MITRE has turned attacker behaviors into a usable framework shared both on their website and on GitHub. Learn now!
This recorded webinar will describe how the SP3 Architecture can increase network traffic visibility & enable you to control your environment. Watch the video!
Microsoft and Global Knowledge discussed how to Empower your skills with Microsoft Security, Compliance, and Identity (SCI) Associate Level certifications.
Learn how Cisco ACI can be implemented to secure data center applications.
In this hands-on demonstration, you observe the configuration of IMS, Internet, SOS, and Admin DNN objects (Data Networks Name).
Certification
Prepare for the CCBA™ - Certification of Competency in Business Analysis certification with training on IIBA® business analysis standards.
Watch this timely 1-hour webinar for a quick overview of cryptocurrencies, a walk-through of a typical attack, the economics of the attackers. & possible mitigation strategies to keep you and your organization safe.
Watch the second installment of this 2-part webinar series and learn how to build and troubleshoot even more formulas and advanced functions. Whether you are a beginner or an experienced user looking for some extra or new tips, this is a webinar you don’t want to miss.
Watch this recorded webinar to understand how to make agile work within your organization. Learn about Agile best practices, Agile vs. Waterfall and why agile can be used for much more than just software development.
Understand how Cisco Intent-Based Networks and SDN technologies will transform your network to be the cornerstone of your digital success. Watch this recorded webinar today!