SlideShare a Scribd company logo
Maharaja Pungamudaiyar
Introduction to ITIL 4 Foundation
Organized by Cognixia on 2nd
July 2020

More Related Content

More from Maharaja P

Coursera Google Workspace Administration
Coursera Google Workspace AdministrationCoursera Google Workspace Administration
Coursera Google Workspace Administration
Maharaja P
 
Coursera Architecting with Google Kubernetes Engine
Coursera Architecting with Google Kubernetes EngineCoursera Architecting with Google Kubernetes Engine
Coursera Architecting with Google Kubernetes Engine
Maharaja P
 
Coursera GCP Cloud Data Engineer
Coursera GCP Cloud Data EngineerCoursera GCP Cloud Data Engineer
Coursera GCP Cloud Data Engineer
Maharaja P
 
Coursera Install and Manage Google Cloud Apigee API
Coursera Install and Manage Google Cloud Apigee APICoursera Install and Manage Google Cloud Apigee API
Coursera Install and Manage Google Cloud Apigee API
Maharaja P
 
Coursera Googke Cloud Certification Cloud Architect
Coursera Googke Cloud Certification Cloud ArchitectCoursera Googke Cloud Certification Cloud Architect
Coursera Googke Cloud Certification Cloud Architect
Maharaja P
 
Coursera -Networking in Google Cloud
Coursera -Networking in Google CloudCoursera -Networking in Google Cloud
Coursera -Networking in Google Cloud
Maharaja P
 
Coursera - Architecting with Google Compute Engine
Coursera - Architecting with Google Compute EngineCoursera - Architecting with Google Compute Engine
Coursera - Architecting with Google Compute Engine
Maharaja P
 
Coursera - Developing Application with GCP
Coursera - Developing  Application with GCPCoursera - Developing  Application with GCP
Coursera - Developing Application with GCP
Maharaja P
 
PACE Institure Opensource Redhat certification
PACE Institure Opensource Redhat certificationPACE Institure Opensource Redhat certification
PACE Institure Opensource Redhat certification
Maharaja P
 
Red Hat Configuration Management with Puppet
Red Hat Configuration Management with PuppetRed Hat Configuration Management with Puppet
Red Hat Configuration Management with Puppet
Maharaja P
 
Ai skill Skilsensa
Ai  skill SkilsensaAi  skill Skilsensa
Ai skill Skilsensa
Maharaja P
 
IOT Security and Penetration Testing Cognixia
IOT Security and Penetration Testing CognixiaIOT Security and Penetration Testing Cognixia
IOT Security and Penetration Testing Cognixia
Maharaja P
 
Artificial Intelligence Robotics
Artificial Intelligence RoboticsArtificial Intelligence Robotics
Artificial Intelligence Robotics
Maharaja P
 
Pearson English
Pearson EnglishPearson English
Pearson English
Maharaja P
 
Pearson English
Pearson EnglishPearson English
Pearson English
Maharaja P
 
Pearson English
Pearson EnglishPearson English
Pearson English
Maharaja P
 
English
EnglishEnglish
English
Maharaja P
 
English
EnglishEnglish
English
Maharaja P
 
English
EnglishEnglish
English
Maharaja P
 
Pearson English
Pearson EnglishPearson English
Pearson English
Maharaja P
 

More from Maharaja P (20)

Coursera Google Workspace Administration
Coursera Google Workspace AdministrationCoursera Google Workspace Administration
Coursera Google Workspace Administration
 
Coursera Architecting with Google Kubernetes Engine
Coursera Architecting with Google Kubernetes EngineCoursera Architecting with Google Kubernetes Engine
Coursera Architecting with Google Kubernetes Engine
 
Coursera GCP Cloud Data Engineer
Coursera GCP Cloud Data EngineerCoursera GCP Cloud Data Engineer
Coursera GCP Cloud Data Engineer
 
Coursera Install and Manage Google Cloud Apigee API
Coursera Install and Manage Google Cloud Apigee APICoursera Install and Manage Google Cloud Apigee API
Coursera Install and Manage Google Cloud Apigee API
 
Coursera Googke Cloud Certification Cloud Architect
Coursera Googke Cloud Certification Cloud ArchitectCoursera Googke Cloud Certification Cloud Architect
Coursera Googke Cloud Certification Cloud Architect
 
Coursera -Networking in Google Cloud
Coursera -Networking in Google CloudCoursera -Networking in Google Cloud
Coursera -Networking in Google Cloud
 
Coursera - Architecting with Google Compute Engine
Coursera - Architecting with Google Compute EngineCoursera - Architecting with Google Compute Engine
Coursera - Architecting with Google Compute Engine
 
Coursera - Developing Application with GCP
Coursera - Developing  Application with GCPCoursera - Developing  Application with GCP
Coursera - Developing Application with GCP
 
PACE Institure Opensource Redhat certification
PACE Institure Opensource Redhat certificationPACE Institure Opensource Redhat certification
PACE Institure Opensource Redhat certification
 
Red Hat Configuration Management with Puppet
Red Hat Configuration Management with PuppetRed Hat Configuration Management with Puppet
Red Hat Configuration Management with Puppet
 
Ai skill Skilsensa
Ai  skill SkilsensaAi  skill Skilsensa
Ai skill Skilsensa
 
IOT Security and Penetration Testing Cognixia
IOT Security and Penetration Testing CognixiaIOT Security and Penetration Testing Cognixia
IOT Security and Penetration Testing Cognixia
 
Artificial Intelligence Robotics
Artificial Intelligence RoboticsArtificial Intelligence Robotics
Artificial Intelligence Robotics
 
Pearson English
Pearson EnglishPearson English
Pearson English
 
Pearson English
Pearson EnglishPearson English
Pearson English
 
Pearson English
Pearson EnglishPearson English
Pearson English
 
English
EnglishEnglish
English
 
English
EnglishEnglish
English
 
English
EnglishEnglish
English
 
Pearson English
Pearson EnglishPearson English
Pearson English
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

ITIL 4 Foundation -Cognixia