250 Results Found
Attackers use a method called scanning before they attack a network. Often attackers use automated tools such as network/host scanners and war dialers to locate systems and attempt to discover vulnerabilities.
Here's an introduction to encryption. What is it? Why do we need it? It's a complicated area, so we're here to help get your started. You'll understand the general function of three categories of mathematical ciphers: Symmetric, Asymmetric and Hashing.
The 2021 revised and updated version CISSP (Certified Information System Security Practitioner) certification exam will be released on May 1, 2021. This new version of the popular CISSP exam will include a modest revision and re-organization of previously included topics, but will integrate a significant number of new topics.
Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This recorded webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment. View the slide deck>
Cybersecurity has matured into a complex and diverse set of functions. Each of these functional specializations represent different roles requiring different knowledge, skills, and abilities.
Cloud and virtualization technologies have spawned a whole ecosystem of applications. But like any powerful technology, they can be used for bad as well as good. This session reviews the top 10 most common mistakes made in cloud and virtualization security.
Here are five date points from the 2020 IT Skills and Salary Report that illustrate important trends in professional development, skills gaps, hiring and top-paying certifications.
There are several advantages to implementing a route-based VPN (a.k.a. tunnel interface VPN) instead of a site-to-site one. Learn more.
The coronavirus pandemic changed how people around the world work and receive skills training. Virtual meeting services saw incredible growth, they also faced new security challenges. As a key Global Knowledge partner, we worked closely with Gary and the Zoom team as they rapidly upgraded their platform to ensure the maximum possible level of safety for all users. However, technology is only as powerful, or safe as the people who use it. So, in this webinar Gary will provide expert (and entertaining!) advice on how to use virtual meetings safely when there is not a Global Knowledge instructor on-hand to help. Joining Gary is Kevin, our CXO: another big personality with a wealth of IT experience and a passion for ensuring our customers receive the best possible experience, every time they connect with Global Knowledge.
This Certification Prep Guide provides an overview of the Microsoft Azure Fundamentals certification and offers helpful tips that you can use when preparing for your certification exam.