16 Results Found
Agile project management literally turns the world of managing projects upside down. The triple constraint is balanced in an unconventional way, the role of the matrix team coordinator is downplayed, and risk management can be built into the prioritization approach. So, what is left for the PM to do?
Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.
In this video, instructor Charles Strother does a quick overview of what is needed to install a Read-Only Domain Controller (RODC) in a Windows Server 2008 environment.
Whether your project follows formal or informal project management, waterfall, or an iterative or Agile, making use of the daily stand-up meeting is an essential habit required for every self-organizing team. Stand-ups are a core practice and help us determine customer value, reinforce team structure, organize priorities, address uncertainty, remove impediments, and manage our time through the use of a personal Kanban. In this one-hour webinar, we will: Determine daily customer value with the three stand-up questions, Investigate the use a Team Charter to build team structure and balance, Address daily uncertainty with a Risk Burndown, and Participate in a small exercise and create your own personal weekly and daily Kanban using exclusive cognitive techniques to manage the multitasking behaviors required of all of us.
The bad guys just keep getting better! No matter how much patching and tweaking we do, the bad guys' constantly changing tactics and techniques continue harming our networks, stealing and damaging data, and just generally screw things up. What motivates someone to do such terrible things in the first place? How have these hackers changed and improved? What kinds of attacks are popular now and why? In this hour-long webinar, security expert, former hacker and Global Knowledge instructor Phillip D. Shade will provide insight into understanding the latest hacking techniques, what the current threat landscape looks like, and suggested countermeasures to mitigate threats. He will include specific examples of the current threat landscape, including data mining, social engineering cyber threat terminology, man-in-the- middle attacks and Denial of Service (DoS) attacks.
In this video, Practice Leader Craig Brown discusses our exclusive Server 2008 course - Configuring, Managing, and Maintaining Server 2008 R2 (M6419). Specifically, the enhancements we've made to this course through Server 2008 R2 supplemental learning materials and custom hands-on labs that enable the student to utilize critical Server 2008 R2 functions after completing the course.