Friday 29 July 2016

BlackBerry BES12.5 Multi-OS Mobile Device Management Review

BlackBerry's BES12.5 is one of the top choices for enterprise mobility management today. We take a hands-on look at the EMM platform's integration, compatibility, capabilities, key features, architecture, administration, security and support.

from Tom's IT Pro
via CERTIVIEW

CCNP Data Center Question of the Week: Connecting Multiple Data Centers

ccnpQoW02

Which protocol is optimized for connecting multiple data centers together?

A. LISP
B. OTV
C. FabricPath
D. vPC

 

Related Courses
DCUCI – Data Center Unified Computing Implementation v5.0
DCUFI – Implementing Cisco Data Center Unified Fabric v5.0
DCUCD – Designing Cisco Data Center Unified Computing v5.0
DCUFD – Designing Cisco Data Center Unified Fabric v5.0
DCUCT – Troubleshooting Cisco Data Center Unified Computing v5.0
DCUFT – Troubleshooting Cisco Data Center Unified Fabric v5.0

Related Certification
CCNP Data Center

CCNP Data Center Question of the Week Series



from
CERTIVIEW

Thursday 28 July 2016

Scrum Alliance Certification Guide: Overview and Career Paths

Scrum Alliance is the leading global membership organization serving Agile practitioners. It offers a comprehensive certification track and numerous resources to its membership.

from Tom's IT Pro
via CERTIVIEW

Wednesday 27 July 2016

How to Automate Software Package Installations in Server 2016 via PowerShell

TKTK

from Tom's IT Pro
via CERTIVIEW

Cybersecurity Professionals Shortage Leaves Businesses Vulnerable

A lack of qualified cybersecurity personnel has created a worldwide crisis, according to a new report from Intel Security, McAfee and the Center for Strategic and International Studies (CSIS). The Hacking the Skills Shortage study indicates that 71 percen

from Tom's IT Pro
via CERTIVIEW

Mobile Device Management: What’s Legal, What’s Not?

Defining a clear and detailed mobile device management policy for your small business is the best way to stay within the bounds of the law

from Tom's IT Pro
via CERTIVIEW

How to Use the Microsoft PowerShell Cmdlets Utility Module

Step-by-step instructions for using the PowerShell cmdlets Utility module that comes with Microsoft's Windows 10.

from Tom's IT Pro
via CERTIVIEW

CEH v9 Question of the Week: Password Cracking Tool

CEH-v9-QOWBlack

Johnny is a member of the hacking group Orpheus1. He is currently working on breaking into the Department of Defense’s front end Exchange Server. He was able to get into the server, located in a DMZ, by using an unused service account that had a very weak password that he was able to guess. Johnny wants to crack the administrator password, but does not have a lot of time to crack it. He wants to use a tool that already has the LM hashes computed for all possible permutations of the administrator password.

What tool would be best used to accomplish this?

A. SMBCrack
B. RainbowTables
C. SmurfCrack
D. PSCrack

 

Related Course
Certified Ethical Hacker v9



from
CERTIVIEW

Tuesday 26 July 2016

Pokemon Go is Endangering Your Company’s Security

Pokemon Go isn’t all fun and games. It can be a real danger for your company’s BYOD security. Here’s how you can stop it.

from Tom's IT Pro
via CERTIVIEW

BlackBerry Reveals 'World's Most Secure Android Phone'

The BlackBerry Dtek50 promises to be the world's most secure Android phone. Here's what's inside and how it will protect your business and data.

from Tom's IT Pro
via CERTIVIEW

Finally, Windows 10 MCSA Is Coming Together

The 70-698 exam is still in beta, but with Windows 10 Anniversary Update scheduled for release on August 2, 2016, the Windows 10 MCSA should be available soon.

from Tom's IT Pro
via CERTIVIEW

Monday 25 July 2016

How to Deploy a Docker Container in Windows Server 2016

Windows Server 2016 includes native support for Docker-based containers. Here's how to install and deploy Windows Server-based containers.

from Tom's IT Pro
via CERTIVIEW

How to Validate Windows Server 2016 with Pester

How to apply the Pester testing framework to Window Server 2016, and how it can be leveraged to ensure your machine is configured how you intend.

from Tom's IT Pro
via CERTIVIEW

Windows 10 Anniversary Update: Best New Features

Windows 10 is getting its first big update with the Anniversary Edition, coming August 2. Here's what's new.

from Tom's IT Pro
via CERTIVIEW

Best Free Prep Materials for Certified Ethical Hacker

The Certified Ethical Hacker (CEH) credential is an intermediate level that teaches IT pros to look at security from a white hat perspective.

from Tom's IT Pro
via CERTIVIEW

Friday 22 July 2016

Thursday 21 July 2016

How To Become a Certified Information Systems Security Professional (CISSP)

The demand for capable security pros continues to grow — and it isn't going to slack off any time soon.

from Tom's IT Pro
via CERTIVIEW

How to Use the New FileShare PowerShell Cmdlets in Server 2016

The introduction of Windows Server 2016 and PowerShell v5 brought a lot of great new commands to manage your environments. Here are some of the more common cmdlets you might use.

from Tom's IT Pro
via CERTIVIEW

Wednesday 20 July 2016

Microsoft Now Offers a Professional Degree Program Online

With the launch of a professional credential in Data Science, Microsoft jumps into the university-level training game with a resume-worthy program.

from Tom's IT Pro
via CERTIVIEW

8 Free Computer Forensics Training Resources For IT Pros

Computer forensics training doesn't have to put a dent in your budget. Find out which companies and organizations offer free forensic training, tutorials and videos.

from Tom's IT Pro
via CERTIVIEW

Tuesday 19 July 2016

How to Test Windows Server 2016 in Azure

Windows lets you create virtual machines through the Azure Portal or with the Azure PowerShell module. Here's how.

from Tom's IT Pro
via CERTIVIEW

Monday 18 July 2016

5 Tips for Mentoring IT Employees

Mentoring can make all the difference to an employee who simply needs some guidance or direction, and is often a win-win for both mentor and mentee.

from Tom's IT Pro
via CERTIVIEW

Friday 15 July 2016

How To Become A White Hat Hacker

Ethical hacking is the perfect career choice for those interested in problem solving, communication and IT security. Here's what it takes to become a white hat hacker.

from Tom's IT Pro
via CERTIVIEW

CCNP Data Center Question of the Week: Aggregation Layer

ccnpQoW03Which three are characteristics of the aggregation layer of a Cisco Data Center Unified Fabric network? (Choose three.)

A. no packet filtering
B. QoS – policing
C. Voice, data, and wireless convergence
D. Scalable routing protocols
E. Provides redundant default gateways using FHRP
F. QoS – classification and queuing
G. Routing manipulation and filtering
H. Aggregates end users

 

Related Courses
DCUCI – Data Center Unified Computing Implementation v5.0
DCUFI – Implementing Cisco Data Center Unified Fabric v5.0
DCUCD – Designing Cisco Data Center Unified Computing v5.0
DCUFD – Designing Cisco Data Center Unified Fabric v5.0
DCUCT – Troubleshooting Cisco Data Center Unified Computing v5.0
DCUFT – Troubleshooting Cisco Data Center Unified Fabric v5.0

Related Certification
CCNP Data Center

CCNP Data Center Question of the Week Series



from
CERTIVIEW

Thursday 14 July 2016

How to Remotely Manage a Nano Server

The changes to Windows Server 2016 might lead to confusion on how to manage the new Nano Server, unless you read this.

from Tom's IT Pro
via CERTIVIEW

Wednesday 13 July 2016

Buying Into VMware Education

Recent training announcements in VMWare bring up a couple key questions. What’s a VMware Learning Zone subscription, and how much does it cost? And, what other alternative subscriptions are available and how much do they cost?

from Tom's IT Pro
via CERTIVIEW

Tuesday 12 July 2016

How to Apply Windows Updates to Nano Server

Microsoft finally went the extra step and removed the GUI in Nano Server. Here's how to apply updates

from Tom's IT Pro
via CERTIVIEW

How To Install Nano Server In Windows Server 2016

In this step-by-step tutorial you'll learn how to build a Nano Server in a virtual machine. We'll also go over the workflow of setting it up along with a short "cheat sheet" of the keys you'll need to navigate through the Nano Server admin interface.

from Tom's IT Pro
via CERTIVIEW

3 Steps for Implementing Business Analysis

team31122Implementing business analysis (BA) in organizations needs to be done in a well-planned process. The three steps are contingent on the BA maturity of the organization, its vision for how BA will be used and the degree of executive sponsorship.

During Step 1, you’ll identify the members of the primary group. This group will be principally responsible for business analysis and will be given initial training on the skills, techniques, methodologies and knowledge needed to implement BA. Training will include the International Institute of Business Analysis’ best practices model, benchmarked methods, history, quality and continuous improvement methods. Step 2 consists of training the rest of your personnel and Step 3 is when BA will be applied.

Step 1: Determining the organizational vision and primary group

The first question that needs to be answered is, “What does BA mean in this organization?” Executives need to define the vision that will become the basis for the entire BA program and it needs to be given necessary time to develop. Without a strong vision that has full executive support, business analysis will only be a mantra and will never be fully accepted, implemented or maintained. It will not survive in the long run.

Next, the BA primary group will be picked, and a location for where they will “live” needs to be decided on. It is usually a good idea to place the BA group in an area of the organization that easily reaches to all departments and who report to a senior executive. Ultimately, the BA group should be permanent staff and made-up of individuals with varying levels of experience and expertise. This provides those with less experience the opportunity to develop and those with more experience with the possibility to eventually take on more of a leadership role. The BA team members’ roles must also be defined both at the group level, as mentioned in the overview, and within the BA unit.

Step 2: Training

The training phase essentially needs to consist of a core curriculum and additional training as necessary. Although needs vary from organization to organization, it has been found that these three basic types of training work well:

  • An orientation or awareness program that introduces the concepts of BA
  • A skills-building program that enables members to collect/elicit and analyze data, apply quantitative and qualitative measures to requirements and work processes, and create improvements.
  • Programs that help to clarify new roles and expectations and provide employees with the essential tools and techniques for implementing a more supportive and participative environment. Examples include leadership and communication, conflict resolution skills and so on.

Training delivery should begin with giving senior managers a one-hour to a half-day orientation of the BA program, and repeating the orientation throughout the organization. Since the BA group will eventually interact with all elements in the organization, it becomes imperative that everyone understands the program and its objectives and methodology.

Providing real-time information is also a good way to decrease any resistance and increase acceptance. In the absence of this real-time information, individuals and groups will make assumptions that may or may not be correct. It is strongly suggested that the training be provided to work groups, since this allows the groups to discuss their own unit’s mission, discover improvement opportunities and to identify any barriers that might impede their progress. Possible training includes:

Orientation training

Orientation training introduces participants to the business analysis process. This training will ensure an understanding of the organization’s mission, vision, values and objectives related to BA. Participants will form an understanding of their roles for contributing to ongoing process improvement. Next, the orientation explains the background and concepts, the state of BA, why the company is investing in business analysis, and the general approach and methodology. A final objective of the orientation is to make sure that employees know what is expected of them and what they can expect from the new function.

Requirements, process identification and analysis training

Requirements, process identification and analysis training enables participants to begin applying the tools of business analysis as soon as they return to their jobs. This training should emphasize techniques for identifying internal and external customers / stakeholders, performing enterprise analysis, eliciting and writing requirements, modeling processes, validation and verification, and building an understanding of team and stakeholder expectations.

Process improvement training

The emphasis here is on “putting it all together” using a systematic model. This is where participants receive the tools, techniques and methodologies for improvement and opportunities to practice. They include modeling the “as is,” state evaluating the processes using the elicited requirements and success criteria, modeling the “to be” state and presenting the completed analysis.

In addition to the above steps, the training on the following subjects may be included:

  • Project management
  • Statistical quality control
  • Leadership and communication
  • Problem solving

Step 3: Implementation

Training needs to be followed by the application of newly acquired skills or the training investment will be lost. Application needs to begin as soon as the training is complete so the information and skills learned are reinforced and do not have time to disintegrate. Immediate practice also reinforces the organization’s commitment to BA. Work on this project should begin when employees return to the workplace. Four criteria should be used in the selection of initial projects:

  1. Importance: The process is important to the organization and its employees. Successful completion will yield a measurable and clearly visible improvement for the organization.
  2. Feasibility: The process can be worked on by the organization and employees have the necessary skills, resources, and abilities to successfully complete the project in a reasonable period of time (usually less than six months).
  3. Energizing: The project is of inherent interest and employees are stakeholders.
  4. Ownership: The process owner is sponsoring the project. Others who have a stake in the project, but are not directly involved, are kept informed by the team.

In summary, implementing BA needs to be handled like any other change management project. It needs to be planned, organized and deployed thoughtfully.

Need help implementing your BA solution? See our complete business analysis training portfolio.

 



from
CERTIVIEW

Monday 11 July 2016

Why Small Businesses Must Regulate Mobile Devices

Data breaches, lawsuits and bad company morale are just a few of the possible side effects of ignoring this advice.

from Tom's IT Pro
via CERTIVIEW

How To Become A Cloud Architect

How do you get to a senior level Cloud Architect position with no experience in cloud computing? The right combination of IT certifications and an advanced degree can substantially speed up the career path to your ideal role in cloud computing.

from Tom's IT Pro
via CERTIVIEW

CCNA Collaboration Question of the Week: Jabber

CCNAQuestionWeek16A new user has registered Cisco Jabber. Which option verifies that the Jabber client is connected to all appropriate systems?

A. Show Connection Status
B. Report A Problem
C. Advanced Settings
D. About Jabber
E. Reset Jabber

 

Related Courses
CICD – Implementing Cisco Collaboration Devices
CIVND2 – Implementing Cisco Video Network Devices v1.0

Related Certification
CCNA Collaboration

Learn more about Cisco Collaboration training.



from
CERTIVIEW

Friday 8 July 2016

Building A Business Case For Data Loss Prevention (DLP) Tools

While data loss prevention has traditionally been driven by compliance regulations and insider threats, companies of all sizes and industry segments are looking to DLP tools to help protect sensitive data.

from Tom's IT Pro
via CERTIVIEW

EMM Use Cases: What Mobility Success Looks Like for You

Pick the right enterprise mobility management solution based on your company's use case needs.

from Tom's IT Pro
via CERTIVIEW

CCNP Data Center Question of the Week: Cisco Technology

ccnpQoW04

Which technology sets Cisco apart from other vendors in a data center?

A. NPV
B. NPIV
C. VSANs
D. FCoE

 

Related Courses
DCUCI – Data Center Unified Computing Implementation v5.0
DCUFI – Implementing Cisco Data Center Unified Fabric v5.0
DCUCD – Designing Cisco Data Center Unified Computing v5.0
DCUFD – Designing Cisco Data Center Unified Fabric v5.0
DCUCT – Troubleshooting Cisco Data Center Unified Computing v5.0
DCUFT – Troubleshooting Cisco Data Center Unified Fabric v5.0

Related Certification
CCNP Data Center

CCNP Data Center Question of the Week Series

  • CCNP Data Center Question of the Week: Cisco Technology


from
CERTIVIEW

Wednesday 6 July 2016

CEH v9 Question of the Week: Full TCP connection

CEH-v9-QOWGoldWhich type of scan opens a full TCP connection?

A. TCP Connect Scan
B. FIN Scan
C. SYN Scan
D. RST Scan

 

Related Course
Certified Ethical Hacker v9



from
CERTIVIEW

Tuesday 5 July 2016

How To Become A Chief Information Security Officer (CISO)

If you're interested in becoming a Chief Information Security Officer, here's what you need to know about the CISO role as well as the educational background, training, job experience and IT certifications that will help you get there.

from Tom's IT Pro
via CERTIVIEW

Friday 1 July 2016

Pluralsight Ups The Bar For Online IT Training With Live Mentoring

Pluralsight now offers learning paths, skills tests and live one-on-one mentoring as part of its "all you can train" subscription LMS. The new capabilities put the popular online training provider in a league of its own.

from Tom's IT Pro
via CERTIVIEW