CIO Dive interviewed Zane Schweer, Global Knowledge's IT Skills and Salary Report lead, along with others about the state of hiring in IT. Schweer highlights how IT professionals want to see a future in their jobs and will search for new opportunities if their current employer doesn't invest in them.
Prep for Over 40 Microsoft Certifications with GK Polaris Subscription. GK Polaris, delivers a continual payload of skills to ensure mission success.
We will discuss some of the top steps that you should take immediately to prepare your employees and protect your organization from cybersecurity risks.
The democratization of technology has resulted in end users having very different expectations of their IT departments than in the past.
Certifications are the most common way in IT to prove you have the skills to solve various technical and business challenges. In this article, I'll address a range of skill sets. For each certification listed, I've included what the certification measures, the requirements to obtain it.
The purpose of a “hack back” is to identify an attacker and possibly recover stolen data in a retaliatory manner. Learn if there is a legal precedent to "hacking back."
As is sometimes the case, the idea for this article originated with a student question I received during one of the Securing Networks with ASA Fundamentals classes I have taught this summer. The course material mentions a simple scenario whereby IP Telephony traffic...
As is frequently the case these days, I get a brainstorm for an article during a Cisco Security training class I conduct. This summer I taught the Securing Networks with ASA Fundamentals class, which concentrates heavily on the Adaptive Security Device Manager (ASDM)...
When the hostname.domainname associated with my Small Office Home Office (SOHO) failed to update after a power outage, and a new DHCP-assigned external address was assigned to my router, I was reminded of the need for Dynamic DNS. This article will explore the implem...
Routers and switches make up the bulk of the network infrastructure and are vulnerable to attack. In a previous article, I talked about some of the different ways of hardening your network devices. In this blog, I’d like to specifically examine the routing protocols used on the major Cisco network operating systems.