Filter Keyword to...

Category: IT Professionals

Results Per Page :
In this course, youll learn about different Skype for Business clients and their settings. Youll also explore client security and virtualization. This course aligns with exam 70-334, Core Solutions of...
[READ MORE]
In this course, youll learn about different Skype for Business clients and their settings. Youll also explore client security and virtualization. This course aligns with exam 70-334, Core Solutions of Microsoft Skype for Business 2015.
In this course, youll learn about different Skype for Business clients and their settings. Youll also explore client security and virtualization. This course aligns with exam 70-334, Core Solutions of Microsoft Skype for Business 2015.
[READ LESS]
Produced by: SkillSoft
Angular apps are typically front-end based and therefore client-side dominant. This course will cover setting up client-side routes and navigation in an Angular app. This course will also cover how to use...
[READ MORE]
Angular apps are typically front-end based and therefore client-side dominant. This course will cover setting up client-side routes and navigation in an Angular app. This course will also cover how to use HTTP requests to communicate with a server from within an Angular app.
Angular apps are typically front-end based and therefore client-side dominant. This course will cover setting up client-side routes and navigation in an Angular app. This course will also cover how to use HTTP requests to communicate with a server from within an Angular app.
[READ LESS]
Produced by: SkillSoft
There are a number of specific features and tools for building and deploying Clojure web applications. In this course, you'll learn about development of basic data-driven web applications using Clojure....
[READ MORE]
There are a number of specific features and tools for building and deploying Clojure web applications. In this course, you'll learn about development of basic data-driven web applications using Clojure. You'll also explore working with relational and non-relational data and using Compojure and HTML templating. You'll also learn how to deploy Clojure web applications.
There are a number of specific features and tools for building and deploying Clojure web applications. In this course, you'll learn about development of basic data-driven web applications using Clojure. You'll also explore working with relational and non-relational data and using Compojure and HTML templating. You'll also learn how to deploy Clojure web applications.
[READ LESS]
Produced by: SkillSoft
Clojure - a dialect of Lisp - is a dynamic programming language that compiles to JVM bytecode. In this course, you'll learn the fundamentals of programming with Clojure including basic syntax and using...
[READ MORE]
Clojure - a dialect of Lisp - is a dynamic programming language that compiles to JVM bytecode. In this course, you'll learn the fundamentals of programming with Clojure including basic syntax and using Leiningen to build Clojure programs. You'll also learn about program flow and working with functions and namespaces.
Clojure - a dialect of Lisp - is a dynamic programming language that compiles to JVM bytecode. In this course, you'll learn the fundamentals of programming with Clojure including basic syntax and using Leiningen to build Clojure programs. You'll also learn about program flow and working with functions and namespaces.
[READ LESS]
Produced by: SkillSoft
In a developing landscape where end user applications are moving to a cloud-hosted infrastructure, the traditional application development design life cycle is redefined. The application design process must...
[READ MORE]
In a developing landscape where end user applications are moving to a cloud-hosted infrastructure, the traditional application development design life cycle is redefined. The application design process must be security-aware and must protect cloud-hosted applications and data from an increasing attack vector density. This course covers various aspects of cloud computing relating to the security of cloud-based application software and supporting hardware and services. The course outlines various aspects of application security and access, including designing in security, peripheral security components, and securing access to services and hosted applications. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination " Domain 4 requirements.
In a developing landscape where end user applications are moving to a cloud-hosted infrastructure, the traditional application development design life cycle is redefined. The application design process must be security-aware and must protect cloud-hosted applications and data from an increasing attack vector density. This course covers various aspects of cloud computing relating to the security of cloud-based application software and supporting hardware and services. The course outlines various aspects of application security and access, including designing in security, peripheral security components, and securing access to services and hosted applications. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination " Domain 4 requirements.
[READ LESS]
Produced by: SkillSoft
Cloud computing is massively growing in importance in the IT sector as more and more companies are eschewing traditional IT and moving applications and business processes to the cloud. This course covers the...
[READ MORE]
Cloud computing is massively growing in importance in the IT sector as more and more companies are eschewing traditional IT and moving applications and business processes to the cloud. This course covers the concepts behind cloud computing and the key characteristics that make cloud services unique and very valuable to some business scenarios. You'll get a basic technology overview of the concepts and strategies emerging from the cloud and learn how cloud products and services can improve traditional business processes.
Cloud computing is massively growing in importance in the IT sector as more and more companies are eschewing traditional IT and moving applications and business processes to the cloud. This course covers the concepts behind cloud computing and the key characteristics that make cloud services unique and very valuable to some business scenarios. You'll get a basic technology overview of the concepts and strategies emerging from the cloud and learn how cloud products and services can improve traditional business processes.
[READ LESS]
Produced by: SkillSoft
IT security is a concern for most modern organizations and moving to the cloud heightens those concerns for most. The security implications are potentially magnified by large tranches of data existing outside...
[READ MORE]
IT security is a concern for most modern organizations and moving to the cloud heightens those concerns for most. The security implications are potentially magnified by large tranches of data existing outside the immediate control of the organization. Although some of the fears with regard to security in the cloud are exaggerated, there are specific areas to be aware of and cautious about. This course explores some of the key risk areas when it comes to security and cloud computing. It also introduces control assessment frameworks and models that can be used in assessing your risk in going to the cloud and evaluating the cloud provider's security offering. It goes on to outline basic guidelines that you should follow to ensure an adequate level of security in an XaaS environment, including key areas of the IT infrastructure and issues relating to data transfer and storage.
IT security is a concern for most modern organizations and moving to the cloud heightens those concerns for most. The security implications are potentially magnified by large tranches of data existing outside the immediate control of the organization. Although some of the fears with regard to security in the cloud are exaggerated, there are specific areas to be aware of and cautious about. This course explores some of the key risk areas when it comes to security and cloud computing. It also introduces control assessment frameworks and models that can be used in assessing your risk in going to the cloud and evaluating the cloud provider's security offering. It goes on to outline basic guidelines that you should follow to ensure an adequate level of security in an XaaS environment, including key areas of the IT infrastructure and issues relating to data transfer and storage.
[READ LESS]
Produced by: SkillSoft
As we move toward more applications being delivered via the cloud and businesses using a cloud computing model, we also need to consider the implications for the management of identity. This course ensures...
[READ MORE]
As we move toward more applications being delivered via the cloud and businesses using a cloud computing model, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management or IAM and the common industry protocols used to extend identity to the cloud. This course covers the concept of federation between different cryptographic services providers or CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service or IDaaS offering. The course also discusses the importance of understanding the presence and privacy factors when conducting business in the cloud and how it is crucial to understand the CSP's responsibility to not only provide security but also a proper level of privacy.
As we move toward more applications being delivered via the cloud and businesses using a cloud computing model, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management or IAM and the common industry protocols used to extend identity to the cloud. This course covers the concept of federation between different cryptographic services providers or CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service or IDaaS offering. The course also discusses the importance of understanding the presence and privacy factors when conducting business in the cloud and how it is crucial to understand the CSP's responsibility to not only provide security but also a proper level of privacy.
[READ LESS]
Produced by: SkillSoft
Migrating services to the public cloud has a number of unique challenges. This course explores the steps you should take in determining if your infrastructure has components that are suitable for a cloud...
[READ MORE]
Migrating services to the public cloud has a number of unique challenges. This course explores the steps you should take in determining if your infrastructure has components that are suitable for a cloud solution. It discusses the Service Oriented Architecture or SOA and grid computing, and highlights characteristics that make these infrastructures suitable or unsuitable for extension to the cloud. The course also explores the recommended steps of analyzing your current infrastructure to inventory data, services, and processes used, as well as identifying problem areas that may be addressed through a cloud solution. Upon completion of your analysis, it is time to determine cloud service candidates and match cloud services, as well as look at examples of how to leverage different services to your problem areas. Finally, you'll learn about the use of private clouds as an alternative to public clouds.
Migrating services to the public cloud has a number of unique challenges. This course explores the steps you should take in determining if your infrastructure has components that are suitable for a cloud solution. It discusses the Service Oriented Architecture or SOA and grid computing, and highlights characteristics that make these infrastructures suitable or unsuitable for extension to the cloud. The course also explores the recommended steps of analyzing your current infrastructure to inventory data, services, and processes used, as well as identifying problem areas that may be addressed through a cloud solution. Upon completion of your analysis, it is time to determine cloud service candidates and match cloud services, as well as look at examples of how to leverage different services to your problem areas. Finally, you'll learn about the use of private clouds as an alternative to public clouds.
[READ LESS]
Produced by: SkillSoft
Cloud computing is massively growing in importance in the IT sector as more and more companies are eschewing traditional IT and moving applications and business processes to the cloud. This course provides IT...
[READ MORE]
Cloud computing is massively growing in importance in the IT sector as more and more companies are eschewing traditional IT and moving applications and business processes to the cloud. This course provides IT professionals with a working definition of cloud computing, explores the technological precursors of today's cloud, as well as the current technologies the cloud is dependent on. Also covered are the benefits and drawbacks of cloud computing for the IT department and business as a whole. It then explores in more detail the different types of services that have become available in the cloud with examples of key pioneers in those areas.
Cloud computing is massively growing in importance in the IT sector as more and more companies are eschewing traditional IT and moving applications and business processes to the cloud. This course provides IT professionals with a working definition of cloud computing, explores the technological precursors of today's cloud, as well as the current technologies the cloud is dependent on. Also covered are the benefits and drawbacks of cloud computing for the IT department and business as a whole. It then explores in more detail the different types of services that have become available in the cloud with examples of key pioneers in those areas.
[READ LESS]
Produced by: SkillSoft
Cloud storage is of key interest to many consumers, as it has a number of advantages over traditional data storage. Cloud-stored data is available from any location that has Internet access. However,...
[READ MORE]
Cloud storage is of key interest to many consumers, as it has a number of advantages over traditional data storage. Cloud-stored data is available from any location that has Internet access. However, depending on the type of business and data, some organizations need to carefully evaluate if and what types of regulations and compliance standards may apply to their data. This course provides a closer look at enterprise resources in the cloud and the use of cloud storage services. It describes the importance of classifying your type of data, what type of security regulations or restrictions apply to it, and whether a cloud provider's offering aligns with those requirements. This course also takes a closer look at the protocols, standards, and mobile client access involved in accessing cloud resources. It explores the meaning of open source software and its role in provisioning and accessing cloud resources.
Cloud storage is of key interest to many consumers, as it has a number of advantages over traditional data storage. Cloud-stored data is available from any location that has Internet access. However, depending on the type of business and data, some organizations need to carefully evaluate if and what types of regulations and compliance standards may apply to their data. This course provides a closer look at enterprise resources in the cloud and the use of cloud storage services. It describes the importance of classifying your type of data, what type of security regulations or restrictions apply to it, and whether a cloud provider's offering aligns with those requirements. This course also takes a closer look at the protocols, standards, and mobile client access involved in accessing cloud resources. It explores the meaning of open source software and its role in provisioning and accessing cloud resources.
[READ LESS]
Produced by: SkillSoft
While the cloud is not necessarily dependent on virtualization, it's widely accepted that any competitive cloud will utilize it. Infrastructural and network connectivity considerations of the modern data...
[READ MORE]
While the cloud is not necessarily dependent on virtualization, it's widely accepted that any competitive cloud will utilize it. Infrastructural and network connectivity considerations of the modern data center are greatly influenced by the requirements of the cloud. Data center infrastructure and components must be designed to address security, scalability, disaster recovery, and redundant high-speed connectivity needed to provide a successful cloud service. This course takes a closer look at the main enabling technologies, including data centers and virtualization that allow clouds to function.
While the cloud is not necessarily dependent on virtualization, it's widely accepted that any competitive cloud will utilize it. Infrastructural and network connectivity considerations of the modern data center are greatly influenced by the requirements of the cloud. Data center infrastructure and components must be designed to address security, scalability, disaster recovery, and redundant high-speed connectivity needed to provide a successful cloud service. This course takes a closer look at the main enabling technologies, including data centers and virtualization that allow clouds to function.
[READ LESS]
Produced by: SkillSoft
In a computing environment where client data assets are remotely hosted, data asset security becomes an important factor when considering the potential transition to cloud services. This course describes and...
[READ MORE]
In a computing environment where client data assets are remotely hosted, data asset security becomes an important factor when considering the potential transition to cloud services. This course describes and explores issues relating to the management and protection of data assets hosted on a cloud platform, and data in transit to and from a cloud platform. In this course, you will learn about all aspects of data management: protection, auditing, access, legislative impact, storage, deletion, security, ownership, data rights management, encryption, classification, known threats to data assets, and threat mitigation. The course covers the essential topics for the ICS2s Certified Cloud Security Professional examination " Domain 2 requirements.
In a computing environment where client data assets are remotely hosted, data asset security becomes an important factor when considering the potential transition to cloud services. This course describes and explores issues relating to the management and protection of data assets hosted on a cloud platform, and data in transit to and from a cloud platform. In this course, you will learn about all aspects of data management: protection, auditing, access, legislative impact, storage, deletion, security, ownership, data rights management, encryption, classification, known threats to data assets, and threat mitigation. The course covers the essential topics for the ICS2s Certified Cloud Security Professional examination " Domain 2 requirements.
[READ LESS]
Produced by: SkillSoft
Alongside the development and uptake of cloud services, comes a developing regulatory framework that compels cloud service providers to protect data and to secure the privacy, integrity, and confidentiality...
[READ MORE]
Alongside the development and uptake of cloud services, comes a developing regulatory framework that compels cloud service providers to protect data and to secure the privacy, integrity, and confidentiality of client data and data assets. This course covers various topics associated with legal and compliance issues with cloud services which are governed within a regulatory framework. The course addresses investigative measures and techniques associated with crime investigation, including eDiscovery and forensic data management. The course also touches on privacy, auditing, and reporting as it applies to cloud technology and services including SAS, SSAE, and ISAE. In this course, you will also learn about risk management, outsourcing, and vendor\provider assessment with particular attention to certifications, access provider audit data, and data ownership issues. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination - Domain 6 requirements.
Alongside the development and uptake of cloud services, comes a developing regulatory framework that compels cloud service providers to protect data and to secure the privacy, integrity, and confidentiality of client data and data assets. This course covers various topics associated with legal and compliance issues with cloud services which are governed within a regulatory framework. The course addresses investigative measures and techniques associated with crime investigation, including eDiscovery and forensic data management. The course also touches on privacy, auditing, and reporting as it applies to cloud technology and services including SAS, SSAE, and ISAE. In this course, you will also learn about risk management, outsourcing, and vendor\provider assessment with particular attention to certifications, access provider audit data, and data ownership issues. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination - Domain 6 requirements.
[READ LESS]
Produced by: SkillSoft
Fundamental to cloud service security are the construction and design of secure datacenters and their hosted hardware and systems. This course covers the best practice management approach to designing,...
[READ MORE]
Fundamental to cloud service security are the construction and design of secure datacenters and their hosted hardware and systems. This course covers the best practice management approach to designing, deploying, and administrating a cloud datacenter and service. In addition, the course will cover the techniques that can be deployed to configure and protect hardware assets " physical and virtualized, manage and protect configuration settings, and keep network data moving in and out of, and hosted within the domain of the datacenter. Topics include regulation compliance, protection techniques, and controlled access to the various components of a cloud data center infrastructure. In this course, you will learn about the deployment of auditing and monitoring techniques, event logging and reporting, and other aspects of management techniques associated with cloud-hosted services. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination " Domain 5 requirements.
Fundamental to cloud service security are the construction and design of secure datacenters and their hosted hardware and systems. This course covers the best practice management approach to designing, deploying, and administrating a cloud datacenter and service. In addition, the course will cover the techniques that can be deployed to configure and protect hardware assets " physical and virtualized, manage and protect configuration settings, and keep network data moving in and out of, and hosted within the domain of the datacenter. Topics include regulation compliance, protection techniques, and controlled access to the various components of a cloud data center infrastructure. In this course, you will learn about the deployment of auditing and monitoring techniques, event logging and reporting, and other aspects of management techniques associated with cloud-hosted services. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination " Domain 5 requirements.
[READ LESS]
Produced by: SkillSoft
Cloud-based systems provide businesses with increased flexibility, scalability, and productivity. This course addresses the different types of cloud-based services available from Microsoft, and explores the...
[READ MORE]
Cloud-based systems provide businesses with increased flexibility, scalability, and productivity. This course addresses the different types of cloud-based services available from Microsoft, and explores the specifics of both Azure and Intune. It is one in a series of courses that prepares learners for exam 98-368: Windows Devices and Mobility Fundamentals, which serves as a credit towards the Microsoft Technology Associate certification and allows students to attain a Microsoft certification, which may later upgrade to a MCSA or even MCSE certificate.
Cloud-based systems provide businesses with increased flexibility, scalability, and productivity. This course addresses the different types of cloud-based services available from Microsoft, and explores the specifics of both Azure and Intune. It is one in a series of courses that prepares learners for exam 98-368: Windows Devices and Mobility Fundamentals, which serves as a credit towards the Microsoft Technology Associate certification and allows students to attain a Microsoft certification, which may later upgrade to a MCSA or even MCSE certificate.
[READ LESS]
Produced by: SkillSoft
Cloud services vary in size and complexity, and the deployed architecture impacts directly on service and data asset security. This course describes and explores aspects of cloud computing architectural...
[READ MORE]
Cloud services vary in size and complexity, and the deployed architecture impacts directly on service and data asset security. This course describes and explores aspects of cloud computing architectural design, and defines associated cloud systems and cloud components. In addition to Cloud Reference Architecture, the course outlines definitions and roles, computing characteristics, and cloud deployment models. In this course, you will learn about cloud security, cloud networks, virtualization within the cloud system, data encryption and aspects of cloud interoperability, trusted cloud services, cloud system management, and operational considerations. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination - Domain 1 requirements.
Cloud services vary in size and complexity, and the deployed architecture impacts directly on service and data asset security. This course describes and explores aspects of cloud computing architectural design, and defines associated cloud systems and cloud components. In addition to Cloud Reference Architecture, the course outlines definitions and roles, computing characteristics, and cloud deployment models. In this course, you will learn about cloud security, cloud networks, virtualization within the cloud system, data encryption and aspects of cloud interoperability, trusted cloud services, cloud system management, and operational considerations. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination - Domain 1 requirements.
[READ LESS]
Produced by: SkillSoft
The security of the cloud services platform and infrastructure is a fundamental driver in the uptake of cloud services and the transition away from Enterprise structures. This course describes issues relating...
[READ MORE]
The security of the cloud services platform and infrastructure is a fundamental driver in the uptake of cloud services and the transition away from Enterprise structures. This course describes issues relating to the security of the supporting components of the cloud infrastructure " both physical and virtual components. The course promotes/outlines a risk management approach in developing and employing security measures to protect cloud components; describes key risk management focus areas " identification, measurement, and control; and covers known threats and the key areas of cloud component vulnerability. In this course, you will learn about security management/measures and auditing, including authentication, authorization, Business Continuity (BC), Disaster Recovery (DR), and failover. The learner will be expected to display knowledge of Cloud Service Business Continuity and Disaster Recovery planning, to identify areas requiring specific security protection, and how to recover lost or damaged data and components hosted on a cloud platform. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination " Domain 3 requirements.
The security of the cloud services platform and infrastructure is a fundamental driver in the uptake of cloud services and the transition away from Enterprise structures. This course describes issues relating to the security of the supporting components of the cloud infrastructure " both physical and virtual components. The course promotes/outlines a risk management approach in developing and employing security measures to protect cloud components; describes key risk management focus areas " identification, measurement, and control; and covers known threats and the key areas of cloud component vulnerability. In this course, you will learn about security management/measures and auditing, including authentication, authorization, Business Continuity (BC), Disaster Recovery (DR), and failover. The learner will be expected to display knowledge of Cloud Service Business Continuity and Disaster Recovery planning, to identify areas requiring specific security protection, and how to recover lost or damaged data and components hosted on a cloud platform. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination " Domain 3 requirements.
[READ LESS]
Produced by: SkillSoft
In this course, you will explore the new features available when creating a vCenter 6.5 managed cluster of ESXi servers
In this course, you will explore the new features available when creating a vCenter 6.5 managed cluster of ESXi servers
[READ LESS]
Produced by: SkillSoft
The COBIT 5 IT-enterprise governance and management business framework provides guidance and best practices to meet stakeholders varying needs. The framework enables the governance entity, usually the board,...
[READ MORE]
The COBIT 5 IT-enterprise governance and management business framework provides guidance and best practices to meet stakeholders varying needs. The framework enables the governance entity, usually the board, to set an appropriate governance direction to meet stakeholders expectations and provide management with a process framework that maximizes enterprise value while optimizing operational risk. This course gives an overview of the COBIT 5 principles of holistic integration, and the treatment of governance and management processes. The latter part of the course covers concepts necessary for the successful implementation of COBIT 5 to an enterprise. The content covered in this course will help learners successfully prepare for the COBIT 5 Foundation Exam.
The COBIT 5 IT-enterprise governance and management business framework provides guidance and best practices to meet stakeholders varying needs. The framework enables the governance entity, usually the board, to set an appropriate governance direction to meet stakeholders expectations and provide management with a process framework that maximizes enterprise value while optimizing operational risk. This course gives an overview of the COBIT 5 principles of holistic integration, and the treatment of governance and management processes. The latter part of the course covers concepts necessary for the successful implementation of COBIT 5 to an enterprise. The content covered in this course will help learners successfully prepare for the COBIT 5 Foundation Exam.
[READ LESS]
Produced by: SkillSoft
Today, technology drives efficiency in business by making it easier for people to work together. Discover the native collaboration solutions in Exchange 2016 and exploit the technology to drive business...
[READ MORE]
Today, technology drives efficiency in business by making it easier for people to work together. Discover the native collaboration solutions in Exchange 2016 and exploit the technology to drive business productivity. In this course, you will examine collaboration solutions including Resource, Linked, and Site Mailboxes, as well as distribution groups and permissions.
Today, technology drives efficiency in business by making it easier for people to work together. Discover the native collaboration solutions in Exchange 2016 and exploit the technology to drive business productivity. In this course, you will examine collaboration solutions including Resource, Linked, and Site Mailboxes, as well as distribution groups and permissions.
[READ LESS]
Produced by: SkillSoft
Columnstore indexes work differently from traditional indexes in SQL Server 2016. This course covers how to implement columnstore indexes in SQL Server 2016, as well as the various columnstore performance...
[READ MORE]
Columnstore indexes work differently from traditional indexes in SQL Server 2016. This course covers how to implement columnstore indexes in SQL Server 2016, as well as the various columnstore performance considerations that can impact operations. This course also covers nonclustered indexes, in-memory indexes, and XML indexes. This course is one of a series of courses that cover the objectives for 70-762: Developing SQL Databases exam.
Columnstore indexes work differently from traditional indexes in SQL Server 2016. This course covers how to implement columnstore indexes in SQL Server 2016, as well as the various columnstore performance considerations that can impact operations. This course also covers nonclustered indexes, in-memory indexes, and XML indexes. This course is one of a series of courses that cover the objectives for 70-762: Developing SQL Databases exam.
[READ LESS]
Produced by: SkillSoft
With LearnKey’s COM+ for Developers training course, developers and systems integrators can discover the power of COM+ to create and use software components in any language and using any tool. With practical,...
[READ MORE]
With LearnKey’s COM+ for Developers training course, developers and systems integrators can discover the power of COM+ to create and use software components in any language and using any tool. With practical, real-world examples, expert Martin Schaeferle shows you how to build COM components, design distributed applications and use Visual Basic to create data components. At the conclusion of this course, you will understand component design and be able to configure COM+ services for optimal performance.
With LearnKey’s COM+ for Developers training course, developers and systems integrators can discover the power of COM+ to create and use software components in any language and using any tool. With practical, real-world examples, expert Martin Schaeferle shows you how to build COM components, design distributed applications and use Visual Basic to create data components. At the conclusion of this course, you will understand component design and be able to configure COM+ services for optimal performance.
[READ LESS]
Produced by: LearnKey
jQuery and jQuery UI provide a large assortment of very useful widgets and animation tools that can be used to make a very interactive web page. In this course you will learn about some of the most common and...
[READ MORE]
jQuery and jQuery UI provide a large assortment of very useful widgets and animation tools that can be used to make a very interactive web page. In this course you will learn about some of the most common and useful widgets as well as how jQuery and jQuery UI can help animate the elements of your web page.
jQuery and jQuery UI provide a large assortment of very useful widgets and animation tools that can be used to make a very interactive web page. In this course you will learn about some of the most common and useful widgets as well as how jQuery and jQuery UI can help animate the elements of your web page.
[READ LESS]
Produced by: SkillSoft
The need for IT specialists who can effectively communicate with all types of users, as well as help organizations implement and manage their growing technological requirements, continues to grow. The...
[READ MORE]
The need for IT specialists who can effectively communicate with all types of users, as well as help organizations implement and manage their growing technological requirements, continues to grow. The Communication Skills for IT Specialists course helps you communicate successfully while managing projects and people within the IT industry. Expert Tom Carpenter covers all aspects of communication from understanding theory to conflict resolution and presentation styles, including scenarios that show how effective communication becomes a key advantage in today's IT environment.
The need for IT specialists who can effectively communicate with all types of users, as well as help organizations implement and manage their growing technological requirements, continues to grow. The Communication Skills for IT Specialists course helps you communicate successfully while managing projects and people within the IT industry. Expert Tom Carpenter covers all aspects of communication from understanding theory to conflict resolution and presentation styles, including scenarios that show how effective communication becomes a key advantage in today's IT environment.
[READ LESS]
Produced by: LearnKey