Hledat školení | Registrace Školícího střediska |
Kalendář | Poptávky | Komentáře | Přihlásit se |
---|
skoleni-kurzy.eu[skoleni-kurzy.eu] Zde najdete různé kurzy, školení, semináře a rekvalifikační kurzy z různých oborů.Nenašli jste kurz, školení a/nebo seminář?Pošlete nám nezávaznou poptávku po kurzu a my se ho pokusíme najít a pošleme Vám kontakt na vzdělávací firmu a/nebo Vaši poptávku kurzu zveřejníme v seznamu poptávek.Registrace školící firmyJste školící firma, vzdělávací instituce a/nebo pořádáte školení, kurzy, rekvalifikační semináře? Zaregistrujte svoji firmu na serveru a zvyšte počet svých klientů.Náhodný kurz/školeníPersonalista online (možnost získání profesní kvalifikace s garancí MPSV) - Centrum služeb pro podnikání s.r.o. Cíle kurzu : V tomto online kurzu se naučíte to nejdůležitější z oblasti Personalistiky. Budete vědět – jak získávat nové pracovníky, jak obsazovat pracovní místa, jak plánovat kariéru a vzdělávání, jak řídit, hodnotit a motivovat pracovníky. ^
Další zlevněné kurzy |
Výpis školení a/nebo kurzů podle klíčového slova: exposu - hledá všechna klíčová slova [AND]Hledáno v oborech jednotlivých školení: exposuNenalezeno # exposuHledáno ve školících firmách: exposuHledáno v popisu kurzu/školení: exposuZobrazit jako:
Tabulka termínů kurzů (exposu) Počet nalezených kurzů : 18 Kreditní riziko v bankovním podnikání a jeho řízeníObsah: charakteristika a typologie kreditních rizik, zdroje podstupovaného kreditního rizika [úvěrování, obchodování, vypořádání atd.], organizační uspořádání řízení kreditních rizik, proces poskytování a monitorování úvěrů, měření a sledování kreditního rizika, nástroje snižující kreditní riziko, kreditní deriváty a sekuritizace, riziko protistrany u derivátů a repooperací, angažovanost [large exposure, klasifikace a tvorba opravných položek. Poplatek zahrnuje studijní materiály, občerstvení o přestávkách a oběd při celodenním semináři. Lektor: Mgr. David Zeman, Ph.D. ...
Podrobnosti ke kurzu, školení -
Legendor
EX413 - Red Hat Certified Specialist in Server Security and Hardening ExamStudy points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX225 - Red Hat JBoss Certified Developer examStudy points for the exam Using Red Hat JBoss Enterprise Application Platform and Red Hat JBoss Developer Studio, you should be able to accomplish the tasks below without assistance. The tasks have been grouped into categories to assist your preparation. Configure and create enterprise-ready web projects Configure database connection and persistence details Include existing components and entities Generate views and view beans from entities Choose between war and ear applications Generate the application scaffold Handle web and enterprise application project structures, including possible configuration file locations Generate and deploy the application using maven or JBoss Tools Work with contexts (CDI) Use the best context lifecycle for a given use case Make good use of Conversation by understanding: Context order used by the container to resolve components and contex * Java™ EE application developers Study points for the exam Using Red Hat JBoss Enterprise Application Platform and Red Hat JBoss Developer Studio, you should be able to accomplish the tasks below without assistance. The tasks have been grouped into categories to assist your preparation. Configure and create enterprise-ready web projects Configure database connection and persistence details Include existing components and entities Generate views and view beans from entities Choose between war and ear applications Generate the application scaffold Handle web and enterprise application project structures, including possible configuration file locations Generate and deploy the application using maven or JBoss Tools Work with contexts (CDI) Use the best context lifecycle for a given use case Make good use of Conversation by understanding: Context order used by the container to resolve components and context variables Temporary versus long running Conversation promotion Conversation demarcation and propagation Relation between conversations, transactions, and persistence context flushmode Debugging a CDI application (potentially with Arquillian) Manage context content Work with POJO - JEE components Differences between EJB3-based components and POJO-based components Component definition Apply @Named Configure beans.xml Component lifecycle Component - contexts interaction Use of @Inject Understand interceptors Understand events Use @Alternative Use @Decorator Apply qualifier Apply producer Apply dispose Setting component and context variable in particular context using CDI APIs Implement the observer or observed patte> using CDI Implement a transactional conversation having in mind the relation between conversations, transactions, and persistence context flushmode JAAS security-related features, including (list not exhaustive) authentication restriction security events bind authentication methods Access and manage identity information through API Work with web - JSF components and web navigation Understand Postback lifecycle Use exhaustive navigation capabilities using faces-config Handling of RESTFul approach with JSF2 (viewparam) Use common Richfaces components Configure navigation based on application state Set up JSF input validation Set up JSF input conversion Use Expression Language (EL) Understand message bundle and locales Choose and configure JSF components Efficiently handle exceptions Implement success and error messages ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX450 - Red Hat Certificate of Expertise in Data Virtualization examStudy points for the exam Candidates should be able to perform the tasks listed below: Establish and import data sources Import from Flat File Source locally Import from Flat File Source ftp Import from RDBMS Federate and transform data Use the Teiid Designer wizards to automatically generate data translators Understand and update generated translators Apply simple data transformations such as Type Casting Apply complex transformations inbuilt transformation functions Use the various inbuilt translators VDB Modeling Aggregate different typed data stores to create a federated view including: Files (flat and XML) Multiple, different relational database Implement SQL logic from distinct data stores Understand and implement materialized views Tuning Improve performance by using in mem * Developers and architects who will be responsible for modeling and creating federated views of multiple, different data sources using Red Hat JBoss Data Virtualization Database administrators who may be involved in a project using Red Hat JBoss Data Virtualization to model and create federated views of multiple, different data sources Study points for the exam Candidates should be able to perform the tasks listed below: Establish and import data sources Import from Flat File Source locally Import from Flat File Source ftp Import from RDBMS Federate and transform data Use the Teiid Designer wizards to automatically generate data translators Understand and update generated translators Apply simple data transformations such as Type Casting Apply complex transformations inbuilt transformation functions Use the various inbuilt translators VDB Modeling Aggregate different typed data stores to create a federated view including: Files (flat and XML) Multiple, different relational database Implement SQL logic from distinct data stores Understand and implement materialized views Tuning Improve performance by using in memory cache Use techniques to bypass caches as needed Tune caching behavior for specific requirements Reporting - Data export Create READ procedure expose procedure results as XML or JSON expose data as RestFul services Understand and anticipate performance issues Runtime Package and deploy virtual databases Understand how to use Teiid Designer to control and mange the Data Virtualization runtime Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites There are no prerequisites to take this exam but it is recommended that an individual take Red Hat JBoss Data Virtualization Administration (JB450) training course. Recommended courses JB450 - Red Hat JBoss Data Virtualization Development ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
MOC10989 - Analyzing Data with Power BI This two-day instructor-led course provides students with the knowledge and skills analyze data with Power BI. Audience The primary audience for this course is BI professionals who need to analyze data utilizing Power BI. The secondary audiences for this course are technically proficient business users. ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
MOC20767 - Implementing a SQL Data Warehouse This 5-day instructor led course describes how to implement a data warehouse platform to support a BI solution. Students will lea> how to create a data warehouse with Microsoft® SQL Server® 2016 and with Azure SQL Data Warehouse, to implement ETL with SQL Server Integration Services, and to validate and cleanse data with SQL Server Data Quality Services and SQL Server Master Data Services. Audience The primary audience for this course are database professionals who need to fulfil a Busi ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX413 - Red Hat Certified Specialist in Server Security and Hardening ExamStudy points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
JB183 Red Hat Aplication Development I Helping Java SE developers write Java EE applications. Red Hat Application Development I: Programming in Java EE (JB183) exposes experienced Java Standard Edition (Java SE) developers to the world of Java Enterprise Edition (Java EE). This course is based on Red Hat® Enterprise Application Platform 7.0. In this course, you will lea> about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line a ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX413 - Red Hat Certificate of Expertise in Server Hardening ExamStudy points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
JB184 - Red Hat Application Development I: Programming in Java EE with exam Red Hat Application Development I: Programming in Java EE with exam (JB184) exposes experienced Java Standard Edition (Java SE) developers to the world of Java Enterprise Edition (Java EE). This course is based on Red Hat® Enterprise Application Platform 7.0. This course is a combination of Red Hat JBoss Development I: Java EE (JB183)and Red Hat Certified Enterprise Application Developer Exam (EX183). Audience This course is designed for Java developers who want to ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Počet nalezených kurzů : 18
Celkem nalezeno kurzů, školení a/nebo rekvalifikací : 18
Nenašli jste kurz? Zkuste zadat jednoduché klíčové slovo, nezadávejte frázi nebo skloňování a zkontrolujte diakritiku Hledat kurzy po jednotlivých klíčových slovech:
| expos Nenašli jste kurz, školení, studium a/nebo seminář?Pošlete nám nezávaznou poptávku po školení a nebo kurzu a my ji zveřejníme na stránkách serveru skoleni-kurzy.eu. Možnost odpovědět na danou poptávku mají pouze
registrované školící firmy na serveru skoleni-kurzy.eu .
[Rekvalifikační kurzy, školení] Novinky z oblasti vzdělávacích kurzů a školení
Novinky z oblasti vzdělávacích kurzů a školení [NEWS]
Nové rekvalifikační vzdělávací kurzy a školení [FIRST MINUTE] Poslední hledané kurzy a/nebo školenítrackback , or-sanitářský-kurz-havlíčkův-or-brod , sanitářský kurz havlíčkův OR brod , certifikát pro obsluhu terminálu sazky , certifikát pro obsluhu terminálu sazky , certifikát pro obsluhu terminálu sazky , certifikát pro obsluhu terminálu sazky , trackback , trackback , trackback , trackback , trackback , dermalogica , trackback , trackback , trackback , pedagogické minimum pro OR mateřské OR školy , cukrář cukrářka liberec liberecký , cukrář-cukrářka-liberec-liberecký , Cukrář cukrářka Liberec Liberecký , trackback , trackback , trackback , phdr jan svoboda , sanitářský kurz plzeň , Zákon pohřebnictví zaměřením , zákon pohřebnictví zaměřením , Zákon pohřebnictví zaměřením , trackback , trackback , trackback , or rekvalifikační kurz fitness or trenér , or rekvalifikační kurz fitness or trenér , or-rekvalifikační-kurz-fitness-or-trenér , rekvalifikační kurz fitness OR trenér , dále viz: statistika | Náhodně hledané školení ^ |