Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

244 Results Found

Results per page: 10 40 80

Ethical Hacking: A Good Defense Starts with Offensive Security

Article | June 21, 2019

There are two types of networks: those that have been hacked and those that will be. To defend against hacks, cyber professionals can benefit greatly from ethical hacking programs.

Microsoft and Global Knowledge Help Organizations Maximize Technology Adoption by Attacking Skills Gaps Head On

Article | June 14, 2019

In 2019, Microsoft has thoughtfully adapted their curriculum to boost Azure skills adoption. And to further speed up Azure consumption, Global Knowledge has stepped in to support Microsoft’s evolution and their new strategy. We’re fighting change with change. And here’s how we did it.

PAN-OS - Network Security/Prevention Everywhere

Webinar – Recorded | May 23, 2019

Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This recorded webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment.

A Question about “Hacking Back” — Is it Legal?

Article | April 09, 2019

Should an organization that is the victim of an intentional nefarious hacking activity resort to retaliation? It’s a question that has been gathering a lot of attention. Retaliating against bad actors might seem appealing, but what are the legal ramifications? In this article, find out if there is a legal precedent to "hacking back."

Why Pentesting is Vital to the Modern DoD Workforce

Webinar – Recorded | Feb. 26, 2019

Watch this recorded webinar as CompTIA’s chief technology evangelist and Global Knowledge’s federal sales director discuss how pentesting has morphed.

Cybersecurity Specializations – Penetration Testing

Video | Nov. 26, 2018

This video focuses on the roles and responsibilities of penetration testing job functions at successful cybersecurity organizations.  

Cybersecurity Specializations – Secure Software Development

Video | Nov. 26, 2018

This video focuses on the roles and responsibilities of secure software development job functions at successful cybersecurity organizations.

Cloud Computing: Zero to Hero in Under 10 Years

Article | Nov. 16, 2018

Cloud computing has risen from relative obscurity to the No. 1 tech area of interest in the world, according to the 2017 Global Knowledge IT Skills and Salary Report.

How to Optimize and Improve Your AWS Architecture

Webinar – Recorded | Nov. 15, 2018

In this one-hour webinar, AWS consultant and instructor Ryan Dymek, will discuss how to optimize your AWS architecture design.

Cybersecurity Specializations – Incident Response and Forensic Analysis

Video | Oct. 31, 2018

This video focuses on the roles and responsibilities of incident response and forensic analysis job functions at successful cybersecurity organizations.