1064 Results Found
Earning your ITIL 4 Foundation certification carries a lot of value. Armed with an understanding of the ITIL framework, you can better align IT with business objectives.
ITIL is the preeminent framework for managing IT service delivery around the world. ITIL 4 defines a Service Value System that prescribes specific practices and activities during the design, development, delivery, and support of IT services.
The main reason for Python’s explosive growth is that it’s very easy to learn, use, and deploy, and in this 45-minute webinar, we’ll take a high level look at Python’s syntax, and explore some of the other reasons for Python’s ubiquity, including its very active and evangelical user community, and the availability of a huge collection of add-ons and libraries, including hundreds for data science and machine learning. Join Skillsoft as we focus on the role that Python can play in almost every area of your business, including as a productivity tool for employees and domains that you might not necessarily associate with a programming function. Watch Now
Whether you are at the start of your Microsoft learning or you’re looking to expand or update your skillset, a certification can help you validate your knowledge and consolidate your skills. Plus, it can help you advance in your career.
Whether you’re a business user, administrator, or embarking on your technical career, this certification provides an opportunity to prove yourself as a cloud evangelist. In addition to validating your knowledge of Microsoft 365 capabilities, earning this certification makes it clear to your organization that you understand the benefits of adopting cloud services, the basics of a Software as a Service (SaaS) cloud model, and the value of implementing Microsoft 365 cloud services. Join Skillsoft in the third of our Transformative Tech Microsoft Certification series, where we demonstrate foundational-level knowledge of cloud services, such as standard practices, considerations, and benefits. Watch Now
The new Solution Specializations are designed to more closely align to the offers and solutions delivered by partners to their customers.
Cisco Learning Credits (CLCs) are prepaid training vouchers that make planning for your success easier when purchasing Cisco products and services.
Microsofts Partner program has moved from Microsoft Partner Network (MPN) with 18 different competencies to a simplified program with 6 partner designations in the Microsoft Cloud Partner Program (MCPP). This new partner program reflects the importance of the Microsoft cloud strategy as all parts of the program relate to cloud solutions.
To stay competitive in the industry, your employers and clients rely on you to stay ahead of the tech curve. Maybe they look to you when they evaluate a move to the cloud, or maybe they bring you a problem and point to an existing tech stack for solutions you may or may not be able to create. Whatever the scenario, you can be sure that the skills you bring to the table are critical on many levels. We will take a look at the cybersecurity Architect Expert certification track. This is the first expert-level certification in Microsoft’s Security, Compliance, and Identity portfolio. This certification will focus on designing elements of a cybersecurity architecture and evaluating the tradeoffs between different solutions. Watch Now
Join Skillsoft, as part of our Transformative Tech series, as we demonstrate how we can educate your organization to foster a culture of cybersecurity and unify all employees to manage risk and encourage agility and vigilance. Watch Now
Chaos and disorganization are commonplace as organizations struggle to manage IT-enabled services, which can have a serious impact on the Helpdesk. Skillsoft has the solution with ITIL. The Foundation, Advanced, and Extension Modules will provide knowledge and training so that you can proactively build and manage a blueprint for IT. This will enable you to effectively address real-world issues that impact your service organizations and their individual contributors alike. Watch Now
We are collectively generating terabytes and petabytes of data on a daily basis. Today’s organizations and governments worldwide need data curators to help sift through that random data and tease out unique insights and actionable information.
In this presentation, CompTIA’s Dr. James Stanger will provide case studies and examples describing how zero trust is implemented in the private and public sector. Dr. Stanger will outline discussions he has had with industry leaders from Google, NIST, and other organizations worldwide who have led the way in successful zero trust implementations. He will outline the best practices and technologies necessary to build next-level networks.
With the increase in number of devices, technologies, platforms and systems we use in our networks today, either they are for security, voice, routing, collaboration, data center or enterprise, we need something to make life easier and automate configurations for us.
Organizations’ network systems are becoming increasingly more complex. With the expansion of the cloud, an increase in the number of employees working from home, growth in the number and diversity of devices being used, and new and ongoing security threats, networking professionals need to be both knowledgeable and have well-developed problem-solving skills.
This article – the first in a series explaining VMware offerings – is designed to simplify things. We hope to explain what specific VMware products do, why each one is important, and what skills you need to leverage them in your own organization. In this article, we’ll look at VMware NSX-T™ Data Center.
CCNP Security (Cisco Certified Network Professional Security) personnel manages security in Routers, Switches, Networking Devices, and appliances The certified professional is responsible for configuring, supporting, and resolving Firewalls, VPNs, IDS/IPS and content security solutions for their networking environment.
This forty-five minute webinar will help you prepare to write the VCP-DCV 2021 VMware exam (2V0-21.20). In addition to a Q&A session, the webinar will cover tips and tricks that cover the key exam objectives. View the slides
When the agile movement first saw broad adoption, there was tremendous success at the team level. It didn't take long for large organizations to run into challenges seeing that same type of success in larger, more complex initiatives. This presentation is an introduction to the expanded principles of agility intended to harness the effectiveness of agile teams and bring better organizational alignment to larger efforts built upon the effectiveness of highly agile teams.
As organizations look to do more with fewer resources and better leverage scarce knowledge across their entire organization, they have found that the traditional hierarchical management structure no longer meets the needs of the business. Enterprises have turned to the matrix organizational structure for increased flow of information across departments and greater flexibility and responsiveness.
To understand the difference between Ethernet II and 802.3, you first must know how Ethernet works. While Ethernet cables transmit data, their role is relatively simple compared to that of the Ethernet card — also referred to as an adapter. It’s within the function of this card that you find the differences between Ethernet II and 802.3.
CCNP Security (Cisco Certified Network Professional Security) personnel manages security in Routers, Switches, Networking Devices, and appliances The certified professional is responsible for configuring, supporting, and resolving Firewalls, VPNs, IDS/IPS and content security solutions for their networking environment.
If you enjoy analyzing data and using Power BI to discover and unlock data insights, this could be the ideal certification for you – especially if you use those insights to provide easy-to-understand data visualizations that can help drive the success of your team and organization. Join Skillsoft in the second of our Transformative Tech Microsoft Certification series, where we leverage our expert knowledge in Microsoft Power BI to inform you on the potential benefits for your business when utilizing Power BI. In this webinar you will learn: Watch Now
VMware software and products are popular among enterprises. However, they are also highly proprietary. So, unless you have had experience with VMware products, any experience with other software can only serve as a foundation for using vSphere and other software that VMware offers.
Virtualization is a constantly evolving process, with new platforms introducing tools every day that are designed to make the process of moving to the cloud simpler.
Value stream mapping can be a dramatically transformational event – expanding empathy across teams, sharing points of view, and solving gaps in understanding which may be robbing everyone of productivity. This webinar will quickly equip attendees with a high-level understanding of value stream mapping and will teach practical tips on how to run a value stream mapping exercise within their teams and organizations.
While the recent trend towards cloud computing might make it seem like virtualization is new, it has existed in some form for many decades.
Most of us have heard of "oversharing" in the social sense (i.e. giving out too many details of your personal life), but how about "under sharing" in the Windows Server realm? What does that even mean? Well, I sort of just made that up, but it does actually make some sense when you think about it in terms of creating a Windows Share that doesn’t provide enough permissions.
As the sophistication, stealth, and frequency of cybersecurity threats continue to increase, the complexity of attacks means every organization needs security expertise before, during, and after an attack. For this reason, the demand for cybersecurity operations (CyberOps) personnel keeps going up.
There are many challenges that come to the forefront as you begin the process of virtualizing the data center and moving away from the current physical network setup.
Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This live webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment.
The Internet is not automatically a secure or safe place to be. We need to re-evaluate what it means to be secure in our online activities.
Mobile payment applications or systems have become commonplace with the expansive growth and popularity of smartphones and other mobile devices.
Protecting your IT assets from threats is an essential part of business and personal digital activities. VPNs and firewalls are two commonly used security tools to help reduce risk while maintaining usability. When used in concert, IT communications are filtered and encrypted.
According to our IT Skills and Salary Report, 85% of professionals possess at least one certification. That’s a ton of competition in the industry. And the general consensus is the more certifications, the better. So why are so many IT pros and decision-makers putting such an emphasis on certifications? Why is so much investment devoted to training?
As cloud platforms provide ever greater infrastructure capability, automating and managing infrastructure is becoming critical to our strategy and process. Tooling environments are also heavily impacted. Tools like Terraform, configuration automation tools (Chef, Ansible, etc.) and cloud-native infrastructure solutions completely change cost models and workflows. This presentation is an introduction to infrastructure automation in the cloud, a few popular automation tools, and how to tie automation to larger cloud (and business) strategy.
An IT certification is a recognized benchmark mapped to a specific skill set based on standardized testing. A certification demonstrates your dedication, motivation and technical knowledge on a specific platform.
From analyzing your data and allowing to ask natural language questions to working with and building huge data models, this version of Excel has a lot to offer. These are some of the best features that Excel has to offer. Some haven’t finished their evolution yet either.
Next Hop Resolution Protocol enables businesses to have a way for next-hop servers and next-hop clients to communicate with each other directly, bypassing a central hub and preventing potential bottlenecks.
Discover how to accelerate the development of your security skills and competencies by incorporating experiential learning activities such as cyber ranges into training. Cyber ranges have emerged as excellent vehicles for helping IT professionals learn by doing. These realistic, hands-on simulations prepare you for when — not if — you’re attacked. And we’ve added them to GK Polaris!