Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

48 Results Found

Results per page: 10 40 80

Business Process Modeling: From Macro to Micro

Webinar – Recorded | Nov. 12, 2015

Business processes are complicated, and mapping them is not a trivial task. Modelling standards give us the tools to model complex processes, but they do not tell us the best way to approach a model or effectively use the tool. In this hour-long webinar, Global Knowledge instructor Rod Fage will guide you through the best way to develop a model, from determining the goal and scope of the process and measuring its effectiveness, to modelling the process in a hierarchical top-down approach, enabling business analyst to continuously validate the model.

Ethical Hacking: A Good Defense Starts with Offensive Security

Article | June 21, 2019

There are two types of networks: those that have been hacked and those that will be. To defend against hacks, cyber professionals can benefit greatly from ethical hacking programs.

Harnessing Creativity to Make Powerful Decisions

White Paper | Nov. 30, 2016

Creativity is the “due diligence” of effective problem analysis. It is through creativity that the best possible solution for a problem is discovered. Without creativity, decisions are often one-dimensional, superficial, and near-sighted.

High Availability Options in SQL Server 2008

Video | July 11, 2013

In this video, you will learn about the High Availability options in SQL Server 2008: Server Clustering, Database Mirroring, Log Shipping and Peer-to-Peer Replication.

How to Build a Pluggable IoT Pipeline in AWS

White Paper | July 23, 2018

As far as modern architectures go, there are few more complicated than an IoT pipeline. You’ve got to consider an ingestion layer (typically streaming) that may undergo manic load. You’ve got to think of data tagging, storage (probably across multiple engines), archival and access—both internal and external. And all of it has to scale like crazy, be as cost effective as possible, and use automation wherever it can. Oh, and your boss needs the IoT pipeline built by tomorrow. Short timelines? Tight budget? Unrealistic expectations? Unfortunately, these asks are realities for many cloud professionals. AWS knows this and is here to help.  

How to Create a Better Cyber Defense by Building a Winning Cybersecurity Team

Webinar – Recorded | Oct. 24, 2018

For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.

How to Maximize Your Training Budget

Webinar – Recorded | Feb. 21, 2019

In this informative webinar, you will learn about the popular and overlooked ways organizations and professionals can purchase training to become more resilient. 

How to Show Your IT Skills and Certifications on LinkedIn (with Video Guides)

Article | March 25, 2021

Learn how to boost your visibility on LinkedIn by listing your skills and certifications and leveraging the courses you’ve taken for professional development. This is especially important to catch the eyes of recruiters and when applying for jobs.

How to Use Policy Based Management in SQL Server 2008

Video | June 12, 2014

In this video, you'll learn how to utilize a great new feature of SQL Server 2008 called Policy Based Management for Multi-Server Management capabilities.

How To Use PowerPivot in SQL Server 2008 R2 and Office 2010

Video | June 12, 2014

In this video, you will learn how to a use a new feature of SQL Server 2008 R2 and Office 2010 called PowerPivot for Self-Service Business Intelligence.