Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

246 Results Found for "azure"

Results per page: 10 40 80

Pen Test Legal Issues

Article | Nov. 13, 2014

Pen testers beware. Whether you believe you know and understand all the potential legal issues, read on. First of all, a penetration test or “pen test” is a method that’s used to evaluate the security and/or vulnerabilities in a network. This test is normally conducted externally wherein the tester is attempting to hack a network or computer. Breaking into computers and networks is illegal under the Computer Fraud and Abuse Act (CFAA), and depending on your activities and other factors, other federal laws and state laws may be broken.

Benefits of an “Agile” Mindset

Article | Nov. 24, 2015

Projects are a social endeavor. Traditional project management approaches have shied away from the social advantages a more agile project environment brings. By nature, we are storytelling, pattern seeking and social people. We need colocation to shine truly in a project environment.

Data Center Basics: the Differences Between IOS and NX-OS

Article | Sep. 04, 2012

As we discussed previously, Cisco created the Nexus Operating System (NX-OS) to power its next-generation data-center switching platform. While this new OS shares many similarities to the original IOS, there are some definite differences that you need to be aware of as you begin using it.

Military Orders Process vs. Project Management Methodology, Part 1

Article | Aug. 13, 2013

For a project manager (PM) who has served as a military officer on a battalion or higher staff, the parallels between the military decision-making process (MDMP), the orders production process, and project management doctrine prescribed by the Project Management Institute (PMI) are difficult to ignore. Both the MDMP and the processes outlined in A Guide to the Project Management Body of Knowledge—Fifth Edition (PMBOK® Guide) are iterative in nature, allow for the introduction of changes to the original plan, assign tasks and responsibilities, and involve the concept of managing the scope of the operation or project.

Migrating to Microservices

Course Code: 821582

Microservices thrive on independent services to provide flexibility, autonomous processes, and communication through APIs. In this course, you'll examine the differences between Microservices and monolithic applications and their architectures, the benefits of using...

Delivery Formats

Architecting with Google Cloud Platform: Design and Process

Course Code: 5974

Learn to design GCP deployments.

Delivery Formats

Security in the Google Cloud Platform

Course Code: 100199

Security in the Google Cloud Platform Courses gives participants a broad study of security controls and techniques on Google Cloud Platform. Enroll today!

Delivery Formats

ITIL®4 Specialist: High-Velocity IT

Course Code: 100439

NewNew & Exclusive – This module explores the ways in which digital organizations and digital operating models function in high velocity environments.

Delivery Formats

Navigating Difficult Conversations

Course Code: 821780

Deliver Your Message with Poise, Empathy and Resolve. Unfortunately, difficult conversations need to happen in the workplace. There are situations where someone has to be let go, told that they aren’t being promoted, or receive a poor performance review – common scen...

Delivery Formats

CBAP Certification Prep Boot Camp

Course Code: 2489

Prepare for the CBAP® and CCBA® exams in this interactive Boot Camp.

Delivery Formats