Home > Articles > Certification > Other IT

Other IT

85 Items

Sort by Date | Title

An Overview of Novell 6 Installation
Jun 20, 2003
Get all of the information you need to upgrade from Novell Netware 5.x to 6. You will be taken step-by-step through the installation process, and you will learn the difference between installing, migrating, and upgrading to help you decide which works best for you.
Becoming a Java Programmer
Dec 6, 2002
This lesson provides an introduction to the Java language and computer programming itself, especially for people who are using it to learn software development for the first time.
Check Point CCSA Exam Cram: Defining Security Policy with SmartDashboard
Jul 1, 2005
This chapter will help you prepare for the CCSA exam, with a focus on SmartDashboard. Sample questions and comprehensive explanations will keep you up to date and equip you to pass the exam.
CISA Exam Cram: Technical Infrastructure and Operational Practices and Infrastructure
May 12, 2005
As an IS auditor, you will need to understand the technical infrastructure of the organization, the IS organizational structure, and the operational practices including working with networking devices, servers and operating systems, data storage systems, applications, and the standards and protocols associated with network communication. This chapter will help you prepare for the CISA exam with detailed examples and sample questions.
Cisco Asks, Can Security Skills Be Certified?
Jul 23, 2004
Yusuf Hussain Bhaiji explores the value of certification in IT Security given its rapidly changing nature and offers suggestions on choosing the right certification program.
CISSP Exam Cram: Business Continuity and Disaster Recovery Planning
Jun 8, 2009
This chapter covers the steps that make up the business continuity plan process to pass the business continuity and disaster recovery domain portion of the CISSP exam.
CISSP Exam Cram: Security Architecture and Models
Feb 4, 2013
This chapter introduces the trusted computer base and the ways in which systems can be evaluated to assess the level of security to help you prepare for the CISSP exam.
CISSP Practice Questions: Application Security
Jun 8, 2009
This chapter provides sample questions (with answers and explanations) to help you prepare for the CISSP exam.
CISSP Security Management and Practices
Dec 20, 2002
This sample chapter covers Domain 3, Security Management Practices, 1 of 10 domains of the Common Body of Knowledge (CBK) covered in the Certified Information Systems Security Professional Examination.
CISSP Security-Management Practices
Oct 28, 2005
This chapter provides an overview of security management with an eye towards passing the CISSP exam, including sample questions with detailed answers to help you prepare.
CNA Study Guide: Novell eDirectory
Mar 5, 2004
CompTIA Security+ Exam: Devices, Media, and Topology Security
Apr 25, 2003
Review basic security concepts and controls that can be used by administrators to secure physical devices and media and fulfill the CompTIA-specified objectives for the Communications Security section of the Security+ exam.
CompTIA Security+ Infrastructure Basics
Jun 8, 2009
This chapter discusses the concepts of identifying and mitigating network infrastructure threats and alerts you to the most common attacks.
Configuring DNS on SLES 9
Sep 23, 2005
This chapter will help you prepare for Novell's Certified Linux Engineer 9 exam with a focus on creating a domain name service using BIND. Sample lab exercises will help you practice for the exam.
Configuring RIP and RDISC
Nov 2, 2001
Practice one of the Solaris 8 Certification exam objectives with expert Rafeeq Rehman's lesson on how configure RIP and RDISC.
Controlling Access and Configuring System Messaging in Solaris 10
May 22, 2009
This chapter covers two main topics: Role-Based Access Control (RBAC) and system messaging (syslog) as they relate to the CX-310-202 exam.
Creating Oracle Databases
Dec 3, 2004
This chapter from the Oracle 9i Fundamentals I Exam Cram book covers the creation of a database, with sample questions to help you prepare.
Filtering (WHERE) and Sorting Data (ORDER BY) in Oracle 9i
Nov 5, 2004
This chapter covers filtering of rows using the WHERE clause and sorting of retrieved data using the ORDER BY clause. The WHERE clause applies to both queries and most DML commands; the ORDER BY clause applies to queries only.
FISMA: Compliance vs. Security
Apr 14, 2008
Randy Nash asks this question: Does FISMA make our agencies any more secure?
Hands-on Guide to the Red Hat Exams: System Logging, Monitoring, and Automation
Apr 28, 2011
This chapter covers working with Syslog, monitoring system performance, and automation with cron and at.

Page 1 2 3 4 5 Next >