Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

602 Results Found for "course"

Results per page: 10 40 80

TRANSFORM YOUR TECH: MODERNIZE SECURITY AND DEFEND AGAINST THREATS WITH MICROSOFT CERTIFICATIONS

Webinar – Recorded | Nov. 08, 2022

This is the first expert-level certification in Microsoft’s Security, Compliance, and Identity portfolio. This certification will focus on designing elements of a cybersecurity architecture and evaluating the tradeoffs between different solutions.

OSPFv3 Address Families: How They’re Used and Why

Article | Jan. 15, 2015

Now that we are moving towards IPv6, the logical move would be to also run OSPF for that protocol suite, which makes sense and reduces the learning curve for implementation and support. But, that would mean that you have to run two OSPF processes — one for IPv4 unicast and one for IPv6 unicast. That means two sets of policies have to be applied, including security for OSPF itself. Running OSPFv3 for both IPv4 and IPv6 reduces the number routing protocols and the configuration that goes with that. It makes it easier to implement policy in a consistent way for both protocol suites.

Network Forensics Analysis: A New Paradigm in Network Security

Webinar – Recorded | Oct. 26, 2011

Discover network forensics analysis and learn more about the new Paradigm in network security in our webinar.

Marketing Analytics Training

Related Page

Develop the skills you need to identify trends, measure digital marketing efficacy and deliver informed campaigns with our marketing analytics training!

Predictive Analytics Training

Related Page

Train with us and leverage your predictive analytic tools and processes to predict behavior, detect fraud and drive strategic decision-making.

Business Intelligence Training

Related Page

Train with us to capitalize on data-driven insight from IBM Cognos, Microsoft BI and SSRS, SAP BusinessObjects, SAS Visual Analytics and more!

Risk Management with RSA’s Archer GRC Framework

Article | Dec. 05, 2012

Despite an organization's efforts to prevent downtime and avoid compromises, failures will still happen from time to time. How do you plan for failures?

Preferred Accommodations

Related Page

To ensure that you have the best overall learning experience with Global Knowledge, we partner with hotels close to our training centers to provide you with special rates and support services.

Red Hat Individual Exam Sessions Terms and Conditions

Related Page

Let us help you understand the convenience of Red Hat Individual Exam Sessions. We'll walk you through the terms and conditions.