Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

1001 Results Found

Results per page: 10 40 80

Understanding Next Hop Resolution Protocol Commands

Article | Oct. 29, 2021

Next Hop Resolution Protocol enables businesses to have a way for next-hop servers and next-hop clients to communicate with each other directly, bypassing a central hub and preventing potential bottlenecks.

The Power of Experiential Skills Development

Webinar – Recorded | Oct. 27, 2021

Discover how to accelerate the development of your security skills and competencies by incorporating experiential learning activities such as cyber ranges into training. Cyber ranges have emerged as excellent vehicles for helping IT professionals learn by doing. These realistic, hands-on simulations prepare you for when — not if — you’re attacked. And we’ve added them to GK Polaris!

Policy-Based Routing: What Is It and How Is It Used?

Article | Oct. 22, 2021

Policy-based routing (PBR) provides network administrators with agility and flexibility to better manage traffic. With carefully architected policies, you can optimize how segments of your network process data, as well as how bandwidth is managed for business-critical applications.

Empower your skills with Microsoft Security, Compliance, and Identity (SCI) certifications

Webinar – Recorded | Oct. 21, 2021

Microsoft and Global Knowledge are partnering up to showcase the importance of Cybersecurity Awareness Month. Join this event to learn all the tools and tactics to stay safe and secure online throughout the whole year. This webinar event will take you through the new certifications focused on Microsoft Security, Compliance, and Identity (SCI). You'll learn more about the complete portfolio of associate training and certification for Microsoft Security and how it's designed to meet industry and market needs with roles, skills, and capabilities needed for the job, including specializations, hands-on experience, and practice requirements.

Fireside Chat: Expert Advice on Starting a Career in Cybersecurity

Webinar – Recorded | Oct. 20, 2021

Join This QA Session to Hear from Cybersecurity Expert Brad Puckett on Kickstarting Your Career

Technical Deepdive with Containers, Kubernetes, Red Hat OpenShift

Webinar – Recorded | Oct. 13, 2021

Join Red Hat Training’s Solution Architect, John Walter, for a virtual, high-level complimentary course introducing you to Linux containers and container orchestration technology using Docker, Kubernetes and Red Hat OpenShift Container Platform.

How to Become a Cisco Certified Cyberops Associate

White Paper | Oct. 07, 2021

The Cisco Certified CyberOps Associate certification focuses on the cybersecurity branch of IT security

The Enemy Inside: How to Detect Supply Chain Attack & Stop it Before It’s Too Late

Webinar – Recorded | Oct. 06, 2021

When it comes to developing new, innovative ways and tools for breaching security, the attackers never stay idle – and so shouldn’t we when it comes to counteracting! Through the past few years, their inventiveness caused substantial damage in the area of supply chain attacks. During this webinar, Paula will demonstrate techniques of using the supply chain method and show tactics used today by cyber-criminals that allow them to deliver it and what are the prevention mechanisms to avoid being attacked by the newest innovations! Bring some coffee before attending!

Maximizing Team Results

Webinar – Recorded | Sep. 28, 2021

In this webinar, we will cover what makes a successful team, how to drive high-performance in your team, different stages of team development and other topics. Understanding people skills, process skills, and setting team boundaries and norms will be discussed and how these can build the framework for your high-performance team. View slide deck>>

10 Reasons You Should Consider a Career in Cybersecurity

Article | Sep. 23, 2021

Cybersecurity has become a key area of job growth in the last few years. Now more than ever, individuals with computer security skills are needed to fill jobs currently sitting vacant. All the while, new job positions come into existence every month with few qualified applicants.

5G Practical Network Slicing

Webinar – Recorded | Sep. 23, 2021

In this hands-on demonstration, you observe the configuration of IMS, Internet, SOS, and Admin DNN objects (Data Networks Name). These DNNs will then be assigned to several slice descriptors, showing how geography enters into slice implementation. You will then watch the slice configured on a working 5G network. View slide deck>>

Cisco Certified Network Professional Enterprise

Article | Sep. 23, 2021

The Cisco Certified Network Professional Enterprise is built on the longstanding and well-recognized CCNP Routing and Switching. With the addition of evolving technologies, this makes the certification current and relevant. Having a vendor certification can be hit or miss, depending on the vendor, but with Cisco holding a major percentages of market share in the different technologies and implementations in the networking industry, having a CCNP Enterprise on your resume offers several advantages.

The Importance of OSPF Type 1, 3 and 5 Link State Advertisements and the benefits of understanding them

Article | Sep. 23, 2021

Many Enterprise companies use Open Shortest Path First (OSPF) as their Interior Gateway Protocol (IGP). OSPF relies on Link State Advertisements (LSAs) in order to advertise and learn subnets so whether it’s for CCNA or CCNP Enterprise or simply for a basic understanding of OSPF, it is important to understand the purpose of the various LSA types and how far the LSAs flood.

Networking Foundations

Webinar – Recorded | Sep. 14, 2021

Despite rapid advances in technology, and widespread use of networks over the last few decades, the Fundamentals of Networking have not changed much. It is also quite surprising to see significant gaps or deficiencies in the foundational knowledge of many networking and IT professionals. This webinar attempts to highlight the common areas of such gaps and how to overcome them.

What Are The Major Disadvantages of Indexing in SQL Server

Article | Sep. 09, 2021

Getting the best possible performance from a SQL server can become more complicated as you add more operations to your database.

This Is What You Can Do To Promote Cybersecurity Awareness Month

Article | Sep. 08, 2021

National Cybersecurity Awareness Month has grown into a global effort, with both individuals and organizations taking part — and for good reason.

ITIL 4 guiding principles in 30 minutes

Webinar – Recorded | Sep. 07, 2021

A quick 30 minute look at ITIL 4 Service Value System focusing on the guiding principles –part of the core guidance of ITIL4. This webinar includes an example of how this guidance might be applied in an organization.  

CCNP Enterprise Preparation

Webinar – Recorded | Aug. 26, 2021

This webinar is examining the process of how to best prepare for the Cisco Certified Network Professional in Enterprise skill set. We will look at the process to become certified including which exams to take; look at the available resources for study, including the blueprint for the exams and courses that are applicable. We will look at why someone might want to get certified as a CCNP Enterprise. We will also examine the process to maintain the certification. View slide deck>>

How to Build a Winning Cybersecurity Team

Article | Aug. 26, 2021

For every organization, effective cybersecurity depends on a careful deployment of technology, processes, and people. And if you get the people right, they’ll take care of the other two factors. Just like sports teams, cybersecurity teams need to be carefully bult and managed to reach optimum performance. They don’t just take shape naturally.

Achieve Highest Degree of Visibility on Network Traffic with Cisco ACI

Article | Aug. 24, 2021

In any operational data center, it is critical to have the highest degree of visibility on network traffic for operations and application troubleshooting. In this white paper, we discuss how to achieve optimal visibility of any type of application traffic with Cisco Application Centric Architecture, or ACI.

How to Monitor Traffic Flow with Cisco ACI

White Paper | Aug. 24, 2021

In any operational data center, it is critical to have the highest degree of visibility on network traffic for operations and application troubleshooting.

Learn to Keep Your Network Secure Using NMAP

White Paper | Aug. 18, 2021

Gain access to this hands-on lab and learn to use NMAP, an open-source port-scan tool, for networking discovery, vulnerability scanning and security risk detection.

2020 15 Top-Paying Certifications

Article | Aug. 16, 2021

Look back at the some of the highest paying IT certifications of 2020.

How to Become a Microsoft Certified Azure Solutions Architect Expert

White Paper | Aug. 13, 2021

This Certification Prep Guide provides an overview of the Microsoft Azure Solutions Architect Expert certification and offers helpful tips that you can use when preparing for your certification exam.

TCP/IP Foundations

Webinar – Recorded | Aug. 10, 2021

Despite rapid advances in technology, and widespread use of networks over the last few decades, the TCP/IP v4 is still the predominant protocol in use. It is also quite surprising to see significant gaps or deficiencies in the foundational TCP/IP knowledge of many networking and IT professionals. This 1-hour webinar attempts to highlight the common areas of such gaps and how to overcome them. View slide deck>>

How to Earn the Nutanix Multicloud Infrastructure Certification?

White Paper | Aug. 06, 2021

This Certification Prep Guide provides an overview of the current Multicloud Infrastructure certification offered by Nutanix and offers helpful tips that you can use when preparing for your certification exam

How to earn the Certified Information Systems Auditor Certification

White Paper | Aug. 04, 2021

CISA is now one of the most sought-after and highest-paying IT certifications

Who Are Systems Administrators? A Job Outlook and Salary Profile

Article | July 28, 2021

Systems Administrators, or SysAdmins for short, are most often frontline IT staff who are problem-solvers, (metaphorical) fire extinguish-ers, and, simply, doers.

Communication Skills for IT Professionals: The Benefits for Your Career

Article | July 27, 2021

For every IT professional, there comes a point when the realization hits: technical skill will only get you so far. You may have your foot in the door (or the IT cave), but in order to advance your career and set yourself apart, you need to bolster a critical soft skill: learning effective communication skills for IT professionals

How to monitor traffic flow with Cisco ACI

Webinar – Recorded | July 27, 2021

This Webinar will focus on addressing the factors behind traffic flow in Cisco ACI. The key components of how to monitor traffic flow in ACI will be covered. View slide deck>>

Top 10 Courses for System Administrators

Article | July 27, 2021

System Administrators, or SysAdmins, are the “installation specialists,” “configuration specialists” and “fixers” in IT. If you’ve ever seen Pulp Fiction, SysAdmins are like Winston Wolfe — their job is to solve problems.

How to Plan a Career Path in Cybersecurity

Article | July 22, 2021

Cybersecurity is the arena of technology, methodology, and practice that focuses on protecting electronic information and the systems supporting it against compromise and attack.

Contingency Planning: How Do You Plan for Failures?

Article | July 21, 2021

Despite an organization's best efforts to prevent downtime and avoid compromises, failures will still happen from time to time. “I am convinced that there are only two types of companies: those that have been hacked, and those that will be,” said Robert Mueller, former FBI Director, in a statement. “Even that is merging into one category: those that have been hacked and will be again.” So, what is your organization doing about it? How do you plan for failures and security breaches?

10 Ways Everyone Should Approach Cybersecurity

Article | July 20, 2021

This paper reviews many key issues and focuses attention on 10 responses that we all need to adopt in our approach to security.

Top 5 Common Activities that Break Company Security Policy

Article | July 16, 2021

Many employees are not as well-versed in their company’s security policy as they should be. This may result in workers performing tasks that might seem innocent or benign on the surface, but which actually put the organization at risk of a security breach. Understanding what you are doing (as an employee) or what your users are doing (as a boss or manager), can help you work toward a viable resolution to these situations. In most cases, user behavior changes as well as implementation of new technological solutions can curb exposure to risk and increase security policy compliance.

Top 5 Risky Internet Behaviors

Article | July 15, 2021

The Internet is not a safe place. We see that more than ever with the security breaches of businesses and individuals in the news on a daily basis. As Internet citizens, we need to take our protection into our own hands, as obviously most online services are not doing their best to protect us.

Why It’s Critical to Use a VPN at Home, for Work, and on Mobile

Article | July 15, 2021

The use of public networks is risky. Whether wireless or wired, any public access Internet connection is putting you and your data at risk. It may be convenient to use a hotel, restaurant, or coffee shop Internet link, but the likelihood of attack or compromise is greater than accessing a private network.

A CompTIA-Certified Professional’s Guide to Maintaining Your Certifications

Article | July 13, 2021

You have earned a CompTIA certification. The next step is to ensure that your certification remains current and valid. Some certifications are good for life, while others require renewal. Let’s look at what certifications require renewal, the options that you have for maintaining your certifications, and steps to get it done.

Top Five Big Data Architectures

Article | July 12, 2021

It’s been about 10 years since public cloud offerings like AWS opened up the world of big data analytics. This post examines the top five most useful architectures used for big data stacks to learn the sweet spots of each.

How to Become a Microsoft Certified Azure Administrator Associate

White Paper | July 09, 2021

This Certification Prep Guide provides an overview of the Microsoft Azure Administrator Associate certification and offers helpful tips that you can use when preparing for your certification exam.