Welcome to the Global Knowledge White Paper Library! Get the latest information on the hottest IT and business topics directly from our expert instructors and training partners. Be sure to check back often as new papers are added monthly!
Select a category below to view related white papers.
IT Training White Papers
Cloud forensics involves exploring issues a company and its forensic examiner may face when suffering a breach of company information in the cloud. What issues will they face, and, if needed, how can they collect information from the cloud?
When it comes to cyber security, we have a lot to look out for, take precautions against, and be paranoid about. Don't forget that attacks don't get worse, they are always getting better.
A zero day exploit is an attack that was previously unknown to the target or security experts in general.
Here are some tips to help you create effective passwords, and how to keep your passwords safer.
Computer security should take a layered approach; here are seven myths about computer security that may help you secure your system.
The opportunities and challenges bring your own device (BYOD) represents are real; enterprises must make their network infrastructure BYOD-ready to meet the onslaught.
After a domain comparison between the new N10-005 exam and the previous N10-004 exam objectives, here are some tips to help you prepare to take the Network+ Exam N10-005.
The new version of the CompTIA Security+ 2011 (SY0-301) has been released and as you prepare to take it, you need to focus on these three main security areas: application, data and host.
In January 2012, the CISSP exam is scheduled for its first major update in several years; here are five tips that can help you successfully prepare for the updated exam.
Hacking Back: As new laws are explored, old ones amended, and solutions sought, let's think outside the box and give the good guys the advantage, or at least a fighting chance.
With many new, unforseen threats to your online and wireless security, it is more important than ever to be cautious, ask questions, not accept information at face value, and be a bit skeptical.
The new CompTIA Security+ 2011 (SY0-301) exam has been significantly updated; in the first topical domain: Network Security, there are at least 10 important new or updated topics that you need to focus on as you prepare for the exam.
With less effort than you might expect, you can build consistent security log analysis processes to protect your organization.
No organization hopes for a disaster, but a quick and effective disaster recovery plan can make the difference between an incident and a catastrophe; this is particularly true for the health care industry.
Discover ten essential IT security guidelines that every organization needs to have in place to protect resources and knowledge.
Saving money on security is about making sound decisions on the right products that provide the best security for their cost.
Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.
Every organization needs a security policy, no matter its size; here are 14 tips to refine your existing policy or to craft a policy if you don't already have one.
This white paper examines some valuable lessons in network security by analyzing how to defend against Distributed Denial of Service (DDoS) attacks.
This white paper presents 13 common infrastructure decisions that can result in poor IT Security.
Learn 10 common ways that malicious code can penetrate your network.
Discover some of the risks and benefits of cloud computing to be sure it is the right solution for you.
This white paper identifies the benefits available to organizations that replace their collection of network security point products with consolidated UTM devices.
In this white paper, seven experienced IT professionals working in the networking, programming, project management, and security fields share what they believe are the most important skills that every IT pro should know.
This white paper examines some of the ways to secure messaging using Cisco Communictions Manager (CUCM).
This white paper focuses on troubleshooting the proper sensing operation of a signature-based Intrusion Prevention System (IPS).
This white paper can help you protect your Cisco IP Phones against potential hacker attacks.
This paper focuses on the most effective use of both GUI-based and CLI-based troubleshooting tools.
This paper examines the use of CLI debug and show commands and explores the three primary VPN implementation areas: Site-to-Site with IPSec; Remote Access with IPSec; and Remote Access with SSL.
This white paper provides a history of attacks and defenses and points out the directions in which security professionals need to look.
This paper helps you understand the basic configuration of the Adaptive Security Appliance (ASA).