Certified Ethical Hacker v8: Network Defense on the Offense

The majority of information security education emphasizes the definition and application of best practices. First, a network or system administrator needs to understand the proper application and configuration of network and security devices: routers, switches, firewalls, intrusion detection/prevention systems, and honeypots. A good start with strong IT policies facilitates the implementation.

Read more

What Happens at IBM IOD Won’t Stay at IBM IOD

I’m preparing to attend my first IBM conference next week when IBM Information On Demand 2013 begins in Las Vegas. While it’s not the first IBM conference Global Knowledge has attended since becoming an IBM Global Training Provider, it’s the first one I’ll be covering, so be on the look out for my IBM IOD-related blogs next month.

Read more