Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Show Filters
Result Filters:

102 Results Found

Results per page: 10 40 80

Understanding Pen Testing

Video | Nov. 23, 2016

A brief introduction to the basics of penetration testing.

Cisco On-Demand Learning

Video | May 07, 2018

This overview of the Cisco On-Demand Learning portfolio covers the various products and solutions available. Including all access collections, certification e-camps, and individual course titles.  With Cisco On-Demand Learning you can train your workforce easily and effectively.

Introducing Blended Live Learning

Video | Oct. 01, 2018

Experience the best of instructor-led and on-demand learning. Blended Live from Global Knowledge combines the expert direction of instructor-led training and the flexibility of on-demand learning and will enable you to close critical skills gaps more effectively while maintaining your day to day responsibilities.

How a Firewall Functions

Video | Oct. 08, 2018

A firewall is a security tool which may be a hardware or software solution that is used to filter network traffic. Understand the basic functionality of a firewall where traffic is blocked or allowed to enter the network.

How to Create a Security Breach Incident Response Plan

Video | Oct. 08, 2018

An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Understand how an incident response team prepares, plans, and responds to a security breach.

How to Manage Security Risks

Video | Oct. 08, 2018

The goal of risk management is to reduce risk down to an acceptable or tolerable level. Understand countermeasures, safeguards, and security controls that can be selected to eliminate or reduce risk.

What is Malware, Ransomware, and Social Engineering

Video | Oct. 08, 2018

Networks are under attack as hackers try to access systems to compromise or steal sensitive data and information. Understand the threats posed by malware, ransomware and social engineering.

Basic Password Do’s and Don’ts

Video | Oct. 11, 2018

Understand how password length and complexity can make your passwords easy to guess or virtually impossible to bypass.

Data Protection for Mobile Phones

Video | Oct. 11, 2018

A mobile phone is just like a small computer, that can be hacked.  Learn basic mobile phone security practices to lock down this potential entry point to your corporate systems.

Cybersecurity Specializations – Architecture and Policy

Video | Oct. 17, 2018

This video focuses on the roles and responsibilities of cybersecurity architecture and policy job functions at successful cybersecurity organizations.  

Cybersecurity Specializations - Data Loss Prevention

Video | Oct. 18, 2018

This video focuses on the roles and responsibilities of cybersecurity data loss prevention engineers at successful cybersecurity organizations.  

Cybersecurity Specializations – Governance, Risk, and Compliance

Video | Oct. 23, 2018

This video focuses on the roles and responsibilities of governance, risk, and compliance job functions at successful cybersecurity organizations.  

Cybersecurity Specializations - Identity and Access Management

Video | Oct. 26, 2018

This video focuses on the roles and responsibilities of identity and access management job functions at successful cybersecurity organizations.  

Cybersecurity Specializations – Incident Response and Forensic Analysis

Video | Oct. 31, 2018

This video focuses on the roles and responsibilities of incident response and forensic analysis job functions at successful cybersecurity organizations. 

Cybersecurity Specializations – Secure DevOps

Video | Oct. 31, 2018

This video focuses on the roles and responsibilities of secure devops and devsecops job functions at successful cybersecurity organizations. 

Cybersecurity Specializations – Penetration Testing

Video | Nov. 26, 2018

This video focuses on the roles and responsibilities of penetration testing job functions at successful cybersecurity organizations.  

Cybersecurity Specializations – Secure Software Development

Video | Nov. 26, 2018

This video focuses on the roles and responsibilities of secure software development job functions at successful cybersecurity organizations.

Blended Live from Global Knowledge

Video | Dec. 03, 2018

Learn more about the Blended Live delivery format from Global Knowledge.

Real Comments from the 2019 IT Skills and Salary Report

Video | July 26, 2019

What we love about our annual IT Skills and Salary Survey is that IT professionals are thoughtful and honest with their answers … well, sometimes a little too honest. Here are actual open-field comments from the 2019 survey. #ITGetsReal

Layer 2 Device Overview

Video | Feb. 24, 2021

An quick fundamental overview of layer two devices.   To learn more about this and similar topics, enroll in our exclusive Understanding Networking Fundamentals course.    

What You Should Learn from the SolarWinds Attack

Video | March 29, 2021

A career in Cybersecurity means being a lifelong learner. New attacks are constantly being invented, and cybersecurity engineers must respond to them in new ways. This video introduces a new supply chain attack, which provides a fascinating glimpse into the incredible skills of state sponsored professional hackers.

Microsoft Azure Certification

Video | Feb. 28, 2023

The cloud in general and specifically the Microsoft Azure cloud enables companies to act faster. They can adapt new processes and implement new technology much quicker than they were able to in the past. They do it without the huge investments they had, but it comes with a monthly subscription cost and some ‘pay as you go’ costs. Where in the past (file)servers where implemented as the platform for solutions, it is now the Microsoft Azure cloud as the solution platform.