1076 Results Found
Early one morning, an engineer end user discovered that the Engineer servers were unreachable, and he didn’t know if he could reach the Internet. The administrator investigated the user’s PC with the IPCONFIG /ALL command and verified that the PC was a DHCP client, but it had received an address from the Accounting DHCP server, not the Engineering DHCP server.
I am a VMware Certified Instructor and every single time I teach, I get questions regarding certification. IT certifications always seem to be a controversial topic, and the question is always, "Why should I become certified?"
Agile is a set of principles requiring a significant cultural shift, new paradigms in thinking and team organization. Over the years, Agile has become "productized" or in many cases "institutionalized", creating different flavours and levels of commitment among teams and organizations. Along the way, managers and team members have lost sight of Agile's principles and tried to enforce the use of certain tools and structure where they may not belong. In this one hour webinar, Perry McLeod will explain how tools such as use cases can be successful in an agile environment, provided the principles of agile are always active in the minds of the managers and the team members that are using them. Join Perry to determine whether or not making the cultural shift towards the use case method in an agile environment is the right move for you and your organization.
Call Admission Control (CAC) is often times included as part of the same topic as Quality of Service (QoS), when in actuality CAC is a separate and complete topic itself. QoS is defined as traffic engineering on a packet switched network. This definition means movin...
When integrating a Voice over IP (VoIP) system into an existing network it is very important to have a good understanding of how much bandwidth is utilized for each call on the network. For most people, just starting out the bandwidth calculations can be a very daunt...
Business and IT alignment is not a one-and-done thing. On the contrary, business strategies and goals continually evolve and cascade down to more specific needs throughout the enterprise — including IT. To stay aligned with the business, the IT side of the house should consistently ensure that it and the business both understand what outcomes are desired in strategic, tactical, and operational contexts. At the same time, IT should build up the disciplines required to enable — and ultimately track — those outcomes.
Business Continuity and Disaster Recovery (BC/DR) planning is the process of developing the plans, processes and procedures to respond to the range of incidents. We start with understanding the essential functions of an organization, called Business Impact Analysis (BIA). In life, we set the same priorities: protection of family and friends, shelter, food and water and other life-giving essentials.
Organizations launch projects with the assumption that the new or improved solution will provide worthwhile benefits for stakeholders and a suitable return on investment. By understanding your business requirements you ensure that your teams actually deliver those benefits. Keeping user and functional requirements aligned with the business requirements is a key to successful solution delivery.
Business processes are complicated, and mapping them is not a trivial task. Modelling standards give us the tools to model complex processes, but they do not tell us the best way to approach a model or effectively use the tool. In this hour-long webinar, Global Knowledge instructor Rod Fage will guide you through the best way to develop a model, from determining the goal and scope of the process and measuring its effectiveness, to modelling the process in a hierarchical top-down approach, enabling business analyst to continuously validate the model.
A quick 30 minute introduction to Business Analysis for those who are considering the field. This webinar looks at why the BA is essential to the business, what BAs do, and certification paths for Business Analysts. View the slide deck>
A quick 30 minute introduction to Business Analysis for those who are considering the field. This webinar looks at why the BA is essential to the business, what BAs do, and certification paths for Business Analysts. View the slide deck>
The benefits of a RADIUS server are many. In addition to speed, you receive heightened security with user access monitoring, reporting and tracking functions and personalized restrictions. Setting it up costs less than $60 and this white paper walks you through each of the steps, settings, configurations and the equipment you will need.
In this second webinar in a series dedicated to building up network security, network security specialist Catherine Paquet will fill you in on advanced threat protection that integrates real-time contextual awareness, intelligent security automation and superior performance with industry-leading network intrusion prevention, Sourcefire.
Despite advances in security, hackers continue to break through network defenses. In this hour-long webinar, network security specialist Catherine Paquet will examine the favorite methods and targets of hackers and will introduce you to the different categories of security technologies. In this foundational presentation, you will learn about the benefits of security solutions such as firewalls, VPNs, IPS, identity services and BYOD.
Many companies have a so-called five-nines goal, meaning that the network needs to be available to the users at least 99.999% of the time. To achieve that goal, IT professionals must consider high availability in the network design, including both physical and logical redundancy.
More challenging Microsoft certification exams require the demanding Microsoft boot camps at Global Knowledge. Rebuilt from the ground up to provide students all the study tools needed to master the Microsoft skills needed to certify and succeed.
Explore how Azure provides easy-to-use services to help you get started with building Data and AI solutions. Learn about many areas of AI, including machine learning, and how many modern applications and services depend on predictive machine learning models. We will also talk about the fundamentals of database concepts in a cloud environment and how to build your foundational knowledge of cloud data services within Azure.
Skillsoft Global Knowledge remains dedicated to providing extensive Broadcom VMware training
IT organizations are increasingly being held accountable to bring digital value to the business and participate as a strategic partner. To this end, IT organizations must ensure they have the right skills at the right time to support the strategic direction of the business and contribute overall ROI. Deploying an IT skills framework provides an opportunity for IT organizations to determine their level of readiness by identifying where skill gaps exist.
ITIL® 4 Foundation Bridge is a new Global Knowledge course that addresses the specific needs of professionals who have already achieved the ITIL v3 Foundation certification and wish to upgrade to ITIL 4.
During this Blockchain overview webinar we will discuss what blockchain is, how it can provide value, and how it is currently being used by organizations around the world to effect transformative organizational change. View the slide deck>
Learn more about the Blended Live delivery format from Global Knowledge.
The process of learning how to subnet IP addresses begins with understanding binary numbers and decimal conversions along with the basic structure of IPv4 addresses. This paper focuses on the mathematics of binary numbering and IP address structure.
Every data center has unique hardware and software requirements that can pose significant management challenges to IT. Cloud utilization, virtualization, mobile device management, app development, security, and storage networking represent just a few of the management challenges facing IT today. Add to that the responsibility of providing the infrastructure for processing an exponential increase in data and making it available to an increasingly mobile workforce on a daily basis.
As I’ve stated before, I like Border Gateway Protocol (BGP). I think it’s an interesting protocol, and yes — it’s complicated, but I guess that part of why I like it. There are a lot of knobs to tweak in BGP, maybe too many, but that’s another post. Anyway, we are now running BGP version 4 and it has had extensions written that support more than just IPv4 unicast routing. We now have IPv4 multicast, IPv6 unicast and multicast, VPNv4, VPNv6, and a few others.
This webinar will look at Border Gateway Protocol and explore why we have the protocol; how its involved and how it works. We will look at how and where BGP is used in today’s networks and Internet. We will look at the basics of configuring it and some not so basic configurations.
In this article, we discuss how to achieve that optimal security approach in the data center with Cisco Application Centric Architecture, or ACI.
In reviewing the list of best-paying jobs in IT, you’ll see some areas you might expect like cloud computing and other areas you probably didn’t, like business technology or enterprise infrastructure management. The top 10 functional areas are based on the 2016 IT Skills and Salary Survey conducted by Global Knowledge in October 2015. Note that all references to “average” represent the mean, not the median or other statistical measures.
For smaller companies, configuring a dial plan to account for variations in dialed numbers is often not a problem. However, companies that are larger and more global in nature encounter a number of issues when designing their dial plan approach.
Projects are a social endeavor. Traditional project management approaches have shied away from the social advantages a more agile project environment brings. By nature, we are storytelling, pattern seeking and social people. We need colocation to shine truly in a project environment.
In the fourth of his five-part series, Eric Strause explores the hardware and application benefits inherent in a cloud-based architecture.
Diane Teare, Global Knowledge's Cisco Course Director, discusses the advantages to taking our CCNA Boot Camp.
In this post I’ll focus on a topic that’s mentioned in the Cisco FIREWALL training class but isn’t emphasized there or in the online Cisco ASA documentation. When configuring failover on a pair of ASA security appliances, a situation can arise in which network disruption occurs due to the secondary ASA in a failover pair becoming active first and then the primary comes online second. Both the documentation and the courseware point out that this causes the secondary (and active ASA) to swap its interface MAC addresses with those of the primary. Being naturally skeptical about this behavior, I decided to investigate. The rest of this post illustrates my confirmation of this phenomenon.
The OSI model is a conceptual tool used to discuss and describe network functions. The use of a standard reference model is essential to communicating ideas as well as creating new technologies. It is a good idea to be familiar with the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers.
RIP is a protocol that is used for routing IP networks. It was designed in the early 1980’s for communication between gateways (computers with two NIC’s). It is the oldest routing protocol used by the network industry and is considered by many to be inefficient or bo...
Cisco Switches and Routers running the Internet Operating System (IOS) have many things in common. Configuring these devices of course, is a skill that is sharpened the more you touch the device. During this post, our discussion will primarily focus on the basic comm...
Understand how password length and complexity can make your passwords easy to guess or virtually impossible to bypass.