Hledat školení | Registrace Školícího střediska |
Kalendář | Poptávky | Komentáře | Přihlásit se |
---|
skoleni-kurzy.eu[skoleni-kurzy.eu] Zde najdete různé kurzy, školení, semináře a rekvalifikační kurzy z různých oborů.Nenašli jste kurz, školení a/nebo seminář?Pošlete nám nezávaznou poptávku po kurzu a my se ho pokusíme najít a pošleme Vám kontakt na vzdělávací firmu a/nebo Vaši poptávku kurzu zveřejníme v seznamu poptávek.Registrace školící firmyJste školící firma, vzdělávací instituce a/nebo pořádáte školení, kurzy, rekvalifikační semináře? Zaregistrujte svoji firmu na serveru a zvyšte počet svých klientů.Náhodný kurz/školeníJe možné změnit bydliště dítěte bez souhlasu druhého z rodičů či určit školu? Další zásadní změny v oblastech rodinného práva – novela občanského zákoníku od 1.7. 2025 - Aliaves Co., a.s. Akreditace: MPSV - A2023 - 0806-SP - PC; Rodinné právo v procesních souvislostech (webinář) MV - AK - PV-75 - 2022, Je možné změnit bydliště dítěte bez souhlasu druhého z rodičů či určit školu? Realizace rodičovské odpovědnosti i v procesních souvislostech Cíl semináře Cílem seminá ^
Další zlevněné kurzy |
Výpis školení a/nebo kurzů podle klíčového slova: or studi or determine - hledá všechna klíčová slova [AND]Hledáno v oborech jednotlivých školení: or studi or determineDalší kurzy a školení : Alias Studio
| Bakalářské studium (VŠ)
| Bakalářské studium [VŠ]
| Bc.studium nemovitý majetek - realitní makléř
| Doplnění vzdělání na úroveň studia diplomového a z
| Obecné studijní předpoklady [OSP]
| Ojedinělý zájmový kurz, příprava na studium, večer
| Pomaturitní studium
| Příprava na Testy studijních předpokladů
| Studium k získání pedagogické kvalifikace
| Studium v zahraničí
Hledáno ve školících firmách: or studi or determineHledáno v popisu kurzu/školení: or studi or determineZobrazit jako:
Tabulka termínů kurzů (or studi or determine) Application Setup in Microsoft Dynamics NAV 2009 (MOC80049)This one-and-a-half-day course, Application Setup in Microsoft Dynamics NAV 2009, provides students with the tools to implement and maintain cross-application setup data after the system components are installed. The focus is on the application-oriented work involved in setting up and maintaining company-wide rules, data, and users. * Module 1: Set Up a Company with the RIM Toolkit This module provides individuals in charge of application setup, such as implementation consultants or customer staff, with the tools to set up a new company using the RIM toolkit, in addition to creating new records based on RIM data templates. Lessons Manual Setup vs. RIM, RIM Toolkit Overview, Using the RIM Toolkit, Demonstration: Create a Setup Questionnaire, Demonstration: Initialize a New Company Based on the Setup Questionnaire, Use Data Templates, Migrate Data Module 2: Set Up Number Series This module explains the purpose of number series and how to manually set them up, including how to define number series relationships to use multiple number series on a single number series. Lessons Number Series Module 3: Set Up Journal Templates and Batches This module provides an overview of journal templates and journal batches to explain their purpose and composition. This module also explains how to set up a journal template and demonstrates how to create two journal batches based on one journal template. Lessons Journal Templates, Batches, and Lines, Create Journal Templates and Batches Module 4: Set Up Posting Groups In this module, the three types of posting groups are described and set up, and then the functions of a posting group structure are demonstrated using a posted sales invoice. Lessons Specific Posting Groups, General Posting Groups, General Posting Setup, VAT Posting Groups, VAT Posting Setup, Additional VAT Posting Setup, Procedure: Determine Posting Groups, Demonstration: Post and Review a Sales Transaction Module 5: Set Up Dimensions In this module, all aspects of dimensions are defined and set up, including Dimension Values, Dimension Combinations, Default Dimensions, and Default Dimension Priority. Lessons Dimensions and Dimensions Values, Dimension Types, Dimension Combinations, Default Dimensions, Default Dimension Priority, Demonstration: Work with Default Dimension Priorities Module 6: Manage User Rights and Profiles This module explains the concepts of logins, roles, and permissions, which are critical to managing user rights in Microsoft Dynamics NAV. The module demonstrates central administrator tasks and offers recommendations about how to most effectively secure data in the system with logins for both the RoleTailored client and Classic client. This module also explains how to set up and assign users to profiles for use in the RoleTailored client. Lessons Authentication, Security Setup Overview, Security Sectup for RoleTailored Client, User Profile Setup for the RoleTaloired Client, Demonstration: Create a New Role, Demonstration: Apply SQL Server Security Filters, Security Setup for Classic Client, User-Specific Setup, Active Directory Security Module 7: Set Up and Manage Document Approvals This module is an introduction to process of setting up and managing the document approval system. It covers the general ...
Podrobnosti ke kurzu, školení -
PC-DIR Real, s.r.o.
EX415 - Red Hat Certified Specialist in Security: Linux examStudy points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login polic * for this exam These audiences may be interested in becoming a Red Hat Certified Specialist in Security: Linux: System administrators responsible for managing large enterprise environments System administrators responsible for securing their organization s infrastructure Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential Prerequisites for this exam Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux exam objectives or have comparable work experience using Red Hat OpenStack Platform. Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login policy. Modify PAM configuration files and parameters. Configure system auditing Write rules to log auditable events. Enable prepackaged rules. Produce audit reports. Configure SELinux Enable SELinux on a host running a simple application. Interpret SELinux violations and determine remedial action. Restrict user activity with SELinux user mappings. Analyze and correct existing SELinux configurations. Enforce security compliance Install OpenSCAP and Workbench. Use OpenSCAP and Red Hat Insights to scan hosts for security compliance. Use OpenSCAP Workbench to tailor policy. Use OpenSCAP Workbench to scan an individual host for security compliance. Use Red Hat Satellite server to implement an OpenSCAP policy. Apply OpenSCAP remediation scripts to hosts. As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Prerequisites Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux e ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX294 - Red Hat Certified Engineer (RHCE) exam for Red Hat Enterprise Linux 8Study points for the exam As an RHCE exam candidate, you should be able to handle all responsibilities expected of a Red Hat Certified System Administrator, including these tasks: Be able to perform all tasks expected of a Red Hat Certified System Administrator Understand and use essential tools Operate running systems Configure local storage Create and configure file systems Deploy, configure, and maintain systems Manage users and groups Manage security Understand core components of Ansible Inventories Modules Variables Facts Plays Playbooks Configuration files Install and configure an Ansible control node Install required packages Create a static host inventory file Create a configuration file Configure Ansible managed nodes Create and distribute SSH keys to managed nodes Configure privilege escalatio * Experienced Red Hat Enterprise Linux system administrators seeking validation of their skills or require a certification either by their organization or based on a mandate (DoD 8570 directive) Students who have taken Red Hat System Administration III: Linux Automation (RH294) and are on the path to becoming a Red Hat Certified Engineer (RHCE) Students who are on the path to becoming a Red Hat Certified Architect (RHCA) Systems administrators who want to demonstrate competency in managing multiple systems IT professionals who work in a DevOps environment and want to demonstrate competency in automating part of their workload Red Hat Certified Engineers who are noncurrent or who are about to become noncurrent and wish to recertify as RHCEs Study points for the exam As an RHCE exam candidate, you should be able to handle all responsibilities expected of a Red Hat Certified System Administrator, including these tasks: Be able to perform all tasks expected of a Red Hat Certified System Administrator Understand and use essential tools Operate running systems Configure local storage Create and configure file systems Deploy, configure, and maintain systems Manage users and groups Manage security Understand core components of Ansible Inventories Modules Variables Facts Plays Playbooks Configuration files Install and configure an Ansible control node Install required packages Create a static host inventory file Create a configuration file Configure Ansible managed nodes Create and distribute SSH keys to managed nodes Configure privilege escalation on managed nodes Validate a working configuration using ad hoc Ansible commands Script administration tasks Create simple shell scripts Create simple shell scripts that run ad hoc Ansible commands Create and use static inventories to define groups of hosts Create Ansible plays and playbooks Know how to work with commonly used Ansible modules Use variables to retrieve the results of running a command Use conditionals to control play execution Configure error handling Create playbooks to configure systems to a specified state Use Ansible modules for system administration tasks that work with: Software packages and repositories Services Firewall rules File systems Storage devices File content Archiving Scheduled tasks Security Users and groups Create and use templates to create customized configuration files Work with Ansible variables and facts Create and work with roles Download roles from an Ansible Galaxy and use them Manage parallelism Use Ansible Vault in playbooks to protect sens ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX415K - Red Hat Certified Specialist in Security: Linux examStudy points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login polic * for this exam These audiences may be interested in becoming a Red Hat Certified Specialist in Security: Linux: System administrators responsible for managing large enterprise environments System administrators responsible for securing their organization s infrastructure Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential Prerequisites for this exam Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux exam objectives or have comparable work experience using Red Hat OpenStack Platform. Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login policy. Modify PAM configuration files and parameters. Configure system auditing Write rules to log auditable events. Enable prepackaged rules. Produce audit reports. Configure SELinux Enable SELinux on a host running a simple application. Interpret SELinux violations and determine remedial action. Restrict user activity with SELinux user mappings. Analyze and correct existing SELinux configurations. Enforce security compliance Install OpenSCAP and Workbench. Use OpenSCAP and Red Hat Insights to scan hosts for security compliance. Use OpenSCAP Workbench to tailor policy. Use OpenSCAP Workbench to scan an individual host for security compliance. Use Red Hat Satellite server to implement an OpenSCAP policy. Apply OpenSCAP remediation scripts to hosts. As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Prerequisites Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux e ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Počet nalezených kurzů : 4
Celkem nalezeno kurzů, školení a/nebo rekvalifikací : 4
Nenašli jste kurz? Zkuste zadat jednoduché klíčové slovo, nezadávejte frázi nebo skloňování a zkontrolujte diakritiku Hledat kurzy po jednotlivých klíčových slovech:
| stud| determi Nenašli jste kurz, školení, studium a/nebo seminář?Pošlete nám nezávaznou poptávku po školení a nebo kurzu a my ji zveřejníme na stránkách serveru skoleni-kurzy.eu. Možnost odpovědět na danou poptávku mají pouze
registrované školící firmy na serveru skoleni-kurzy.eu .
Seznam článků (doporučení)
|