Hledat školení | Registrace Školícího střediska |
Kalendář | Poptávky | Komentáře | Přihlásit se |
---|
skoleni-kurzy.eu[skoleni-kurzy.eu] Zde najdete různé kurzy, školení, semináře a rekvalifikační kurzy z různých oborů.Nenašli jste kurz, školení a/nebo seminář?Pošlete nám nezávaznou poptávku po kurzu a my se ho pokusíme najít a pošleme Vám kontakt na vzdělávací firmu a/nebo Vaši poptávku kurzu zveřejníme v seznamu poptávek.Registrace školící firmyJste školící firma, vzdělávací instituce a/nebo pořádáte školení, kurzy, rekvalifikační semináře? Zaregistrujte svoji firmu na serveru a zvyšte počet svých klientů.Náhodný kurz/školeníÚčetní a daňové aktuality - STUDIO W Na tomto semináři se účastníci seznámí především s novelami daňových zákonů a účetních předpisů, včetně zákonů souvisejících s podnikáním pro rok 2024 - 2025, které k datu uzávěrky katalogu není možné předpokládat Dále budou zařazeny: Aktuální výklady platné legislativy pro rok 2024 No ^
Další zlevněné kurzy |
Výpis školení a/nebo kurzů podle klíčového slova: or counci or certifi or securit or analys - pouze v názvu kurzu hledá aspoň jedno klíčové slovo [OR]Hledáno v oborech jednotlivých školení: or counci or certifi or securit or analysDalší kurzy a školení : Administrátor počítače - certifikovaný rekvalifika
| Certifikované kurzy Adobe
| Certifikované kurzy Corel
| Certifikované kurzy MZ ČR - celoživotní vzdělávání
| Certifikovaný kurz Adobe Photoshop
| Individuální výuka tradičního feng shui s certifik
| Kurzy s certifikací a metodikou FN Brno, které Vám
| Manažer - pracovník obchodu a služeb - certifikova
| NLP - certifikace NLP-Practitioner
| Obsluha CNC obráběcích strojů - certifikovaný prof
| Obsluha osobního počítače - certifikovaný rekvalif
| Operátor Call centra - certifikovaný rekvalifikačn
| Organizačně technický pracovník - certifikovaný re
| Prodavač - certifikovaný profesní rekvalifikační k
| Programátor CNC strojů - certifikovaný rekvalifika
| Programátor internetových aplikací - certifikovaný
| Projektový manažer - certifikovaný rekvalifikační
| Red Hat Certified Engineer Exam
| Red Hat Certified Virtualization Administrator (RH
| Webdesigner / tvorba stránek - certifikovaný rekv
| Zkouška Red Hat Certified System Administrator
| Základy obsluhy osobního počítače - certifikovaný
| Základy podnikání - certifikovaný rekvalifikační k
Hledáno ve školících firmách: or counci or certifi or securit or analysHledáno v názvu kurzu/školení: or counci or certifi or securit or analysPočet nalezených kurzů : 2682 EC-Council Certified Ethical Hacker v13 ELITEEC-Council Certified Ethical Hacker v13 ELITE * Ponořte se do světa kybernetické bezpečnosti s kurzem Certified Ethical Hacker v13. V kurzu pro začínající hackery získáte klíčové dovednosti a aktuální znalosti v prostředí kybernetické bezpečnosti. Školení CEH v13 probíhá podle sestaveného školicího plánu a trvá pět dní, neustále se aktualizuje, aby držel krok s nejnovějšími operačními systémy, exploity, nástroji a technikami. Koncepty obsažené ve vzdělávacím programu jsou rozděleny 50 - 50 mezi šk ...
^
Podrobnosti ke kurzu, školení -
ICT Pro s.r.o. – Kurzy, školení, konzultace ICT a Soft Skills
EX413 - Red Hat Certified Specialist in Server Security and Hardening ExamStudy points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX413 - Red Hat Certified Specialist in Server Security and Hardening ExamStudy points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX415 - Red Hat Certified Specialist in Security: Linux examStudy points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login polic * for this exam These audiences may be interested in becoming a Red Hat Certified Specialist in Security: Linux: System administrators responsible for managing large enterprise environments System administrators responsible for securing their organization s infrastructure Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential Prerequisites for this exam Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux exam objectives or have comparable work experience using Red Hat OpenStack Platform. Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login policy. Modify PAM configuration files and parameters. Configure system auditing Write rules to log auditable events. Enable prepackaged rules. Produce audit reports. Configure SELinux Enable SELinux on a host running a simple application. Interpret SELinux violations and determine remedial action. Restrict user activity with SELinux user mappings. Analyze and correct existing SELinux configurations. Enforce security compliance Install OpenSCAP and Workbench. Use OpenSCAP and Red Hat Insights to scan hosts for security compliance. Use OpenSCAP Workbench to tailor policy. Use OpenSCAP Workbench to scan an individual host for security compliance. Use Red Hat Satellite server to implement an OpenSCAP policy. Apply OpenSCAP remediation scripts to hosts. As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Prerequisites Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux e ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX425 - Red Hat Certified Specialist in Security: Containers and OpenShift Container Platform examStudy points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set Configure security context constraints Use trusted registries Load images into a registry Query images in a registry Work with trusted container images Identify a trusted container image Sign images View signed images Scan images Load signed images into a registry Build secure container images Perform simple S2I builds Implement S2I bui * System administrators or developers who want to demonstrate their ability to properly secure containers System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform Red Hat Certified Engineers who wish to become Red Hat Certified Architects Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set Configure security context constraints Use trusted registries Load images into a registry Query images in a registry Work with trusted container images Identify a trusted container image Sign images View signed images Scan images Load signed images into a registry Build secure container images Perform simple S2I builds Implement S2I build hooks Automate builds using Jenkins Automate scanning and code validations as part of the build process Control access to OpenShift Container Platform clusters Configure users with different permission levels, access, and bindings Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication Query users and groups in IdM Log into OpenShift Container Platform using an IdM managed account Configure single sign-on (SSO) Install SSO authentication Configure OpenShift Container Platform to use SSO Integrate web applications with SSO Automate policy-based deployments Configure policies to control the use of images and registries Use secrets to provide access to external registries Automatically pull and use images from a registry Use triggers to verify that automated deployments work Manage orchestration Restrict nodes on which containers may run Use quotas to limit resource utilization Use secrets to automate access to resources Configure network isolation Create software-defined networks (SDN) Associate containers and projects with SDNs Configure and manage secure container storage Configure and secure file-based container storage Configure and secure block-based container storage As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central . Red Hat does not authorize e ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Exam Readiness: AWS Certified Security - SpecialtyThe AWS Certified Security Specialty exam validates technical skills and experience in securing and hardening workloads and architectures on the AWS platform. Attendees with two or more years of hands-on experience designing and deploying cloud architecture on AWS should join this half-day, course to lea> how to prepare and succeed in the exam. We ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX415K - Red Hat Certified Specialist in Security: Linux examStudy points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login polic * for this exam These audiences may be interested in becoming a Red Hat Certified Specialist in Security: Linux: System administrators responsible for managing large enterprise environments System administrators responsible for securing their organization s infrastructure Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential Prerequisites for this exam Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux exam objectives or have comparable work experience using Red Hat OpenStack Platform. Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login policy. Modify PAM configuration files and parameters. Configure system auditing Write rules to log auditable events. Enable prepackaged rules. Produce audit reports. Configure SELinux Enable SELinux on a host running a simple application. Interpret SELinux violations and determine remedial action. Restrict user activity with SELinux user mappings. Analyze and correct existing SELinux configurations. Enforce security compliance Install OpenSCAP and Workbench. Use OpenSCAP and Red Hat Insights to scan hosts for security compliance. Use OpenSCAP Workbench to tailor policy. Use OpenSCAP Workbench to scan an individual host for security compliance. Use Red Hat Satellite server to implement an OpenSCAP policy. Apply OpenSCAP remediation scripts to hosts. As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Prerequisites Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux e ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Kurz Oracle 12c Security # pro Administrátory, programátoryKurz Oracle 12c Security je určen pro správce Oracle databází, kteří dostali za úkol zajistit Server ze všech možných stran tak, aby se k daným datům nedostali neoprávněné osoby. Dozví se také jak zajistit data na více úrovních tak, aby je nepovolané osoby nemohly použít i v případě prolomení některých z ochran. Kurz obsahuje zabezpečení a šifrování na úrovni dat, tabulek, databází a databázových objektů, na úrovni serveru, na úrovni komunikace s aplikacemi. Věnuje se i auditu bezpečnosti, který se dá využít na nepřetržitý monitoring bezpečnosti. ...
Podrobnosti ke kurzu, školení -
David Solnař
Kurz Oracle 12c/19c Security # pro Administrátory, programátoryKurz Oracle 12c - 19c Security je určen pro správce Oracle databází, kteří dostali za úkol zajistit Server ze všech možných stran tak, aby se k daným datům nedostali neoprávněné osoby. Dozví se také jak zajistit data na více úrovních tak, aby je nepovolané osoby nemohly použít i v případě prolomení některých z ochran. Kurz obsahuje zabezpečení a šifrování na úrovni dat, tabulek, databází a databázových objektů, na úrovni serveru, na úrovni komunikace s aplikacemi. Věnuje se i auditu bezpečnosti, který se dá využít na nepřetržitý monitoring bezpečnosti. ...
Podrobnosti ke kurzu, školení -
David Solnař
Security Operations on AWS Security Operations on AWS demonstrates how to efficiently use AWS security services to stay secure and compliant in the AWS cloud. The course focuses on the AWS-recommended security best practices that you can implement to enhance the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. This course also refers to the common security control objectives ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Počet nalezených kurzů : 2682
Celkem nalezeno kurzů, školení a/nebo rekvalifikací : 2682
Nenašli jste kurz? Zkuste zadat jednoduché klíčové slovo, nezadávejte frázi nebo skloňování a zkontrolujte diakritiku Hledat kurzy po jednotlivých klíčových slovech:
| counc| certif| securi| analy Nenašli jste kurz, školení, studium a/nebo seminář?Pošlete nám nezávaznou poptávku po školení a nebo kurzu a my ji zveřejníme na stránkách serveru skoleni-kurzy.eu. Možnost odpovědět na danou poptávku mají pouze
registrované školící firmy na serveru skoleni-kurzy.eu .
[Rekvalifikační kurzy, školení] Novinky z oblasti vzdělávacích kurzů a školení
Novinky z oblasti vzdělávacích kurzů a školení [NEWS]
Nové rekvalifikační vzdělávací kurzy a školení [FIRST MINUTE] Poslední hledané kurzy a/nebo školeníwx-lt-redirect-php-url-mgclub-org-ua-showthread-php-t-62p-1242viewfull-1 , wx-lt-redirect-php-url-mgclub-org-ua-showthread-php-t-62p-1242viewfull-1 , Licence , UML , ipflearning-org-uk-provident , ipflearning , kadeřnice pardubice , ipflearning , ipflearning , pedagog-volného-času , pedagogicke minimum brno OR hybešova , SEŘIZOVAČ CNC , rekvalifikační kurz asistent OR pedagoga OR svitavy , rekvalifikační kurz asistent OR pedagoga OR svitavy , programování studio , zkušební-testy-otázky-a-odpovědi-sanitář , stavební projektant , stavební-projektant , energ , zedník , projektant tzb , asistent pedagoga hodonín , realtimesystems-com-media-js-netsoltrademark-php-d-fightingirish-com-media-js-netsoltrademark-php-d , Kombinovaný kurz Asistent , Kombinovaný kurz Asistent , asistent-pedagoga-brno-hybesova , asistent pedagoga brno hybesova , Personalistika v praxi , chlaďaře , chlaďaře , chlaďařské-zkou , chlaďařské zkoušky , chlaďařské zkoušky , rekvalifikace bez maturity , or-chlaďa , dále viz: statistika | Náhodně hledané školení ^ |