Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Show Filters
Result Filters:

12 Results Found

Results per page: 10 40 80

DevOps is the Missing Piece for Businesses that Demand Change

White Paper | Feb. 27, 2018

Building upon the IT best practices of Lean, Agile Scrum and IT Service Management, DevOps adds that “missing” layer to tie together the service lifecycle workflow across Development and Operations, while leveraging the latest in automation technology. Demand for skilled, open-minded, and collaborative professionals with DevOps knowledge is rapidly increasing. Are you ready for change?    

The Perfect Stand-Up Meeting

Webinar – Recorded | May 04, 2017

Whether your project follows formal or informal project management, waterfall, or an iterative or Agile, making use of the daily stand-up meeting is an essential habit required for every self-organizing team. Stand-ups are a core practice and help us determine customer value, reinforce team structure, organize priorities, address uncertainty, remove impediments, and manage our time through the use of a personal Kanban. In this one-hour webinar, we will: Determine daily customer value with the three stand-up questions,  Investigate the use a Team Charter to build team structure and balance, Address daily uncertainty with a Risk Burndown, and Participate in a small exercise and create your own personal weekly and daily Kanban using exclusive cognitive techniques to manage the multitasking behaviors required of all of us.

Is Agile the Best Way Forward for Your Organization?

Webinar – Recorded | April 07, 2017

This webinar focuses on assisting leaders who are determining whether Agile is right for their organization. In one hour, we will take you from the basic concepts of Agile methodology to understanding the process and what your role is as a leader. You will learn the challenges and benefits and how an Agile culture can fuel your teams and provide value for your customers faster.

Project Managers in Agile - Where do They Fit In?

Webinar – Recorded | March 31, 2017

Agile project management literally turns the world of managing projects upside down. The triple constraint is balanced in an unconventional way, the role of the matrix team coordinator is downplayed, and risk management can be built into the prioritization approach. So, what is left for the PM to do?

Protect Software Applications with IBM Security AppScan

Webinar – Recorded | May 28, 2015

Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.

Hyper-V Replicas in Windows Server 2012

White Paper | Feb. 27, 2015

One of the most significant new features in Microsoft Windows Server 2012 is the Hyper-V Replica (HVR) capability. Whether you are considering this for your own organization or just prepping for your Windows Server 2012 MCSA, this white paper presents the essentials of deploying this disaster recovery feature.

What You Don't Know About Cybersecurity CAN Hurt You

Webinar – Recorded | Oct. 21, 2014

The bad guys just keep getting better! No matter how much patching and tweaking we do, the bad guys' constantly changing tactics and techniques continue harming our networks, stealing and damaging data, and just generally screw things up. What motivates someone to do such terrible things in the first place? How have these hackers changed and improved? What kinds of attacks are popular now and why? In this hour-long webinar, security expert, former hacker and Global Knowledge instructor Phillip D. Shade will provide insight into understanding the latest hacking techniques, what the current threat landscape looks like, and suggested countermeasures to mitigate threats. He will include specific examples of the current threat landscape, including data mining, social engineering cyber threat terminology, man-in-the- middle attacks and Denial of Service (DoS) attacks.

Read-Only Domain Controllers (RODC)

Video | Sep. 02, 2014

In this video, instructor Charles Strother does a quick overview of what is needed to install a Read-Only Domain Controller (RODC) in a Windows Server 2008 environment.

Windows Server 2008 R2 Training

Video | July 01, 2014

In this video, Practice Leader Craig Brown discusses our exclusive Server 2008 course - Configuring, Managing, and Maintaining Server 2008 R2 (M6419). Specifically, the enhancements we've made to this course through Server 2008 R2 supplemental learning materials and custom hands-on labs that enable the student to utilize critical Server 2008 R2 functions after completing the course.

Monitoring and Troubleshooting the Performance of a Windows Server Environment Workshop

Video | May 29, 2014

Global Knowledge Practice Leader, Craig Brown, explains what students will learn in our "Monitoring and Troubleshooting the Performance of a Windows Server Environment" workshop.