Configuration Management in IT Business Services (A Practical Application) by Mark Thomas

Home > Videos > Business Analysis > Configuration Management in IT Business Services (A Practical Application) by Mark Thomas

Configuration Management in IT Business Services (A Practical Application) by Mark Thomas

Like This Video 0 8Mark Thomas
Added by January 10, 2018

In this video, ITIL and COBIT Instructor Mark Thomas discusses practical applications of Configuration Management in IT Business Services and how it can be used to meet business requirements and IT goals from the stakeholder’s needs. Mark shares his experiences and provides some real-world examples of designing and adopting a Configuration Management System.

For instructor-led IT Business Services certification, see our course schedule:

ITIL Training & Certification Courses

 

You may also like:  ITIL – Change Management. Projecting Service Outages for your Change Advisory Board

Videos You May Like

Using Navigation Controls in a Collaboration Site in SharePoint

0 115 0

In this SharePoint training video, I want to talk about the Navigation Controls in SharePoint. They tend to fall into two kind of different categories; one with the navigation controls in a typical Collaboration Site such as a Team Site or a Project Site. These are Sites that are based on the Team Site Template … Continue reading Using Navigation Controls in a Collaboration Site in SharePoint

Windows 10 Features and Navigation – December 1, 2015

0 41 1

In this video, Windows Instructor Steve Fullmer presents the navigation and some of the new features associated with Windows 10 including Sysinternals Tools for Windows Client, Windows core concepts, exploring Process Explorer as well as some of the features that are not yet ready for prime time but will be released shortly in the future with Windows 10.

Detailed Forensic Investigation of Malware Infections – April 21, 2015

2 254 2

In this IT Security training video, Security expert Mike Danseglio (CISSP / CEH) will perform several malware investigations including rootkits, botnets, viruses, and browser toolbars.

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.