13 Results Found
This Certification Prep Guide provides an overview of the current AWS Certified Solutions Architect – Associate certification and offers helpful tips that you can use when preparing for your AWS Architect certification exam.
The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.
For organizations getting started with RHEL, Red Hat Training has developed a series of courses to develop the skills needed for basic administration and configuration of Red Hat Enterprise Linux. These courses introduce key command line concepts and enterprise-level tools, laying the foundation for the rapid deployment of Red Hat Enterprise Linux. The curriculum also introduces the basic administration skills needed for resolving configuration issues and integrating Red Hat Enterprise Linux systems with other existing environments. View the slide deck>>
In this one-hour webinar, AWS consultant and instructor Ryan Dymek, will discuss how to optimize your AWS architecture design.
In this live excerpt from Supporting and Troubleshooting Windows 10 (M10982), Windows 10 expert and Microsoft Certified instructor, John Panagakos, will lead you through one of the most popular modules in this course.
One of the most significant new features in Microsoft Windows Server 2012 is the Hyper-V Replica (HVR) capability. Whether you are considering this for your own organization or just prepping for your Windows Server 2012 MCSA, this white paper presents the essentials of deploying this disaster recovery feature.
In this video, instructor Glenn Weadock explains the Windows 7 library concept and how it replaces the traditional "My Documents" user profile folder by adding the Public profile to the user profile.
Global Knowledge Practice Leader, Craig Brown, explains what students will learn in our "Monitoring and Troubleshooting the Performance of a Windows Server Environment" workshop.
In this video, instructor Charles Strother does a quick overview of what is needed to install a Read-Only Domain Controller (RODC) in a Windows Server 2008 environment.
Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do to keep your systems safe and implementing a layered approach. If you depend on one program or feature to secure your computer, then when (not if, but when) that dependency is breached, you may have personal information stolen or even have your computer taken over.