logo skoleni-kurzy

ŠKOLENÍ: SECURITY # HLEDÁM NEJLEPŠÍ ŠKOLENÍ NEBO SEMINÁŘE STRANA 3 | HLEDÁ KURZ: SECURITY POUZE V NÁZVU KURZU | VŠECHNY KURZY


skoleni-kurzy.eu




Podrobné hledání kurzů, školení a rekvalifikací


Security | do 10 dnů | do 30 dnů



skoleni-kurzy.eu

[skoleni-kurzy.eu] Zde najdete různé kurzy, školení, semináře a rekvalifikační kurzy z různých oborů.

Nenašli jste kurz, školení a/nebo seminář?

Pošlete nám nezávaznou poptávku po kurzu a my se ho pokusíme najít a pošleme Vám kontakt na vzdělávací firmu a/nebo Vaši poptávku kurzu zveřejníme v seznamu poptávek.

Registrace školící firmy

Jste školící firma, vzdělávací instituce a/nebo pořádáte školení, kurzy, rekvalifikační semináře? Zaregistrujte svoji firmu na serveru a zvyšte počet svých klientů.
 

Náhodný kurz/školení


Strážný Akreditovaný rekvalifikační kurz - KUSTOD
Kurz je určen pro zájemce o práci v bezpečnostních a hlídacích agenturách. Kurz je podmínkou k výkonu práce strážného.

^

 

 

Viz také následující kurzy :
Další zlevněné kurzy

SLEVA 20 % na kurz Základy aranžování květin – tvorba květinové aranže - LastMinute' - Praha 2 - - využít slevu lze pouze do 30.4.2024

Výpis školení a/nebo kurzů podle klíčového slova: security - pouze v názvu kurzu hledá všechna klíčová slova [AND]

Hledáno v názvu kurzu/školení: security


Počet nalezených kurzů : 37

Kurzy : << | 1 | 2 | 3 | 4| >>


RH415 - Red Hat security: Linux in Physical, Virtual, and Cloud

Red Hat security: Linux in Physical, Virtual, and Cloud (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights. Maintaining security of computing systems is ...


^

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


DO425 - Red Hat security: securing Containers and OpenShift

Lea> to mitigate and manage threats to OpenShift container-based infrastructure Red Hat security: securing Containers and OpenShift (DO425) is designed to help infrastructure administrators and security professionals lea> to identity and mitigate threats to OpenShift container-based infrastructure. The curriculum also covers how to implement and manage secure architecture, policies, and procedures for mode> containerized applications and software-defined networking. This course is based on R ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


DO426 - Red Hat security: securing Containers and OpenShift with exam

Red Hat security: securing Containers and OpenShift with exam (DO426) is bundle is a combination of the following: DO425 - Red Hat security: securing Containers and OpenShift EX425 - Red Hat Certified Specialist in security: Containers and OpenShift Container Platform exam ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


EX425 - Red Hat Certified Specialist in security: Containers and OpenShift Container Platform exam

Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set Configure security context constraints Use trusted registries Load images into a registry Query images in a registry Work with trusted container images Identify a trusted container image Sign images View signed images Scan images Load signed images into a registry Build secure container images Perform simple S2I builds Implement S2I bui * System administrators or developers who want to demonstrate their ability to properly secure containers System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform Red Hat Certified Engineers who wish to become Red Hat Certified Architects Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set Configure security context constraints Use trusted registries Load images into a registry Query images in a registry Work with trusted container images Identify a trusted container image Sign images View signed images Scan images Load signed images into a registry Build secure container images Perform simple S2I builds Implement S2I build hooks Automate builds using Jenkins Automate scanning and code validations as part of the build process Control access to OpenShift Container Platform clusters Configure users with different permission levels, access, and bindings Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication Query users and groups in IdM Log into OpenShift Container Platform using an IdM managed account Configure single sign-on (SSO) Install SSO authentication Configure OpenShift Container Platform to use SSO Integrate web applications with SSO Automate policy-based deployments Configure policies to control the use of images and registries Use secrets to provide access to external registries Automatically pull and use images from a registry Use triggers to verify that automated deployments work Manage orchestration Restrict nodes on which containers may run Use quotas to limit resource utilization Use secrets to automate access to resources Configure network isolation Create software-defined networks (SDN) Associate containers and projects with SDNs Configure and manage secure container storage Configure and secure file-based container storage Configure and secure block-based container storage As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central . Red Hat does not authorize e ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


Security Fundamentals Online

This self-paced course is designed to introduce you to fundamental cloud computing and AWS security concepts including AWS access control and management, governance, logging, and encryption methods. It also covers security-related compliance protocols and risk management strategies, as well as procedures related to auditing your AWS security infrastructure. Start the online class Audience This course is intended for: IT business-level users and professionals interested in cloud s ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


RH416 - Red Hat security: Linux in Physical, Virtual, and Cloud with exam

Red Hat security: Linux in Physical, Virtual, and Cloud with exam (RH416) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances. This course is based on Red Hat Enterpri ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


AWS security Essentials

This course is intended for: IT business-level professionals interested in cloud security practices security professionals with minimal working knowledge of AWS Course Objectives In this course, you will lea> to: Identify security benefits and responsibilities when using the AWS Cloud Describe the access control and management feat ...


INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


Exam Readiness: AWS Certified security - Specialty

The AWS Certified security Specialty exam validates technical skills and experience in securing and hardening workloads and architectures on the AWS platform. Attendees with two or more years of hands-on experience designing and deploying cloud architecture on AWS should join this half-day, course to lea> how to prepare and succeed in the exam. We ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


Security Engineering on AWS - for APN partners

This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also lea> how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security in ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


RH363 - Red Hat security: Identity Management and Active Directory Integration with exam

Red Hat security: Identity Management and Active Directory Integration with exam (RH363) provides the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat® Enterprise Linux. This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directo ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


Vybraná aktuální témata v interním auditu pro rok 2021: SWIFT Customer security Programme a Efektivní Interní audit – automatizace a GRC nástroje

SWIFT Customer security Programme V reakci na stávající výzvy v oblasti rizik a kybernetické bezpečnosti sestavila společnost SWIFT (Společnost pro celosvětovou mezibankovní finanční telekomunikaci) komplexní soubor pravidel a požadavků, které by měly aktivně podporovat zákazníky v boji proti kybernetickým útokům. Díky dlouhodobé spolupráci se spo ...

INFO:   Podrobnosti ke kurzu, školení - Český institut interních auditorů, z.s.

Počet nalezených kurzů : 37

Kurzy : << | 1 | 2 | 3 | 4| >>
Zobrazit jako: Table Tabulka termínů kurzů (security)

Celkem nalezeno kurzů, školení a/nebo rekvalifikací : 37


Nenašli jste kurz? Zkuste zadat jednoduché klíčové slovo, nezadávejte frázi nebo skloňování a zkontrolujte diakritiku
Seznam kurzůHledat kurzy po jednotlivých klíčových slovech:
  • securi (hledá i v popisu kurzu)
  • security Pro více slov: musí najít všechna [AND]
  • security hledá i v kurzech bez termínu a hledá pouze v názvu kurzu aspoň jedno klíčové slovo [OR]




| securi
  • Hledáno: security - kurz musí obsahovat všechna hledaná slova
  • Vyzkoušejte také: nové hledání kurzu: security - můžete vybrat kurz security - podle regionu, akreditace a nebo termínu školení: security [NEW]





  •  
    RSS
    RSS - odběr novinek - nové kurzy, rekvalifikace a školení
    Nové kurzy/školení | Nové termíny kurzů/školení | Last-Minute | Odběr novinek na Váš mail
    skoleni-kurzy.eu

    SKOLENI-KURZY.EU



    REGIONY



    MENU



    KONTAKT


    skoleni-kurzy.eu
    2007 - 2024 © OBEC.net, sro
    Potoční 8, 617 00 Brno, CZ
    Email: info[at]skoleni-kurzy.eu
    Telefon:(+420) 775 193 488
    Fax:
    Kontakt

    +



    +




    V případě dotazu ke kurzu využijte prosím kontaktní formulář u daného konkrétního kurzu





    Školení: Kurz DB2 UDB administrace v květnu 2024 - Praha,Ostrava
    ^