Configuration Management in IT Business Services (A Practical Application) by Mark Thomas

Home > Videos > Business Analysis > Configuration Management in IT Business Services (A Practical Application) by Mark Thomas

Configuration Management in IT Business Services (A Practical Application) by Mark Thomas

Like This Video 0 11 Mark Thomas
Added by January 10, 2018

In this video, ITIL and COBIT Instructor Mark Thomas discusses practical applications of Configuration Management in IT Business Services and how it can be used to meet business requirements and IT goals from the stakeholder’s needs. Mark shares his experiences and provides some real-world examples of designing and adopting a Configuration Management System.

For instructor-led IT Business Services certification, see our course schedule:

ITIL Training & Certification Courses

 

Videos You May Like

A Simple Introduction to Cisco CML2

0 462 0

Mark Jacob, Cisco Instructor, presents an introduction to Cisco Modeling Labs 2.0 or CML2.0, an upgrade to Cisco’s VIRL Personal Edition. Mark demonstrates Terminal Emulator access to console, as well as console access from within the CML2.0 product. Hello, I’m Mark Jacob, a Cisco Instructor and Network Instructor at Interface Technical Training. I’ve been using … Continue reading A Simple Introduction to Cisco CML2

Using Navigation Controls in a Collaboration Site in SharePoint

0 334 1

In this SharePoint training video, I want to talk about the Navigation Controls in SharePoint. They tend to fall into two kind of different categories; one with the navigation controls in a typical Collaboration Site such as a Team Site or a Project Site. These are Sites that are based on the Team Site Template … Continue reading Using Navigation Controls in a Collaboration Site in SharePoint

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 599 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.