Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By

Topics

Show Filters
Result Filters:

29 Results Found

Results per page: 10 40 80

Insider Tips on Microsoft SQL Server 2016

Webinar – Recorded | Aug. 20, 2015

In this hour-long webinar, Global Knowledge course director Brian Egler will examine key new features of Microsoft SQL Server 2016 that demonstrate how it provides automatic end-to-end security, seamless generation of business analytics and elastic integration of data in the cloud.

How To Use Transparent Data Encryption in SQL Server 2008

Video | July 18, 2013

In this video, you will learn how to a use a new feature of SQL Server 2008 called Transparent Data Encryption for enhanced security.

How To Use PowerPivot in SQL Server 2008 R2 and Office 2010

Video | June 12, 2014

In this video, you will learn how to a use a new feature of SQL Server 2008 R2 and Office 2010 called PowerPivot for Self-Service Business Intelligence.

How to Use Policy Based Management in SQL Server 2008

Video | June 12, 2014

In this video, you'll learn how to utilize a great new feature of SQL Server 2008 called Policy Based Management for Multi-Server Management capabilities.

How to Deal with Six Types of Difficult Coworkers

White Paper | Jan. 06, 2021

It’s inevitable. At some point in your career, you’ll find yourself working alongside individuals who fall into the general category of “Difficult People.” The effects these people can have on an organization vary greatly but usually involve many problems for the team. This white paper describes some of the more common types of difficult people and provides you with tips on how to handle them.

How to Create a Better Cyber Defense by Building a Winning Cybersecurity Team

Webinar – Recorded | Oct. 24, 2018

For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.

How to Build a VMware vSphere 6.x Home Lab

White Paper | Dec. 12, 2017

Take your VMware vSphere training to the next level—set up your own training lab environment. This paper is broken down into three major sections: the hardware required, the VMware Workstation configuration, and installing vSphere and vCenter (vC).

How to Become Certified in Risk and Information Systems Control

White Paper | July 06, 2021

Digital transformation has bred equal parts innovation and risk. And it’s not just the IT department that’s been disrupted—technology is now the most critical risk factor for the entire organization.

High Availability Options in SQL Server 2008

Video | July 11, 2013

In this video, you will learn about the High Availability options in SQL Server 2008: Server Clustering, Database Mirroring, Log Shipping and Peer-to-Peer Replication.

Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6.5 to 6.7

Webinar – Recorded | Dec. 13, 2018

VMware vSphere: ICM 6.7 is the foundation for most other VMware technologies in the software-defined data center. The recent update from 6.5 brings important new features and enhancements.