Course Code: 100660
The Value Stream Management Foundation course from Value Stream Management Consortium, and offered in partnership with DevOps Institute, is an introductory course taking learners through a value stream management implementation journey. It considers the human, proces...
Course Code: 840110
The AAIA Certification Prep Course is designed to help professionals build the expertise needed to audit and govern AI systems with confidence. As artificial intelligence becomes integral to business operations, organizations face new challenges around ethics, compli...
Course Code: 910034
This course helps you understand what is important for the exam, how to approach different question types, and how to identify common misconceptions that appear on the test. The instructor will guide you through exam-focused reviews of each domain, highlighting frequ...
Course Code: 842009
This 3-day instructor-led course provides in-depth training on Cortex XDR, Palo Alto Networks' powerful extended detection and response platform. You will gain hands-on expertise in security operations, incident investigation, and system optimization to effectively p...
Schedule Page
Receive expert IT training in a self-paced, online environment with convenient 24/7 access! Global Knowledge offers an interactive on-demand training experience for hundreds of IT and business courses. Gain new skills with our flexible on-demand class format designed to fit your schedule.
This white paper provides a list of 10 security tools and tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Cybersecurity is an essential business operation more than ever before. In this article, we present 10 things cybersecurity experts wish end users knew.
Cloud computing is constantly reshaping the way we work, learn and play. Let's look at 10 ways the cloud will (and to a large degree already has) changed the world.
James Michael Stewart discusses 10 ways everyone should focus on key issues regarding to approaching Cybersecurity in 2015 for their organization. Learn more.
Learn 10 common ways that malicious code can penetrate your network.