228 Results Found
Join This QA Session to Hear from Cybersecurity Expert Brad Puckett on Kickstarting Your Career
Join Red Hat Training’s Solution Architect, John Walter, for a virtual, high-level complimentary course introducing you to Linux containers and container orchestration technology using Docker, Kubernetes and Red Hat OpenShift Container Platform.
When it comes to developing new, innovative ways and tools for breaching security, the attackers never stay idle – and so shouldn’t we when it comes to counteracting! Through the past few years, their inventiveness caused substantial damage in the area of supply chain attacks. During this webinar, Paula will demonstrate techniques of using the supply chain method and show tactics used today by cyber-criminals that allow them to deliver it and what are the prevention mechanisms to avoid being attacked by the newest innovations! Bring some coffee before attending!
In this webinar, we will cover what makes a successful team, how to drive high-performance in your team, different stages of team development and other topics. Understanding people skills, process skills, and setting team boundaries and norms will be discussed and how these can build the framework for your high-performance team. View Slide deck>>
In this hands-on demonstration, you observe the configuration of IMS, Internet, SOS, and Admin DNN objects (Data Networks Name). These DNNs will then be assigned to several slice descriptors, showing how geography enters into slice implementation. You will then watch the slice configured on a working 5G network. View slide deck>>
Despite rapid advances in technology, and widespread use of networks over the last few decades, the Fundamentals of Networking have not changed much. It is also quite surprising to see significant gaps or deficiencies in the foundational knowledge of many networking and IT professionals. This webinar attempts to highlight the common areas of such gaps and how to overcome them.
A quick 30 minute look at ITIL 4 Service Value System focusing on the guiding principles –part of the core guidance of ITIL4. This webinar includes an example of how this guidance might be applied in an organization.
Organizations and individuals are threatened with ever-growing cyber threats and must be prepared to address them. The more we are connected to networks, the more suspectable we are to attacks, therefore enterprises must stay current applying various cybersecurity measures and maintaining awareness of cybersecurity trends. View slide deck>>
This webinar is examining the process of how to best prepare for the Cisco Certified Network Professional in Enterprise skill set. We will look at the process to become certified including which exams to take; look at the available resources for study, including the blueprint for the exams and courses that are applicable. We will look at why someone might want to get certified as a CCNP Enterprise. We will also examine the process to maintain the certification. View slide deck>>
Despite rapid advances in technology, and widespread use of networks over the last few decades, the TCP/IP v4 is still the predominant protocol in use. It is also quite surprising to see significant gaps or deficiencies in the foundational TCP/IP knowledge of many networking and IT professionals. This 1-hour webinar attempts to highlight the common areas of such gaps and how to overcome them. View slide deck>>