203 Results Found
Networks are under attack as hackers try to access systems to compromise or steal sensitive data and information. Understand the threats posed by malware, ransomware and social engineering.
Have you been afraid to implement PowerShell in your environment because of security fears? The reality of PowerShell security doesn’t always match the perception. When compared to other scripting languages, PowerShell is actually more secure by default.
As far as modern architectures go, there are few more complicated than an IoT pipeline. You’ve got to consider an ingestion layer (typically streaming) that may undergo manic load. You’ve got to think of data tagging, storage (probably across multiple engines), archival and access—both internal and external. And all of it has to scale like crazy, be as cost effective as possible, and use automation wherever it can. Oh, and your boss needs the IoT pipeline built by tomorrow. Short timelines? Tight budget? Unrealistic expectations? Unfortunately, these asks are realities for many cloud professionals. AWS knows this and is here to help.
Despite a growing awareness and preparation for distributed denial-of-service (DDoS) attacks, the overall arc of DDoS attacks is not weakening, but actually gaining more attention from the companies and personnel who have experienced these threats first-hand.
In the digital age, people and intellectual property have supplanted physical assets as the most important criteria for determining the value of an organization. It is the employees who develop the next big product or improve the practices, processes, services and internal culture that add significant value to an organization.
Google takes security to a whole new level thanks to their years of experience as one of the most popular targets on the internet for would-be hackers and denial of service bots. This led Google to build a sophisticated security infrastructure the likes of which few companies or organizations can claim. Google approaches security holistically and involves everything from the physical data centers, to the data pipelines between them, down to the training of each employee that is responsible for managing the infrastructure.
Consider how many financial transactions are performed on the Internet everyday. Protecting all this data is of upmost importance. Cryptography can be defined as the process of concealing the contents of a message from all except those who know the key. Cryptography can be used for many purposes, but there are two types of cryptographic algorithms you need to understand, symmetric and asymmetric. Symmetric uses a single key, whereas asymmetric uses two keys. What else is required to have a good understanding of cryptography? It’s important to start with an understanding of how cryptography relates to the basic foundations of security: authentication, integrity, confidentiality, and non-repudiation.
Yes, there’s big money in AWS Certification, which tends to outpace other cloud certification salaries, but there’s more to the cloud than dollars and cents.
Driven by recent increases in cryptocurrency values, Cryptojacking is poised to be the center of conversation in 2018. It’s one of the latest innovations in hacking in which a victim’s computer is enlisted to mine cryptocurrency. Unlike ransomware, this attack steals processor cycles in an attempt to mine Monero and other currencies, typically without the user’s knowledge or consent. Watch this timely 1-hour webinar where we will discuss – A quick overview of cryptocurrencies. A walk-through of a typical attack. The economics of the attackers. Possible mitigation strategies to keep you and your organization safe. With miners trying to take advantage of the rising cryptocurrency industry, join us as we investigate this cyber-crime and learn how you can protect yourself and your organization. View our complete Cybersecurity curriculum for courses that help you build fundamental to advanced cybersecurity techniques, prepare for top industry-recognized certifications or master product-specific skills.
It has been over three years since the last revision of the CompTIA Security+ exam back on May 1, 2014. In fall of 2017, the latest version, SY0-501, was released. This revamped exam retains the same six domains as established in SY0-401, which emphasizes security in three main areas: application, data, and host.
This certification and exam guide discusses the various ITIL® certifications and what they might mean to you, your organization, and your career, as well as provide important test-taking tips for the ITIL certification exams. ITIL certifications help individuals validate their ability to demonstrate skills from a foundational to a mastery level of IT service management. ITIL certification can often be a key differentiator in the marketplace as well.
The profusion of email we receive every day is often blamed as our biggest productivity thief. Learn how Microsoft Outlook can help you manage not only your inbox, but your entire day. Watch this webinar and learn: Automating tasks Creating rules to manage your inbox Conditional Formatting Other tips and tricks to help you take control of your day Stop letting email manage your day and learn to take control with Microsoft Outlook. Take your first step and watch this webinar today! Outlook Training to Grow your Skills View our complete curriculum of 1-day hands-on Outlook courses on versions 2010, 2013 and 2016. Learn to benefit from all that Outlook can offer with our introductory and advanced level courses.
Whether you are operating a home system, overseeing a small startup, or performing security governance for an enterprise, everyone can benefit from paying attention to security. This white paper provides a list of 10 security tools and tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Google Cloud Platform (GCP) is Google’s public cloud offering comparable to Amazon Web Services and Microsoft Azure. The difference is that GCP is built upon Google's massive, cutting-edge infrastructure that handles the traffic and workload of all Google users. There is a wide range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). We will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.
The Global Knowledge IT Skills and Salary Report is a window into the inner workings of IT departments, revealing insights and opinions held by professionals around the world. For 10 years, we have surveyed over 120,000 men and women in IT about the state of the industry. With a decade of data at our fingertips, we analyzed 10 years’ worth of reports and noticed four major trending areas: certifications, salaries, cloud computing and cybersecurity.
For 10 years, Global Knowledge has surveyed IT professionals and published the findings in our annual IT Skills and Salary Report. With topics ranging from top-paying certifications to most in-demand skills, our reports have consistently provided a deep examination of the attitudes and opinions held by IT professionals around the globe. With a decade of reporting at our fingertips, we decided it was an appropriate time to dissect the views of those making the decisions in the tech industry. What are their biggest challenges? How have their training opinions changed over time? How do their actions affect staff?
This article addresses non-technical skills you need to do to be a success in IT.
General character attributes every IT pro should have and on the things that every IT pro should know or do.
To help you stay ahead of the game, here are ten IT skills that are on the brink of extinction.
We spoke with Doug Cutting about his role with Cloudera and learned more about Big Data, training options for IT professionals interested in Big Data, and how Cloudera compares to Red Hat.
If you want to stay relevant as an IT professional, you have two choices: evolve your current skills or make a big change.
When designing a structured business analyst interview, it’s crucial to have a goal in mind, a clear set of questions planned, and an understanding of how those questions may deviate from the intended goal. An interview has an intended line of questioning; it may also have alternate lines of questioning and unanticipated paths where the interviewee has raised issues or answered questions in a way the business analyst had not considered or planned. In short, an interview is a social process.
A structured business analysis interview is much more than a conversation; it is a controlled event requiring attention to detail, cautious design, and a strong social foundation from which to build a trusting and lasting relationship.
Linking business analysis skills with the methods of The Open Group’s Architecture Framework, TOGAF®, facilitates stronger IT results that drive business value.
Structuring techniques are the foundation of decision making. They are to decision making what blueprints are to construction. There are a number of techniques that will quickly and easily improve the analysis of virtually any problem. This paper introduces some of the simplest and most effective structuring techniques including sorting, sequencing, placement, decision trees, and ranking.
Shortly after being awarded an ITIL® Foundation certification, a recipient’s natural inclination is to ask: “Now what? How do I take the best practices I’ve learned and apply them to my organization?”
Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a breach. But what is "reasonable security," and is there a definition?
A brief introduction to the basics of penetration testing.
When a decision matters, there are certain steps you will want to follow. In this white paper, we provide guidelines for approaching decisions. The steps in this white paper are a series of interconnected techniques used in problem analysis and decision making.
The VMware NSX platform combines networking and security functionality directly in the hypervisor and it interoperable with a vast majority of VMware’s products. The platform provides a set of logical networking elements and services, using logical switching, routing, load balancing, VPN, firewall, etc. This product decouples network functionality from the physical devices.
Cyber resilience is becoming a bigger issue for all organizations. But what does “good cyber resilience” look like? And how do you get there?
Leadership is evolving beyond traditional leadership skills, and it has never been so important. In an era of constant change, digital disruption, increased employee expectations and rising business complexity, today’s leaders require more than the fundamentals. In years past, leadership development focused on helping leaders set performance expectations, communicate effectively, provide feedback, coach and motivate their employees. While these skills remain important, they are no longer sufficient to meet the business requirements of the 21st century. Leaders now require skills and competencies to ensure that they also build highly productive teams, accelerate organizational results and transform customer experiences in a fast-paced, highly competitive and global working environment. In this hour-long webinar, leadership consultant Kim Caughlin will reveal and discuss the new high-demand skills and competencies required to lead effectively in the 21st century.
Discover the most common barriers you will face when implementing knowledge management and how to overcome them, so that your organization changes, over time, into a culture where knowledge sharing and reuse becomes second nature and part of the normal course of activity.
Which mainstay certifications should be in your list of credentials? What's the next up-and-coming certification? This article will help you answer both questions by providing a review of the 15 top-paying certifications.
The Toronto Chapter of the Association of Change Management Professionals (ACMP), in partnership with Global Knowledge, welcomes Kelly Norgate to share information about her success in leading change with powerful change communication strategies. In this hour-long webinar, Norgate will examine the link between creative change communication solutions and great corporate culture. You will learn practical change communications strategies and tactics that generate the energy and commitment required to get employees on board with transformational change. Take your next change communication plan from good – to great.
IT organizations are increasingly being held accountable to bring digital value to the business and participate as a strategic partner. To this end, IT organizations must ensure they have the right skills at the right time to support the strategic direction of the business and contribute overall ROI. Deploying an IT skills framework provides an opportunity for IT organizations to determine their level of readiness by identifying where skill gaps exist.
Business processes are complicated, and mapping them is not a trivial task. Modelling standards give us the tools to model complex processes, but they do not tell us the best way to approach a model or effectively use the tool. In this hour-long webinar, Global Knowledge instructor Rod Fage will guide you through the best way to develop a model, from determining the goal and scope of the process and measuring its effectiveness, to modelling the process in a hierarchical top-down approach, enabling business analyst to continuously validate the model.
If you're responsible for creating marketing content and the demand for fresh content is stressing you out, help has arrived. In this hour-long webinar, award-winning content creator Gail Mercer-MacKay will show you how to easily create new content that will attract prospects even if you're short on time and budget. You will learn how basic building blocks, such as blogs, social media and newsletters, support each other and can be reused multiple times. By producing fresh content, leveraging the content of others and broadcasting through various mechanisms to drive awareness, followers, likes and leads, you can obtain your desired results by investing only seven to 10 hours a month.
Measurements and metrics provide a view into every aspect of an organization. From resource availability to necessary improvements, measurements are the key to successfully understanding how your organization is performing. This paper will give you guidance on why measuring is important, how to get started, what types of metrics are available, what should be measured, and how to go about initiating improvements.
Often we let personal biases and other intuitive mental forces push us towards quick decisions. In contrast, good decision makers make the effort to really analyze issues. Instead learn how to become a critical thinker by separating facts from assumptions to make consistent, high-quality decisions.