Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

618 Results Found for "course"

Results per page: 10 40 80

How to Become an ITIL Expert

Video | Oct. 02, 2014

Michael Scarborough and Ryan Ballmer, co-authors of Global Knowledge ITIL courseware, discuss how to become an ITIL expert.

Why is ITIL Important?

Video | Oct. 31, 2013

Michael Scarborough and Ryan Ballmer, co-authors of Global Knowledge ITIL courseware, discuss why ITIL is important to businesses.

Benefit from Using Failover MAC Address

Article | Nov. 04, 2011

In this post I’ll focus on a topic that’s mentioned in the Cisco FIREWALL training class but isn’t emphasized there or in the online Cisco ASA documentation. When configuring failover on a pair of ASA security appliances, a situation can arise in which network disruption occurs due to the secondary ASA in a failover pair becoming active first and then the primary comes online second. Both the documentation and the courseware point out that this causes the secondary (and active ASA) to swap its interface MAC addresses with those of the primary. Being naturally skeptical about this behavior, I decided to investigate. The rest of this post illustrates my confirmation of this phenomenon.

What is Your Best, Tactical Advice for HR and IT Teams Seeking Top Talent?

Article | April 08, 2021

If you're losing top talent and having trouble attracting quality candidates, the no. 1 reason is that they don't see a future with you. If you're not leveraging professional development, here are a couple tips to start.

How Training Can Enhance Your Cloud Adoption

Article | Oct. 10, 2018

Cloud adoption continues to soar. In fact, worldwide Infrastructure-as-a-Service (IaaS) public cloud services grew by 29.5 percent in 2017, according to Gartner. If it’s not in a company’s current plans to utilize cloud technology, it most certainly will be (or should be) in the next couple of years.

The Importance of a UPS

Article | Jan. 25, 2010

In light of the recent tragic events in Haiti, it might be a good time to review some of the requirements for a well designed Uninterruptible Power Source (UPS) to be included in all of our critical network installations. As a CCNA, we are called upon to help maintai...

Real-Life IT Horror Stories: The Day the Logic Bomb Went Off

Article | Oct. 29, 2015

AMC’s television series “Halt and Catch Fire” shows North Texas’ rise as the “Silicon Prairie.” In the 1980s and early 1990s, it’s where IBM PC cloning was explored and where first-person shooter games were created. It’s also the site of the first “logic bomb”—the source of my horror story.

Supporting Windows 7 Group Policy Settings with Windows Server 2003 Domain Controllers

Article | March 16, 2010

Recently, I was asked the following question: “We plan to implement Windows 7 in our network very soon. We want to use Windows 2003 Domain Controllers for the next couple of years. Can we make the hundreds of new Group Policy setting available to Windows 7 Windows Server 2003 DCs?” This is not an unusual situation. Some organizations find they need to replace their desktop computers immediately because of age or obsolescence and others wish to upgrade to Windows 7 because of its superior security and performance. But there may be no budget or desire to upgrade to Windows 2008 or 2008 R2. Luckily, it is not difficult to adapt Server 2003 to work with Windows 7.

A Guide to Network Time Protocol (NTP)

Article | May 03, 2017

What is Network Time Protocol (NTP)? Well, it’s a network protocol used to synchronize clocks between computing systems over a packet switched network. It’s been around since the mid-1980s and was developed by David Mills at the University of Delaware; it is one of the oldest protocols still around on the Internet. NTP replaced other time synchronization technologies that didn’t have some capabilities to adjust time based on location of the time source or time server relative to the receiver or adjusting to the variation of delay found on typical data networks.