48 Results Found
Cryptography can be used for many purposes, but there are two types of cryptographic algorithms you need to understand: symmetric and asymmetric. Learn more from the experts at Global Knowledge.
It has been over three years since the last revision of the CompTIA Security+ exam back on May 1, 2014. In fall of 2017, the latest version, SY0-501, was released. This revamped exam retains the same six domains as established in SY0-401, which emphasizes security in three main areas: application, data, and host.
Every second of every day, data is being sent and received. Billions of data packets are processed by your company’s network every day. In fact, you received dozens of packets just to read this article, but the vast majority of us have no idea how this works. People have no clue as to what goes on behind the scenes to ensure data actually gets to the right device.
If you’ve been around IT for even a few minutes, you’ve likely heard the acronyms “LAN” and “WAN” used by fellow technicians. But with all of the possible variations of networks—different sizes, different arrangements, and different protocols—how do you tell the difference between a LAN and a WAN and everything in between? The simple answer is one of scope and size.
It should come as no surprise that in this modern era of digital data we need encryption. But what exactly is it? How do you know what kind of encryption you need? If you were to ask someone what kind of encryption they use, they may respond with a specific encryption-based product, like full-disk encryption. Or they may mention an encryption-based protocol, like HTTPS (HyperText Transport Protocol over SSL). But encryption is much more complicated than that.
If you are considering career options or have been in the workforce a few years and are seeking a career change, you might want to consider training to become a computer support specialist.
IT professionals benefit from gaining skills in data analysis, cybersecurity, cloud computing, virtualization and hyperconvergence, and mobile app development.
Just like the physical keys to your car or house, passwords add a bit of inconvenience in exchange for security. However, if you've ever been frustrated by password rules (complexity, special characters and numbers, etc.), you might be happy about the latest news.
Technology is a wonderful thing, but it comes with a price: cybersecurity. Free Web browsers, social media sites and other digital services collect personal information like email addresses, phone numbers, place of employment, buying habits, mortgage data that is shared with advertisers. The availability of this information leaves us vulnerable to hackers. This white paper can help you learn more about what kind of personal data is typically collected, and how to secure your information online.
CompTIA has raised the bar for Network+ candidates. The new certification exam has significant changes to the five "domains" or knowledge areas with new content related to security, cloud, data-center and operational concerns and troubleshooting. There is also a greater emphasis on wireless networking and VoIP. Use this white paper to help you gain an overview of what's new and what's different.