Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

256 Results Found for "course"

Results per page: 10 40 80

The 5 Phases of Hacking: Gaining Access

Article | March 25, 2021

Gaining access is the most important phase of an attack in terms of potential damage, although attackers don’t always have to gain access to the system to cause damage. For instance, denial-of-service attacks can either exhaust resources or stop services from running on the target system. Stopping a service can be carried out by killing processes, using a logic/time bomb, or even reconfiguring and crashing the system. Resources can be exhausted locally by filling up outgoing communication links.

Improve Your Data Analytics with Google Cloud Platform Big Data Tools

Article | June 27, 2018

A longtime leader in data analytics, Google continues to earn their position by continually improving their data analytics offerings. Now, with Google Cloud Platform (GCP), you can capture, process, store, and analyze your data in one place, allowing you to change your focus from infrastructure to analytics that informs business decisions. However, you can also use GCP Big Data tools in combination with other cloud-native and open-source solutions to meet your needs. Below is an overview of GCP Big Data Tools and how you might utilize them to improve analytics.

What Kind of Network Am I On?

Article | March 01, 2012

Good question! There are lots of networks, so I’m sorry to say that it depends. Let me explain. The smallest computer-based networks are usually PANs or Personal Area Networks. They can connect a wireless keyboard, mouse, or other devices to a computer. You may find them wirelessly linking a printer to your computer. You may have noticed these all include wireless connections. A PAN most often uses wireless technologies like infrared and Bluetooth, so it is really a WPAN (Wireless Personal Area Network).

Business-IT Alignment: Driving Business Outcomes

Webinar – Recorded | Dec. 06, 2016

An Introduction to TOGAF®, The Open Group Architecture Framework

Webinar – Recorded | Aug. 11, 2015

Discover an introduction to TOGAF®, the open group architecture framework, in our webinar.

Digital Storytelling: How to Create Content Quickly and Easily

Webinar – Recorded | Nov. 09, 2015

Learn techniques for digital storytelling to create content quickly and easily in our webinar.

What Happens If I Have More Than One Switch With Redundant Links?

Article | Oct. 11, 2012

That depends on their configurations. For example: While it makes very good sense to include redundant physical links in a network, connecting switches in loops, without taking the appropriate measures, will cause havoc on a network. Without the correct measures, a switch floods broadcast frames out all of its ports, causing serious problems for the network devices. The main problem is a broadcast storm where broadcast frames are flooded through every switch until all available bandwidth is used and all network devices have more inbound frames than they can process.

TRANSFORM YOUR TECH: MODERNIZE SECURITY AND DEFEND AGAINST THREATS WITH MICROSOFT CERTIFICATIONS

Webinar – Recorded | Nov. 08, 2022

This is the first expert-level certification in Microsoft’s Security, Compliance, and Identity portfolio. This certification will focus on designing elements of a cybersecurity architecture and evaluating the tradeoffs between different solutions.