Multimedia Library - All

Mar 3, 2015
Education

Session 3: Faults & Fixes  

Presented by: Chris McNulty | Running Time: 61 minutes In the final session, we'll focus on diagnosing poor performing and degraded systems, reviewing tools and techniques to pinpoint some common root causes with advice on fixing issues and returning systems to peak availability....More
Mar 3, 2015
Education

Session 1: Installing and Configuring a Hybrid Deployment's  

Presented by: Michael Van Horenbeeck | Running Time: 75 minutes This session will cover the basics of a hybrid deployment and how to prepare your environment for it, including how to configure Directory Synchronization and Active Directory Federation Services....More
Mar 3, 2015
Education

Session 2: Inside Social Engineering Attacks  

Presented by: Mel Beckman | Running Time: 61 minutes This session illustrates in detail the various technical means hackers employ in social engineering attacks. You'll learn about phishing and spear phishing, induced drive-by infections, telephone and voicemail attacks, social networking attacks through Facebook and LinkedIn, and attacks through personal mobile devices....More
Mar 3, 2015
Education

Session 1: Demystifying Asynchronous Messaging  

Presented by: Allen White | Running Time: 69 minutes Service Broker is seldom used because it isn't well understood. In this session, Allen will walk you through the basics of Service Broker, including the components involved in getting messages sent from one place to another. He will talk about both normal and external activation, where an application – rather than a stored procedure – receives and processes the messages, and he'll discuss strategies to handle various problems like poison messages....More
Mar 3, 2015
Education

Session 2: All about the Database  

Presented by: Liam Cleary | Running Time: 58 minutes The database is the core to a SharePoint platform. It stores all of the configuration and content that can be very private and confidential for an organization. In this session we will review security approaches for SQL Server, and then try to break into SQL and perform escalation attacks to gain access to SharePoint....More
Mar 3, 2015
Education

Session 3: Managing Security in SSIS  

Presented by: Tim Mitchell | Running Time: 62 minutes In this session, we'll cover the essentials of securing the SSIS catalog. We will walk through security of individual packages, including package/project protection levels. We will cover the configuration story, and demonstrate how to properly secure sensitive information (such as connection strings) outside of the package. Finally, we will discuss and demonstrate security in the catalog itself, including management of who can (and cannot) browse, edit, and execute packages....More
Mar 3, 2015
Education

Session 1: Power BI Platform: Technical Overview  

Presented by: Jen Underwod | Running Time: 64 minutes In this session, Jen will introduce the Power BI Platform components from a BI professional perspective. She will cover key differences from the prior Power BI release, various BI delivery use cases, and deployment models. Best practices and recommendations also will be shared....More
Mar 3, 2015
Education

Session 2: Creating a Hybrid Exchange Connection Using the Hybrid Configuration Wizard  

Presented by: Michael Van Horenbeeck | Running Time: 66 minutes In this session, we will explore the features of the Hybrid Configuration Wizard and walk through the various steps to successfully configure a hybrid connection and how you can troubleshoot if something fails during the configuration process....More
Mar 3, 2015
Education

Session 3: Multi-Pronged Attacks  

Presented by: Mel Beckman | Running Time: 65 minutes Hackers no longer limit themselves to a single type of attack per victim. Modern attacks are multi-pronged and prosecuted over the course of days or weeks. To defend against these attacks, you must learn to link seemingly unrelated events together and report unusual events to a central security person. The final session explains these processes and how additional business security policies can help formalize them....More
Mar 3, 2015
Education

Session 2: Insuring Successful Business Data Delivery with Service Broker  

Presented by: Allen White Running Time: 69 minutes How your business applications interact with the corporate database directly can have a dramatic impact on how successful you are, and one of the biggest issues is performance with large databases. By designing the application to use asynchronous messaging for non-critical updates you can focus performance concerns to where the timeliness is critical. SQL Server Service Broker handles the asynchronous requests quickly and efficiently, and minimizes the conflicts with your critical updates. This session will walk you through the steps to get Service Broker up and running and provide a consistent delivery of your business data....More
John Savill's Microsoft Stack Master Class

Join John Savill for the ALL NEW Microsoft Stack Master Class!

Get 30 hours of detailed instruction covering the complete Microsoft solution stack. Invest a few hours each week and become THE Microsoft expert in your organization.

Thursdays, October 8th to December 17th

John will cover topics including:

* Key Features of Active Directory for every version of Server OS, including Windows Server 2012 R2 and Windows Server 2016
* Key elements of Microsoft System Center 2012 and System Center 2012 R2 PLUS major changes in the 2016 wave
* Deploying, Migrating to, and Managing Hyper-V in Your Organization
* Implementing a Private Cloud
* Using PowerShell to Automate Common tasks
* Key Windows 10 changes including the new Start menu, Cortana, Microsoft Edge, and more
* And much more!

 

Enroll by October 1st and SAVE $245!

 

 

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×