102 Results Found
A brief introduction to the basics of penetration testing.
This overview of the Cisco On-Demand Learning portfolio covers the various products and solutions available. Including all access collections, certification e-camps, and individual course titles. With Cisco On-Demand Learning you can train your workforce easily and effectively.
Experience the best of instructor-led and on-demand learning. Blended Live from Global Knowledge combines the expert direction of instructor-led training and the flexibility of on-demand learning and will enable you to close critical skills gaps more effectively while maintaining your day to day responsibilities.
A firewall is a security tool which may be a hardware or software solution that is used to filter network traffic. Understand the basic functionality of a firewall where traffic is blocked or allowed to enter the network.
An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Understand how an incident response team prepares, plans, and responds to a security breach.
The goal of risk management is to reduce risk down to an acceptable or tolerable level. Understand countermeasures, safeguards, and security controls that can be selected to eliminate or reduce risk.
Networks are under attack as hackers try to access systems to compromise or steal sensitive data and information. Understand the threats posed by malware, ransomware and social engineering.
Understand how password length and complexity can make your passwords easy to guess or virtually impossible to bypass.
A mobile phone is just like a small computer, that can be hacked. Learn basic mobile phone security practices to lock down this potential entry point to your corporate systems.
This video focuses on the roles and responsibilities of cybersecurity architecture and policy job functions at successful cybersecurity organizations.
This video focuses on the roles and responsibilities of cybersecurity data loss prevention engineers at successful cybersecurity organizations.
This video focuses on the roles and responsibilities of governance, risk, and compliance job functions at successful cybersecurity organizations.
This video focuses on the roles and responsibilities of identity and access management job functions at successful cybersecurity organizations.
This video focuses on the roles and responsibilities of incident response and forensic analysis job functions at successful cybersecurity organizations.
This video focuses on the roles and responsibilities of secure devops and devsecops job functions at successful cybersecurity organizations.
This video focuses on the roles and responsibilities of penetration testing job functions at successful cybersecurity organizations.
This video focuses on the roles and responsibilities of secure software development job functions at successful cybersecurity organizations.
Learn more about the Blended Live delivery format from Global Knowledge.
What we love about our annual IT Skills and Salary Survey is that IT professionals are thoughtful and honest with their answers … well, sometimes a little too honest. Here are actual open-field comments from the 2019 survey. #ITGetsReal
An quick fundamental overview of layer two devices. To learn more about this and similar topics, enroll in our exclusive Understanding Networking Fundamentals course.
A career in Cybersecurity means being a lifelong learner. New attacks are constantly being invented, and cybersecurity engineers must respond to them in new ways. This video introduces a new supply chain attack, which provides a fascinating glimpse into the incredible skills of state sponsored professional hackers.
The cloud in general and specifically the Microsoft Azure cloud enables companies to act faster. They can adapt new processes and implement new technology much quicker than they were able to in the past. They do it without the huge investments they had, but it comes with a monthly subscription cost and some ‘pay as you go’ costs. Where in the past (file)servers where implemented as the platform for solutions, it is now the Microsoft Azure cloud as the solution platform.