50 Results Found
IT is a very fast changing industry – what is hot today may be a tiny niche market in only a few years and lesser known things may turn out to be huge trends. That having been said, there are many certifications that will be around for a long time. However, this does not imply that recertification and/or continuing education credits are not required to maintain certification. Predicting the future is always challenging, including in IT, but these certifications are good bets.
The idea of building and running applications without thinking about the servers (AKA serverless computing) is a developers dream come true. Watch expert Rich Morrow to understand: The benefits of using serverless computing Different architectures that use serverless computing How AWS services, like Lambda, S3, API Gateway and DynamoDB work together to enable faster and more flexible application deployment and management. This video also features a live demo: Building a web app with only serverless components.
This Certification Prep Guide provides an overview of the current CompTIA Cloud+ certification and offers helpful tips that you can use when preparing for your CompTIA Cloud+ certification exam.
Have you been afraid to implement PowerShell in your environment because of security fears? The reality of PowerShell security doesn’t always match the perception. When compared to other scripting languages, PowerShell is actually more secure by default.
Prepping for a Microsoft certification exam? Global Knowledge's own Tracy Wallace has you covered with these six tips for passing any Microsoft exam.
Cryptography can be used for many purposes, but there are two types of cryptographic algorithms you need to understand: symmetric and asymmetric. Learn more from the experts at Global Knowledge.
It has been over three years since the last revision of the CompTIA Security+ exam back on May 1, 2014. In fall of 2017, the latest version, SY0-501, was released. This revamped exam retains the same six domains as established in SY0-401, which emphasizes security in three main areas: application, data, and host.
Every second of every day, data is being sent and received. Billions of data packets are processed by your company’s network every day. In fact, you received dozens of packets just to read this article, but the vast majority of us have no idea how this works. People have no clue as to what goes on behind the scenes to ensure data actually gets to the right device.
If you’ve been around IT for even a few minutes, you’ve likely heard the acronyms “LAN” and “WAN” used by fellow technicians. But with all of the possible variations of networks—different sizes, different arrangements, and different protocols—how do you tell the difference between a LAN and a WAN and everything in between? The simple answer is one of scope and size.
It should come as no surprise that in this modern era of digital data we need encryption. But what exactly is it? How do you know what kind of encryption you need? If you were to ask someone what kind of encryption they use, they may respond with a specific encryption-based product, like full-disk encryption. Or they may mention an encryption-based protocol, like HTTPS (HyperText Transport Protocol over SSL). But encryption is much more complicated than that.