Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

63 Results Found

Results per page: 10 40 80

Two Great Security Features of VMware’s NSX Network Virtualization Platform

Article | Aug. 30, 2016

The VMware NSX platform combines networking and security functionality directly in the hypervisor and it interoperable with a vast majority of VMware’s products. The platform provides a set of logical networking elements and services, using logical switching, routing, load balancing, VPN, firewall, etc. This product decouples network functionality from the physical devices.

VMware Training White Paper: Using VMware NSX for the Microsegmentation of Security

White Paper | Oct. 07, 2016

The methods we have used in the past to secure our networks won’t work for tomorrow’s networks. Cloud-based applications and multi-tenant environments require greater scalability, agility and control. Software-defined networking (SDN), such as that provided by VMware NSX, can deliver a new platform that transforms networking and provides for much more specific control of the security of your data and networked applications.  In this white paper, author Bill Ferguson describes the microsegmentation of security and illustrates how you can use NSX to provide security that works on today’s and tomorrow’s networks.

How to Ask Your Company to Pay for VMware Training

Article | Oct. 16, 2017

A lot of IT pros would like to get their work to fund their training and certifications, but if the issue isn't approached with care and forethought, it can be dangerous territory. So how do you justify the costs of training? Luckily, a help desk tech in the healthcare field named R. Lee Young offered up some great suggestions.

How to Build a VMware vSphere 6.x Home Lab

White Paper | Dec. 12, 2017

Take your VMware vSphere training to the next level—set up your own training lab environment. This paper is broken down into three major sections: the hardware required, the VMware Workstation configuration, and installing vSphere and vCenter (vC).

10 IT CERTIFICATIONS EMPLOYERS LOOK FOR

Article | Nov. 01, 2018

How do you measure the experience and knowledge of an IT professional? One way is through certifications. Earning any certification is a notable achievement, though not all certifications carry the same perceived worth.

Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6.5 to 6.7

Webinar – Recorded | Dec. 13, 2018

VMware vSphere: ICM 6.7 is the foundation for most other VMware technologies in the software-defined data center. The recent update from 6.5 brings important new features and enhancements.

Develop Your Skills with Unlimited Access to Red Hat Online Learning

Webinar – Recorded | Jan. 31, 2019

The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.

Why Pentesting is Vital to the Modern DoD Workforce

Webinar – Recorded | Feb. 26, 2019

Watch this recorded webinar as CompTIA’s chief technology evangelist and Global Knowledge’s federal sales director discuss how pentesting has morphed.

Accelerating with Ansible

Webinar – Recorded | March 28, 2019

Watch John Walter, Solution Architect for Red Hat's Training and Certification team as he discusses the emergence of radically simple Ansible automation and answers your questions.

Top Tech Trends and Predictions for 2020

Article | Dec. 06, 2019

Global Knowledge subject matter experts predict the top trends for 2020 in IT training, Microsoft, Cisco, AWS, cybersecurity and more.

The 10 Most Important IT Skills for 2020

Article | Aug. 17, 2020

As IT departments struggle with skills gaps and businesses attempt to recovery economically from the COVID-19 pandemic, these 10 IT skills are essential to drive success. Job roles in these areas pay well, but decision-makers are struggling to find qualified candidates. If you’re looking to make an IT skills investment or start a new career path this year, these are the areas to consider.

From Analyst to Threat Hunter: How to Build the Skills for Tomorrow’s Hottest Cyber Jobs

Webinar – Recorded | Oct. 06, 2020

Whether you’re a current cyber pro looking to specialize, or new to the industry and looking for direction, Focal Point Academy’s lead cyber workforce expert can give you the insight needed to fast-track a career into today’s most in-demand cyber jobs, like Threat Hunting and Reverse Engineering. We’ll profile the top job roles for the next few years, break down the knowledge, skills, and abilities required in each, and show you how to build a training plan that gets you the job you want. And best of all, we’ll end with a special offer designed to help jump start the process for you and your team. View the slide deck>

Cybersecurity Awareness Fundamentals

Webinar – Recorded | Oct. 08, 2020

Expert Hesham Mahmoud discusses the importance of cybersecurity, how to secure your IT infrastructure and detect the latest vulnerabilities and threats your organization might encounter. This webinar will cover the latest cybersecurity trends and how to react to data breaches. View the slide deck>

Working from home – a hacker’s paradise!

Webinar – Recorded | Oct. 09, 2020

The novel coronavirus has changed many aspects of life for millions of people globally, including where they work. With the increase in remote work, it is important for both individuals and companies to be aware of the added cybersecurity risks. Join us as Paula shares real world examples and tips on how we all can be better prepared.

The Importance of Maintaining Cybersecurity Skills in a Virtual World

Webinar – Recorded | Oct. 19, 2020

The Information Technology (IT) profession is a pretty exciting place to be, right now. We’re seeing an unprecedented influx of new technologies and approaches, including AI, robotics, automation, and next-level networking. More importantly, today’s IT workers have become the guardians of identity and curators of information. Given the increased movement to remote working the IT community must be conscious their teams skillset in the midst of increasing and complex cybersecurity threats designed to hit organizations where it hurts...their people. If you’re curious about what it’s like to be part of the IT profession in quickly changing virtual world, then watch CompTIA’s Chief Technology Evangelist, Dr. James Stanger, to learn more. James discusses the pillars of IT that help create our (post)-modern world, and dispel a few myths about the cybersecurity profession. If you’re interested in learning more about the different cybersecurity pathways available to you, and how you can become a unique contributor to the cybersecurity profession, then we welcome you.

Deploying MITRE ATT&CK Navigator to Improve Incident Response

Webinar – Recorded | Oct. 20, 2020

The world of Incident Response is evolving. No longer do we focus on indicators of compromise; we now focus on attacker behavior. MITRE has turned attacker behaviors into a usable framework shared both on their website and on GitHub. MITRE provides the MITRE ATT&CK Navigator on GitHub which includes a complete mapping of all techniques and sub-techniques to help you understand the attacker’s behavior. The Navigator can be leveraged to optimize Incident Response, evolving your team from responsive to predictive response.

Keeping Safe While Video Conferencing

Webinar – Recorded | Oct. 26, 2020

The coronavirus pandemic changed how people around the world work and receive skills training. Virtual meeting services saw incredible growth, they also faced new security challenges. As a key Global Knowledge partner, we worked closely with Gary and the Zoom team as they rapidly upgraded their platform to ensure the maximum possible level of safety for all users. However, technology is only as powerful, or safe as the people who use it. So, in this webinar Gary will provide expert (and entertaining!) advice on how to use virtual meetings safely when there is not a Global Knowledge instructor on-hand to help. Joining Gary is Kevin, our CXO: another big personality with a wealth of IT experience and a passion for ensuring our customers receive the best possible experience, every time they connect with Global Knowledge.

18 IT and Business Certifications Worth Having

Article | Jan. 11, 2021

Here are 18 certification options, in no particular order, that are worth your effort based on site searches, feedback from subject matter experts and data in the Global Knowledge 2019 IT Skills and Salary Report.

Trends in Cybersecurity

Webinar – Recorded | Feb. 03, 2021

Organizations and individuals are threatened with ever-growing cyber threats and must be prepared to address them. The more we are connected to networks, the more suspectable we are to attacks, therefore enterprises must stay current applying various cybersecurity measures and maintaining awareness of cybersecurity trends. View the slide deck>    

Fundamentals of Red Hat Enterprise Linux

Webinar – Recorded | March 09, 2021

For organizations getting started with RHEL, Red Hat Training has developed a series of courses to develop the skills needed for basic administration and configuration of Red Hat Enterprise Linux. These courses introduce key command line concepts and enterprise-level tools, laying the foundation for the rapid deployment of Red Hat Enterprise Linux. The curriculum also introduces the basic administration skills needed for resolving configuration issues and integrating Red Hat Enterprise Linux systems with other existing environments. View the slide deck>>

Ansible Technical Overview & Key Features

Webinar – Recorded | April 13, 2021

For those that want to take their first steps towards Ansible adoption, Red Hat Training has developed several courses to teach you better ways to automate administrative tasks and use Red Hat Ansible Engine effectively, as well as how to leverage advanced features of Ansible to perform more complex tasks. This webinar will highlight the benefits to using Ansible to automate tasks across a variety of Red Hat Enterprise Linux, Windows, cloud, and networking devices. View the slide deck>>

OpenShift Technical Overview & Key Features

Webinar – Recorded | May 04, 2021

Containers and Red Hat OpenShift have quickly become the de facto solution for agile development and application deployment. Administrators and developers are increasingly seeking ways to improve application time to market and improve maintainability. Red Hat Training has developed a course that provides the gateway to container adoption by providing an understanding of the potential of DevOps using a container-based architecture. Orchestrating a container-based architecture with Kubernetes and Red Hat OpenShift improves application reliability and scalability, decreases developer overhead, and facilitates continuous integration and continuous deployment. View the slide deck>>

Top 10 Courses for System Administrators

Article | July 27, 2021

System Administrators, or SysAdmins, are the “installation specialists,” “configuration specialists” and “fixers” in IT. If you’ve ever seen Pulp Fiction, SysAdmins are like Winston Wolfe — their job is to solve problems.