Filter Keyword to...

Category: IT Professionals

Results Per Page :
Discover how to use SQL Server VMs and R services with Azure Machine Learning Studio.
Discover how to use SQL Server VMs and R services with Azure Machine Learning Studio.
[READ LESS]
Produced by: SkillSoft
Discover to import external packages, create summaries, and use custom visualizations with Azure Machine Learning Studio.
Discover to import external packages, create summaries, and use custom visualizations with Azure Machine Learning Studio.
[READ LESS]
Produced by: SkillSoft
Examine features. rows, columns, and how to merge datasets while you discover how to transform your data in Azure Machine Learning Studio.
Examine features. rows, columns, and how to merge datasets while you discover how to transform your data in Azure Machine Learning Studio.
[READ LESS]
Produced by: SkillSoft
Discover how to use a data science VM and HDInsights with Azure Machine Learning Studio.
Discover how to use a data science VM and HDInsights with Azure Machine Learning Studio.
[READ LESS]
Produced by: SkillSoft
In a computing environment where client data assets are remotely hosted, data asset security becomes an important factor when considering the potential transition to cloud services. This course describes and...
[READ MORE]
In a computing environment where client data assets are remotely hosted, data asset security becomes an important factor when considering the potential transition to cloud services. This course describes and explores issues relating to the management and protection of data assets hosted on a cloud platform, and data in transit to and from a cloud platform. In this course, you will learn about all aspects of data management: protection, auditing, access, legislative impact, storage, deletion, security, ownership, data rights management, encryption, classification, known threats to data assets, and threat mitigation. The course covers the essential topics for the ICS2s Certified Cloud Security Professional examination " Domain 2 requirements.
In a computing environment where client data assets are remotely hosted, data asset security becomes an important factor when considering the potential transition to cloud services. This course describes and explores issues relating to the management and protection of data assets hosted on a cloud platform, and data in transit to and from a cloud platform. In this course, you will learn about all aspects of data management: protection, auditing, access, legislative impact, storage, deletion, security, ownership, data rights management, encryption, classification, known threats to data assets, and threat mitigation. The course covers the essential topics for the ICS2s Certified Cloud Security Professional examination " Domain 2 requirements.
[READ LESS]
Produced by: SkillSoft
Alongside the development and uptake of cloud services, comes a developing regulatory framework that compels cloud service providers to protect data and to secure the privacy, integrity, and confidentiality...
[READ MORE]
Alongside the development and uptake of cloud services, comes a developing regulatory framework that compels cloud service providers to protect data and to secure the privacy, integrity, and confidentiality of client data and data assets. This course covers various topics associated with legal and compliance issues with cloud services which are governed within a regulatory framework. The course addresses investigative measures and techniques associated with crime investigation, including eDiscovery and forensic data management. The course also touches on privacy, auditing, and reporting as it applies to cloud technology and services including SAS, SSAE, and ISAE. In this course, you will also learn about risk management, outsourcing, and vendor\provider assessment with particular attention to certifications, access provider audit data, and data ownership issues. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination - Domain 6 requirements.
Alongside the development and uptake of cloud services, comes a developing regulatory framework that compels cloud service providers to protect data and to secure the privacy, integrity, and confidentiality of client data and data assets. This course covers various topics associated with legal and compliance issues with cloud services which are governed within a regulatory framework. The course addresses investigative measures and techniques associated with crime investigation, including eDiscovery and forensic data management. The course also touches on privacy, auditing, and reporting as it applies to cloud technology and services including SAS, SSAE, and ISAE. In this course, you will also learn about risk management, outsourcing, and vendor\provider assessment with particular attention to certifications, access provider audit data, and data ownership issues. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination - Domain 6 requirements.
[READ LESS]
Produced by: SkillSoft
Fundamental to cloud service security are the construction and design of secure datacenters and their hosted hardware and systems. This course covers the best practice management approach to designing,...
[READ MORE]
Fundamental to cloud service security are the construction and design of secure datacenters and their hosted hardware and systems. This course covers the best practice management approach to designing, deploying, and administrating a cloud datacenter and service. In addition, the course will cover the techniques that can be deployed to configure and protect hardware assets " physical and virtualized, manage and protect configuration settings, and keep network data moving in and out of, and hosted within the domain of the datacenter. Topics include regulation compliance, protection techniques, and controlled access to the various components of a cloud data center infrastructure. In this course, you will learn about the deployment of auditing and monitoring techniques, event logging and reporting, and other aspects of management techniques associated with cloud-hosted services. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination " Domain 5 requirements.
Fundamental to cloud service security are the construction and design of secure datacenters and their hosted hardware and systems. This course covers the best practice management approach to designing, deploying, and administrating a cloud datacenter and service. In addition, the course will cover the techniques that can be deployed to configure and protect hardware assets " physical and virtualized, manage and protect configuration settings, and keep network data moving in and out of, and hosted within the domain of the datacenter. Topics include regulation compliance, protection techniques, and controlled access to the various components of a cloud data center infrastructure. In this course, you will learn about the deployment of auditing and monitoring techniques, event logging and reporting, and other aspects of management techniques associated with cloud-hosted services. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination " Domain 5 requirements.
[READ LESS]
Produced by: SkillSoft
Cloud-based systems provide businesses with increased flexibility, scalability, and productivity. This course addresses the different types of cloud-based services available from Microsoft, and explores the...
[READ MORE]
Cloud-based systems provide businesses with increased flexibility, scalability, and productivity. This course addresses the different types of cloud-based services available from Microsoft, and explores the specifics of both Azure and Intune. It is one in a series of courses that prepares learners for exam 98-368: Windows Devices and Mobility Fundamentals, which serves as a credit towards the Microsoft Technology Associate certification and allows students to attain a Microsoft certification, which may later upgrade to a MCSA or even MCSE certificate.
Cloud-based systems provide businesses with increased flexibility, scalability, and productivity. This course addresses the different types of cloud-based services available from Microsoft, and explores the specifics of both Azure and Intune. It is one in a series of courses that prepares learners for exam 98-368: Windows Devices and Mobility Fundamentals, which serves as a credit towards the Microsoft Technology Associate certification and allows students to attain a Microsoft certification, which may later upgrade to a MCSA or even MCSE certificate.
[READ LESS]
Produced by: SkillSoft
Cloud services vary in size and complexity, and the deployed architecture impacts directly on service and data asset security. This course describes and explores aspects of cloud computing architectural...
[READ MORE]
Cloud services vary in size and complexity, and the deployed architecture impacts directly on service and data asset security. This course describes and explores aspects of cloud computing architectural design, and defines associated cloud systems and cloud components. In addition to Cloud Reference Architecture, the course outlines definitions and roles, computing characteristics, and cloud deployment models. In this course, you will learn about cloud security, cloud networks, virtualization within the cloud system, data encryption and aspects of cloud interoperability, trusted cloud services, cloud system management, and operational considerations. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination - Domain 1 requirements.
Cloud services vary in size and complexity, and the deployed architecture impacts directly on service and data asset security. This course describes and explores aspects of cloud computing architectural design, and defines associated cloud systems and cloud components. In addition to Cloud Reference Architecture, the course outlines definitions and roles, computing characteristics, and cloud deployment models. In this course, you will learn about cloud security, cloud networks, virtualization within the cloud system, data encryption and aspects of cloud interoperability, trusted cloud services, cloud system management, and operational considerations. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination - Domain 1 requirements.
[READ LESS]
Produced by: SkillSoft
The security of the cloud services platform and infrastructure is a fundamental driver in the uptake of cloud services and the transition away from Enterprise structures. This course describes issues relating...
[READ MORE]
The security of the cloud services platform and infrastructure is a fundamental driver in the uptake of cloud services and the transition away from Enterprise structures. This course describes issues relating to the security of the supporting components of the cloud infrastructure " both physical and virtual components. The course promotes/outlines a risk management approach in developing and employing security measures to protect cloud components; describes key risk management focus areas " identification, measurement, and control; and covers known threats and the key areas of cloud component vulnerability. In this course, you will learn about security management/measures and auditing, including authentication, authorization, Business Continuity (BC), Disaster Recovery (DR), and failover. The learner will be expected to display knowledge of Cloud Service Business Continuity and Disaster Recovery planning, to identify areas requiring specific security protection, and how to recover lost or damaged data and components hosted on a cloud platform. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination " Domain 3 requirements.
The security of the cloud services platform and infrastructure is a fundamental driver in the uptake of cloud services and the transition away from Enterprise structures. This course describes issues relating to the security of the supporting components of the cloud infrastructure " both physical and virtual components. The course promotes/outlines a risk management approach in developing and employing security measures to protect cloud components; describes key risk management focus areas " identification, measurement, and control; and covers known threats and the key areas of cloud component vulnerability. In this course, you will learn about security management/measures and auditing, including authentication, authorization, Business Continuity (BC), Disaster Recovery (DR), and failover. The learner will be expected to display knowledge of Cloud Service Business Continuity and Disaster Recovery planning, to identify areas requiring specific security protection, and how to recover lost or damaged data and components hosted on a cloud platform. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination " Domain 3 requirements.
[READ LESS]
Produced by: SkillSoft
This course covers key concepts related to cluster analysis using Microsoft R and the k-means clustering technique. It also covers ensemble learning for analysis, including random forest analysis.
This course covers key concepts related to cluster analysis using Microsoft R and the k-means clustering technique. It also covers ensemble learning for analysis, including random forest analysis.
[READ LESS]
Produced by: SkillSoft
Today, technology drives efficiency in business by making it easier for people to work together. Discover the native collaboration solutions in Exchange 2016 and exploit the technology to drive business...
[READ MORE]
Today, technology drives efficiency in business by making it easier for people to work together. Discover the native collaboration solutions in Exchange 2016 and exploit the technology to drive business productivity. In this course, you will examine collaboration solutions including Resource, Linked, and Site Mailboxes, as well as distribution groups and permissions.
Today, technology drives efficiency in business by making it easier for people to work together. Discover the native collaboration solutions in Exchange 2016 and exploit the technology to drive business productivity. In this course, you will examine collaboration solutions including Resource, Linked, and Site Mailboxes, as well as distribution groups and permissions.
[READ LESS]
Produced by: SkillSoft
Columnstore indexes work differently from traditional indexes in SQL Server 2016. This course covers how to implement columnstore indexes in SQL Server 2016, as well as the various columnstore performance...
[READ MORE]
Columnstore indexes work differently from traditional indexes in SQL Server 2016. This course covers how to implement columnstore indexes in SQL Server 2016, as well as the various columnstore performance considerations that can impact operations. This course also covers nonclustered indexes, in-memory indexes, and XML indexes. This course is one of a series of courses that cover the objectives for 70-762: Developing SQL Databases exam.
Columnstore indexes work differently from traditional indexes in SQL Server 2016. This course covers how to implement columnstore indexes in SQL Server 2016, as well as the various columnstore performance considerations that can impact operations. This course also covers nonclustered indexes, in-memory indexes, and XML indexes. This course is one of a series of courses that cover the objectives for 70-762: Developing SQL Databases exam.
[READ LESS]
Produced by: SkillSoft
With LearnKey’s COM+ for Developers training course, developers and systems integrators can discover the power of COM+ to create and use software components in any language and using any tool. With practical,...
[READ MORE]
With LearnKey’s COM+ for Developers training course, developers and systems integrators can discover the power of COM+ to create and use software components in any language and using any tool. With practical, real-world examples, expert Martin Schaeferle shows you how to build COM components, design distributed applications and use Visual Basic to create data components. At the conclusion of this course, you will understand component design and be able to configure COM+ services for optimal performance.
With LearnKey’s COM+ for Developers training course, developers and systems integrators can discover the power of COM+ to create and use software components in any language and using any tool. With practical, real-world examples, expert Martin Schaeferle shows you how to build COM components, design distributed applications and use Visual Basic to create data components. At the conclusion of this course, you will understand component design and be able to configure COM+ services for optimal performance.
[READ LESS]
Produced by: LearnKey
The need for IT specialists who can effectively communicate with all types of users, as well as help organizations implement and manage their growing technological requirements, continues to grow. The...
[READ MORE]
The need for IT specialists who can effectively communicate with all types of users, as well as help organizations implement and manage their growing technological requirements, continues to grow. The Communication Skills for IT Specialists course helps you communicate successfully while managing projects and people within the IT industry. Expert Tom Carpenter covers all aspects of communication from understanding theory to conflict resolution and presentation styles, including scenarios that show how effective communication becomes a key advantage in today's IT environment.
The need for IT specialists who can effectively communicate with all types of users, as well as help organizations implement and manage their growing technological requirements, continues to grow. The Communication Skills for IT Specialists course helps you communicate successfully while managing projects and people within the IT industry. Expert Tom Carpenter covers all aspects of communication from understanding theory to conflict resolution and presentation styles, including scenarios that show how effective communication becomes a key advantage in today's IT environment.
[READ LESS]
Produced by: LearnKey
Windows Server 2008 introduces Read-Only Domain Controllers (RODCs) which can be deployed by organizations in locations where physical security may be an issue. A RODC will improve security, provide faster...
[READ MORE]
Windows Server 2008 introduces Read-Only Domain Controllers (RODCs) which can be deployed by organizations in locations where physical security may be an issue. A RODC will improve security, provide faster login times and more efficient access to network resources, especially over a WAN. This course discusses various policies, such as Group Policies, Default Domain Security Policies, Account Policies, and Password Policies, that are used to implement security in your organization. It also explains how organizational units can be used to apply the Group Policy settings to a specific subset of computers or users, and how Internet Protocol Security (IPSec) can be used to secure Active Directory communications. The course is one in a series that covers the objectives for Microsoft exam 70-640: TS: Windows Server 2008 Active Directory, Configuring. Passing this exam completes the requirements for the MCTS: Windows Server 2008 Active Directory, Configuration certification, and counts as credit towards the following certifications: Microsoft Certified IT Professional (MCITP): Enterprise Administrator, and the Microsoft Certified IT Professional (MCITP): Server Administrator, since both MCITPs are certifications that require more than one exam.
Windows Server 2008 introduces Read-Only Domain Controllers (RODCs) which can be deployed by organizations in locations where physical security may be an issue. A RODC will improve security, provide faster login times and more efficient access to network resources, especially over a WAN. This course discusses various policies, such as Group Policies, Default Domain Security Policies, Account Policies, and Password Policies, that are used to implement security in your organization. It also explains how organizational units can be used to apply the Group Policy settings to a specific subset of computers or users, and how Internet Protocol Security (IPSec) can be used to secure Active Directory communications. The course is one in a series that covers the objectives for Microsoft exam 70-640: TS: Windows Server 2008 Active Directory, Configuring. Passing this exam completes the requirements for the MCTS: Windows Server 2008 Active Directory, Configuration certification, and counts as credit towards the following certifications: Microsoft Certified IT Professional (MCITP): Enterprise Administrator, and the Microsoft Certified IT Professional (MCITP): Server Administrator, since both MCITPs are certifications that require more than one exam.
[READ LESS]
Produced by: SkillSoft
The best practices of using a Chef Server are directly related to the reusability of cookbook recipes and components. This course will focus on the effective use of community cookbooks with a Chef server.
The best practices of using a Chef Server are directly related to the reusability of cookbook recipes and components. This course will focus on the effective use of community cookbooks with a Chef server.
[READ LESS]
Produced by: SkillSoft
Node.js is a server-side JavaScript engine built on Google's V8 runtime. Backbone.Marionette is a set of design templates for Backbone.js created to simplify the process of creating large scale applications....
[READ MORE]
Node.js is a server-side JavaScript engine built on Google's V8 runtime. Backbone.Marionette is a set of design templates for Backbone.js created to simplify the process of creating large scale applications. In this course, you'll learn about complex JavaScript application development using Backbone.js, server-side databases, node.js and Marionette.
Node.js is a server-side JavaScript engine built on Google's V8 runtime. Backbone.Marionette is a set of design templates for Backbone.js created to simplify the process of creating large scale applications. In this course, you'll learn about complex JavaScript application development using Backbone.js, server-side databases, node.js and Marionette.
[READ LESS]
Produced by: SkillSoft
It is important to understand the various components, editions, and versions that exist when discussing SQL Server 2016. This course provides and introduction for both the SQL Server platform and SQL Server...
[READ MORE]
It is important to understand the various components, editions, and versions that exist when discussing SQL Server 2016. This course provides and introduction for both the SQL Server platform and SQL Server architecture, while also providing an overview of best practices and guidelines to follow when preparing for an installation of SQL Server 2016. This course is one of a series of courses that cover the objectives for the 20765A: Provisioning SQL Databases exam.
It is important to understand the various components, editions, and versions that exist when discussing SQL Server 2016. This course provides and introduction for both the SQL Server platform and SQL Server architecture, while also providing an overview of best practices and guidelines to follow when preparing for an installation of SQL Server 2016. This course is one of a series of courses that cover the objectives for the 20765A: Provisioning SQL Databases exam.
[READ LESS]
Produced by: SkillSoft
DDD enhances modeling through a total approach for building software for complex domains. With the various tools and strategies in the DDD architecture, the designer will have a more effective approach to...
[READ MORE]
DDD enhances modeling through a total approach for building software for complex domains. With the various tools and strategies in the DDD architecture, the designer will have a more effective approach to domain modeling. In this course, you will learn additional information regarding further components, such as architecture, entities, value objects, services, and domain events. Finally you will learn about the concepts of modules, model-driven design, and aggregates.
DDD enhances modeling through a total approach for building software for complex domains. With the various tools and strategies in the DDD architecture, the designer will have a more effective approach to domain modeling. In this course, you will learn additional information regarding further components, such as architecture, entities, value objects, services, and domain events. Finally you will learn about the concepts of modules, model-driven design, and aggregates.
[READ LESS]
Produced by: SkillSoft
There is a practical approach to troubleshooting PC, security, mobile OS, and application issues. Starting with the actual symptom, different tools and scenarios are explored to resolve the issue. In this...
[READ MORE]
There is a practical approach to troubleshooting PC, security, mobile OS, and application issues. Starting with the actual symptom, different tools and scenarios are explored to resolve the issue. In this course, you will learn about troubleshooting PCs, security, mobile OSs, and applications, along with the steps, tools, and solutions you can use to fix them.
There is a practical approach to troubleshooting PC, security, mobile OS, and application issues. Starting with the actual symptom, different tools and scenarios are explored to resolve the issue. In this course, you will learn about troubleshooting PCs, security, mobile OSs, and applications, along with the steps, tools, and solutions you can use to fix them.
[READ LESS]
Produced by: SkillSoft
This course will cover the installation process of hardware and the accompanying software that is needed to integrate the hardware into the Windows operating system, as well as a breakdown of storage options...
[READ MORE]
This course will cover the installation process of hardware and the accompanying software that is needed to integrate the hardware into the Windows operating system, as well as a breakdown of storage options available within the Windows operating system. In this course, you will learn about the installation of hardware, such as printers and hard disk drives, into the operating system including its drivers. You will also learn about managing the device from the Windows operating system, and storage options.
This course will cover the installation process of hardware and the accompanying software that is needed to integrate the hardware into the Windows operating system, as well as a breakdown of storage options available within the Windows operating system. In this course, you will learn about the installation of hardware, such as printers and hard disk drives, into the operating system including its drivers. You will also learn about managing the device from the Windows operating system, and storage options.
[READ LESS]
Produced by: SkillSoft
This course covers troubleshooting and security principles along with security practices commonly implemented within an IT infrastructure. In addition, you'll explore software and physical security, data...
[READ MORE]
This course covers troubleshooting and security principles along with security practices commonly implemented within an IT infrastructure. In addition, you'll explore software and physical security, data destruction and disposal, as well as wireless network security. Finally, the course will cover an introduction to the troubleshooting methodology.
This course covers troubleshooting and security principles along with security practices commonly implemented within an IT infrastructure. In addition, you'll explore software and physical security, data destruction and disposal, as well as wireless network security. Finally, the course will cover an introduction to the troubleshooting methodology.
[READ LESS]
Produced by: SkillSoft
This course covers an introduction to mobile operating systems. In this course, you will explore a basic overview of mobile operating systems including some of the features, technologies, and troubleshooting...
[READ MORE]
This course covers an introduction to mobile operating systems. In this course, you will explore a basic overview of mobile operating systems including some of the features, technologies, and troubleshooting methods associated with them.
This course covers an introduction to mobile operating systems. In this course, you will explore a basic overview of mobile operating systems including some of the features, technologies, and troubleshooting methods associated with them.
[READ LESS]
Produced by: SkillSoft
Two of the most popular and required disciplines in IT are virtualization and security. In this course, you will explore some very basic terms and concepts of virtualization that provide a cursory...
[READ MORE]
Two of the most popular and required disciplines in IT are virtualization and security. In this course, you will explore some very basic terms and concepts of virtualization that provide a cursory understanding of a virtual environment. You will also learn about common terms, threats, and mitigation against those threats during an overview IT security.
Two of the most popular and required disciplines in IT are virtualization and security. In this course, you will explore some very basic terms and concepts of virtualization that provide a cursory understanding of a virtual environment. You will also learn about common terms, threats, and mitigation against those threats during an overview IT security.
[READ LESS]
Produced by: SkillSoft