logo skoleni-kurzy

ŠKOLENÍ: NETWORK SECURITY HACKING V PRAXI # HLEDÁM NEJLEPŠÍ ŠKOLENÍ NEBO SEMINÁŘE STRANA 3 | HLEDÁ KURZ: NETWORK SECURITY HACKING V PRAXI POUZE V NÁZVU KURZU


skoleni-kurzy.eu




Podrobné hledání kurzů, školení a rekvalifikací


Network security hacking v praxi | do 10 dnů | do 30 dnů



skoleni-kurzy.eu

[skoleni-kurzy.eu] Zde najdete různé kurzy, školení, semináře a rekvalifikační kurzy z různých oborů.

Nenašli jste kurz, školení a/nebo seminář?

Pošlete nám nezávaznou poptávku po kurzu a my se ho pokusíme najít a pošleme Vám kontakt na vzdělávací firmu a/nebo Vaši poptávku kurzu zveřejníme v seznamu poptávek.

Registrace školící firmy

Jste školící firma, vzdělávací instituce a/nebo pořádáte školení, kurzy, rekvalifikační semináře? Zaregistrujte svoji firmu na serveru a zvyšte počet svých klientů.
 

Náhodný kurz/školení


Jak si usnadnit jednání s náročnými klienty a kolegy pro asistentky - STUDIO W
Určeno pro asistentky, pracovníky zákaznického servisu a další podpůrné neobchodní profese, které jednají se zákazníky a kolegy. Cílem kurzu je naučit se vyjednávat s komplikovanými osobami tak, abychom dosáhli svého, udržovali a vytvářeli dobré vztahy a při tom se zbytečně nestresovali.

^

 

 

Viz také následující kurzy :
Další zlevněné kurzy

SLEVA 10 % na kurz Microsoft OneNote – efektivní využití - LastMinute' - Brno - - využít slevu lze pouze do 31.5.2024

Výpis školení a/nebo kurzů podle klíčového slova: network security hacking v praxi - pouze v názvu kurzu hledá aspoň jedno klíčové slovo [OR]

Hledáno v názvu kurzu/školení: network security hacking v praxi


Počet nalezených kurzů : 885

Kurzy : << | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 75| >>


EX415 - Red Hat Certified Specialist in security: Linux exam

Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login polic * for this exam These audiences may be interested in becoming a Red Hat Certified Specialist in security: Linux: System administrators responsible for managing large enterprise environments System administrators responsible for securing their organization s infrastructure Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential Prerequisites for this exam Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in security: Linux exam objectives or have comparable work experience using Red Hat OpenStack Platform. Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login policy. Modify PAM configuration files and parameters. Configure system auditing Write rules to log auditable events. Enable prepackaged rules. Produce audit reports. Configure SELinux Enable SELinux on a host running a simple application. Interpret SELinux violations and determine remedial action. Restrict user activity with SELinux user mappings. Analyze and correct existing SELinux configurations. Enforce security compliance Install OpenSCAP and Workbench. Use OpenSCAP and Red Hat Insights to scan hosts for security compliance. Use OpenSCAP Workbench to tailor policy. Use OpenSCAP Workbench to scan an individual host for security compliance. Use Red Hat Satellite server to implement an OpenSCAP policy. Apply OpenSCAP remediation scripts to hosts. As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Prerequisites Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in security: Linux e ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


RH415 - Red Hat security: Linux in Physical, Virtual, and Cloud

Red Hat security: Linux in Physical, Virtual, and Cloud (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights. Maintaining security of computing systems is ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


DO425 - Red Hat security: securing Containers and OpenShift

Lea> to mitigate and manage threats to OpenShift container-based infrastructure Red Hat security: securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals lea> to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for mode> containerized applications and software-defined networking. This course is based on R ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


DO426 - Red Hat security: securing Containers and OpenShift with exam

Red Hat security: securing Containers and OpenShift with exam (DO426) is bundle is a combination of the following: DO425 - Red Hat security: securing Containers and OpenShift EX425 - Red Hat Certified Specialist in security: Containers and OpenShift Container Platform exam ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


EX425 - Red Hat Certified Specialist in security: Containers and OpenShift Container Platform exam

Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set Configure security context constraints Use trusted registries Load images into a registry Query images in a registry Work with trusted container images Identify a trusted container image Sign images View signed images Scan images Load signed images into a registry Build secure container images Perform simple S2I builds Implement S2I bui * System administrators or developers who want to demonstrate their ability to properly secure containers System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform Red Hat Certified Engineers who wish to become Red Hat Certified Architects Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set Configure security context constraints Use trusted registries Load images into a registry Query images in a registry Work with trusted container images Identify a trusted container image Sign images View signed images Scan images Load signed images into a registry Build secure container images Perform simple S2I builds Implement S2I build hooks Automate builds using Jenkins Automate scanning and code validations as part of the build process Control access to OpenShift Container Platform clusters Configure users with different permission levels, access, and bindings Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication Query users and groups in IdM Log into OpenShift Container Platform using an IdM managed account Configure single sign-on (SSO) Install SSO authentication Configure OpenShift Container Platform to use SSO Integrate web applications with SSO Automate policy-based deployments Configure policies to control the use of images and registries Use secrets to provide access to external registries Automatically pull and use images from a registry Use triggers to verify that automated deployments work Manage orchestration Restrict nodes on which containers may run Use quotas to limit resource utilization Use secrets to automate access to resources Configure network isolation Create software-defined networks (SDN) Associate containers and projects with SDNs Configure and manage secure container storage Configure and secure file-based container storage Configure and secure block-based container storage As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central . Red Hat does not authorize e ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


Security Fundamentals Online

This self-paced course is designed to introduce you to fundamental cloud computing and AWS security concepts including AWS access control and management, governance, logging, and encryption methods. It also covers security-related compliance protocols and risk management strategies, as well as procedures related to auditing your AWS security infrastructure. Start the online class Audience This course is intended for: IT business-level users and professionals interested in cloud s ...


Podobný kurz    = podobný kurz, školení a/nebo seminář

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


RH416 - Red Hat security: Linux in Physical, Virtual, and Cloud with exam

Red Hat security: Linux in Physical, Virtual, and Cloud with exam (RH416) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances. This course is based on Red Hat Enterpri ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


AWS security Essentials

This course is intended for: IT business-level professionals interested in cloud security practices security professionals with minimal working knowledge of AWS Course Objectives In this course, you will lea> to: Identify security benefits and responsibilities when using the AWS Cloud Describe the access control and management feat ...


^

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


Exam Readiness: AWS Certified security - Specialty

The AWS Certified security Specialty exam validates technical skills and experience in securing and hardening workloads and architectures on the AWS platform. Attendees with two or more years of hands-on experience designing and deploying cloud architecture on AWS should join this half-day, course to lea> how to prepare and succeed in the exam. We ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


Security Engineering on AWS - for APN partners

This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also lea> how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security in ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


RH363 - Red Hat security: Identity Management and Active Directory Integration with exam

Red Hat security: Identity Management and Active Directory Integration with exam (RH363) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux. This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directo ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.

Počet nalezených kurzů : 885

Kurzy : << | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 75| >>
Zobrazit jako: Table Tabulka termínů kurzů (network security hacking v praxi)

Celkem nalezeno kurzů, školení a/nebo rekvalifikací : 885


Nenašli jste kurz? Zkuste zadat jednoduché klíčové slovo, nezadávejte frázi nebo skloňování a zkontrolujte diakritiku
Seznam kurzůHledat kurzy po jednotlivých klíčových slovech:



| networ| securi| hackin| prax
  • Hledáno: network security hacking v praxi - kurz musí obsahovat všechna hledaná slova
  • Vyzkoušejte také: nové hledání kurzu: network security hacking v praxi - můžete vybrat kurz network security hacking v praxi - podle regionu, akreditace a nebo termínu školení: network security hacking v praxi [NEW]





  •  
    RSS
    RSS - odběr novinek - nové kurzy, rekvalifikace a školení
    Nové kurzy/školení | Nové termíny kurzů/školení | Last-Minute | Odběr novinek na Váš mail
    skoleni-kurzy.eu

    SKOLENI-KURZY.EU



    REGIONY



    MENU



    KONTAKT


    skoleni-kurzy.eu
    2007 - 2024 © OBEC.net, sro
    Potoční 8, 617 00 Brno, CZ
    Email: info[at]skoleni-kurzy.eu
    Telefon:(+420) 775 193 488
    Fax:
    Kontakt

    +



    +




    V případě dotazu ke kurzu využijte prosím kontaktní formulář u daného konkrétního kurzu





    Školení: Základy podnikání online kurz v květnu 2024 - on-line
    ^