Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

192 Results Found

Results per page: 10 40 80

5 Most Popular IT Certifications for 2020

Article | May 11, 2020

While cybersecurity remains the most popular certification category in our IT Skills and Salary Report, foundational-level certifications highlight our list of the most popular IT certifications of 2020. 

Cyberwarfare: Origins, Motivations and What You Can Do in Response

White Paper | May 04, 2020

This cybersecurity white paper explores the origins and motivations of cyberwarfare, and provides actions you can take in response.

Awesomely Geeky IT Pranks

Article | March 30, 2020

If you’ve been wondering what are some good IT pranks for April Fools’ Day—or any other time of the year—this is the post for you. Whether you’re an IT pro with decades of experience or a noob who is about to learn that holding CTRL+SHIFT+ESC is a faster way to access the task manager (you’re welcome), we have an IT prank for you.

Women in Tech Leadership Profile: Skills, Job Roles and Certifications

Article | March 06, 2020

For women in IT, advancing your career can be a challenge in itself. In the Global Knowledge 2019 IT Skills and Salary Report, only eight percent of senior- and executive-level IT professionals are women. We have pulled data from our research that sheds light on the job roles, skills, challenges, certifications and experience of women in tech who have progressed to the highest levels of an organization.

Most Popular and Most Pursued IT Certifications by Women in Tech

Article | March 04, 2020

According to the Global Knowledge IT Skills and Salary Report, women make up 16% of the tech workforce, and an even smaller percentage (8%) are at the senior or executive level. Here’s an overview of the most popular and most pursued certifications by women in tech.

Is Degree Deflation IT’s Solution for Hiring Challenges and Reducing Costs?

Article | Jan. 03, 2020

IT organizations could benefit from degree deflation. By deemphasizing college degrees during the hiring process, an open pipeline to more candidates could emerge, leading to diminished skills gaps and potentially lower payroll.

Top Tech Trends and Predictions for 2020

Article | Dec. 06, 2019

Global Knowledge subject matter experts predict the top trends for 2020 in IT training, Microsoft, Cisco, AWS, cybersecurity and more.

Business Analysis in 30 Minutes

Webinar – Recorded | Dec. 03, 2019

A quick 30 minute introduction to Business Analysis for those who are considering the field. This webinar looks at why the BA is essential to the business, what BAs do, and certification paths for Business Analysts. View the slide deck>

Top Cybersecurity Certifications to Enhance Your Career

Article | Oct. 04, 2019

Managers are in dire need of cybersecurity professionals with specific skills. If you’re looking to advance your career, or transfer into the cyber field, now is the time to get certified.

Help Wanted: Cybersecurity Professionals Needed

Article | Sep. 18, 2019

Cybersecurity is a top technology investment area around the globe, with over half of our survey respondents saying it’s a priority. It’s no longer a niche skill—every IT professional needs some cybersecurity knowledge.

Training is an Investment, Not an Expense

Article | Aug. 30, 2019

Explore how IT decision-makers’ training views have changed since we first released our annual IT Skills and Salary Report 12 years ago. Once viewed as an expense, IT leadership now sees professional development as an investment. Even with shrinking budgets and a recent rise in skills gaps, the value of training is currently at an all-time high.

IT Certifications: 5 New Realities

Article | Aug. 27, 2019

The value of IT certifications has grown considerably over the last decade. Examine the evolution of certification trends, see the top-paying certifications and learn how decision-makers are struggling to hire certified employees.

5 Highest-Paying ISACA Certifications

Article | July 09, 2019

ISACA certifications are some of the most popular and highest-paying in the Global Knowledge 2019 IT Skills and Salary Report. Eleven percent of IT professionals in the United States and Canada are ISACA-certified, and their salaries are 12% above the North American average.

Why is CISSP a Top-Paying IT Certification?

Article | July 09, 2019

This year, CISSP-certified IT professionals have the third highest global salary ($116,573) and the 10th highest in North America ($123,815). This is nothing new—CISSP has ranked in the top 10 in the U.S. each year since 2015, even coming in first in 2018. CISSP is a top-paying certification year after year. But how has it remained so relevant and valuable?

Ethical Hacking: A Good Defense Starts with Offensive Security

Article | June 21, 2019

There are two types of networks: those that have been hacked and those that will be. To defend against hacks, cyber professionals can benefit greatly from ethical hacking programs.

PAN-OS - Network Security/Prevention Everywhere

Webinar – Recorded | May 23, 2019

Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This recorded webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment.

A Question about “Hacking Back” — Is it Legal?

Article | April 09, 2019

Should an organization that is the victim of an intentional nefarious hacking activity resort to retaliation? It’s a question that has been gathering a lot of attention. Retaliating against bad actors might seem appealing, but what are the legal ramifications? In this article, find out if there is a legal precedent to "hacking back."

Why Pentesting is Vital to the Modern DoD Workforce

Webinar – Recorded | Feb. 26, 2019

Watch this recorded webinar as CompTIA’s chief technology evangelist and Global Knowledge’s federal sales director discuss how pentesting has morphed.

How to Maximize Your Training Budget

Webinar – Recorded | Feb. 21, 2019

In this informative webinar, you will learn about the popular and overlooked ways organizations and professionals can purchase training to become more resilient. 

Cybersecurity Specializations – Penetration Testing

Video | Nov. 26, 2018

This video focuses on the roles and responsibilities of penetration testing job functions at successful cybersecurity organizations.  

Cybersecurity Specializations – Secure Software Development

Video | Nov. 26, 2018

This video focuses on the roles and responsibilities of secure software development job functions at successful cybersecurity organizations.

How to Optimize and Improve Your AWS Architecture

Webinar – Recorded | Nov. 15, 2018

In this one-hour webinar, AWS consultant and instructor Ryan Dymek, will discuss how to optimize your AWS architecture design.

Cybersecurity Specializations – Incident Response and Forensic Analysis

Video | Oct. 31, 2018

This video focuses on the roles and responsibilities of incident response and forensic analysis job functions at successful cybersecurity organizations. 

Cybersecurity Specializations – Secure DevOps

Video | Oct. 31, 2018

This video focuses on the roles and responsibilities of secure devops and devsecops job functions at successful cybersecurity organizations. 

Cybersecurity Specializations - Identity and Access Management

Video | Oct. 26, 2018

This video focuses on the roles and responsibilities of identity and access management job functions at successful cybersecurity organizations.  

How to Create a Better Cyber Defense by Building a Winning Cybersecurity Team

Webinar – Recorded | Oct. 24, 2018

For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.

Cybersecurity Specializations – Governance, Risk, and Compliance

Video | Oct. 23, 2018

This video focuses on the roles and responsibilities of governance, risk, and compliance job functions at successful cybersecurity organizations.  

Cybersecurity Specializations - Data Loss Prevention

Video | Oct. 18, 2018

This video focuses on the roles and responsibilities of cybersecurity data loss prevention engineers at successful cybersecurity organizations.  

Cybersecurity Specializations – Architecture and Policy

Video | Oct. 17, 2018

This video focuses on the roles and responsibilities of cybersecurity architecture and policy job functions at successful cybersecurity organizations.  

Basic Password Do’s and Don’ts

Video | Oct. 11, 2018

Understand how password length and complexity can make your passwords easy to guess or virtually impossible to bypass.

Data Protection for Mobile Phones

Video | Oct. 11, 2018

A mobile phone is just like a small computer, that can be hacked.  Learn basic mobile phone security practices to lock down this potential entry point to your corporate systems.

Top 5 Cyber Risks Targeting Modern Enterprise

Webinar – Recorded | Oct. 10, 2018

The Cyber Risk landscape is rapidly evolving leaving Cybersecurity professionals dazzled and lost in prioritizing their cybersecurity needs. Limited budget and low cyber resilience lead organizations in adopting re-active defensive measures. In this webinar, we will go through a methodological approach for assessing top cyber-risks a typical enterprise might encounter. And will address different scenarios for mitigating, transferring, or avoiding encountered risks.  

How a Firewall Functions

Video | Oct. 08, 2018

A firewall is a security tool which may be a hardware or software solution that is used to filter network traffic. Understand the basic functionality of a firewall where traffic is blocked or allowed to enter the network.

How to Create a Security Breach Incident Response Plan

Video | Oct. 08, 2018

An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Understand how an incident response team prepares, plans, and responds to a security breach.

How to Manage Security Risks

Video | Oct. 08, 2018

The goal of risk management is to reduce risk down to an acceptable or tolerable level. Understand countermeasures, safeguards, and security controls that can be selected to eliminate or reduce risk.

IT Horror Stories

Article | Oct. 08, 2018

We asked for your top IT horror stories, and you delivered. Read the most unexpected and cringe-worthy IT nightmares from fellow IT professionals.

What is Malware, Ransomware, and Social Engineering

Video | Oct. 08, 2018

Networks are under attack as hackers try to access systems to compromise or steal sensitive data and information. Understand the threats posed by malware, ransomware and social engineering.

Top 5 Must-Have Skills for IT Departments

Article | Sep. 01, 2018

Technology trends such as these show no signs of abating, and IT administrators need to be prepared. Having a well-rounded and versatile team of IT practitioners is becoming increasingly necessary. In the following article, we examine five key skills that every IT department should have covered, regardless of the size of the company.

How Secure is PowerShell?

Article | Aug. 20, 2018

Have you been afraid to implement PowerShell in your environment because of security fears? The reality of PowerShell security doesn’t always match the perception. When compared to other scripting languages, PowerShell is actually more secure by default.

How to Build a Pluggable IoT Pipeline in AWS

White Paper | July 23, 2018

As far as modern architectures go, there are few more complicated than an IoT pipeline. You’ve got to consider an ingestion layer (typically streaming) that may undergo manic load. You’ve got to think of data tagging, storage (probably across multiple engines), archival and access—both internal and external. And all of it has to scale like crazy, be as cost effective as possible, and use automation wherever it can. Oh, and your boss needs the IoT pipeline built by tomorrow. Short timelines? Tight budget? Unrealistic expectations? Unfortunately, these asks are realities for many cloud professionals. AWS knows this and is here to help.