Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Show Filters
Result Filters:

14 Results Found

Results per page: 10 40 80

Read-Only Domain Controllers (RODC)

Video | Sep. 02, 2014

In this video, instructor Charles Strother does a quick overview of what is needed to install a Read-Only Domain Controller (RODC) in a Windows Server 2008 environment.

The Perfect Stand-Up Meeting

Webinar – Recorded | May 04, 2017

Whether your project follows formal or informal project management, waterfall, or an iterative or Agile, making use of the daily stand-up meeting is an essential habit required for every self-organizing team. Stand-ups are a core practice and help us determine customer value, reinforce team structure, organize priorities, address uncertainty, remove impediments, and manage our time through the use of a personal Kanban. In this one-hour webinar, we will: Determine daily customer value with the three stand-up questions,  Investigate the use a Team Charter to build team structure and balance, Address daily uncertainty with a Risk Burndown, and Participate in a small exercise and create your own personal weekly and daily Kanban using exclusive cognitive techniques to manage the multitasking behaviors required of all of us.

What You Don't Know About Cybersecurity CAN Hurt You

Webinar – Recorded | Oct. 21, 2014

The bad guys just keep getting better! No matter how much patching and tweaking we do, the bad guys' constantly changing tactics and techniques continue harming our networks, stealing and damaging data, and just generally screw things up. What motivates someone to do such terrible things in the first place? How have these hackers changed and improved? What kinds of attacks are popular now and why? In this hour-long webinar, security expert, former hacker and Global Knowledge instructor Phillip D. Shade will provide insight into understanding the latest hacking techniques, what the current threat landscape looks like, and suggested countermeasures to mitigate threats. He will include specific examples of the current threat landscape, including data mining, social engineering cyber threat terminology, man-in-the- middle attacks and Denial of Service (DoS) attacks.

Windows Server 2008 R2 Training

Video | July 01, 2014

In this video, Practice Leader Craig Brown discusses our exclusive Server 2008 course - Configuring, Managing, and Maintaining Server 2008 R2 (M6419). Specifically, the enhancements we've made to this course through Server 2008 R2 supplemental learning materials and custom hands-on labs that enable the student to utilize critical Server 2008 R2 functions after completing the course.