Articles

1431 Items

Sort by Date | Title

Ranking Certifications (2016 Edition)
Apr 25, 2016
Employers look for and seek out certified IT professionals, but generally prefer candidates who possess both college degrees and specific certification credentials. Aspiring or active IT professionals can benefit from an informed evaluation of certifications in terms of the time commitment, cost, and other factors involved in earning such a credential vis-a-vis the ultimate financial or career advancement that such an investment can return. In this article, Ed Tittel and Mary Kyle look at one method for rating and ranking IT certifications.
Building a Security Strategy
Mar 24, 2016
Bob Vachon introduces network security-related concepts and summarizes how security policies are implemented using a lifecycle approach.
Remote Site Telephony and Branch Redundancy Options
Mar 5, 2016
Hannah and Behl introduce and explain the various options for deploying remote site telephony solutions.
3 Common Network Security Threats
Feb 25, 2016
Whether their ultimate intention is harming your organization or stealing its information, attackers are probably already trying to crack your network. Network engineers need to anticipate these attacks and be ready to mitigate them. Security specialist Sean Wilkins points out three attack methods that most networks will experience.
7 Popular Layer 2 Attacks
Feb 25, 2016
If you're responsible for securing a corporate or private network, you need to be aware of the vulnerabilities that attackers will use. Security expert Sean Wilkins discusses seven common methods that can give attackers access, helping them to control or steal information from your network.
Designing and Deploying Cisco Unified IM and Presence
Feb 25, 2016
This chapter describes the Cisco Unified Communications IM and Presence (IM&P) architecture and design.
Securing Cisco Device Management
Feb 23, 2016
Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, Academic Edition, discusses available solutions for addressing basic security concerns of Cisco network devices, including important protocols that every security approach should implement.
WAN Technologies
Feb 21, 2016
Learn the characteristics and benefits of various WAN technologies.
SPHR Exam Prep: Workforce Planning and Employment
Feb 19, 2016
An organization’s overall success will be determined to a significant degree by its ability to have the right people, with the right skills, in the right places, at the right times. Although this statement sounds somewhat straightforward, let’s take a closer look at what it actually means.
What's New and What's Changed in the CompTIA A+ 220-902 Exam
Feb 18, 2016
Concluding his two-part series on updates to the CompTIA A+ exams, long-time A+ certified professional Timothy Warner points out what you can expect from the new 220-902 exam.
What's New and What's Changed in the CompTIA A+ 220-901 Exam
Feb 17, 2016
Timothy Warner, a CompTIA A+ certified professional for over a decade, has seen a lot of changes in the A+ exams over the years. Tune in to learn how CompTIA has improved on its 220-801 exam, giving the new 220-901 replacement a sharper focus on the breadth of today's computing technology.
Video: OCA Java SE 8 Programmer I (1Z0 808): A Course Introduction
Feb 12, 2016
In this excerpt from OCA Java SE 8 Programmer I (1Z0-808) Complete Video Course, Simon Roberts introduces his video course for Oracle Certified Associate, Java SD 8 Programmer Exam (1Z0-808), including a list of covered topics.
Networking Essentials: Interconnecting the LANs
Feb 11, 2016
The utility of LANs led to the desire to connect two (or more) networks together. This chapter from Networking Essentials: A CompTIA Network+ N10-006 Textbook, 4th Edition introduces the concepts and issues behind interconnecting LANs.
Video: OCA Java SE 8 Programmer I (1Z0-808): Changing Times and Dates
Feb 10, 2016
In this excerpt from OCA Java SE 8 Programmer I (1Z0-808) Complete Video Course, Simon Roberts takes a look at some of the ways you can change dates and times in Java SE 8.
DHCP Snooping: Basic Concepts and Configuration
Feb 9, 2016
Mason Harris, CCIE #5916 and co-author of CCNA Security 210-260 Complete Video Course, provides a streamlined introduction to DHCP snooping, a barrier to denial-of-service and man-in-the-middle attacks on organizational networks.
Video: OCA Java SE 8 Programmer I (1Z0-808): Comparing While and Simple for Loops
Feb 8, 2016
In this excerpt from OCA Java SE 8 Programmer I (1Z0-808) Complete Video Course, Simon Roberts compares the while and simple for loop in Java SE 8.
Peripherals and Custom Computing
Feb 2, 2016
Learn about the devices and peripherals we add on to the computer, the ports they connect to, as well as some custom PC configurations you will undoubtedly encounter in the field.
Cisco Video Surveillance
Jan 25, 2016
This chapter from CCNA Collaboration CIVND 210-065 Official Cert Guide offers a high-level overview of the solution Cisco offers in IP surveillance. The first section reviews legacy closed-circuit TV (CCTV) video-surveillance architecture and how it has evolved into what is available today. The subsequent sections cover Cisco’s physical security offering, the components involved with their solution, and the architectural design of how all the different elements work together.
Understanding RRM
By David Hucaby
Jan 22, 2016
This chapter covers configuring 802.11 support and understanding RRM.
Exam Profile: LPIC-2 (201 and 202)
Jan 20, 2016
William "Bo" Rothwell, author of LPIC-2 Cert Guide, shares details to help you prepare for and pass the LPIC-2 exams (201-400 and 202-400).

<< < Prev Page 3 4 5 6 7 Next >