Welcome to the Global Knowledge White Paper Library! Get the latest information on the hottest IT and business topics directly from our expert instructors and training partners. Be sure to check back often as new papers are added monthly!
Select a category below to view related white papers.
IT Training White Papers
Learn about the importance of network forensics for system monitoring and attack mitigation.
Learn about the 10 concerns that security experts want you to know.
Learn about the five major security concerns with mobile payment systems.
Discover the ways in which cybercrime occurs in three realms: individual, business, and governmental.
Discover 10 key lessons we need to learn (or learn again) from cybersecurity compromises.
Discover how the current threat landscape pertains to human vulnerabilities and how to take the first steps toward mitigating them.
This white paper is part of a two-part series on the PKI. The first white paper, Fundamentals of the PKI Infrastructure, can be found within the cybersecurity section of the white papers.
Discover the new material in the latest SY0-401 revision of the CompTIA Security+ exam.
Learn about common risky behaviors that typical workers engage in and what you can do to avoid being the weakest link in your company.
Explore the unforeseen risks prompted by expansion of machine-to-machine (M2M) communications and the Internet of Everything (IoE) while discovering possible barriers to secure functioning of M2M across a variety of sectors. This white paper closes with an examination of the problems posed by unchecked security threats as well as possible solutions that exist to mitigate those risks.
Discover why a VPN is a necessary component of your Internet activity when using public networks or mobile devices.
Discover the prospects of Network Functions Virtualization (NFV) as it evolves from a hardware-centric approach to a software-driven model. This paper also examines the future market implications and how NFV can help organizations to achieve their goals.
Explore the diverse Mobile Management Services (MMS) security models and the services that mobile management providers offer. This paper also examines the future of MMS as it applies to the application, security, and network service management markets.
This white paper examines NIST's cloud definition in detail with real world case study examples to illustrate how it is applicable to today's cloud market landscape.
Explore how to secure your data by using public key infrastructure (PKI).
Be the IT expert for yourself by using these tools to get strengthen the security of your systems.
Find out which security trends that occurred in 2013 are continuing into 2014, along with a few new emerging trends.
Have you considered where your hardware and software comes from; who built each piece and whether it comes with preloaded malware or backdoors?
Learn the brief history of hacking and how the Certified Ethical Hacker v8 course teaches the offensive security skills that are needed to respond to changes in the security landscape.
Discover two options that can maintain a company's network security while also meeting the ever-changing needs of today's constantly mobile workforce and consumer base.
The field of cybersecurity is growing quickly; so quickly that there are positions sitting open waiting to be filled by qualified individuals.
As organizations evaluate the available approaches to information security, they need to address a number of considerations in terms of operational, procedural, environmental, and system-related areas.
Authentication is one of the essential components of security; it is one part of the concept known as authentication, authorization, and accounting.
Here are some steps that you, as a customer or as a bank or financial institution, can take to protect yourself and your customers from cyber heists.
The Internet is not automatically a secure or safe place to be; what we need to reconsider is what it means to be secure or insecure when it comes to our online activities.
You may have heard concerns or nightmare stories about 802.1X, but with the tools we have today and the method of implementation, deployment can be seamless in an environment and can far exceed any compliance requirements one may have.
Cloud forensics involves exploring issues a company and its forensic examiner may face when suffering a breach of company information in the cloud. What issues will they face, and, if needed, how can they collect information from the cloud?
When it comes to cyber security, we have a lot to look out for, take precautions against, and be paranoid about. Don't forget that attacks don't get worse, they are always getting better.
A zero day exploit is an attack that was previously unknown to the target or security experts in general.
Here are some tips to help you create effective passwords, and how to keep your passwords safer.
Computer security should take a layered approach; here are seven myths about computer security that may help you secure your system.
The opportunities and challenges bring your own device (BYOD) represents are real; enterprises must make their network infrastructure BYOD-ready to meet the onslaught.
After a domain comparison between the new N10-005 exam and the previous N10-004 exam objectives, here are some tips to help you prepare to take the Network+ Exam N10-005.
The new version of the CompTIA Security+ 2011 (SY0-301) has been released and as you prepare to take it, you need to focus on these three main security areas: application, data and host.
In January 2012, the CISSP exam is scheduled for its first major update in several years; here are five tips that can help you successfully prepare for the updated exam.
Hacking Back: As new laws are explored, old ones amended, and solutions sought, let's think outside the box and give the good guys the advantage, or at least a fighting chance.
With many new, unforseen threats to your online and wireless security, it is more important than ever to be cautious, ask questions, not accept information at face value, and be a bit skeptical.
The new CompTIA Security+ 2011 (SY0-301) exam has been significantly updated; in the first topical domain: Network Security, there are at least 10 important new or updated topics that you need to focus on as you prepare for the exam.
With less effort than you might expect, you can build consistent security log analysis processes to protect your organization.
Discover ten essential IT security guidelines that every organization needs to have in place to protect resources and knowledge.
Saving money on security is about making sound decisions on the right products that provide the best security for their cost.
Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.
Every organization needs a security policy, no matter its size; here are 14 tips to refine your existing policy or to craft a policy if you don't already have one.
This white paper examines some valuable lessons in network security by analyzing how to defend against Distributed Denial of Service (DDoS) attacks.
This white paper presents 13 common infrastructure decisions that can result in poor IT Security.
Learn 10 common ways that malicious code can penetrate your network.
Discover some of the risks and benefits of cloud computing to be sure it is the right solution for you.
This white paper identifies the benefits available to organizations that replace their collection of network security point products with consolidated UTM devices.
In this white paper, seven experienced IT professionals working in the networking, programming, project management, and security fields share what they believe are the most important skills that every IT pro should know.
This white paper examines some of the ways to secure messaging using Cisco Communictions Manager (CUCM).
This white paper focuses on troubleshooting the proper sensing operation of a signature-based Intrusion Prevention System (IPS).
This white paper can help you protect your Cisco IP Phones against potential hacker attacks.
This paper focuses on the most effective use of both GUI-based and CLI-based troubleshooting tools.
This paper examines the use of CLI debug and show commands and explores the three primary VPN implementation areas: Site-to-Site with IPSec; Remote Access with IPSec; and Remote Access with SSL.
This white paper provides a history of attacks and defenses and points out the directions in which security professionals need to look.
This paper helps you understand the basic configuration of the Adaptive Security Appliance (ASA).