Discover how the fundamental elements of a requirement give rise to its intrinsic value. Understanding the very nature of those elements is essential to eliciting, planning, analyzing, communicating, and managing them.
Learn 10 common ways that malicious code can penetrate your network.
Course Code: 1176
In this training course, you will be introduced to Java EE frameworks, specifications, and application programming interfaces (APIs) for JBoss Enterprise Application Platform 6 (EAP6). Enroll with Global Knowledge today.
Course Code: 100185
Configure and manage network infrastructure using Red Hat Ansible Automation for Networking
Learn how to configure IP Multicast with Multiprotocol Label Switching (MPLS) and how to add encryption for Multicast with the Group Encrypted Transport VPN (GETVPN).
Course Code: 2712
Learn how to utilize use case modeling to document functional requirements that can be understood and validated by all project stakeholders, including technical staff and business stakeholders, increasing the likelihood that stakeholder needs on a project are met.
Course Code: 9889
This class will teach you to design, build, and deploy containerized applications on an OpenShift cluster
This white paper will bring you up to speed on what DevOps is, how it can help IT deliver value to the business, and position the IT organization to keep up with business demand for change.
Big data is getting bigger. Companies like IBM are rising to meet the challenge. Learn more about initiatives like the OpenPower Foundation and open source programs like Linux that improve your processing capabilites.
Discover the essentials of effective negotiations including the process, the different styles, and the communication elements that can affect the outcome.