Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

43 Results Found

Results per page: 10 40 80

Most Popular and Most Pursued IT Certifications by Women in Tech

Article | March 04, 2020

According to the Global Knowledge IT Skills and Salary Report, women make up 16% of the tech workforce, and an even smaller percentage (8%) are at the senior or executive level. Here’s an overview of the most popular and most pursued certifications by women in tech.

Is Agile the Best Way Forward for Your Organization?

Webinar – Recorded | April 07, 2017

This webinar focuses on assisting leaders who are determining whether Agile is right for their organization. In one hour, we will take you from the basic concepts of Agile methodology to understanding the process and what your role is as a leader. You will learn the challenges and benefits and how an Agile culture can fuel your teams and provide value for your customers faster.

Importance of Project Schedule and Cost Control in Project Management

Article | Oct. 20, 2020

Keep your project on time and within budget by controlling the baselines, budget, and schedule. View our comprehensive guide to project management, from project scheduling to cost control, from the experts at Global Knowledge.

How Data is Delivered

Article | March 18, 2021

Every second of every day, data is being sent and received. Billions of data packets are processed by your company’s network every day. In fact, you received dozens of packets just to read this article, but the vast majority of us have no idea how this works. People have no clue as to what goes on behind the scenes to ensure data actually gets to the right device.

How to Successfully Migrate from IPv4 to IPv6

Webinar – Recorded | April 20, 2011

In this webinar, you will examine the need for IPv6 and whether it's possible to survive on IPv6 alone. You will learn ways to phase in IPv6 and how to successfully migrate to IPv6.

How to Avoid a Cyber Disaster

Webinar – Recorded | April 27, 2011

Planning for a cyber disaster makes recovering from one much easier. Still, as important as disaster planning is, it's often overlooked or put off until it is too late. In this webinar, Global Knowledge instructor Debbie Dahlin discusses planning for the unexpected -- whether the unexpected means a simple power outage, a network security breach, or a major natural disaster. She'll discuss risk analysis and risk management techniques and explain the importance and process of creating a business continuity plan. Using a fictional company as an example, Debbie will walk you through the disaster planning process a security professional should use, and she will provide simple tricks to reduce your company's downtime before, during, and after a disaster.

Hacking Back In Self-Defense: Is It Legal? Should It Be?

Webinar – Recorded | Feb. 01, 2012

Your business has been hacked, leaving you with a persistent bot; now what? In this hour-long webinar, security expert David Willson will discuss ways you can eliminate the threat in an act of self-defense or defense of property. As new laws are explored, old ones amended, and solutions sought, you'll take a look at thinking outside the box to give the good guys the advantage-or at least a fighting chance.

Fundamentals of Red Hat Enterprise Linux

Webinar – Recorded | March 09, 2021

For organizations getting started with RHEL, Red Hat Training has developed a series of courses to develop the skills needed for basic administration and configuration of Red Hat Enterprise Linux. These courses introduce key command line concepts and enterprise-level tools, laying the foundation for the rapid deployment of Red Hat Enterprise Linux. The curriculum also introduces the basic administration skills needed for resolving configuration issues and integrating Red Hat Enterprise Linux systems with other existing environments. View the slide deck>>

Eleven Myths About 802.11 Wi-Fi Networks

Webinar – Recorded | Oct. 06, 2006

Wi-Fi networks have been misunderstood by much of the IT community since their inception. Even the reasons for this misunderstanding are kind of hard to understand. The result has been that myths about 802.11 (better known as Wi-Fi) networks have grown almost as fast as the technology itself. In this web seminar, we'll examine 11 common Wi-Fi myths and explore ways to use correct information to make your networks scalable, secure and satisfying for your users.

Develop Your Skills with Unlimited Access to Red Hat Online Learning

Webinar – Recorded | Jan. 31, 2019

The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.