blamed as our biggest productivity thief. Learn how Microsoft Outlook can help you manage not only your inbox, but your entire day. Watch this webinar and learn: Automating tasks Creating rules to manage your inbox Conditional Formatting Other tips and tricks to help you take control of your day Stop letting email manage your day and learn to take control with Microsoft Outlook. Take your first step and watch this webinar today! Outlook Training to Grow your Skills View our complete curriculum of 1-day hands-on Outlook courses on versions 2010, 2013 and 2016. Learn to benefit from all that Outlook can offer with our introductory and advanced level courses.

10 Network Security Tools and Tests Everyone Should Use

White Paper | Nov. 28, 2017

Whether you are operating a home system, overseeing a small startup, or performing security governance for an enterprise, everyone can benefit from paying attention to security. This white paper provides a list of 10 security tools and tests that will help you check out suspicious issues and keep ahead of new risks and threats.

Understanding Google Cloud Platform: Architecture

White Paper | Nov. 20, 2017

Google Cloud Platform (GCP) is Google’s public cloud offering comparable to Amazon Web Services and Microsoft Azure. The difference is that GCP is built upon Google's massive, cutting-edge infrastructure that handles the traffic and workload of all Google users. There is a wide range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). We will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.

Analyzing a Decade of IT Trends

White Paper | Nov. 16, 2017

The Global Knowledge IT Skills and Salary Report is a window into the inner workings of IT departments, revealing insights and opinions held by professionals around the world. For 10 years, we have surveyed over 120,000 men and women in IT about the state of the industry. With a decade of data at our fingertips, we analyzed 10 years’ worth of reports and noticed four major trending areas: certifications, salaries, cloud computing and cybersecurity. 

The Evolution of the IT Decision-Maker

White Paper | Nov. 16, 2017

For 10 years, Global Knowledge has surveyed IT professionals and published the findings in our annual IT Skills and Salary Report. With topics ranging from top-paying certifications to most in-demand skills, our reports have consistently provided a deep examination of the attitudes and opinions held by IT professionals around the globe. With a decade of reporting at our fingertips, we decided it was an appropriate time to dissect the views of those making the decisions in the tech industry. What are their biggest challenges? How have their training opinions changed over time? How do their actions affect staff?

Tackling 5 Taboo Topics in Cybersecurity People Management

Webinar – Recorded | Oct. 24, 2017

When it comes to cybersecurity, people are an organization’s greatest asset—after all cyber-attacks are people attacking people, not machines attacking machines. However, managing your cybersecurity team has its challenges and they are often more acute due to the worldwide skills shortage and the increasing sophistication of cyber criminals. In this 60-minute webinar, our panel of cybersecurity experts will discuss five unasked questions about cybersecurity people management like:  Do cybersecurity certifications create flight risk?  Do penetration testing and ethical hacking courses actually teach bad guys?  Is cybersecurity a differentiator? Does it improve your organization’s position or make you a target?  Do cybersecurity certifications really increase an individual’s earning potential?  Should organizations “hack back”? Is it unethical to preemptively hack?  Watch this webinar today as experts Dave Buster and Ross Casanova describe actionable steps you can take to navigate these minefields within your own team and organization. Related: Cybersecurity Certification Training

5 Secrets to Being a Success in IT

Article | Oct. 11, 2017

This article addresses non-technical skills you need to do to be a success in IT.

Top 10 Traits of Successful IT Pros

Article | Oct. 11, 2017

General character attributes every IT pro should have and on the things that every IT pro should know or do.

This Is What You Can Do To Promote Cyber Security Awareness Month

Article | Oct. 01, 2017

Whether or not you work in cybersecurity, National Cyber Security Awareness Month (NCSAM) is a great time to start promoting online safety awareness. Every October when NCSAM rolls around, we at Global Knowledge find it is an opportune time to do our part as an NCSAM Champion to spread the word about cybersecurity.

A Beginner's Guide to Encryption

Article | Aug. 29, 2017

It should come as no surprise that in this modern era of digital data we need encryption. But what exactly is it? How do you know what kind of encryption you need? If you were to ask someone what kind of encryption they use, they may respond with a specific encryption-based product, like full-disk encryption. Or they may mention an encryption-based protocol, like HTTPS (HyperText Transport Protocol over SSL). But encryption is much more complicated than that.

Ten IT Skills on the Brink of Extinction

Article | Aug. 19, 2017

To help you stay ahead of the game, here are ten IT skills that are on the brink of extinction.

The Story Behind Cloudera and Big Data

Article | July 15, 2017

We spoke with Doug Cutting about his role with Cloudera and learned more about Big Data, training options for IT professionals interested in Big Data, and how Cloudera compares to Red Hat.