Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

53 Results Found

Results per page: 10 40 80

Protect Software Applications with IBM Security AppScan

Webinar – Recorded | May 28, 2015

Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.

Protecting Your Network with Authentication and Cryptography

Webinar – Recorded | Feb. 09, 2011

In this webinar, the first of two based on our Cybersecurity Foundations course, you will examine the following topics: verifying users and what they can access, ways a user can be validated to computer and network resources, how cryptography is used to protect data, symmetric and asymmetric encryption and hashes.

Proving Project Value

Webinar – Recorded | Aug. 13, 2015

We often discuss how to manage projects, but we overlook an essential step: proving project value. Proving project value ensures that organizational strategies are aligned with project objectives.

Python – The World’s Most Useful Language

Webinar – Recorded | Jan. 21, 2020

This webinar will discuss our Python offerings and how it is proving to be the language of Data Science, Artificial Intelligence and Deep Learning. View the slide deck>

Secure Your SQL Server Today!

Webinar – Recorded | Feb. 05, 2014

Your Microsoft SQL Server database often contains the most valuable information in your organization. Get tips for securing it properly and effectively in this free, information-packed webinar with Microsoft SQL Server expert Gidget Pryor. In just an hour, Gidget will demonstrate the layered security approach used by SQL Server. She will step you through the process and best practices of setting up logins, users, roles, schemas, and permissions, and she will review the security model changes that have taken place from SQL Server 2005 through SQL Server 2012. She will also review SQL Server 2012 training and certifications.

Securing Communications

Webinar – Recorded | Feb. 23, 2011

In this webinar, the second of two based on our Cybersecurity Foundations course, you'll build on what you learned in the first of the series, Protecting Your Network with Authentication and Cryptography.

The Enemy Inside: How to Detect Supply Chain Attack & Stop it Before It’s Too Late

Webinar – Recorded | Oct. 06, 2021

When it comes to developing new, innovative ways and tools for breaching security, the attackers never stay idle – and so shouldn’t we when it comes to counteracting! Through the past few years, their inventiveness caused substantial damage in the area of supply chain attacks. During this webinar, Paula will demonstrate techniques of using the supply chain method and show tactics used today by cyber-criminals that allow them to deliver it and what are the prevention mechanisms to avoid being attacked by the newest innovations! Bring some coffee before attending!

The Impact of IIBA's New BABOK® Guide and PMI's New Business Analysis for Practitioners Guide

Webinar – Recorded | June 25, 2015

The past months have seen the release of both the International Institute of Business Analysis (IIBA)'s long-awaited A Guide to the Business Analysis Body of Knowledge (BABOK® Guide) v3 and the Project Management Institute® (PMI®)'s Business Analysis for Practitioners. While both represent interesting developments in the field of business analysis, they also provide lots of information to process. There's no need to go it alone! Join Global Knowledge instructors Cheryl Lee and Adam McClellan for this complimentary, hour- long webinar to learn about the differences between the two guides, how both guides compare to the previous version of the BABOK ® Guide, and where all this might be going.

The Importance of Maintaining Cybersecurity Skills in a Virtual World

Webinar – Recorded | Oct. 19, 2020

The Information Technology (IT) profession is a pretty exciting place to be, right now. We’re seeing an unprecedented influx of new technologies and approaches, including AI, robotics, automation, and next-level networking. More importantly, today’s IT workers have become the guardians of identity and curators of information. Given the increased movement to remote working the IT community must be conscious their teams skillset in the midst of increasing and complex cybersecurity threats designed to hit organizations where it hurts...their people. If you’re curious about what it’s like to be part of the IT profession in quickly changing virtual world, then watch CompTIA’s Chief Technology Evangelist, Dr. James Stanger, to learn more. James discusses the pillars of IT that help create our (post)-modern world, and dispel a few myths about the cybersecurity profession. If you’re interested in learning more about the different cybersecurity pathways available to you, and how you can become a unique contributor to the cybersecurity profession, then we welcome you.

The Project Manager as Business Analyst

Webinar – Recorded | June 26, 2014

The project manager (PM) and business analyst (BA) have to be key allies in the management of any project. That can be difficult when project work is duplicated because of the overlapping tasks defined by the International Institute of Business Analysis (IIBA®) and the Project Management Institute (PMI®). Still, as long as roles are clearly defined and understood, the two can cooperate and collaborate, instead of competing. In this hour-long webinar, Global Knowledge instructor and PMP-certified project management expert Daniel Stober will explain how to delineate the roles.