Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Show Filters
Result Filters:

20 Results Found

Results per page: 10 40 80

10 Security Concerns for Cloud Computing

Webinar – Recorded | May 17, 2010

The flexibility, reduced cost, and mobility of cloud computing have made the concept a hot topic. Before implementing this method of computing, however, it is important to consider the security of the "cloud." During this webinar, we will help you understand some of the risks and benefits of cloud computing so you can decide if it is the right solution for you.

Enhancing the Value of ITIL® and TOGAF®

Webinar – Recorded | Aug. 29, 2013

Traditionally, ITIL and TOGAF professionals have been part of different teams within an organization. Due to the ongoing alignment of business and IT, these professionals now often find themselves on the same team. Because of this crossover, there is a growing trend towards organization of work based on multiple best practice models. 

Developing Effective IT Learning Processes

Webinar – Recorded | Oct. 16, 2013

Business is changing rapidly and Information Technology is at the centre of the trends: mobile, social, cloud and big data,. Forward thinking IT functions must develop and manage the skills of their most critical asset-- their employees. Effective professional development can guard against the pace of change, leading IT units to re-define job roles to include both technical and non-technical competencies and to establish business processes to help their staff develop and maintain these skills. This session will present the components of a holistic process to support learning and development in any IT organization.

DevOps: The Future of ITSM and ITIL

Webinar – Recorded | June 19, 2014

Cloud computing enables development teams to get applications into production faster. IT Service Management (ITSM) leaders must adopt new strategies and change existing processes or risk becoming a barrier to success. Cloud computing requires DevOps-the blending of development and operations with the goal of accelerating time-to-market and reducing time-to-value. The good news is that ITIL® is uniquely positioned to accelerate DevOps, but it requires changes to existing ITSM processes.

Get Your Best Practices in Order: ITSM and Your Organization

Webinar – Recorded | June 24, 2014

Nasser El-Batal will walk you through the most useful, recognized, and mandated ITSM best practices in the industry: TOGAF, COBIT and ITIL®. He will highlight the benefits of integrating them into a single implementation program to avoid project disaster. Discussions are focused on "Getting Your House in Order" and how to establish your own organization-specific business transformation program, while increasing your organization maturity.

How to Study for and Pass ITIL Intermediate Exams

Webinar – Recorded | July 24, 2014

In this hour-long webinar by Global Knowledge instructor and ITIL Expert Michael Scarborough, you will learn how to study for and succeed in passing ITIL Intermediate Exams. You will learn how to approach an ITIL Intermediate exam, the true/false approach and why it works and how to study for the ITIL Intermediate exams.

What You Don't Know About Cybersecurity CAN Hurt You

Webinar – Recorded | Oct. 21, 2014

The bad guys just keep getting better! No matter how much patching and tweaking we do, the bad guys' constantly changing tactics and techniques continue harming our networks, stealing and damaging data, and just generally screw things up. What motivates someone to do such terrible things in the first place? How have these hackers changed and improved? What kinds of attacks are popular now and why? In this hour-long webinar, security expert, former hacker and Global Knowledge instructor Phillip D. Shade will provide insight into understanding the latest hacking techniques, what the current threat landscape looks like, and suggested countermeasures to mitigate threats. He will include specific examples of the current threat landscape, including data mining, social engineering cyber threat terminology, man-in-the- middle attacks and Denial of Service (DoS) attacks.

Getting Started with Change Management

Webinar – Recorded | Dec. 04, 2014

You will learn how many organizations approach change management as compared to how best practices dictate that change management should work. Global Knowledge instructor and ITIL Expert Michael Scarborough will fill you in on the purpose of change management and the difference between change management and change tickets. He will provide a high-level guide for establishing a change management process that uses real-world examples as its basis.

Understanding the Difference Between Incident Management and Problem Management

Webinar – Recorded | April 02, 2015

In this hour-long webinar, Global Knowledge instructor and ITIL Expert Michael Scarborough will share his knowledge and expertise on various aspects of incident management and problem management processes. He will help you understand the difference between incidents and problems and between incident and problem management, providing examples from his own experience to drive the concepts home. Michael will also provide an overview of who performs various incident and problem management activities in an organization.

Protect Software Applications with IBM Security AppScan

Webinar – Recorded | May 28, 2015

Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.