Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

228 Results Found

Results per page: 10 40 80

Four-Point Plan for Developing Durable Project Management Talent

Webinar – Recorded | Aug. 13, 2015

Introducing new talent to an established organization can be difficult for many reasons. Seasoned employees may view the incoming new hires as "too green" or as not having the required skills to contribute in a meaningful way. They may worry about having to "waste time" teaching the newbies things that they should already know or get aggravated when the new employees are not familiar with "the way we do things around here." Additionally, it is difficult to know if the right new hires are being put into the right positions for their interests, abilities and talents. After all, a resume and an interview can only tell a hiring manager so much about the person they are bringing on board, and often talented employees are simply being put into a role that is not a good fit.

Proving Project Value

Webinar – Recorded | Aug. 13, 2015

We often discuss how to manage projects, but we overlook an essential step: proving project value. Proving project value ensures that organizational strategies are aligned with project objectives.

An Introduction to TOGAF®, The Open Group Architecture Framework

Webinar – Recorded | Aug. 11, 2015

In this hour-long webinar, IT service management expert Nasser El-Batal will introduce you to the TOGAF framework. You will learn about its business benefits, critical factors for implementation success, and TOGAF's relationship to and integration with other best practices.

IBM Cloud TechTalks (Part 2 of 4): Up, Up & Away: Storage in the Cloud

Webinar – Recorded | July 23, 2015

The four-part Cloud TechTalks series shares practical insights and best practices for using the cloud. With exponential growth and unparalleled demand, there are few areas with greater opportunity than storage in the cloud. Join us for this complimentary, hour-long webinar to hear Susan Schreitmueller, IBM distinguished engineer and senior cloud advisor, share IBM's cloud storage solutions. Along with exploring trends and directions around IBM's roadmap for storage in the cloud, Schreitmueller will review Cloud Managed Services and SoftLayer options, as well as software-defined storage and IBM's suite of products.

Consulting Skills: The Art and Science of Success

Webinar – Recorded | July 17, 2015

Every business needs to have a consultative approach that increases organizational buy-in, enhances client relationships and improves customer service. Applying consulting skills can mean greater success for individuals and organizations alike. In this one-hour webinar, Michelle Moore will provide an overview of the Consulting Skills Lifecycle and present practical ideas from our McMaster Certified Consulting Skills Program. You'll learn how to engage your clients, gather and analyze information, present findings and recommendations, plan and implement recommendations and conclude the engagement and evaluate results.

Building Up Network Security: An Introduction

Webinar – Recorded | July 16, 2015

Despite advances in security, hackers continue to break through network defenses. In this hour-long webinar, network security specialist Catherine Paquet will examine the favorite methods and targets of hackers and will introduce you to the different categories of security technologies. In this foundational presentation, you will learn about the benefits of security solutions such as firewalls, VPNs, IPS, identity services and BYOD.

The Use Case Technique: An Overview

Webinar – Recorded | June 26, 2015

Use cases are an effective and widely used technique for eliciting software requirements. In this hour-long webinar, software development and process improvement expert Karl E. Wiegers will introduce you to a practical and straightforward use cases approach to requirements elicitation. You will learn how to focus on the goals that users have with a system, rather than emphasize system functionality.

The Impact of IIBA's New BABOK® Guide and PMI's New Business Analysis for Practitioners Guide

Webinar – Recorded | June 25, 2015

The past months have seen the release of both the International Institute of Business Analysis (IIBA)'s long-awaited A Guide to the Business Analysis Body of Knowledge (BABOK® Guide) v3 and the Project Management Institute® (PMI®)'s Business Analysis for Practitioners. While both represent interesting developments in the field of business analysis, they also provide lots of information to process. There's no need to go it alone! Join Global Knowledge instructors Cheryl Lee and Adam McClellan for this complimentary, hour- long webinar to learn about the differences between the two guides, how both guides compare to the previous version of the BABOK ® Guide, and where all this might be going.

Preparing for Digital Disruption: Future-Proofing Yourself and Your Organization

Webinar – Recorded | June 16, 2015

In this world of volatility and complexity, it seems that the only certainty is the unstoppable advancement of technology. As people and organizations look to improve productivity, innovate their business models and processes, and differentiate their client and employee experiences, they need to be prepared to work in new and different ways. The challenge is that recent data reveals that Canada is falling behind the rest of the world in innovation, especially regarding new and disruptive technologies that promise to significantly impact every industry and organizations of all types and sizes. In this 60-minute webinar, we will explore the concept of digital disruption and provide information about how to future-proof yourself and your organization to succeed in this new world.

IBM Cloud TechTalks (Part 1 of 4): Building a Power Cloud for Your Administrators

Webinar – Recorded | June 15, 2015

PowerVC is a cloud tool based on OpenStack technology used to manage your virtualized environment running on your Power System. It automates rapid provisioning/deprovisioning and provides simple ongoing management of LPARs on Power Systems. Join us for this free, interactive webinar to hear senior power cloud consultants Vess Natchev and Kyle Wurgler from IBM System Lab Services.

Project Managers are Makers; Change Managers are Shakers!

Webinar – Recorded | May 28, 2015

Change managers and project managers come at the same goal of maximizing ROI for their organizations, but from different perspectives and approaches and with different skill sets. While project managers are responsible for achieving specific objectives on time and on budget, the change manager's role is broader. Change managers apply a structured approach to helping individuals, teams and organizations negotiate relentless change. A project manager turns ideas into reality. Increasingly, project managers are required to take on the role of change manager as well. Business today can't afford to carry out tasks without considering the larger picture. Today, integration is unavoidable - and expected. In this hour-long interactive session, we'll discuss the similarities and differences between project management and change management. We'll also identify the occasions when both a project manager and a change manager might be needed.

Protect Software Applications with IBM Security AppScan

Webinar – Recorded | May 28, 2015

Nowadays, you can read weekly articles about security attacks and stolen data. Even leading companies and organizations are victims of cybercrime. Attacks can include breaches at three levels: the physical level, which includes social engineering, system and network and applications (e.g., web and mobile). In this complimentary webinar, you will discover the benefits of using automated solutions to detect application vulnerabilities, provide steps to remediate them and avoid costly compliance violation.

How to Manage Complex Projects

Webinar – Recorded | April 16, 2015

Complexity has always been a part of projects. But today, globalization, new technologies and changing markets have combined to add to the complexity. Today's projects have more stakeholders, more ambiguity and more politics than ever, and project managers need new tools and approaches to succeed. Join Alexander Stanisic and Michelle Moore of Global Knowledge for an information-packed hour on how to manage the complexity of the 21st-century project.

Portfolio Management and the PMO: Cost Center or Revenue Driver?

Webinar – Recorded | April 09, 2015

In many organizations, the Program/Project Management Office (PMO) is viewed as purely a cost center, so it becomes marginalized by additional layers of bureaucracy, oversight and cost. But the essence of the PMO and portfolio management in general is to add value to the organization. So how do organizations reconcile the cost of the PMO versus the value it adds? The short answer is to flip the conversation on its head and talk about the PMO as a revenue driver rather than a cost center. In this hour-long webinar, Global Knowledge PMP-certified senior product manager Daniel Stober will explain how, by focusing on efficiencies gained and reduced waste, you can shift the conversation from the PMO being a necessary evil to the PMO being critical for organizational success.

Understanding the Difference Between Incident Management and Problem Management

Webinar – Recorded | April 02, 2015

In this hour-long webinar, Global Knowledge instructor and ITIL Expert Michael Scarborough will share his knowledge and expertise on various aspects of incident management and problem management processes. He will help you understand the difference between incidents and problems and between incident and problem management, providing examples from his own experience to drive the concepts home. Michael will also provide an overview of who performs various incident and problem management activities in an organization.

Change Agility: Mastering Constant Change

Webinar – Recorded | Feb. 26, 2015

Change is no longer an isolated event. In the digital world, professional and personal change is constant. It is the new normal. Today's leaders and teams are asked to handle relentless upheavals, while still being expected to deliver on their short-term goals. To succeed, they must toggle between the often-conflicting priorities of today's profits and tomorrow's growth. Organizational change management has been documented and many approaches exist; the same can be said for personal change. But rarely have organizations holistically thought about how these two drivers of positive change can collectively enable ongoing success. Join Jocelyn Bérard, Global Knowledge Vice President, International Leadership and Business Solutions, and Phil Buckley, Managing Director at Change with Confidence, for this informative hour-long webinar to learn a powerful and practical framework to help you manage organizational and personal change.

To Certify or Not to Certify? That's the $100,000 Question

Webinar – Recorded | Jan. 29, 2015

Does an IT certification guarantee you a ticket to a $100,000 job? Not anymore! Are IT certifications a thing of the past? Not even close. But, the certification landscape is definitely changing - and it's changing rapidly. Organizations are empowered with more technology options than ever before, vendors are changing their products to address the need for cloud-based services, and open-source technology is becoming mainstream. In this hour- long session, we will review the current certification landscape and answer questions.

Get Ready! Career Management in the Digital Age

Webinar – Recorded | Jan. 27, 2015

Technology in the digital age is disrupting everything in our lives and our workplace -- and it's impacting all aspects of the "People, Process and Technology" paradigm. Changes for IT professionals, project managers and business analysts are profound and are happening at lightning speed - faster than we've ever seen before. Individuals and organizations must keep pace or get left behind. Never fear. Along with the danger of quickly finding yourself on the sidelines are opportunities for tremendous career growth. Join us for this one-hour session on career management in the digital age. You will learn about the forces that are impacting business, how skills are evolving, which new skills will emerge and what you can do to adapt and succeed in the digital age.

Getting Started with Change Management

Webinar – Recorded | Dec. 04, 2014

You will learn how many organizations approach change management as compared to how best practices dictate that change management should work. Global Knowledge instructor and ITIL Expert Michael Scarborough will fill you in on the purpose of change management and the difference between change management and change tickets. He will provide a high-level guide for establishing a change management process that uses real-world examples as its basis.

What You Don't Know About Cybersecurity CAN Hurt You

Webinar – Recorded | Oct. 21, 2014

The bad guys just keep getting better! No matter how much patching and tweaking we do, the bad guys' constantly changing tactics and techniques continue harming our networks, stealing and damaging data, and just generally screw things up. What motivates someone to do such terrible things in the first place? How have these hackers changed and improved? What kinds of attacks are popular now and why? In this hour-long webinar, security expert, former hacker and Global Knowledge instructor Phillip D. Shade will provide insight into understanding the latest hacking techniques, what the current threat landscape looks like, and suggested countermeasures to mitigate threats. He will include specific examples of the current threat landscape, including data mining, social engineering cyber threat terminology, man-in-the- middle attacks and Denial of Service (DoS) attacks.

The Human Side of Communication in the Digital Age

Webinar – Recorded | Oct. 15, 2014

Communication in our work and personal life has been dramatically transformed, not only by technology, but also by new practices and habits. At the same time, numerous studies show that communication is one of the top critical skills required to be successful. In fact, because of the way organizations and jobs are evolving, the importance of communication keeps increasing for professionals and leaders. This hour-long complimentary webinar is not about how to maximize your LinkedIn contacts or attract more Twitter followers. Jocelyn Bérard is a psychologist specializing in human performance and will share innovative ways to influence others through communication. He will also help you raise your knowledge and awareness about your personality traits and personal characteristics, how they impact communication and how to use them effectively.The digital age is here and you can't control it. But you can certainly improve and better use the human side of your communication.

When e-Learning Fails: Five Classic Mistakes and How to Avoid Them

Webinar – Recorded | Oct. 02, 2014

Most of us have been involved with an e-Learning design project that has not delivered its intended impact. Across organizations, remarkably similar but preventable mistakes are made in the design and development of e-Learning that can frustrate learners, reduce effectiveness and ultimately impede success. Small missteps early in the design process can lead to costly problems in the development and implementation stages. This session will present 5 common mistakes e-Learning professionals make. For each mistake, evidence-based best practices will also be shared to help prevent their occurrence in the future. The evidence-based best practices can serve as a design guide for successful e-Learning projects of all types. Finally, approaches will also be discussed to help organizations integrate evidence-based best practices into their e-Learning design efforts.

How Project Managers Can Influence Their Stakeholders' Perceptions

Webinar – Recorded | Sep. 25, 2014

In this hour-long webinar, Global Knowledge instructor and PMP-certified project management expert Daniel Stober will look beyond the triple constraint model and focus on the true essence of project success: stakeholder satisfaction. Many project managers (PMs) fall into the familiar habit of managing based on the constraints of time, cost and scope. While all of these are important, managing them effectively doesn't guarantee project success if the PM fails to conduct proper stakeholder management. To manage stakeholders effectively, the PM has to set expectations. Once expectations are set, the PM must influence the perception of project performance with the stakeholder. Tune in as Dan explores methods you can use to accomplish that goal.

Take the Fear Out of Change: Why You Need Organizational Change Management

Webinar – Recorded | Aug. 21, 2014

Today's organizations must integrate and align people, processes, structures, culture and strategy to successfully transition individuals and/or groups from a current state to a future state to achieve their desired business outcomes and objectives. It is how we define change management today, which directly affects everyone from the entry-level employee to senior management. Everyone must learn how to make organizational changes, where managers are charged with the additional responsibility of making these changes happen in and through the different levels of strategic execution. This one-hour webinar focuses on change management in the areas of organizational development and human resource management combined with standardized portfolio, program, and project management practices (i.e., A Guide to the Project Management Body of Knowledge-Fifth Edition (PMBOK® Guide)).

Effective Meetings for Business Analysts

Webinar – Recorded | Aug. 20, 2014

Business analysts have the responsibility to gather, analyze, and validate business and technical requirements for their projects, thus they need structured facilitation skills to manage requirements meetings and workshops. In this one hour webinar you will learn the most important things to remember when planning a facilitated workshop and what types of questions to ask when eliciting requirements.

Maximize Organizational Success with Precision Guided Enterprise Architecture

Webinar – Recorded | Aug. 14, 2014

Successful transformation initiatives are driven by Business Architecture. The Business Architect plays a key role in bringing all of the portfolio components together and consistently reinforcing senior management's voice throughout the ADM lifecycle. This begins with establishing strategic goals and outcomes that set the context for the entire program and service transformation. Establishing context serves as the basis for strategic project portfolio definition and integrated execution. This approach mitigates the risk of executing projects in isolation without considering the needs of the entire portfolio as a whole. This session will boost your knowledge of these concepts and help you and your team to achieve the best possible outcomes for your organization.

Common Networking Standards and Why They Are Relevant

Webinar – Recorded | July 29, 2014

Often, we don't have time to learn the reasons behind the standards we use. But learning what instigated a standard goes a long way toward not only understanding its importance, but also more easily and effectively applying it in your workplace. In this hour-long webinar, Global Knowledge instructor Keith Sorn will discuss common networking standards and explain how they were determined and why they are relevant. He will fill you in on things like why it's important to use proper color-coding standards when making cable and why the length limitations on wired cable are essential. He will also explain new standards, such as power over fiber.

How to Study for and Pass ITIL Intermediate Exams

Webinar – Recorded | July 24, 2014

In this hour-long webinar by Global Knowledge instructor and ITIL Expert Michael Scarborough, you will learn how to study for and succeed in passing ITIL Intermediate Exams. You will learn how to approach an ITIL Intermediate exam, the true/false approach and why it works and how to study for the ITIL Intermediate exams.

Managing Stakeholder Expectations for Project Success

Webinar – Recorded | July 24, 2014

This power session is an introduction to Managing Stakeholder relations. It offers new ways of managing and dealing with projects, which focus more on communications, understanding stakeholders' needs and managing their expectations, as well as learning about organizational politics and culture, and performing value-add activities. It provides a practical approach to managing issues that matter most for project success - communication, stakeholder expectations, risk, change and quality; so that the scope, schedule and cost end up on target, achieving the desired outcomes for the organization.

An Introduction to Agile: The New Mainstream Approach to Software Delivery

Webinar – Recorded | July 10, 2014

With Forrester Research declaring "Waterfall processes have become obstacles to speed, quality and predictability," and more than 85% of CIO's surveyed by CIO Magazine using or planning to pursue Agile practices in 2014, this one-hour webinar will explore the basics of Agile and why so many organizations are adopting Agile methods.

Future-Proof your IT Career in The Digital Age: A Practical Guide

Webinar – Recorded | June 26, 2014

With the onset of the Digital Age, IT professionals today are hit with a tsunami of changes! "By 2018, adoption of mobile, social, cloud, analytics will redefine 90% of IT roles" according to IDC 2014 Predictions: CIO Agenda. Large organizations are eliminating silos. Small and medium organizations are outsourcing technology services. Digital natives have entered the workforce. New roles will emerge as new ways of doing business are introduced and as old technology fades away. Today's IT professionals must adapt, and a new set of skills is in order. Join Pranav Shah, Manager of Information Technology and Security at Sony Canada, and Pam Maguire, Business Development Manager, Global Knowledge, for a 60 minute webinar on how to future-proof your IT career in the Digital Age. You will learn about how IT roles are changing, what organizations are looking for, and what you can do now to be ready.

The Project Manager as Business Analyst

Webinar – Recorded | June 26, 2014

The project manager (PM) and business analyst (BA) have to be key allies in the management of any project. That can be difficult when project work is duplicated because of the overlapping tasks defined by the International Institute of Business Analysis (IIBA®) and the Project Management Institute (PMI®). Still, as long as roles are clearly defined and understood, the two can cooperate and collaborate, instead of competing. In this hour-long webinar, Global Knowledge instructor and PMP-certified project management expert Daniel Stober will explain how to delineate the roles.

Get Your Best Practices in Order: ITSM and Your Organization

Webinar – Recorded | June 24, 2014

Nasser El-Batal will walk you through the most useful, recognized, and mandated ITSM best practices in the industry: TOGAF, COBIT and ITIL®. He will highlight the benefits of integrating them into a single implementation program to avoid project disaster. Discussions are focused on "Getting Your House in Order" and how to establish your own organization-specific business transformation program, while increasing your organization maturity.

DevOps: The Future of ITSM and ITIL

Webinar – Recorded | June 19, 2014

Cloud computing enables development teams to get applications into production faster. IT Service Management (ITSM) leaders must adopt new strategies and change existing processes or risk becoming a barrier to success. Cloud computing requires DevOps-the blending of development and operations with the goal of accelerating time-to-market and reducing time-to-value. The good news is that ITIL® is uniquely positioned to accelerate DevOps, but it requires changes to existing ITSM processes.

Cybersecurity: Physical Security

Webinar – Recorded | May 26, 2014

As an IT professional you deal day in and day out with securing operating systems, patching software, installing and configuring firewall and routers But what about the physical infrastructure? Do you understand how simple techniques can allow theft of your company resources? In this session we will discuss how to reduce the possibility of loss of data and equipment. Physical security may not be part of your job but you should be aware and having discussions with the personnel who are responsible. Or does Physical Security become one of your job responsibilities? Come to this session and learn about one of the most important and yet least thought about areas of security by IT professionals.

Where Does Business Analysis Fit into TOGAF?

Webinar – Recorded | May 08, 2014

The Open Group Architectural Framework (TOGAF) provides a structure for describing all transformational work within an enterprise. While TOGAF focuses on the role of an enterprise's architects, it also very much addresses the space in which business analysts (BAs) play. This can lead to role confusion, blurred deliverables, and duplicate work. In this one-hour webinar, business analysis expert and Global Knowledge instructor Adam McClellan will focus on those parts of TOGAF in which the business analyst is typically the most active, and he will outline how the analyst's work contributes to the broader architecture. He will also provide perspective for architects who work with BAs and for BAs interested in the architecture disciplines.

Going Mobile: How to Harness Mobile Technologies for Learning and Performance

Webinar – Recorded | May 07, 2014

The promise of mobile learning is the ability to reach employees with powerful information, support tools, and interactive content when and where they need. Only recently, with the rise of tablets, smartphones, cloud services, and BYOD programs have we reached a tipping point where mobile learning can meet this promise. It can extend an existing L&D program, support learning transfer, provide the access point for social and informal learning, and take on-demand performance support in entirely new directions. Organizations using the right mobile learning strategy can achieve performance gains not possible through traditional learning or even e-learning. This hour-long session will provide a brief summary of the mobile landscape and the current and future impact it is having on the learning profession. It will also provide concrete guidance on the key decisions required to make mobile learning a part of a broader learning strategy. Participants can expect to leave the session with a greater understand of the possibilities of starting a mobile learning project and creating a mobile learning strategy.

PMs Are From Mars, BAs Are From Venus

Webinar – Recorded | May 01, 2014

Whether you're a Project Manager or a Business Analyst, you can certainly relate to a situation where you've felt like your cohort on a project was from a completely different planet! This panel discussion webinar between our PM expert, Ori Schibi, and our BA expert, Cheryl Lee, will explore some of the misconceptions that each role has and learn how to play nicely with each other in the project world.

Unlock the Power of Microsoft SQL Server 2014

Webinar – Recorded | April 24, 2014

Join Microsoft SQL Server expert Brian Egler for an hour-long webinar covering the key features and updates in the upcoming release of Microsoft SQL Server 2014! You will get a thorough review, along with demonstrations, of how SQL Server 2014 provides substantial improvements in performance, manageability, and availability that will make your job easier.

Why Your Company Should Have a Risk Management Program

Webinar – Recorded | April 22, 2014

Does your company have a risk management program? In this hour-long webinar, cybersecurity expert and Global Knowledge instructor David Willson will explain why you should. In light of recent breaches at Target, Nieman Marcus, Michaels, Yahoo, and a growing list of others, we're learning that FBI Director Mueller was right when he said getting breached is not a matter of if, but when. While having a risk management program may not prevent a breach, it can certainly lower the risk of one, ensure compliance, and reduce or even eliminate your liability if a breach does occur, enabling you to recover quickly and to protect your reputation. Beyond explaining the importance of a risk management program, David will tell you how to implement one, including conducting a basic risk assessment, policies you'll need, and training your workforce.

Prioritization: Start Working Strategically

Webinar – Recorded | April 02, 2014

Today, every project comes with limited resources and an impossible timeline. You have to prioritize, but how do you determine what's most important? The answer is to do more than just prioritize. You have to fully understand your company's strategic direction and make every action align with that strategy. In this hour-long webinar, project management expert Yvan Bastien will show you how to reach that full understanding and make the kinds of informed decisions that lead to success.

Amazon Web Services: An Overview

Webinar – Recorded | March 28, 2014

Amazon Web Services: An OverviewThere's a really good chance that Amazon Web Services (AWS) has more than a few products to help you work faster, smarter, and more cost effectively. After all, the depth and breadth of AWS is significant, comprising more than 30 services in dozens of data centers located in nine regions across the globe. They offer computing, storage, networking, deployment, management, and a host of supporting services, such as queues and email services. Getting a clear understanding of what AWS is and how it can help your business can be challenging. Never fear. In this hour-long webinar, Global Knowledge instructor and cloud and big data analyst Rich Morrow will help. He'll give an overview of AWS and its many benefits.

Learn OpenStack from the Experts at Red Hat

Webinar – Recorded | March 26, 2014

In this seminar, discover how OpenStack can simplify your cloud infrastructure management. Experts from Red Hat, the leading contributor to the OpenStack project, will fill you in on how organizations have solved problems and increased business value with open-source cloud technology. They will also give you a peek into the future of Red Hat OpenStack and reveal how Red Hat training and certification can ensure the success of your cloud deployment.

Business Requirements Scoping Techniques

Webinar – Recorded | March 01, 2014

Organizations launch projects with the assumption that the new or improved solution will provide worthwhile benefits for stakeholders and a suitable return on investment. By understanding your business requirements you ensure that your teams actually deliver those benefits. Keeping user and functional requirements aligned with the business requirements is a key to successful solution delivery.

The Power of Influence in the Workplace

Webinar – Recorded | Feb. 26, 2014

A shift is occurring in the way we view leadership today. If you want to get things done, you need influence, not authority. This means that IT Professionals, Project Managers, Business Analysts, business-line Managers and individual contributors must focus on demonstrating personal leadership. Getting results through others by building relationships and using influence skills rather than relying on positional power is key.

The Business Analyst in an Agile Environment

Webinar – Recorded | Feb. 19, 2014

Agile is increasingly becoming the foundation for today's business world, and Business Analysts are essential for organizations and projects to achieve maximum success. Following a brief overview, Benjamin will tackle and dispel many of the common myths about Agile and then dig deeper into the true value Business Analysts hold for their organization. Join us for a look at the modern Business Analyst and their role in an Agile environment.

Secure Your SQL Server Today!

Webinar – Recorded | Feb. 05, 2014

Your Microsoft SQL Server database often contains the most valuable information in your organization. Get tips for securing it properly and effectively in this free, information-packed webinar with Microsoft SQL Server expert Gidget Pryor. In just an hour, Gidget will demonstrate the layered security approach used by SQL Server. She will step you through the process and best practices of setting up logins, users, roles, schemas, and permissions, and she will review the security model changes that have taken place from SQL Server 2005 through SQL Server 2012. She will also review SQL Server 2012 training and certifications.

Démystifier les cas d'utilisation pour les analystes d'affaires

Webinar – Recorded | Nov. 07, 2013

La plupart des analystes d'affaires ont déjà entendu parler des cas d'utilisation, mais sont souvent intimidés par des exemples complexes qui ne semblent pas pertinents pour eux. Ce webinaire a pour but de clarifier ce que sont précisément les cas d'utilisation et leur usage, en plus de démontrer comment ils peuvent faciliter les tâches de l'analyste d'affaires.

La réalisation des bénéfices - l'objectif partagé du GP et de l'organisation commanditaire

Webinar – Recorded | Oct. 24, 2013

Ce séminaire en ligne portera sur l'importance de la réalisation de la valeur attendu du projet et proposera des outils et des approches pratiques pour aider dans votre quête du rôle de précieux allié. La profession de gestionnaire de projet est en plein essor et le rôle du GP est en transition. En plus d'être un expert en techniques de planification et de contrôle, le GP d'aujourd'hui doit bien coordonner le travail d'équipe et, ultimement, protéger l'organisation contre l'incertitude. Avec cette responsabilité accrue vient également un sens d'imputabilité pour la réalisation des bénéfices envisagés par le projet. Au-delà de bien gérer la triple contrainte, un GP qui maintien l'attention de l'équipe sur la réalisation des bénéfices sera un partenaire clé de l'organisation. Ce séminaire en ligne porte sur l'importance de la réalisation de la aleur attendu du projet et proposera des outils et des approches pratiques pour aider dans votre quête du rôle de précieux allié.

Can Use Cases Really be Used in an Agile Environment?

Webinar – Recorded | Oct. 17, 2013

Agile is a set of principles requiring a significant cultural shift, new paradigms in thinking and team organization. Over the years, Agile has become "productized" or in many cases "institutionalized", creating different flavours and levels of commitment among teams and organizations. Along the way, managers and team members have lost sight of Agile's principles and tried to enforce the use of certain tools and structure where they may not belong. In this one hour webinar, Perry McLeod will explain how tools such as use cases can be successful in an agile environment, provided the principles of agile are always active in the minds of the managers and the team members that are using them. Join Perry to determine whether or not making the cultural shift towards the use case method in an agile environment is the right move for you and your organization.

Developing Effective IT Learning Processes

Webinar – Recorded | Oct. 16, 2013

Business is changing rapidly and Information Technology is at the centre of the trends: mobile, social, cloud and big data,. Forward thinking IT functions must develop and manage the skills of their most critical asset-- their employees. Effective professional development can guard against the pace of change, leading IT units to re-define job roles to include both technical and non-technical competencies and to establish business processes to help their staff develop and maintain these skills. This session will present the components of a holistic process to support learning and development in any IT organization.

Cybersecurity Necessities: A Firewall, Antivirus, and a Well-Trained Workforce

Webinar – Recorded | Oct. 03, 2013

You have spent money on software and hardware, implemented best practices, and believe you are secure, right? You may have overlooked the weakest link: your employee. Many breaches occur as a result of an employee mistakenly clicking on a link or visiting a site that allows a virus to be unknowingly downloaded, giving hackers access to your network. Today, a well-trained workforce is a necessity and may even be your most important cybersecurity tool. In this webinar, security expert David Willson will discuss how many breaches have occurred and are occurring, the tools and techniques hackers use to trick employees into clicking on links or opening attachments, and how to prevent such behavior.

Getting There Faster - Accelerating Leadership Development

Webinar – Recorded | Oct. 01, 2013

How can leaders and Human Resources professionals use effective, simple and research-based talent management practices to contribute to their organization's success? Too many leadership development theories provide complex and confusing answers. Join Jocelyn Bérard as he shares the core practices introduced in his new book, Accelerating Leadership Development, which reflects his extensive research and years of experience in making leadership development uncomplicated and practical.

Enhancing the Value of ITIL® and TOGAF®

Webinar – Recorded | Aug. 29, 2013

Traditionally, ITIL and TOGAF professionals have been part of different teams within an organization. Due to the ongoing alignment of business and IT, these professionals now often find themselves on the same team. Because of this crossover, there is a growing trend towards organization of work based on multiple best practice models. 

Uncover e-Learning Best Practices from a CSTD Award-Winning Project

Webinar – Recorded | June 26, 2013

Learn how to leverage e-Learning to its full potential from someone who has succeeded in e-Learning. E-Learning is considered the way of the future for good reason: attractive cost-savings, flexibility, and convenience. To realize these benefits, you need to craft the training to meet a number of rigorous objectives. Join Kevin Kernohan, senior production manager at Global Knowledge, and Ann Schuler, learning and development consultant at the Government of Alberta Human Services Ministry, as they lead you from beginning to end of the e-Learning development cycle. In partnership with the Government of Alberta, Global Knowledge developed the Critical Thinking in Action training program for employees throughout the province. Discover why this e-Learning program earned a CSTD Award for Training Excellence and how you can assimilate these best practices into your organization.

New Paths to Learning: Emerging Trends in Learning and Development

Webinar – Recorded | May 30, 2013

Business complexity, technology innovation and a new understanding of how we learn at work are causing the learning profession to re-think how they develop and sustain human performance and behaviour change. As a result new methods and approaches are emerging that promise to change the landscape of learning and development meeting in the coming years. This session will provide an opportunity to learn about the following trends and their application.

Maximizing Self-Awareness for Business and Leadership Development

Webinar – Recorded | Oct. 25, 2012

Self-awareness is a very powerful tool for leaders in every type of business or organization. The more leaders can maximize their self awareness the greater the impact on business performance, employee engagement and leadership and development initiatives. Self-awareness is the central component of personal development and emotional intelligence. For most leaders today it is still underdeveloped and frequently underemployed. Better understanding of this important leadership trait is critical for leadership and organizational success.

When Learning Fails: Six Classic Mistakes and How to Avoid Them

Webinar – Recorded | May 12, 2012

Everyone has been involved in a learning program or project that has not delivered its intended impact. Across organizations, remarkably similar but preventable missteps are made in needs identification, learning strategies, program development and implementation.  Instructor Tom Gram, Senior Director of Professional Services at Global Knowledge, will present six classic mistakes learning professionals make that reduce chances for success along with evidence-based practices to help prevent them. 

Hacking Back In Self-Defense: Is It Legal? Should It Be?

Webinar – Recorded | Feb. 01, 2012

Your business has been hacked, leaving you with a persistent bot; now what? In this hour-long webinar, security expert David Willson will discuss ways you can eliminate the threat in an act of self-defense or defense of property. As new laws are explored, old ones amended, and solutions sought, you'll take a look at thinking outside the box to give the good guys the advantage-or at least a fighting chance.

Network Forensics Analysis: A New Paradigm in Network Security

Webinar – Recorded | Oct. 26, 2011

In this hour-long webinar, security expert and Global Knowledge instructor Phillip D. Shade will provide insight into the emerging network security science of network forensics analysis, a.k.a. security event analysis and reconstruction. Using case studies, you will examine the role of data retention in network forensics analysis, and you will learn about applying forensics analysis techniques to handle application-based attacks, VoIP call interception, and worms, bots, and viruses.

Private VLANs: Advanced Switching Tips and Tricks

Webinar – Recorded | Oct. 10, 2011

In this hour-long webinar, Global Knowledge instructor John Barnes will guide you through implementing Cisco private VLANs. He will review VLANs and 802.1q, and he will discuss private VLAN fundamentals and operation, covering primary VLANs and secondary VLANs. He will cover VLAN mapping and discuss using private VLANs between multiple switches. He will also provide a use case example.

Cloud Computing Security

Webinar – Recorded | Aug. 10, 2011

In this informative, hour-long webinar, Global Knowledge instructor Debbie Dahlin will explore an abundance of important cloud computing security issues. She will help you gain insight into the key cloud security issues of maintaining the confidentiality, integrity, and availability of corporate information and applications.

How to Avoid a Cyber Disaster

Webinar – Recorded | April 27, 2011

Planning for a cyber disaster makes recovering from one much easier. Still, as important as disaster planning is, it's often overlooked or put off until it is too late. In this webinar, Global Knowledge instructor Debbie Dahlin discusses planning for the unexpected -- whether the unexpected means a simple power outage, a network security breach, or a major natural disaster. She'll discuss risk analysis and risk management techniques and explain the importance and process of creating a business continuity plan. Using a fictional company as an example, Debbie will walk you through the disaster planning process a security professional should use, and she will provide simple tricks to reduce your company's downtime before, during, and after a disaster.

How to Successfully Migrate from IPv4 to IPv6

Webinar – Recorded | April 20, 2011

In this webinar, you will examine the need for IPv6 and whether it's possible to survive on IPv6 alone. You will learn ways to phase in IPv6 and how to successfully migrate to IPv6.

Securing Communications

Webinar – Recorded | Feb. 23, 2011

In this webinar, the second of two based on our Cybersecurity Foundations course, you'll build on what you learned in the first of the series, Protecting Your Network with Authentication and Cryptography.

Protecting Your Network with Authentication and Cryptography

Webinar – Recorded | Feb. 09, 2011

In this webinar, the first of two based on our Cybersecurity Foundations course, you will examine the following topics: verifying users and what they can access, ways a user can be validated to computer and network resources, how cryptography is used to protect data, symmetric and asymmetric encryption and hashes.

10 Security Concerns for Cloud Computing

Webinar – Recorded | May 17, 2010

The flexibility, reduced cost, and mobility of cloud computing have made the concept a hot topic. Before implementing this method of computing, however, it is important to consider the security of the "cloud." During this webinar, we will help you understand some of the risks and benefits of cloud computing so you can decide if it is the right solution for you.

Eleven Myths About 802.11 Wi-Fi Networks

Webinar – Recorded | Oct. 06, 2006

Wi-Fi networks have been misunderstood by much of the IT community since their inception. Even the reasons for this misunderstanding are kind of hard to understand. The result has been that myths about 802.11 (better known as Wi-Fi) networks have grown almost as fast as the technology itself. In this web seminar, we'll examine 11 common Wi-Fi myths and explore ways to use correct information to make your networks scalable, secure and satisfying for your users.