logo skoleni-kurzy

ŠKOLENÍ: PRAKTICK�� OCHRANA SERVER�� A S��T�� V PROST��ED�� WINDOWS SERVERWINDOWS SERVER 2008 2012 SECURITY # HLEDÁM NEJLEPŠÍ ŠKOLENÍ NEBO SEMINÁŘE STRANA 8 | HLEDÁ KURZ: PRAKTICK�� OCHRANA SERVER�� A S��T�� V PROST��ED�� WINDOWS SERVERWINDOWS SERVER 2008 2012 SECURITY POUZE V NÁZVU KURZU


skoleni-kurzy.eu




Podrobné hledání kurzů, školení a rekvalifikací


Praktick�� ochrana server�� a s��t�� v prost��ed�� windows serverwindows server 2008 2012 security | do 10 dnů | do 30 dnů



skoleni-kurzy.eu

[skoleni-kurzy.eu] Zde najdete různé kurzy, školení, semináře a rekvalifikační kurzy z různých oborů.

Nenašli jste kurz, školení a/nebo seminář?

Pošlete nám nezávaznou poptávku po kurzu a my se ho pokusíme najít a pošleme Vám kontakt na vzdělávací firmu a/nebo Vaši poptávku kurzu zveřejníme v seznamu poptávek.

Registrace školící firmy

Jste školící firma, vzdělávací instituce a/nebo pořádáte školení, kurzy, rekvalifikační semináře? Zaregistrujte svoji firmu na serveru a zvyšte počet svých klientů.
 

Náhodný kurz/školení


Rozvrhování pracovní doby prakticky Změny u DPP od 1.7.2024 a od 1.1.2025 - 1. VOX a.s.
Seminář se zabývá správným výpočtem mezd, pro který je podstatný harmonogram směn koncipovaný v souladu s právní úpravou. Posluchači budou seznámeni s vyrovnávacím obdobím, kterým mohou být jak násobky týdnů stanovené týdenní pracovní doby, tak měsíce.

^

 

 

Viz také následující kurzy :
Další zlevněné kurzy

SLEVA 10 % na kurz Microsoft Outlook – základní kurz - LastMinute' - online - - využít slevu lze pouze do 4.6.2024

Výpis školení a/nebo kurzů podle klíčového slova: praktick�� ochrana server�� a s��t�� v prost��ed�� windows serverwindows server 2008 2012 security - pouze v názvu kurzu hledá aspoň jedno klíčové slovo [OR]

Hledáno v názvu kurzu/školení: praktick�� ochrana server�� a s��t�� v prost��ed�� windows serverwindows server 2008 2012 security


Počet nalezených kurzů : 9184

Kurzy : << | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 75 | 150 | 225 | 300 | 375 | 450 | 525 | 600 | 675 | 750 | 825 | 900| >>


NSE4 FortiGate security

In this 3-day class, you will lea> how to use basic FortiGate UTM. In interactive labs, you will explore firewall policies, basic VPNs, virus detection, web filtering, application control, user authentication, and more. These administrative fundamentals will provide you with a solid understanding of how to integrate basic network security. Audience Anyone who is responsible for day-to-day management of a FortiGate appliance. You must master this course before attending FortiGate Infrastru ...


INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


RH362 - Red Hat security: Identity Management and Active Directory Integration

This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. Audience Red Hat Certified System Administrator (RHCSA) who wants to lea> how to provision and configure IdM technologies across both Linux and windows applications Identi ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


EX415 - Red Hat Certified Specialist in security: Linux exam

Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login polic * for this exam These audiences may be interested in becoming a Red Hat Certified Specialist in security: Linux: System administrators responsible for managing large enterprise environments System administrators responsible for securing their organization s infrastructure Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential Prerequisites for this exam Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in security: Linux exam objectives or have comparable work experience using Red Hat OpenStack Platform. Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login policy. Modify PAM configuration files and parameters. Configure system auditing Write rules to log auditable events. Enable prepackaged rules. Produce audit reports. Configure SELinux Enable SELinux on a host running a simple application. Interpret SELinux violations and determine remedial action. Restrict user activity with SELinux user mappings. Analyze and correct existing SELinux configurations. Enforce security compliance Install OpenSCAP and Workbench. Use OpenSCAP and Red Hat Insights to scan hosts for security compliance. Use OpenSCAP Workbench to tailor policy. Use OpenSCAP Workbench to scan an individual host for security compliance. Use Red Hat Satellite server to implement an OpenSCAP policy. Apply OpenSCAP remediation scripts to hosts. As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Prerequisites Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in security: Linux e ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


RH415 - Red Hat security: Linux in Physical, Virtual, and Cloud

Red Hat security: Linux in Physical, Virtual, and Cloud (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights. Maintaining security of computing systems is ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


DO425 - Red Hat security: securing Containers and OpenShift

Lea> to mitigate and manage threats to OpenShift container-based infrastructure Red Hat security: securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals lea> to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for mode> containerized applications and software-defined networking. This course is based on R ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


DO426 - Red Hat security: securing Containers and OpenShift with exam

Red Hat security: securing Containers and OpenShift with exam (DO426) is bundle is a combination of the following: DO425 - Red Hat security: securing Containers and OpenShift EX425 - Red Hat Certified Specialist in security: Containers and OpenShift Container Platform exam ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


EX425 - Red Hat Certified Specialist in security: Containers and OpenShift Container Platform exam

Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set Configure security context constraints Use trusted registries Load images into a registry Query images in a registry Work with trusted container images Identify a trusted container image Sign images View signed images Scan images Load signed images into a registry Build secure container images Perform simple S2I builds Implement S2I bui * System administrators or developers who want to demonstrate their ability to properly secure containers System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform Red Hat Certified Engineers who wish to become Red Hat Certified Architects Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set Configure security context constraints Use trusted registries Load images into a registry Query images in a registry Work with trusted container images Identify a trusted container image Sign images View signed images Scan images Load signed images into a registry Build secure container images Perform simple S2I builds Implement S2I build hooks Automate builds using Jenkins Automate scanning and code validations as part of the build process Control access to OpenShift Container Platform clusters Configure users with different permission levels, access, and bindings Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication Query users and groups in IdM Log into OpenShift Container Platform using an IdM managed account Configure single sign-on (SSO) Install SSO authentication Configure OpenShift Container Platform to use SSO Integrate web applications with SSO Automate policy-based deployments Configure policies to control the use of images and registries Use secrets to provide access to external registries Automatically pull and use images from a registry Use triggers to verify that automated deployments work Manage orchestration Restrict nodes on which containers may run Use quotas to limit resource utilization Use secrets to automate access to resources Configure network isolation Create software-defined networks (SDN) Associate containers and projects with SDNs Configure and manage secure container storage Configure and secure file-based container storage Configure and secure block-based container storage As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central . Red Hat does not authorize e ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


Security Fundamentals Online

This self-paced course is designed to introduce you to fundamental cloud computing and AWS security concepts including AWS access control and management, governance, logging, and encryption methods. It also covers security-related compliance protocols and risk management strategies, as well as procedures related to auditing your AWS security infrastructure. Start the online class Audience This course is intended for: IT business-level users and professionals interested in cloud s ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


RH416 - Red Hat security: Linux in Physical, Virtual, and Cloud with exam

Red Hat security: Linux in Physical, Virtual, and Cloud with exam (RH416) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances. This course is based on Red Hat Enterpri ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


Exam Readiness: AWS Certified security - Specialty

The AWS Certified security Specialty exam validates technical skills and experience in securing and hardening workloads and architectures on the AWS platform. Attendees with two or more years of hands-on experience designing and deploying cloud architecture on AWS should join this half-day, course to lea> how to prepare and succeed in the exam. We ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


Security Engineering on AWS - for APN partners

This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also lea> how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security in ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.

Počet nalezených kurzů : 9184

Kurzy : << | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 75 | 150 | 225 | 300 | 375 | 450 | 525 | 600 | 675 | 750 | 825 | 900| >>
Zobrazit jako: Table Tabulka termínů kurzů (praktick�� ochrana server�� a s��t�� v prost��ed�� windows serverwindows server 2008 2012 security)

Celkem nalezeno kurzů, školení a/nebo rekvalifikací : 9184


Nenašli jste kurz? Zkuste zadat jednoduché klíčové slovo, nezadávejte frázi nebo skloňování a zkontrolujte diakritiku
Seznam kurzůHledat kurzy po jednotlivých klíčových slovech:



| praktick| ochran| server| s��t�| prost��ed| window| serverwind| serve| 200| 201| securi
  • Hledáno: praktick�� ochrana server�� a s��t�� v prost��ed�� windows serverwindows server 2008 2012 security - kurz musí obsahovat všechna hledaná slova
  • Vyzkoušejte také: nové hledání kurzu: praktick�� ochrana server�� a s��t�� v prost��ed�� windows serverwindows server 2008 2012 security - můžete vybrat kurz praktick�� ochrana server�� a s��t�� v prost��ed�� windows serverwindows server 2008 2012 security - podle regionu, akreditace a nebo termínu školení: praktick�� ochrana server�� a s��t�� v prost��ed�� windows serverwindows server 2008 2012 security [NEW]





     

    [Rekvalifikační kurzy, školení] Novinky z oblasti vzdělávacích kurzů a školení


    Kurzy | ABRA Flexi
    ***
    kurzy | 2022-06-09 
    Články:Vzdělávání dospělích  Kurzy a akce - kurzy
    Články:Vzdělávání dospělích  Summit Academy RAZU sport kurzy - Pustevny - kurzy
    Články:Vzdělávání dospělích  Kurzy | IES - kurzy
    Články:Vzdělávání dospělích  Kurzy - Curatio - kurzy
    Články:Vzdělávání dospělích  Kurzy - sniper.cz - kurzy
    Články:Vzdělávání dospělích  Kurzy - skoleniproucetniskoleniproucetni - kurzy
    Články:Vzdělávání dospělích  Kurzy Online + E-learning - kurzy
    Články:Vzdělávání dospělích  Kurzy - kurzy
    Články:Vzdělávání dospělích  Online kurzy - kurzy


    Nalezeno celkem : 34 zpráv | aktualizace každou hodinu

    ^



    ^

  •  
    RSS
    RSS - odběr novinek - nové kurzy, rekvalifikace a školení
    Nové kurzy/školení | Nové termíny kurzů/školení | Last-Minute | Odběr novinek na Váš mail
    skoleni-kurzy.eu

    SKOLENI-KURZY.EU



    REGIONY



    MENU



    KONTAKT


    skoleni-kurzy.eu
    2007 - 2024 © OBEC.net, sro
    Potoční 8, 617 00 Brno, CZ
    Email: info[at]skoleni-kurzy.eu
    Telefon:(+420) 775 193 488
    Fax:
    Kontakt

    +



    +




    V případě dotazu ke kurzu využijte prosím kontaktní formulář u daného konkrétního kurzu





    Školení: Kronikářství pro města a obce – aktuální trendy a praxe v červnu 2024 - Praha
    ^