logo skoleni-kurzy

ŠKOLENÍ: EXPOSURE # HLEDÁM NEJLEPŠÍ ŠKOLENÍ NEBO SEMINÁŘE


skoleni-kurzy.eu




Podrobné hledání kurzů, školení a rekvalifikací


Exposure | do 10 dnů | do 30 dnů



skoleni-kurzy.eu

[skoleni-kurzy.eu] Zde najdete různé kurzy, školení, semináře a rekvalifikační kurzy z různých oborů.

Nenašli jste kurz, školení a/nebo seminář?

Pošlete nám nezávaznou poptávku po kurzu a my se ho pokusíme najít a pošleme Vám kontakt na vzdělávací firmu a/nebo Vaši poptávku kurzu zveřejníme v seznamu poptávek.

Registrace školící firmy

Jste školící firma, vzdělávací instituce a/nebo pořádáte školení, kurzy, rekvalifikační semináře? Zaregistrujte svoji firmu na serveru a zvyšte počet svých klientů.
 

Náhodný kurz/školení


Excel nejen pro účetní prakticky – Power Query - 1. VOX s.r.o.
aneb „Superúčetní“ Ukázat účastníkům kurzu , že kontingenční tabulky již nejsou poslednou metou v novodobých verzích aplikace Microsoft Excel a mají své následníky pro práci s daty – Power Query a Power Pivot, které jsou pro jejich praxi přínosem. Předpokladem aktivní účasti je notebook s

^

 

 

Viz také následující kurzy :
Další zlevněné kurzy

SLEVA 10 % na kurz Microsoft Excel – základní kurz - LastMinute' - Brno - - využít slevu lze pouze do 16.12.2024

Výpis školení a/nebo kurzů podle klíčového slova: exposure - hledá všechna klíčová slova [AND]

Hledáno v oborech jednotlivých školení: exposure

Nenalezeno # exposure

Hledáno ve školících firmách: exposure



Hledat exposure včetně termínů školení nebo hledat i v kurzech bez termínu exposure

Hledáno v popisu kurzu/školení: exposure



Kreditní riziko v bankovním podnikání a jeho řízení

Obsah: charakteristika a typologie kreditních rizik, zdroje podstupovaného kreditního rizika [úvěrování, obchodování, vypořádání atd.], organizační uspořádání řízení kreditních rizik, proces poskytování a monitorování úvěrů, měření a sledování kreditního rizika, nástroje snižující kreditní riziko, kreditní deriváty a sekuritizace, riziko protistrany u derivátů a repooperací, angažovanost [large exposure, klasifikace a tvorba opravných položek. Poplatek zahrnuje studijní materiály, občerstvení o přestávkách a oběd při celodenním semináři. Lektor: Mgr. David Zeman, Ph.D. ...



EX413 - Red Hat Certified Specialist in Server Security and Hardening Exam

Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


MOC10989 - Analyzing Data with Power BI

This two-day instructor-led course provides students with the knowledge and skills analyze data with Power BI. Audience The primary audience for this course is BI professionals who need to analyze data utilizing Power BI. The secondary audiences for this course are technically proficient business users. ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


MOC20767 - Implementing a SQL Data Warehouse

This 5-day instructor led course describes how to implement a data warehouse platform to support a BI solution. Students will lea> how to create a data warehouse with Microsoft® SQL Server® 2016 and with Azure SQL Data Warehouse, to implement ETL with SQL Server Integration Services, and to validate and cleanse data with SQL Server Data Quality Services and SQL Server Master Data Services. Audience The primary audience for this course are database professionals who need to fulfil a Busi ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


EX413 - Red Hat Certified Specialist in Server Security and Hardening Exam

Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


EX413 - Red Hat Certificate of Expertise in Server Hardening Exam

Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


MOCAZ-400 - Microsoft Azure - DevOps

Čtyřdenní kurz připravuje k certifikaci AZ-400 a přináší studentům DevOps základní technické vědomosti o podpoře vývoje v prostředí Azure. Kurz je vhodný jako příprava k získání titulu Microsoft Azure - Expert: Azure DevOps Engineer. ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


Developing Serverless Solutions on AWS

This course gives developers exposure to and practice with best practices for building serverless applications using AWS Lambda and other services in the AWS serverless platform. You’ll use AWS frameworks to deploy a serverless application in hands-on labs that progress from simpler to more complex topics. You will use AWS documentation throughout the course to develop authentic methods for learning and problem-solving beyond the classroom. Audience Developers who have some familiarity with ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.

Počet nalezených kurzů : 8

Kurzy : << | 1| >>
Zobrazit jako: Table Tabulka termínů kurzů (exposure)

Celkem nalezeno kurzů, školení a/nebo rekvalifikací : 8


Nenašli jste kurz? Zkuste zadat jednoduché klíčové slovo, nezadávejte frázi nebo skloňování a zkontrolujte diakritiku
Seznam kurzůHledat kurzy po jednotlivých klíčových slovech:
  • exposu (hledá i v popisu kurzu)
  • exposure Pro více slov: musí najít všechna [AND]
  • exposure hledá i v kurzech bez termínu a hledá pouze v názvu kurzu aspoň jedno klíčové slovo [OR]




| exposu
  • Hledáno: exposure - kurz musí obsahovat všechna hledaná slova
  • Vyzkoušejte také: nové hledání kurzu: exposure - můžete vybrat kurz exposure - podle regionu, akreditace a nebo termínu školení: exposure [NEW]

    Nenašli jste kurz, školení, studium a/nebo seminář?


    Pošlete nám nezávaznou poptávku po školení a nebo kurzu a my ji zveřejníme na stránkách serveru skoleni-kurzy.eu. Možnost odpovědět na danou poptávku mají pouze registrované školící firmy na serveru skoleni-kurzy.eu .




  •  
    RSS
    RSS - odběr novinek - nové kurzy, rekvalifikace a školení
    Nové kurzy/školení | Nové termíny kurzů/školení | Last-Minute | Odběr novinek na Váš mail
    skoleni-kurzy.eu

    SKOLENI-KURZY.EU



    REGIONY



    MENU



    KONTAKT


    skoleni-kurzy.eu
    2007 - 2024 © OBEC.net, sro
    Potoční 8, 617 00 Brno, CZ
    Email: info[at]skoleni-kurzy.eu
    Telefon:(+420) 775 193 488
    Fax:
    Kontakt

    +



    +




    V případě dotazu ke kurzu využijte prosím kontaktní formulář u daného konkrétního kurzu





    Školení: Prodejní firemní stránky bez programování v lednu 2025 - Praha
    ^