Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

237 Results Found for "azure"

Results per page: 10 40 80

Techniques for Managing Stress and Pressure in the Workplace

Course Code: 100959

NewPrevent stress from taking over. This live class helps participants to recognize stress, how we place pressure on ourselves, and how to prevent it.

Delivery Formats

Overcoming Barriers to Creating a Knowledge Management Culture

White Paper | March 29, 2016

In this white paper on IT service management, discover the most common barriers you will face when implementing knowledge management and how to overcome them.

ENSDWI - Implementing Cisco SD-WAN Solutions v3.0

Course Code: 821365

This course gives you training on how to design, deploy, configure, and manage your Cisco Software-Defined WAN (SD-WAN) solution in a large-scale

Delivery Formats

Cisco Completes the Security Picture with Sourcefire

White Paper | June 19, 2015

Rich Hummel discusses about Cisco's security solutions and how Cisco's acquisition of Sourcefire has changed the security landscape. Learn more here.

Discovery Fundamentals

Course Code: 821270

ServiceNow Discovery Fundamentals course is for customers, partners, employees who implement and administer features, functions, data associated with Discovery.

Delivery Formats

Five Security Concerns with Mobile Payment Systems

White Paper | March 10, 2015

Learn about the five major security concerns with mobile payment systems before you link your finances to a mobile device for payments. Download your copy!

Junos Layer 2 VPNs (JL2V)

Course Code: 100553

This two-day course is designed to provide students with MPLS-based Layer 2 virtual private network (VPN) knowledge and configuration examples.

Delivery Formats

An Introduction to PMI’s Project Management Life Cycle

Article | April 06, 2012

The term "life cycle" implies two things: that a process is perpetual and that the sequence of events is obligatory or uni-directional. There is no beginning or end to a life cycle and the sequence of events cannot change. A seed cannot go directly to being a mature plant nor revert back to the blossom stage.

Benefits of Using “+” Dialing in the CUCM Dial Plan

Article | Oct. 03, 2014

For smaller companies, configuring a dial plan to account for variations in dialed numbers is often not a problem. However, companies that are larger and more global in nature encounter a number of issues when designing their dial plan approach.

Pen Test Legal Issues

Article | Nov. 13, 2014

Pen testers beware. Whether you believe you know and understand all the potential legal issues, read on. First of all, a penetration test or “pen test” is a method that’s used to evaluate the security and/or vulnerabilities in a network. This test is normally conducted externally wherein the tester is attempting to hack a network or computer. Breaking into computers and networks is illegal under the Computer Fraud and Abuse Act (CFAA), and depending on your activities and other factors, other federal laws and state laws may be broken.