Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

36 Results Found

Results per page: 10 40 80

What “Good Cyber Resilience” Is and How to Get There

Webinar – Recorded | May 26, 2016

Cyber resilience is becoming a bigger issue for all organizations. But what does “good cyber resilience” look like? And how do you get there?

What is Cryptojacking and How Can I Protect Myself?

Webinar – Recorded | Feb. 02, 2018

Driven by recent increases in cryptocurrency values, Cryptojacking is poised to be the center of conversation in 2018. It’s one of the latest innovations in hacking in which a victim’s computer is enlisted to mine cryptocurrency. Unlike ransomware, this attack steals processor cycles in an attempt to mine Monero and other currencies, typically without the user’s knowledge or consent. Watch this timely 1-hour webinar where we will discuss – A quick overview of cryptocurrencies. A walk-through of a typical attack. The economics of the attackers. Possible mitigation strategies to keep you and your organization safe. With miners trying to take advantage of the rising cryptocurrency industry, join us as we investigate this cyber-crime and learn how you can protect yourself and your organization. View our complete Cybersecurity curriculum for courses that help you build fundamental to advanced cybersecurity techniques, prepare for top industry-recognized certifications or master product-specific skills.

Top 5 Cyber Risks Targeting Modern Enterprise

Webinar – Recorded | Oct. 10, 2018

The Cyber Risk landscape is rapidly evolving leaving Cybersecurity professionals dazzled and lost in prioritizing their cybersecurity needs. Limited budget and low cyber resilience lead organizations in adopting re-active defensive measures. In this webinar, we will go through a methodological approach for assessing top cyber-risks a typical enterprise might encounter. And will address different scenarios for mitigating, transferring, or avoiding encountered risks.  

How to Create a Better Cyber Defense by Building a Winning Cybersecurity Team

Webinar – Recorded | Oct. 24, 2018

For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.

Why Pentesting is Vital to the Modern DoD Workforce

Webinar – Recorded | Feb. 26, 2019

Watch this recorded webinar as CompTIA’s chief technology evangelist and Global Knowledge’s federal sales director discuss how pentesting has morphed.

PAN-OS - Network Security/Prevention Everywhere

Webinar – Recorded | May 23, 2019

Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This recorded webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment.

Python – The World’s Most Useful Language

Webinar – Recorded | Jan. 21, 2020

This webinar will discuss our Python offerings and how it is proving to be the language of Data Science, Artificial Intelligence and Deep Learning. View the slide deck>

From Analyst to Threat Hunter: How to Build the Skills for Tomorrow’s Hottest Cyber Jobs

Webinar – Recorded | Oct. 06, 2020

Whether you’re a current cyber pro looking to specialize, or new to the industry and looking for direction, Focal Point Academy’s lead cyber workforce expert can give you the insight needed to fast-track a career into today’s most in-demand cyber jobs, like Threat Hunting and Reverse Engineering. We’ll profile the top job roles for the next few years, break down the knowledge, skills, and abilities required in each, and show you how to build a training plan that gets you the job you want. And best of all, we’ll end with a special offer designed to help jump start the process for you and your team. View the slide deck>

Cybersecurity Awareness Fundamentals

Webinar – Recorded | Oct. 08, 2020

Expert Hesham Mahmoud discusses the importance of cybersecurity, how to secure your IT infrastructure and detect the latest vulnerabilities and threats your organization might encounter. This webinar will cover the latest cybersecurity trends and how to react to data breaches. View the slide deck>

Working from home – a hacker’s paradise!

Webinar – Recorded | Oct. 09, 2020

The novel coronavirus has changed many aspects of life for millions of people globally, including where they work. With the increase in remote work, it is important for both individuals and companies to be aware of the added cybersecurity risks. Join us as Paula shares real world examples and tips on how we all can be better prepared.