logo skoleni-kurzy

ŠKOLENÍ: EXPOSU # HLEDÁM NEJLEPŠÍ ŠKOLENÍ NEBO SEMINÁŘE


skoleni-kurzy.eu




Podrobné hledání kurzů, školení a rekvalifikací


Exposu | do 10 dnů | do 30 dnů



skoleni-kurzy.eu

[skoleni-kurzy.eu] Zde najdete různé kurzy, školení, semináře a rekvalifikační kurzy z různých oborů.

Nenašli jste kurz, školení a/nebo seminář?

Pošlete nám nezávaznou poptávku po kurzu a my se ho pokusíme najít a pošleme Vám kontakt na vzdělávací firmu a/nebo Vaši poptávku kurzu zveřejníme v seznamu poptávek.

Registrace školící firmy

Jste školící firma, vzdělávací instituce a/nebo pořádáte školení, kurzy, rekvalifikační semináře? Zaregistrujte svoji firmu na serveru a zvyšte počet svých klientů.
 

Náhodný kurz/školení


Personalista online (možnost získání profesní kvalifikace s garancí MPSV) - Centrum služeb pro podnikání s.r.o.
Cíle kurzu : V tomto online kurzu se naučíte to nejdůležitější z oblasti Personalistiky. Budete vědět – jak získávat nové pracovníky, jak obsazovat pracovní místa, jak plánovat kariéru a vzdělávání, jak řídit, hodnotit a motivovat pracovníky.

^

 

 

Viz také následující kurzy :
Další zlevněné kurzy

SLEVA 10 % na kurz Kurz Adobe Acrobat – tvorba a úprava PDF dokumentů - LastMinute' - Brno - - využít slevu lze pouze do 13.12.2024

Výpis školení a/nebo kurzů podle klíčového slova: exposu - hledá všechna klíčová slova [AND]

Hledáno v oborech jednotlivých školení: exposu

Nenalezeno # exposu

Hledáno ve školících firmách: exposu



Hledat exposu včetně termínů školení nebo hledat i v kurzech bez termínu exposu

Hledáno v popisu kurzu/školení: exposu


Počet nalezených kurzů : 18

Kurzy : << | 1 | 2| >>


Kreditní riziko v bankovním podnikání a jeho řízení

Obsah: charakteristika a typologie kreditních rizik, zdroje podstupovaného kreditního rizika [úvěrování, obchodování, vypořádání atd.], organizační uspořádání řízení kreditních rizik, proces poskytování a monitorování úvěrů, měření a sledování kreditního rizika, nástroje snižující kreditní riziko, kreditní deriváty a sekuritizace, riziko protistrany u derivátů a repooperací, angažovanost [large exposure, klasifikace a tvorba opravných položek. Poplatek zahrnuje studijní materiály, občerstvení o přestávkách a oběd při celodenním semináři. Lektor: Mgr. David Zeman, Ph.D. ...



EX413 - Red Hat Certified Specialist in Server Security and Hardening Exam

Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


EX225 - Red Hat JBoss Certified Developer exam

Study points for the exam Using Red Hat JBoss Enterprise Application Platform and Red Hat JBoss Developer Studio, you should be able to accomplish the tasks below without assistance. The tasks have been grouped into categories to assist your preparation. Configure and create enterprise-ready web projects Configure database connection and persistence details Include existing components and entities Generate views and view beans from entities Choose between war and ear applications Generate the application scaffold Handle web and enterprise application project structures, including possible configuration file locations Generate and deploy the application using maven or JBoss Tools Work with contexts (CDI) Use the best context lifecycle for a given use case Make good use of Conversation by understanding: Context order used by the container to resolve components and contex * Java™ EE application developers Study points for the exam Using Red Hat JBoss Enterprise Application Platform and Red Hat JBoss Developer Studio, you should be able to accomplish the tasks below without assistance. The tasks have been grouped into categories to assist your preparation. Configure and create enterprise-ready web projects Configure database connection and persistence details Include existing components and entities Generate views and view beans from entities Choose between war and ear applications Generate the application scaffold Handle web and enterprise application project structures, including possible configuration file locations Generate and deploy the application using maven or JBoss Tools Work with contexts (CDI) Use the best context lifecycle for a given use case Make good use of Conversation by understanding: Context order used by the container to resolve components and context variables Temporary versus long running Conversation promotion Conversation demarcation and propagation Relation between conversations, transactions, and persistence context flushmode Debugging a CDI application (potentially with Arquillian) Manage context content Work with POJO - JEE components Differences between EJB3-based components and POJO-based components Component definition Apply @Named Configure beans.xml Component lifecycle Component - contexts interaction Use of @Inject Understand interceptors Understand events Use @Alternative Use @Decorator Apply qualifier Apply producer Apply dispose Setting component and context variable in particular context using CDI APIs Implement the observer or observed patte> using CDI Implement a transactional conversation having in mind the relation between conversations, transactions, and persistence context flushmode JAAS security-related features, including (list not exhaustive) authentication restriction security events bind authentication methods Access and manage identity information through API Work with web - JSF components and web navigation Understand Postback lifecycle Use exhaustive navigation capabilities using faces-config Handling of RESTFul approach with JSF2 (viewparam) Use common Richfaces components Configure navigation based on application state Set up JSF input validation Set up JSF input conversion Use Expression Language (EL) Understand message bundle and locales Choose and configure JSF components Efficiently handle exceptions Implement success and error messages ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


EX450 - Red Hat Certificate of Expertise in Data Virtualization exam

Study points for the exam Candidates should be able to perform the tasks listed below: Establish and import data sources Import from Flat File Source locally Import from Flat File Source ftp Import from RDBMS Federate and transform data Use the Teiid Designer wizards to automatically generate data translators Understand and update generated translators Apply simple data transformations such as Type Casting Apply complex transformations inbuilt transformation functions Use the various inbuilt translators VDB Modeling Aggregate different typed data stores to create a federated view including: Files (flat and XML) Multiple, different relational database Implement SQL logic from distinct data stores Understand and implement materialized views Tuning Improve performance by using in mem * Developers and architects who will be responsible for modeling and creating federated views of multiple, different data sources using Red Hat JBoss Data Virtualization Database administrators who may be involved in a project using Red Hat JBoss Data Virtualization to model and create federated views of multiple, different data sources Study points for the exam Candidates should be able to perform the tasks listed below: Establish and import data sources Import from Flat File Source locally Import from Flat File Source ftp Import from RDBMS Federate and transform data Use the Teiid Designer wizards to automatically generate data translators Understand and update generated translators Apply simple data transformations such as Type Casting Apply complex transformations inbuilt transformation functions Use the various inbuilt translators VDB Modeling Aggregate different typed data stores to create a federated view including: Files (flat and XML) Multiple, different relational database Implement SQL logic from distinct data stores Understand and implement materialized views Tuning Improve performance by using in memory cache Use techniques to bypass caches as needed Tune caching behavior for specific requirements Reporting - Data export Create READ procedure expose procedure results as XML or JSON expose data as RestFul services Understand and anticipate performance issues Runtime Package and deploy virtual databases Understand how to use Teiid Designer to control and mange the Data Virtualization runtime Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites There are no prerequisites to take this exam but it is recommended that an individual take Red Hat JBoss Data Virtualization Administration (JB450) training course. Recommended courses JB450 - Red Hat JBoss Data Virtualization Development ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


MOC10989 - Analyzing Data with Power BI

This two-day instructor-led course provides students with the knowledge and skills analyze data with Power BI. Audience The primary audience for this course is BI professionals who need to analyze data utilizing Power BI. The secondary audiences for this course are technically proficient business users. ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


MOC20767 - Implementing a SQL Data Warehouse

This 5-day instructor led course describes how to implement a data warehouse platform to support a BI solution. Students will lea> how to create a data warehouse with Microsoft® SQL Server® 2016 and with Azure SQL Data Warehouse, to implement ETL with SQL Server Integration Services, and to validate and cleanse data with SQL Server Data Quality Services and SQL Server Master Data Services. Audience The primary audience for this course are database professionals who need to fulfil a Busi ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


EX413 - Red Hat Certified Specialist in Server Security and Hardening Exam

Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


JB183 Red Hat Aplication Development I

Helping Java SE developers write Java EE applications. Red Hat Application Development I: Programming in Java EE (JB183) exposes experienced Java Standard Edition (Java SE) developers to the world of Java Enterprise Edition (Java EE). This course is based on Red Hat® Enterprise Application Platform 7.0. In this course, you will lea> about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line a ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


EX413 - Red Hat Certificate of Expertise in Server Hardening Exam

Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


JB184 - Red Hat Application Development I: Programming in Java EE with exam

Red Hat Application Development I: Programming in Java EE with exam (JB184) exposes experienced Java Standard Edition (Java SE) developers to the world of Java Enterprise Edition (Java EE). This course is based on Red Hat® Enterprise Application Platform 7.0. This course is a combination of Red Hat JBoss Development I: Java EE (JB183)and Red Hat Certified Enterprise Application Developer Exam (EX183). Audience This course is designed for Java developers who want to ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.

Počet nalezených kurzů : 18

Kurzy : << | 1 | 2| >>
Zobrazit jako: Table Tabulka termínů kurzů (exposu)

Celkem nalezeno kurzů, školení a/nebo rekvalifikací : 18


Nenašli jste kurz? Zkuste zadat jednoduché klíčové slovo, nezadávejte frázi nebo skloňování a zkontrolujte diakritiku
Seznam kurzůHledat kurzy po jednotlivých klíčových slovech:
  • expos (hledá i v popisu kurzu)
  • exposu Pro více slov: musí najít všechna [AND]
  • exposu hledá i v kurzech bez termínu a hledá pouze v názvu kurzu aspoň jedno klíčové slovo [OR]




| expos
  • Hledáno: exposu - kurz musí obsahovat všechna hledaná slova
  • Vyzkoušejte také: nové hledání kurzu: exposu - můžete vybrat kurz exposu - podle regionu, akreditace a nebo termínu školení: exposu [NEW]

    Nenašli jste kurz, školení, studium a/nebo seminář?


    Pošlete nám nezávaznou poptávku po školení a nebo kurzu a my ji zveřejníme na stránkách serveru skoleni-kurzy.eu. Možnost odpovědět na danou poptávku mají pouze registrované školící firmy na serveru skoleni-kurzy.eu .




  •  
    RSS
    RSS - odběr novinek - nové kurzy, rekvalifikace a školení
    Nové kurzy/školení | Nové termíny kurzů/školení | Last-Minute | Odběr novinek na Váš mail
    skoleni-kurzy.eu

    SKOLENI-KURZY.EU



    REGIONY



    MENU



    KONTAKT


    skoleni-kurzy.eu
    2007 - 2024 © OBEC.net, sro
    Potoční 8, 617 00 Brno, CZ
    Email: info[at]skoleni-kurzy.eu
    Telefon:(+420) 775 193 488
    Fax:
    Kontakt

    +



    +




    V případě dotazu ke kurzu využijte prosím kontaktní formulář u daného konkrétního kurzu





    Školení: Interní auditor ISO 45001 v prosinci 2024 - Plzeň
    ^