64 Results Found
It has been three years since the last revision of the CompTIA Security+ exam. In early summer of 2014, the latest version SY0-401 was released. This revamped exam retains the same six domains as established in SY0-301, which emphasize security in three main areas: application, data, and host. New topics add attention and focus on cloud computing and mobile devices, while greater emphasis has been added to incident response and physical security. In your efforts to prepare for SY0-401, it would be a good idea to pay special attention to the new topics and issues added for this latest revision.
In this video, instructor Charles Strother does a quick overview of what is needed to install a Read-Only Domain Controller (RODC) in a Windows Server 2008 environment.
Often, we don't have time to learn the reasons behind the standards we use. But learning what instigated a standard goes a long way toward not only understanding its importance, but also more easily and effectively applying it in your workplace. In this hour-long webinar, Global Knowledge instructor Keith Sorn will discuss common networking standards and explain how they were determined and why they are relevant. He will fill you in on things like why it's important to use proper color-coding standards when making cable and why the length limitations on wired cable are essential. He will also explain new standards, such as power over fiber.
In this video, Practice Leader Craig Brown discusses our exclusive Server 2008 course - Configuring, Managing, and Maintaining Server 2008 R2 (M6419). Specifically, the enhancements we've made to this course through Server 2008 R2 supplemental learning materials and custom hands-on labs that enable the student to utilize critical Server 2008 R2 functions after completing the course.
Global Knowledge Practice Leader, Craig Brown, explains what students will learn in our "Monitoring and Troubleshooting the Performance of a Windows Server Environment" workshop.
As an IT professional you deal day in and day out with securing operating systems, patching software, installing and configuring firewall and routers But what about the physical infrastructure? Do you understand how simple techniques can allow theft of your company resources? In this session we will discuss how to reduce the possibility of loss of data and equipment. Physical security may not be part of your job but you should be aware and having discussions with the personnel who are responsible. Or does Physical Security become one of your job responsibilities? Come to this session and learn about one of the most important and yet least thought about areas of security by IT professionals.
In this report, I've reviewed the 15 most popular certifications according to our more than 12,000 North American respondents to our annual IT Skills and Salary Survey. For each certification, you'll find a brief description, the average salary, and some insight into why it is popular.
You have spent money on software and hardware, implemented best practices, and believe you are secure, right? You may have overlooked the weakest link: your employee. Many breaches occur as a result of an employee mistakenly clicking on a link or visiting a site that allows a virus to be unknowingly downloaded, giving hackers access to your network. Today, a well-trained workforce is a necessity and may even be your most important cybersecurity tool. In this webinar, security expert David Willson will discuss how many breaches have occurred and are occurring, the tools and techniques hackers use to trick employees into clicking on links or opening attachments, and how to prevent such behavior.
Meet Global Knowledge course director and lab topology architect Joey DeWiele, a specialist in Unified Communications. Joey will walk you through the benefits of our exclusive Cisco UC lab architecture - a more scalable and stable approach to the all-important labs featured in unified communications courses. Our labs feature upgraded hardware and software including Custom Lenovo T61 PCs, 7965 IP Phones, 3560 Switches and Call Manager 7. With our flexible UC architecture, students are able to view and experience the full lab architecture regardless of which Cisco UC course they are taking or the skill set they are seeking. The lab architecture features a realistic network with redundant environments that are made rich with multiple machines, pre-deployed tools with shortcuts, online documentation that is particular to individual pods, and multiple OS support for all virtual machines (Windows, Linux, VMware).
A video covering our Cisco Unified Communications courses - ACUCW1 & ACUCW2 - by Global Knowledge Course Director and Lab Topology Architect Joey DeWiele, a specialist in Unified Communications.