1042 Results Found
This Certification Prep Guide provides an overview of the Microsoft Azure Administrator Associate certification and offers helpful tips that you can use when preparing for your certification exam.
CISSP remains one of the most respected and sought-after cybersecurity certifications. With the most recent update released in May 2021, (ISC)2 has maintained the high bar it set to validate the knowledge and skills of senior cybersecurity managers.
Digital transformation has bred equal parts innovation and risk. And it’s not just the IT department that’s been disrupted—technology is now the most critical risk factor for the entire organization.
CISSP is a widely desired indicator of knowledge, experience, and excellence on the resume of many IT professionals.
Many organizations have already embarked on their Agile Transformation journey, yet despite having agile methodologies in place they have still not matured their competencies to the desired level. Still, there are some unicorns who have managed to master the process and are now delivering value faster and more efficiently. Frameworks like DevOps and Scrum help organizations stay ahead of the curve by facilitating cultural transformation, adoption of a lean mindset, and increased automation.
In this article, we discuss how to achieve that optimal security approach in the data center with Cisco Application Centric Architecture, or ACI.
The CCNP Enterprise certification is the newest CCNP level certification. It replaces the CCNP Routing and Switching certification that has had multiple iterations throughout the years.
Despite rapid advances in technology, and widespread use of networks over the last few decades, the TCP/IP v4 is still the predominant protocol in use. It is also quite surprising to see significant gaps or deficiencies in the foundational TCP/IP knowledge of many networking and IT professionals. This 1-hour webinar attempts to highlight the common areas of such gaps and how to overcome them. View slide deck >>
CompTIA has become one of the most recognized and respected names in IT certifications, from the first A+ back in the 1990s to today with over a dozen vendor-neutral certifications covering a variety of topics.
After reading this article, whether you’re requesting training for yourself or your team, you will be better prepared to build and state your case for the business-delivering value of training.
With a constant demand for support, specialized skills and technology, IT professionals are under a good deal of pressure at work. And if they’re not compensated for it, they might just leave — causing disruption at the company, but also their own lives.
This quick reference guide will highlight the various certification tracks to help you find your path through the EC-Council programs.
This webinar will highlight the benefits of the Global Knowledge’s exciting new offerings through the American Management Association (AMA)—AMA’s Certified Professional in ManagementTM (AMA-CPM) and AMA’s Women’s Leadership Center (WLC). In order to keep up with the changing ways of business, organizations need their people to be prepared to lead. The American Management Association has developed AMA-CPMTM as the ground-breaking professional certification for managers. Attend this event to discover the four critical competencies successful managers need to respond to the growing demands of today’s business world. In addition, learn how AMA’s Women’s Leadership Center (WLC) can bring value and long-term benefits to your present and future women leaders through community and meaningful education. View the slide deck>>
This Webinar will focus on addressing the issues of an unsecure data center network and how to address the security concerns with Cisco ACI. The key components of how to create an ACI whitelist will be covered. View slide deck>>
Despite the obvious benefits, organizations are still struggling to successfully implement Diversity and Inclusion in the WorkPlace. This webinar discusses the benefits as well as the factors limiting diversity and inclusion in the workplace. View the slide deck>>
Join us for this exciting journey through Microsoft Security, Compliance, and Identity (SCI) new security-focused certifications. We will discover the complete portfolio of associate training and certification for Microsoft Security, designed to meet industry and market needs, with roles, skills and capabilities needed for the job, including specializations, hands-on experience and practice requirements. We will also discuss the skills gap in security professionals. View the slide deck>>
This is the second of a two-part series on First Hop Redundancy Protocols (FHRP). In Part 1 of this topic, we reviewed the fundamentals of networking, the importance of the Default Gateway to an endpoint, and how to solve redundancy of Default Gateway by using an FHRP such as Hot Standby Router Protocol (HSRP)
This Certification Prep Guide provides an overview of the current AWS Certified Solutions Architect – Associate certification and offers helpful tips that you can use when preparing for your AWS Architect certification exam.
As an IT security leader, you understand the importance of having and following corporate policies to protect and defend your systems and the assets that they retain. You and your security team work diligently to know the latest threats, prepare for possible intrusion, and harden your network.
In any operational data network, the two high-level outcome possibilities are connectivity and isolation. If every device can connect to every other device by enabling full connectivity, networking is relatively easy to create, but inherently unsecure. If a network fully isolates all forms of traffic, it is unusable.
Diversity in the workplace means that a company employs a wide range of individuals with different characteristics. By nurturing a more accepting, diverse culture, organizations will experience a substantial positive effect on individuals and a stronger bond within teams.
Containers and Red Hat OpenShift have quickly become the de facto solution for agile development and application deployment. Administrators and developers are increasingly seeking ways to improve application time to market and improve maintainability. Red Hat Training has developed a course that provides the gateway to container adoption by providing an understanding of the potential of DevOps using a container-based architecture. Orchestrating a container-based architecture with Kubernetes and Red Hat OpenShift improves application reliability and scalability, decreases developer overhead, and facilitates continuous integration and continuous deployment. View the slide deck>>
Most Internet users don't realize that often a website or other service that seems slow to respond is actually working fine. Instead, it’s the resolution of DNS that is putting a glitch in your giddy up. Fortunately, there are several steps you can take to optimize your DNS to get better performance.
This webinar will focus on addressing the issues of an unsecure campus network and how to address the insecurity with ISE. We then will look at how Cisco ISE can add security to devices beyond initial connectivity. View the slide deck>>
This certification prep guide provides an overview of the current Cisco Certified Network Professional-Security certification and offers helpful tips.
Passwords aren't as secure as you think, but there are ways to improve their effectiveness against hackers' attempts to gain access.
Hackers are everywhere, and they have a sophisticated array of tools for cracking your passwords. The primary purpose of this white paper is to help you understand that easy-to-remember passwords are no longer considered a secure form of authentication
IT is everywhere. The advent of the Internet of Things (IoT), expansion of data capabilities and storage, and broad access to wireless services have pushed IT into virtually every aspect of our lives. From appliances and televisions to tablets and smartphones, people are more connected than ever.
One of the most used ways for hackers to attack an organization is through email phishing. From an attacker’s point of view, email attacks can be automated at scale with thousands of emails sent virtually for free.
For those that want to take their first steps towards Ansible adoption, Red Hat Training has developed several courses to teach you better ways to automate administrative tasks and use Red Hat Ansible Engine effectively, as well as how to leverage advanced features of Ansible to perform more complex tasks. This webinar will highlight the benefits to using Ansible to automate tasks across a variety of Red Hat Enterprise Linux, Windows, cloud, and networking devices. View the slide deck>>
Retention rates and employee morale plague IT departments. The solution? Invest in career development and ongoing training.
Cryptography can be used for many purposes, but there are two types of cryptographic algorithms you need to understand: symmetric and asymmetric. Learn more from the experts at Global Knowledge.
Security is complicated, which has led to the many misconceptions and misunderstandings about security. By paying attention to these 10 concerns that security experts want you to know, you can gain knowledge and understanding about security and be securer both at work and in your personal life.
HR and IT managers, if you're losing top talent and having trouble attracting quality candidates, the no. 1 reason is that they don't see a future with you. If you're not leveraging professional development, here are a couple tips to start.
Every manager wants to get the most out of every employee and maximize team cohesion and efficiency. Making your team members feel as if they are being heard, understood, and acknowledged is critical to any management strategy. Actively listening to team members’ thoughts, ideas, and challenges drives employee engagement and satisfaction, which drives better results. View the slide deck>>
This Certification Prep Guide provides an overview of the current Google Certified Professional Cloud Architect certification and offers helpful tips that you can use when preparing for your GCP certification exam.
This Certification Prep Guide provides an overview of the current Google Certified Professional Cloud Architect certification and offers helpful tips that you can use when preparing for your GCP certification exam.
This Certification Prep Guide provides an overview of the current Google Cloud Platform (GCP) Certified Data Engineer certification and offers helpful tips that you can use when preparing for your GCP certification exam.
There are several techniques, methods, and tools that can help you reduce your security budget while maintaining or increasing your actual defenses. No security defense is perfect, and you often get what you pay for.
In any operational data network, the two high-level outcome possibilities are connectivity and isolation. If every device can connect to every other device by enabling full connectivity, networking is relatively easy to create, but inherently unsecure. If a network fully isolates all forms of traffic, it is unusable.
This webinar focuses on addressing the issues of an unsecure campus network and how to address the insecurity with 802.1X. We then will look at how Cisco ISE can centralize campus access with 802.1X. View the slide deck>>
This certification prep guide provides an overview of the current Cisco Certified Network Associate (CCNA) certification and offers helpful tips that students can use when preparing for the exam.
A career in Cybersecurity means being a lifelong learner. New attacks are constantly being invented, and cybersecurity engineers must respond to them in new ways. This video introduces a new supply chain attack, which provides a fascinating glimpse into the incredible skills of state sponsored professional hackers.
Gaining access is the most important phase of an attack in terms of potential damage, although attackers don’t always have to gain access to the system to cause damage. For instance, denial-of-service attacks can either exhaust resources or stop services from running on the target system.
Learn how to boost your visibility on LinkedIn by listing your skills and certifications and leveraging the courses you’ve taken for professional development. This is especially important to catch the eyes of recruiters and when applying for jobs.
Once an attacker gains access to the target system, the attacker can choose to use both the system and its resources and further use the system as a launch pad to scan and exploit other systems, or he can keep a low profile and continue exploiting the system.
The SolarWinds cyberattack is one of the most sophisticated and broad cyberattacks in history and will likely be studied for years by cybersecurity researchers as a case study for a supply chain attack.
This Microsoft and Global Knowledge 1-hour webinar event gives you an overview to the different Microsoft solutions for managing security in your organization. Explore how Microsoft provides a holistic approach to security, helping you to protect identities, data, applications, and devices across on-premises, cloud, and mobile.
In any operational data network, the two high-level outcome possibilities are connectivity and isolation. If every device can connect to every other device by enabling full connectivity, networking is relatively easy to create, but inherently unsecure. If a network fully isolates all forms of traffic, it is unusable.
ISACA’s role is to help those in the field of cybersecurity get greater utilization out of the people already in the fold. This means enabling IT professionals to take a leadership role and increase their depth of knowledge.
Attackers use a method called scanning before they attack a network. Often attackers use automated tools such as network/host scanners and war dialers to locate systems and attempt to discover vulnerabilities.
Every second of every day, data is being sent and received. Billions of data packets are processed by your company’s network every day. In fact, you received dozens of packets just to read this article, but the vast majority of us have no idea how this works. People have no clue as to what goes on behind the scenes to ensure data actually gets to the right device.
Microsoft retired the MCSA and MCSE certifications on January 2021. Does that really mean it is the end? It isn’t. Join this webinar to understand the logical next steps and new certification paths. View the slide deck>>
This certification profile covers the job functions and titles held by the professionals who hold the certification, views on job security and satisfaction, CISSP salary information, along with other certifications held and tenure. The data is from Global Knowledge’s annual global IT Skills and Salary Report so you won't find it anywhere else.
The updated version of the CISSP exam was released on May 1, 2021. The new version now includes a significant number of new topics.
Many companies have a so-called five-nines goal, meaning that the network needs to be available to the users at least 99.999% of the time. To achieve that goal, IT professionals must consider high availability in the network design, including both physical and logical redundancy.
For organizations getting started with RHEL, Red Hat Training has developed a series of courses to develop the skills needed for basic administration and configuration of Red Hat Enterprise Linux. These courses introduce key command line concepts and enterprise-level tools, laying the foundation for the rapid deployment of Red Hat Enterprise Linux. The curriculum also introduces the basic administration skills needed for resolving configuration issues and integrating Red Hat Enterprise Linux systems with other existing environments. View the slide deck>>
Follow these four troubleshooting tips to help you work through a challenging repair and reach a solution without much wasted time and resources.
This Certification Prep Guide provides an overview of the current Project Management Professional (PMP)® certification and offers helpful tips that you can use when preparing for your PMP certification exam.
Here's an introduction to encryption. What is it? Why do we need it? It's a complicated area, so we're here to help get your started. You'll understand the general function of three categories of mathematical ciphers: Symmetric, Asymmetric and Hashing.
Many certification roadmaps include (ISC)2’s CISSP (Certified Information System Security Practitioner) as a crucial cybersecurity certification to consider in a career and education plan. One example is the CompTIA IT Certification Roadmap, which places CISSP in the “Expert” column of the Information Security pathway. The CompTIA roadmap of IT certifications is not alone in recognizing the importance and value of the CISSP.
The 2021 revised and updated version CISSP (Certified Information System Security Practitioner) certification exam will be released on May 1, 2021. This new version of the popular CISSP exam will include a modest revision and re-organization of previously included topics, but will integrate a significant number of new topics.
The Ethernet switch has become an integral part of the world’s LAN infrastructure. At its core, the Ethernet is a shared network, each node contending for access to precious bandwidth and dealing with the repercussions of collisions.
Learn about the five types of area networks.
Advancing your knowledge of the Amazon Web Services (AWS) cloud can be life-changing.
An quick fundamental overview of layer two devices. To learn more about this and similar topics, enroll in our exclusive Understanding Networking Fundamentals course.
Cybersecurity is one of the most important fields of work in our world today. It’s an ever-changing discipline that requires ongoing education and adaptability, even for cybersecurity experts.
This guide provides an overview of the Security+ certification, including who the certification is for, how to earn and maintain it, the positive impact that it will have on your career, and options for advancement following your Security+ certification.
The Security+ certification is a common component of a cybersecurity professional’s resume, which would leave a gap if it is not present. Learn about the new material that will be present on the SY0-601 Security+ exam.
The cloud has been around for over a decade, but great cloud engineers are in short supply. What sets a great cloud engineer apart from simply a good one? Experience plays a big part, and the general expectation seems to be that you will become great by putting in your time. However, the truth is that to be a great cloud engineer you do not just slowly grow into your role. You actively aim for ways to improve both your skills and your approach to using technology. Here are three examples of what great cloud engineers do to be highly successful.
The field of cybersecurity is growing, and it is no wonder. Global Knowledge’s 2020 IT Skills and Salary Report confirms the value of security experts, with those functioning in the Cybersecurity/IT Security field in the U.S. reporting an average annual wage of $153,655. Here’s an exclusive Security+ certification profile.
COVID-19 has had a significant impact on businesses. Cost-cutting efforts have resulted in organizations having to do more with less. Safety protocols and social distancing guidelines have meant that more employees are working from home. The reality of remote workers and the access, reliability, and security issues that they create are at the forefront of the challenges facing IT departments.
Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This recorded webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment. View the slide deck>
Organizations and individuals are threatened with ever-growing cyber threats and must be prepared to address them. The more we are connected to networks, the more suspectable we are to attacks, therefore enterprises must stay current applying various cybersecurity measures and maintaining awareness of cybersecurity trends. View the slide deck>
Explore how Azure provides easy-to-use services to help you get started with building Data and AI solutions. Learn about many areas of AI, including machine learning, and how many modern applications and services depend on predictive machine learning models. We will also talk about the fundamentals of database concepts in a cloud environment and how to build your foundational knowledge of cloud data services within Azure.
The IT Skills and Salary Report covers a lot in the published report, and that’s only the surface. Here are four snippets of AWS data that weren't included in the published report.
This webinar begins with a general introduction to Microsoft SQL Server editions and versions. We will then highlight several scalability features of SQL Server. Next we will look at the High Availability Options of SQL Server. Finally we will look at Azure SQL deployment and Availability solutions. View the slide deck>
Systems engineers are the men and women responsible for keeping your applications running and databases responsive, and while the cloud has removed much of their responsibilities regarding hardware, their jobs are by no means easy. Lack of attention to details is always a factor in most mistakes, but these issues stem from misperception and a lack of understanding regarding the cloud itself.
Cybersecurity has matured into a complex and diverse set of functions. Each of these functional specializations represent different roles requiring different knowledge, skills, and abilities.
Cloud and virtualization technologies have spawned a whole ecosystem of applications. But like any powerful technology, they can be used for bad as well as good. This session reviews the top 10 most common mistakes made in cloud and virtualization security.