As is sometimes the case, the idea for this article originated with a student question I received during one of the Securing Networks with ASA Fundamentals classes I have taught this summer. The course material mentions a simple scenario whereby IP Telephony traffic...
As is frequently the case these days, I get a brainstorm for an article during a Cisco Security training class I conduct. This summer I taught the Securing Networks with ASA Fundamentals class, which concentrates heavily on the Adaptive Security Device Manager (ASDM)...
Routers and switches make up the bulk of the network infrastructure and are vulnerable to attack. In a previous article, I talked about some of the different ways of hardening your network devices. In this blog, I’d like to specifically examine the routing protocols used on the major Cisco network operating systems.
Prep for Over 40 Microsoft Certifications with GK Polaris Subscription. GK Polaris, delivers a continual payload of skills to ensure mission success.
We will discuss some of the top steps that you should take immediately to prepare your employees and protect your organization from cybersecurity risks.
CIO Dive interviewed Zane Schweer, Global Knowledge's IT Skills and Salary Report lead, along with others about the state of hiring in IT. Schweer highlights how IT professionals want to see a future in their jobs and will search for new opportunities if their current employer doesn't invest in them.
In this webinar, we will cover what makes a successful team, how to drive high-performance in your team, different stages of team development and other topics.
Learn how to use virtual meetings safely when there is not a Global Knowledge instructor on-hand to help.
Global Knowledge presented its research and findings from its global IT Skills and Salary Survey and Report to the EU Skills Commission in Brussels, Belgium.
Every second of every day, data is being sent and received. Billions of data packets are processed by your company’s network every day. In fact, you received dozens of packets just to read this article, but the vast majority of us have no idea how this works. People have no clue as to what goes on behind the scenes to ensure data actually gets to the right device.