Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

191 Results Found

Results per page: 10 40 80

Project Managers are Makers; Change Managers are Shakers!

Webinar – Recorded | May 28, 2015

Change managers and project managers come at the same goal of maximizing ROI for their organizations, but from different perspectives and approaches and with different skill sets. While project managers are responsible for achieving specific objectives on time and on budget, the change manager's role is broader. Change managers apply a structured approach to helping individuals, teams and organizations negotiate relentless change. A project manager turns ideas into reality. Increasingly, project managers are required to take on the role of change manager as well. Business today can't afford to carry out tasks without considering the larger picture. Today, integration is unavoidable - and expected. In this hour-long interactive session, we'll discuss the similarities and differences between project management and change management. We'll also identify the occasions when both a project manager and a change manager might be needed.

Network Forensics for Attack Mitigation

White Paper | June 11, 2015

The network forensics market is set to dramatically expand as increasing numbers of organizations become the victims of malware attacks. Limiting the damage from these incursions, and avoiding potentially crippling losses, are key motivators for businesses of any size. And network forensics offers a powerful set of tools to help companies achieve those goals.

The Impact of IIBA's New BABOK® Guide and PMI's New Business Analysis for Practitioners Guide

Webinar – Recorded | June 25, 2015

The past months have seen the release of both the International Institute of Business Analysis (IIBA)'s long-awaited A Guide to the Business Analysis Body of Knowledge (BABOK® Guide) v3 and the Project Management Institute® (PMI®)'s Business Analysis for Practitioners. While both represent interesting developments in the field of business analysis, they also provide lots of information to process. There's no need to go it alone! Join Global Knowledge instructors Cheryl Lee and Adam McClellan for this complimentary, hour- long webinar to learn about the differences between the two guides, how both guides compare to the previous version of the BABOK ® Guide, and where all this might be going.

Building Up Network Security: An Introduction

Webinar – Recorded | July 16, 2015

Despite advances in security, hackers continue to break through network defenses. In this hour-long webinar, network security specialist Catherine Paquet will examine the favorite methods and targets of hackers and will introduce you to the different categories of security technologies. In this foundational presentation, you will learn about the benefits of security solutions such as firewalls, VPNs, IPS, identity services and BYOD.

PMP Formula of the Week: Point of Total Assumption

Article | Aug. 10, 2015

Your organization and a seller have just agreed to a contract with a total cost of $150,000, an estimated profit of $10,000, buyer/seller sharing of 70/30 and a ceiling price of $170,000. What is the PTA (point of total assumption)? A. $170,000 B. $160,000 C. $164,2...

Four-Point Plan for Developing Durable Project Management Talent

Webinar – Recorded | Aug. 13, 2015

Introducing new talent to an established organization can be difficult for many reasons. Seasoned employees may view the incoming new hires as "too green" or as not having the required skills to contribute in a meaningful way. They may worry about having to "waste time" teaching the newbies things that they should already know or get aggravated when the new employees are not familiar with "the way we do things around here." Additionally, it is difficult to know if the right new hires are being put into the right positions for their interests, abilities and talents. After all, a resume and an interview can only tell a hiring manager so much about the person they are bringing on board, and often talented employees are simply being put into a role that is not a good fit.

Proving Project Value

Webinar – Recorded | Aug. 13, 2015

We often discuss how to manage projects, but we overlook an essential step: proving project value. Proving project value ensures that organizational strategies are aligned with project objectives.

Healthcare Organizations and Data Breach: How to Lower Risk and Reduce Liability

White Paper | Aug. 14, 2015

Discover why healthcare organizations must take an immediate active role in securing their data. It is much more costly, monetarily as well as with regard to reputation, for an organization to react to a breach rather than plan for it.

PMP Formula of the Week: Rent, Lease or Buy?

Article | Aug. 17, 2015

You are the project manager on a construction project where you are deliberating between renting, leasing or purchasing a large piece of equipment. Equipment pricing: Rent at a cost of $2,500 per day; Lease for a 60 day period at $2,500 per day, with a 10% discount; Purchase at a price of $100,000. By looking at your project schedule, you have estimated that you will use the equipment about 50 to 60 days. Based only on price, which decision would you recommend?

Data Breaches: What Can and Cannot Be Done

White Paper | Aug. 23, 2015

Experts agree that as long as there is data, there will be people trying to steal it. For every defense mechanism put in place, there is someone who will find a way to get around it. Constant vigilance, education of the workforce, and management support are all necessary to implement effective security policies. While a well-trained IT staff is key to protecting data, all employees must understand the importance of protecting company assets, including data.

Technology Offers Convenience, Privacy Pays the Price

White Paper | Sep. 25, 2015

Technology is a wonderful thing, but it comes with a price: cybersecurity. Free Web browsers, social media sites and other digital services collect personal information like email addresses, phone numbers, place of employment, buying habits, mortgage data that is shared with advertisers. The availability of this information leaves us vulnerable to hackers. This white paper can help you learn more about what kind of personal data is typically collected, and how to secure your information online.

Understanding Cisco Security Solutions: Are You Ready for a New Era of Risk?

White Paper | Oct. 06, 2015

The responsibility for securing organizational data has spread beyond the traditional IT professional. While there are more diverse security solutions, there are more diverse and sophisticated security threats. Security awareness and training is essential for everyone within an organization. Learn how Cisco has continued to evolve its security solutions and training.

The Unpleasant Truths of Modern Business Cybersecurity

Webinar – Recorded | Oct. 15, 2015

From the largest to the smallest company, the inescapable truth is that with the click of a few keys or even a simple phone call, intruders can bypass all of your carefully constructed security. According to the Ponemon Institute's 2015 Cost of Data Breach Study, the average total cost of a data breach increased from $3.52 million to $3.79 million in 2014. While a number of major data breaches have made the news, often overlooked are the events and decisions that set the stage for the breach to occur. In this hour-long webinar, Global Knowledge instructor Phill Shade will walk through a number of key areas in which today's decisions set the stage for tomorrow's breach.

PMP Formula of the Week: Confidence Level

Article | Nov. 02, 2015

You are estimating the total project cost using three points for cost estimates with a 95 percent confidence level. What is the cost estimate range if the estimated project cost is $120,000 and the standard deviation is $2,500?

Benefits of an “Agile” Mindset

Article | Nov. 24, 2015

Projects are a social endeavor. Traditional project management approaches have shied away from the social advantages a more agile project environment brings. By nature, we are storytelling, pattern seeking and social people. We need colocation to shine truly in a project environment.

15 Top-Paying Certifications for 2016

Special Report | Jan. 01, 2016

Which mainstay certifications should be in your list of credentials? What's the next up-and-coming certification? This article will help you answer both questions by providing a review of the 15 top-paying certifications.

What “Good Cyber Resilience” Is and How to Get There

Webinar – Recorded | May 26, 2016

Cyber resilience is becoming a bigger issue for all organizations. But what does “good cyber resilience” look like? And how do you get there?

Two Great Security Features of VMware’s NSX Network Virtualization Platform

Article | Aug. 30, 2016

The VMware NSX platform combines networking and security functionality directly in the hypervisor and it interoperable with a vast majority of VMware’s products. The platform provides a set of logical networking elements and services, using logical switching, routing, load balancing, VPN, firewall, etc. This product decouples network functionality from the physical devices.

Understanding Pen Testing

Video | Nov. 23, 2016

A brief introduction to the basics of penetration testing.

“Reasonable Security” Best Practices: Learning From Notable Data Breaches

White Paper | Nov. 28, 2016

Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a breach. But what is "reasonable security," and is there a definition?

PMBOK Guide 6th Edition: A Deep Dive into the Changes

Article | Dec. 02, 2016

Are you prepping for the PMP exam? What should you know about the impending new edition of A Guide to the Project Management Body of Knowledge PMBOK® Guide before scheduling your examination?

Project Managers in Agile - Where do They Fit In?

Webinar – Recorded | March 31, 2017

Agile project management literally turns the world of managing projects upside down. The triple constraint is balanced in an unconventional way, the role of the matrix team coordinator is downplayed, and risk management can be built into the prioritization approach. So, what is left for the PM to do?

3 Project Manager Skills to Improve Project Team Success

Article | April 04, 2017

The question of how a project manager working in a functional or matrix organizational structure gets team members to perform is asked in almost every project management class I have taught.

Is Agile the Best Way Forward for Your Organization?

Webinar – Recorded | April 07, 2017

This webinar focuses on assisting leaders who are determining whether Agile is right for their organization. In one hour, we will take you from the basic concepts of Agile methodology to understanding the process and what your role is as a leader. You will learn the challenges and benefits and how an Agile culture can fuel your teams and provide value for your customers faster.

What is Project Quality Management?

Article | April 10, 2017

Modern quality management and project management are complementary. They both emphasize customer satisfaction and the underlying belief that quality leads to customer satisfaction. The main objective in quality management is making sure that the project meets the needs it was originally created to meet—nothing more, nothing less. In other words, to ensure quality, you must meet the needs of the stakeholder.

Top 10 Business Analysis Terms

Article | June 15, 2017

Whether you are just getting started in business analysis or want to gain a better understanding of certain aspects of business analysis, we have compiled a list of frequently used terms to help you get started.

Analyzing a Decade of IT Trends

White Paper | Nov. 16, 2017

The Global Knowledge IT Skills and Salary Report is a window into the inner workings of IT departments, revealing insights and opinions held by professionals around the world. For 10 years, we have surveyed over 120,000 men and women in IT about the state of the industry. With a decade of data at our fingertips, we analyzed 10 years’ worth of reports and noticed four major trending areas: certifications, salaries, cloud computing and cybersecurity. 

10 Network Security Tools and Tests Everyone Should Use

White Paper | Nov. 28, 2017

Whether you are operating a home system, overseeing a small startup, or performing security governance for an enterprise, everyone can benefit from paying attention to security. This white paper provides a list of 10 security tools and tests that will help you check out suspicious issues and keep ahead of new risks and threats.

This is Why You Should Cross-Certify

Article | Dec. 15, 2017

Each year as the data from the Global Knowledge IT Skills and Salary Survey is put through the analysis process, certain trends become clearer. One of those is the prevalence of IT professionals who pursue certifications across multiple categories.

New Topics on the New Security+ SY0-501 Exam

White Paper | Jan. 25, 2018

It has been over three years since the last revision of the CompTIA Security+ exam back on May 1, 2014. In fall of 2017, the latest version, SY0-501, was released. This revamped exam retains the same six domains as established in SY0-401, which emphasizes security in three main areas: application, data, and host.

What is Cryptojacking and How Can I Protect Myself?

Webinar – Recorded | Feb. 02, 2018

Driven by recent increases in cryptocurrency values, Cryptojacking is poised to be the center of conversation in 2018. It’s one of the latest innovations in hacking in which a victim’s computer is enlisted to mine cryptocurrency. Unlike ransomware, this attack steals processor cycles in an attempt to mine Monero and other currencies, typically without the user’s knowledge or consent. Watch this timely 1-hour webinar where we will discuss – A quick overview of cryptocurrencies. A walk-through of a typical attack. The economics of the attackers. Possible mitigation strategies to keep you and your organization safe. With miners trying to take advantage of the rising cryptocurrency industry, join us as we investigate this cyber-crime and learn how you can protect yourself and your organization. View our complete Cybersecurity curriculum for courses that help you build fundamental to advanced cybersecurity techniques, prepare for top industry-recognized certifications or master product-specific skills.

How to Make Agile Project Management Work in Your Organization

Webinar – Recorded | Feb. 27, 2018

So you want to be more agile, but is it possible in a waterfall world? The short answer is yes! Waterfall can be combined with principles of agility. The trick is to recognize how agile practices lead to organizational agility. Any organization can become more agile, but there are trade-offs that need to be considered. In this hour-long webinar, instructor and presenter Brian Egan will help you understand how to make agile work within your organization. In it you will learn: Agile best practices Discover how organizations can be more agile Agile vs. Waterfall: Discuss the pros and cons of each Dispense the myth that agile can only be used for software development Watch this webinar today and learn how and why your organization should become more agile! Recommended Agile Project Management courses: Introduction to Agile Agile Project Management Transitioning from Waterfall to Agile PMI Agile Certified Practitioner (PMI-ACP)® Boot Camp

PMP Exam Prep Quick Hits: The Quality Gurus You Need to Know

Article | May 01, 2018

Quality, as we know it today, is an accumulation of several concepts that together create a comprehensive approach to quality. The views of quality, as described in A Guide to the Project Management Body of Knowledge (PMBOK® Guide) and tested on the PMP® exam, focus primarily on the work of three major contributors: W. Edwards Deming, Joseph M. Juran and Philip B. Crosby.

Playing the Joint Project Manager-Business Analyst Role

White Paper | May 15, 2018

Being able to play both roles of a project manager (PM) and a business analyst (BA) is a great skillset to have. Learn how to ensure your team gets what it needs in these two key roles so that you all can deliver successfully.

Cryptography Tools and Techniques

Article | June 25, 2018

Consider how many financial transactions are performed on the Internet everyday. Protecting all this data is of upmost importance. Cryptography can be defined as the process of concealing the contents of a message from all except those who know the key. Cryptography can be used for many purposes, but there are two types of cryptographic algorithms you need to understand, symmetric and asymmetric. Symmetric uses a single key, whereas asymmetric uses two keys. What else is required to have a good understanding of cryptography? It’s important to start with an understanding of how cryptography relates to the basic foundations of security: authentication, integrity, confidentiality, and non-repudiation.

Google Cloud Platform Security: A Data Fortress

Article | June 26, 2018

Google takes security to a whole new level thanks to their years of experience as one of the most popular targets on the internet for would-be hackers and denial of service bots. This led Google to build a sophisticated security infrastructure the likes of which few companies or organizations can claim. Google approaches security holistically and involves everything from the physical data centers, to the data pipelines between them, down to the training of each employee that is responsible for managing the infrastructure.

Success in the Digital Age: The Value of Investing in People

Special Report | July 06, 2018

In the digital age, people and intellectual property have supplanted physical assets as the most important criteria for determining the value of an organization. It is the employees who develop the next big product or improve the practices, processes, services and internal culture that add significant value to an organization.

DDoS Is Still a Threat and It Matters How You Handle It

Article | July 18, 2018

Despite a growing awareness and preparation for distributed denial-of-service (DDoS) attacks, the overall arc of DDoS attacks is not weakening, but actually gaining more attention from the companies and personnel who have experienced these threats first-hand.

How Secure is PowerShell?

Article | Aug. 20, 2018

Have you been afraid to implement PowerShell in your environment because of security fears? The reality of PowerShell security doesn’t always match the perception. When compared to other scripting languages, PowerShell is actually more secure by default.

Top 5 Must-Have Skills for IT Departments

Article | Sep. 01, 2018

Technology trends such as these show no signs of abating, and IT administrators need to be prepared. Having a well-rounded and versatile team of IT practitioners is becoming increasingly necessary. In the following article, we examine five key skills that every IT department should have covered, regardless of the size of the company.

How a Firewall Functions

Video | Oct. 08, 2018

A firewall is a security tool which may be a hardware or software solution that is used to filter network traffic. Understand the basic functionality of a firewall where traffic is blocked or allowed to enter the network.

How to Create a Security Breach Incident Response Plan

Video | Oct. 08, 2018

An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Understand how an incident response team prepares, plans, and responds to a security breach.

How to Manage Security Risks

Video | Oct. 08, 2018

The goal of risk management is to reduce risk down to an acceptable or tolerable level. Understand countermeasures, safeguards, and security controls that can be selected to eliminate or reduce risk.

What is Malware, Ransomware, and Social Engineering

Video | Oct. 08, 2018

Networks are under attack as hackers try to access systems to compromise or steal sensitive data and information. Understand the threats posed by malware, ransomware and social engineering.

Top 5 Cyber Risks Targeting Modern Enterprise

Webinar – Recorded | Oct. 10, 2018

The Cyber Risk landscape is rapidly evolving leaving Cybersecurity professionals dazzled and lost in prioritizing their cybersecurity needs. Limited budget and low cyber resilience lead organizations in adopting re-active defensive measures. In this webinar, we will go through a methodological approach for assessing top cyber-risks a typical enterprise might encounter. And will address different scenarios for mitigating, transferring, or avoiding encountered risks.  

Basic Password Do’s and Don’ts

Video | Oct. 11, 2018

Understand how password length and complexity can make your passwords easy to guess or virtually impossible to bypass.

Data Protection for Mobile Phones

Video | Oct. 11, 2018

A mobile phone is just like a small computer, that can be hacked.  Learn basic mobile phone security practices to lock down this potential entry point to your corporate systems.

Cybersecurity Specializations – Architecture and Policy

Video | Oct. 17, 2018

This video focuses on the roles and responsibilities of cybersecurity architecture and policy job functions at successful cybersecurity organizations.  

Cybersecurity Specializations - Data Loss Prevention

Video | Oct. 18, 2018

This video focuses on the roles and responsibilities of cybersecurity data loss prevention engineers at successful cybersecurity organizations.  

Cybersecurity Specializations – Governance, Risk, and Compliance

Video | Oct. 23, 2018

This video focuses on the roles and responsibilities of governance, risk, and compliance job functions at successful cybersecurity organizations.  

How to Create a Better Cyber Defense by Building a Winning Cybersecurity Team

Webinar – Recorded | Oct. 24, 2018

For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.

Cybersecurity Specializations - Identity and Access Management

Video | Oct. 26, 2018

This video focuses on the roles and responsibilities of identity and access management job functions at successful cybersecurity organizations.  

Cybersecurity Specializations – Incident Response and Forensic Analysis

Video | Oct. 31, 2018

This video focuses on the roles and responsibilities of incident response and forensic analysis job functions at successful cybersecurity organizations. 

Cybersecurity Specializations – Secure DevOps

Video | Oct. 31, 2018

This video focuses on the roles and responsibilities of secure devops and devsecops job functions at successful cybersecurity organizations. 

10 IT CERTIFICATIONS EMPLOYERS LOOK FOR

Article | Nov. 01, 2018

How do you measure the experience and knowledge of an IT professional? One way is through certifications. Earning any certification is a notable achievement, though not all certifications carry the same perceived worth.

Cybersecurity Specializations – Penetration Testing

Video | Nov. 26, 2018

This video focuses on the roles and responsibilities of penetration testing job functions at successful cybersecurity organizations.  

Cybersecurity Specializations – Secure Software Development

Video | Nov. 26, 2018

This video focuses on the roles and responsibilities of secure software development job functions at successful cybersecurity organizations.

Why Pentesting is Vital to the Modern DoD Workforce

Webinar – Recorded | Feb. 26, 2019

Watch this recorded webinar as CompTIA’s chief technology evangelist and Global Knowledge’s federal sales director discuss how pentesting has morphed.

A Question about “Hacking Back” — Is it Legal?

Article | April 09, 2019

Should an organization that is the victim of an intentional nefarious hacking activity resort to retaliation? It’s a question that has been gathering a lot of attention. Retaliating against bad actors might seem appealing, but what are the legal ramifications? In this article, find out if there is a legal precedent to "hacking back."

Level Up with the PMP Certification

Webinar – Recorded | May 02, 2019

After several decades on the market, the Project Management Professional® certification continues to be one of the most in-demand certifications worldwide. Learn how you can increase your salary, project success, and organizational value with this recorded webinar.

Why Now Is the Right Time to Combine ITIL® 4 and Project Management

Article | May 09, 2019

For organizations with the willingness to get in shape and regain their corporate vitality, combining and aligning best practice frameworks is a sure way to achieve that goal. Admittedly, it takes work. Combining ITIL® 4 and project management should be high on your list.

PAN-OS - Network Security/Prevention Everywhere

Webinar – Recorded | May 23, 2019

Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This recorded webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment.

Ethical Hacking: A Good Defense Starts with Offensive Security

Article | June 21, 2019

There are two types of networks: those that have been hacked and those that will be. To defend against hacks, cyber professionals can benefit greatly from ethical hacking programs.

5 Highest-Paying ISACA Certifications

Article | July 09, 2019

ISACA certifications are some of the most popular and highest-paying in the Global Knowledge 2019 IT Skills and Salary Report. Eleven percent of IT professionals in the United States and Canada are ISACA-certified, and their salaries are 12% above the North American average.

Why is CISSP a Top-Paying IT Certification?

Article | July 09, 2019

This year, CISSP-certified IT professionals have the third highest global salary ($116,573) and the 10th highest in North America ($123,815). This is nothing new—CISSP has ranked in the top 10 in the U.S. each year since 2015, even coming in first in 2018. CISSP is a top-paying certification year after year. But how has it remained so relevant and valuable?

IT Certifications: 5 New Realities

Article | Aug. 27, 2019

The value of IT certifications has grown considerably over the last decade. Examine the evolution of certification trends, see the top-paying certifications and learn how decision-makers are struggling to hire certified employees.

Help Wanted: Cybersecurity Professionals Needed

Article | Sep. 18, 2019

Cybersecurity is a top technology investment area around the globe, with over half of our survey respondents saying it’s a priority. It’s no longer a niche skill—every IT professional needs some cybersecurity knowledge.

Top Cybersecurity Certifications to Enhance Your Career

Article | Oct. 04, 2019

Managers are in dire need of cybersecurity professionals with specific skills. If you’re looking to advance your career, or transfer into the cyber field, now is the time to get certified.

Top Tech Trends and Predictions for 2020

Article | Dec. 06, 2019

Global Knowledge subject matter experts predict the top trends for 2020 in IT training, Microsoft, Cisco, AWS, cybersecurity and more.

The Ultimate Guide to ITIL4 Education

Webinar – Recorded | Feb. 03, 2020

In 2020 we will see the complete ITIL4 education portfolio released and in all likelihood the start of the retirement of the ITIL v3 qualifications. Our ITIL guru, Barry Corless lead author for ITIL4 incident and problem management practices, will talk about the course content, the practical skills you’ll learn, and who will benefit from attending each courses. If you plan to continue your ITIL education then you cannot afford to miss this webinar.

Most Popular and Most Pursued IT Certifications by Women in Tech

Article | March 04, 2020

According to the Global Knowledge IT Skills and Salary Report, women make up 16% of the tech workforce, and an even smaller percentage (8%) are at the senior or executive level. Here’s an overview of the most popular and most pursued certifications by women in tech.

Women in Tech Leadership Profile: Skills, Job Roles and Certifications

Article | March 06, 2020

For women in IT, advancing your career can be a challenge in itself. In the Global Knowledge 2019 IT Skills and Salary Report, only eight percent of senior- and executive-level IT professionals are women. We have pulled data from our research that sheds light on the job roles, skills, challenges, certifications and experience of women in tech who have progressed to the highest levels of an organization.

Cyberwarfare: Origins, Motivations and What You Can Do in Response

White Paper | May 04, 2020

This cybersecurity white paper explores the origins and motivations of cyberwarfare, and provides actions you can take in response.

5 Most Popular IT Certifications for 2020

Article | May 11, 2020

While cybersecurity remains the most popular certification category in our IT Skills and Salary Report, foundational-level certifications highlight our list of the most popular IT certifications of 2020. 

Top 10 Recession-Proof IT Jobs

Article | June 05, 2020

These technology job roles are proven to be essential during a crisis as enterprises scramble to change strategies and meet goals. The skills demonstrated by IT professionals in these 10 positions can make the difference between business success and failure, especially during a recession.

The 10 Most Important IT Skills for 2020

Article | Aug. 17, 2020

As IT departments struggle with skills gaps and businesses attempt to recovery economically from the COVID-19 pandemic, these 10 IT skills are essential to drive success. Job roles in these areas pay well, but decision-makers are struggling to find qualified candidates. If you’re looking to make an IT skills investment or start a new career path this year, these are the areas to consider.

The Next Cyberattack is Right Around the Corner—Are You Ready?

Article | Sep. 23, 2020

There’s a lot of pressure on IT decision-makers to fill the cybersecurity holes in their organization. The cyber skills shortage is palpable and growing. Cybersecurity is the most challenging IT hiring area in the world. Those of you expecting to hire your way out of your cyber skills gaps, we have some bad news for you—it’s not viable.

What Is Project Scope Management? An Overview

Article | Oct. 01, 2020

Project Scope Management sets the foundation for the creation, development and successful delivery of a project. Learn about the project management process here.

From Analyst to Threat Hunter: How to Build the Skills for Tomorrow’s Hottest Cyber Jobs

Webinar – Recorded | Oct. 06, 2020

Whether you’re a current cyber pro looking to specialize, or new to the industry and looking for direction, Focal Point Academy’s lead cyber workforce expert can give you the insight needed to fast-track a career into today’s most in-demand cyber jobs, like Threat Hunting and Reverse Engineering. We’ll profile the top job roles for the next few years, break down the knowledge, skills, and abilities required in each, and show you how to build a training plan that gets you the job you want. And best of all, we’ll end with a special offer designed to help jump start the process for you and your team. View the slide deck>

What is Project Quality Management?

Article | Oct. 07, 2020

Project quality management is the process of determining the quality standards that are applicable to a project and devising a way to satisfy them. Learn more here.