logo skoleni-kurzy

ŠKOLENÍ: & STUDIU EX415 # HLEDÁM NEJLEPŠÍ ŠKOLENÍ NEBO SEMINÁŘE | HLEDÁ KURZ: OR STUDIU EX415 POUZE V NÁZVU KURZU


skoleni-kurzy.eu




Podrobné hledání kurzů, školení a rekvalifikací


Or studiu ex415 | do 10 dnů | do 30 dnů



skoleni-kurzy.eu

[skoleni-kurzy.eu] Zde najdete různé kurzy, školení, semináře a rekvalifikační kurzy z různých oborů.

Nenašli jste kurz, školení a/nebo seminář?

Pošlete nám nezávaznou poptávku po kurzu a my se ho pokusíme najít a pošleme Vám kontakt na vzdělávací firmu a/nebo Vaši poptávku kurzu zveřejníme v seznamu poptávek.

Registrace školící firmy

Jste školící firma, vzdělávací instituce a/nebo pořádáte školení, kurzy, rekvalifikační semináře? Zaregistrujte svoji firmu na serveru a zvyšte počet svých klientů.
 

Náhodný kurz/školení


Microsoft 365 Copilot - AbecedaPC
Kurz Microsoft 365 Copilot probíhá v malé skupině účastníků. Kurzu Microsoft 365 Copilot se účastní maximálně 8 osob.

^

 

 

Viz také následující kurzy :
Další zlevněné kurzy

SLEVA 15 % na kurz Individuální online kurz MS PowerPoint - LastMinute' - Praha - - využít slevu lze pouze do 31.12.2024

Výpis školení a/nebo kurzů podle klíčového slova: or studiu or ex415 - pouze v názvu kurzu hledá aspoň jedno klíčové slovo [OR]

Hledáno v oborech jednotlivých školení: or studiu or ex415

Nenalezeno # or studiu or ex415

Hledáno ve školících firmách: or studiu or ex415


   AHA PR Agency, s.r.o.AHA PR Agency, s.r.o. (odkaz na termíny kurzů)
   Vzdělávací studio Argos - Kurzy stříhání a kosmetická úprava psůVzdělávací studio Argos - Kurzy stříhání a kosmetická úprava psů (odkaz na termíny kurzů)
   EGALITÉ, spol. s r.o.EGALITÉ, spol. s r.o. (odkaz na termíny kurzů)

Hledat or studiu or ex415 včetně termínů školení nebo hledat i v kurzech bez termínu or studiu or ex415

Hledáno v názvu kurzu/školení: or studiu or ex415


Počet nalezených kurzů : 2351

Kurzy : << | 1 | 2 | 3 | 4 | 5 | 75 | 150 | 225| >>


EX413 - Red Hat Certified Specialist in Server Security and Hardening Exam

Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


EX413 - Red Hat Certified Specialist in Server Security and Hardening Exam

Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


EX415 - Red Hat Certified Specialist in Security: Linux exam

Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login polic * for this exam These audiences may be interested in becoming a Red Hat Certified Specialist in Security: Linux: System administrators responsible for managing large enterprise environments System administrators responsible for securing their organization s infrastructure Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential Prerequisites for this exam Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux exam objectives or have comparable work experience using Red Hat OpenStack Platform. Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login policy. Modify PAM configuration files and parameters. Configure system auditing Write rules to log auditable events. Enable prepackaged rules. Produce audit reports. Configure SELinux Enable SELinux on a host running a simple application. Interpret SELinux violations and determine remedial action. Restrict user activity with SELinux user mappings. Analyze and correct existing SELinux configurations. Enforce security compliance Install OpenSCAP and Workbench. Use OpenSCAP and Red Hat Insights to scan hosts for security compliance. Use OpenSCAP Workbench to tailor policy. Use OpenSCAP Workbench to scan an individual host for security compliance. Use Red Hat Satellite server to implement an OpenSCAP policy. Apply OpenSCAP remediation scripts to hosts. As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Prerequisites Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux e ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


EX413 - Red Hat Certificate of Expertise in Server Hardening Exam

Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


EX415K - Red Hat Certified Specialist in Security: Linux exam

Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login polic * for this exam These audiences may be interested in becoming a Red Hat Certified Specialist in Security: Linux: System administrators responsible for managing large enterprise environments System administrators responsible for securing their organization s infrastructure Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential Prerequisites for this exam Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux exam objectives or have comparable work experience using Red Hat OpenStack Platform. Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login policy. Modify PAM configuration files and parameters. Configure system auditing Write rules to log auditable events. Enable prepackaged rules. Produce audit reports. Configure SELinux Enable SELinux on a host running a simple application. Interpret SELinux violations and determine remedial action. Restrict user activity with SELinux user mappings. Analyze and correct existing SELinux configurations. Enforce security compliance Install OpenSCAP and Workbench. Use OpenSCAP and Red Hat Insights to scan hosts for security compliance. Use OpenSCAP Workbench to tailor policy. Use OpenSCAP Workbench to scan an individual host for security compliance. Use Red Hat Satellite server to implement an OpenSCAP policy. Apply OpenSCAP remediation scripts to hosts. As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Prerequisites Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux e ...

INFO:   Podrobnosti ke kurzu, školení - DataScript s.r.o.


Kurz Oracle ADO.NET XML Visual Studio 2019

Kurz Oracle ADO.NET XML Visual Studio 2019 ukáže možnosti ADO.NET a XML pro Oracle Database, používá se v Visual Studio 2019 ...

INFO:   Podrobnosti ke kurzu, školení - David Solnař


Jak ověřit soulad zákona o kybernetické bezpečnosti v organizaci – případová studie

Pro začátečníky - mírně pokročilé. Určeno pro Seminář je určený pro interní auditory a vedoucí útvarů interních auditů v organizacích, kteří v rámci své činnosti zajišťují audity kybernetické bezpečnosti dle zákona č. 181 - 2014 Sb., resp. vyhlášky č. 82 - 2018 Sb. Cíl semináře Cílem semi ...

INFO:   Podrobnosti ke kurzu, školení - Český institut interních auditorů, z.s.


Audit systému řízení bezpečnosti informací v organizaci – případová studie

Pro začátečníky - mírně pokročilé. Určeno pro Seminář je určený pro interní auditory a vedoucí útvarů interních auditů v organizacích, kteří v rámci své činnosti zajišťují audity systému řízení bezpečnosti informací. Cíl semináře Cílem semináře je seznámit účastníky s praktickými poznatky z realizace auditů systému řízení bezpečnosti informac ...

INFO:   Podrobnosti ke kurzu, školení - Český institut interních auditorů, z.s.


REALIZACE AUDITU ŘÍZENÍ RIZIK V ORGÁNU VEŘEJNÉ SPRÁVY – PŘÍPADOVÁ STUDIE

Pro začátečníky - mírně pokročilé Určeno pro Webinář je určen pro interní auditory a vedoucí útvarů interních auditů, kteří plánují realizovat audit systému řízení rizik v orgánu veřejné správy. Cíl semináře Cílem webináře je seznámit účastníky s postupem realizace systémového auditu zaměřeného na řízení rizik a praktickými poznatky pro jeho ...

INFO:   Podrobnosti ke kurzu, školení - Český institut interních auditorů, z.s.


Přiznání k dani z příjmů neziskové organizace za rok 2024 (pravidla + příklady + případová studie)

Jak posoudit výnosy a náklady v neziskové organizaci a jak vyplnit přiznání k dani z příjmů za rok 2024. Na kurzu si stručně zopakujete platnou právní úpravu daně z příjmů pro neziskové organizace a z praktických příkladů a zkušeností zjistíte, jak se tyto předpisy promítají do praxe neziskových organizací. Vyzkoušíte si připravit a vyplnit přiznání k dani z příjmů neziskové organizace. * Shrnutí a procvičení postupů týkajících se daně z příjmů neziskové organizace a příprava a sestavení přiznání k dani z příjmů. Shrnutí aktuální právní úpravy: • definice veřejně prospěšného poplatníka, • předmět daně z příjmů, • osvobození od daně z příjmů, • osvobození bezúplatných příjmů od daně z příjmů, • práce s přijatými dary, • snížení základu daně. Řešení případové studie s údaji o výnosech a nákladech neziskové organizace (údaje z účetnictví). Ta bude společně řešena nejdříve formou přípravy podkladů pro DPPO, tedy sestavení podkladu, který je dostatečný pro doložení výpočtu daňové povinnosti. Následně budou vyplněny formuláře pro přiznání k DPPO. Případová studie bude řešena pro různé druhy neziskových organizací. Odpovědi na dotazy. ...


^

INFO:   Podrobnosti ke kurzu, školení - 1. VOX s.r.o.

Počet nalezených kurzů : 2351

Kurzy : << | 1 | 2 | 3 | 4 | 5 | 75 | 150 | 225| >>
Zobrazit jako: Table Tabulka termínů kurzů (or studiu or ex415)

Celkem nalezeno kurzů, školení a/nebo rekvalifikací : 2351


Nenašli jste kurz? Zkuste zadat jednoduché klíčové slovo, nezadávejte frázi nebo skloňování a zkontrolujte diakritiku
Seznam kurzůHledat kurzy po jednotlivých klíčových slovech:
  • or studiu or ex415 Pro více slov: musí najít všechna [AND]
  • or studiu or ex415 hledá i v kurzech bez termínu a hledá pouze v názvu kurzu aspoň jedno klíčové slovo [OR]




| studi| ex41
  • Hledáno: or studiu or ex415 - kurz musí obsahovat všechna hledaná slova
  • Vyzkoušejte také: nové hledání kurzu: or studiu or ex415 - můžete vybrat kurz or studiu or ex415 - podle regionu, akreditace a nebo termínu školení: or studiu or ex415 [NEW]

    Nenašli jste kurz, školení, studium a/nebo seminář?


    Pošlete nám nezávaznou poptávku po školení a nebo kurzu a my ji zveřejníme na stránkách serveru skoleni-kurzy.eu. Možnost odpovědět na danou poptávku mají pouze registrované školící firmy na serveru skoleni-kurzy.eu .



    Seznam článků (doporučení)

  •  
    RSS
    RSS - odběr novinek - nové kurzy, rekvalifikace a školení
    Nové kurzy/školení | Nové termíny kurzů/školení | Last-Minute | Odběr novinek na Váš mail
    skoleni-kurzy.eu

    SKOLENI-KURZY.EU



    REGIONY



    MENU



    KONTAKT


    skoleni-kurzy.eu
    2007 - 2024 © OBEC.net, sro
    Potoční 8, 617 00 Brno, CZ
    Email: info[at]skoleni-kurzy.eu
    Telefon:(+420) 775 193 488
    Fax:
    Kontakt

    +



    +




    V případě dotazu ke kurzu využijte prosím kontaktní formulář u daného konkrétního kurzu





    Školení: Základy vázání kytic v lednu 2025 - Praha 2
    ^