Hledat školení | Registrace Školícího střediska |
Kalendář | Poptávky | Komentáře | Přihlásit se |
---|
skoleni-kurzy.eu[skoleni-kurzy.eu] Zde najdete různé kurzy, školení, semináře a rekvalifikační kurzy z různých oborů.Nenašli jste kurz, školení a/nebo seminář?Pošlete nám nezávaznou poptávku po kurzu a my se ho pokusíme najít a pošleme Vám kontakt na vzdělávací firmu a/nebo Vaši poptávku kurzu zveřejníme v seznamu poptávek.Registrace školící firmyJste školící firma, vzdělávací instituce a/nebo pořádáte školení, kurzy, rekvalifikační semináře? Zaregistrujte svoji firmu na serveru a zvyšte počet svých klientů.Náhodný kurz/školeníDaň z příjmů fyzických osob aktuálně a očekávané změny pro rok 2025 – speciálka - 1. VOX s.r.o. Na semináři si prohloubíte znalosti o dani z příjmů a seznámíte se s očekávanými změnami pro rok 2025, v podobě známé k datu konání. Současně budete mít dostatečný prostor pro diskuzi, řešení konkrétních dotazů a příležitost k výměně zkušeností. ^
Další zlevněné kurzy |
Výpis školení a/nebo kurzů podle klíčového slova: oscp offensive security certified professional - pouze v názvu kurzu hledá aspoň jedno klíčové slovo [OR]Hledáno v oborech jednotlivých školení: oscp offensive security certified professionalZkouška Red Hat Certified System Administrator Hledáno ve školících firmách: oscp offensive security certified professionalAbecedaPC (odkaz na termíny kurzů) AMOS Software, spol. s.r.o. (odkaz na termíny kurzů) PC-DIR Real, s.r.o. (odkaz na termíny kurzů) Security System (odkaz na termíny kurzů) SCOMP (odkaz na termíny kurzů) Hledáno v názvu kurzu/školení: oscp offensive security certified professionalPočet nalezených kurzů : 368 AWS Certification Exam Readiness Workshop: AWS Certified Solutions Architect – ProfessionalThe AWS Certified Solutions Architect – Professional exam validates advanced technical skills and experience in designing distributed applications and systems on the AWS platform. In this full-day advanced workshop, you will lea> how to prepare and succeed in the exam. We will explore the exam’s topic areas, mapping to architecting on AWS and to specific areas to study. We will review sample exam questions in each topic area, teaching you how to interpret the concepts being tested so that you c ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Zabbix Certified ProfessionalProhlubte své znalosti o Zabbixu a mějte pod kontrolou firemní síť i aplikace. Školení je realizováno na poslední stabilní verzi Zabbix 6.0 LTS. Součástí školení je certifikační zkouška, která probíhá na závěr školení, je teoretická a trvá 75 minut. Každý účastník dostane osvědčení o absolvování kurzu Zabbix 7.0. Po úspěšném složení zkoušky získáte certifikát Zabbix 7.0 Certified Professional. Cílová skupina Systémoví administrátoři, kteří chtějí rozšířit svoje znalosti produktu ...
^
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Professional Scrum Master - Certification Course Tento kurz je dostupný jak v českém, tak anglickém jazyce. Certifikační test je v angličtině. Professional Scrum Master I Certification Course je 2-denní intenzivní kurz nabitý náročnými cvičeními a následnými diskuzemi. Tento kurz slouží především jako teoretická příprava pro úspěšné složení certifikačního testu Professional Scrum Master I od společnosti scrum.org. Kurz je vhodný především pro ty, kteří se Scrumem, čí agilním vývojem, již zkušenosti mají a rádi by svoje ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Exam Readiness: AWS Certified DevOps Engineer – ProfessionalThe AWS Certified DevOps Engineer – Professional exam validates technical expertise in provisioning, operating, and managing distributed application systems on the AWS platform. Join this full-day, advanced-level course to lea> how to prepare for the exam by exploring the exam’s topic areas and how they map to DevOps on AWS and to specific areas to study. We will review sample exam questions in each topic area and teach you how to interpret the concepts being tested so that you can more easily ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Professional Scrum Master® certifikační kurzKurz slouží jako ověření znalostí o agilním vývoji software a Scrumu. Je určen komukoliv, kdo se účastní vývoje software, ať už jako člen vývojového týmu nebo na straně byznysu. Obsah kurzu Během prvního dne proběhne teoretická příprava (avšak pomocí praktických cvičení, žádné nudné slajdy) a oživení znalostí frameworku Scrum. Dozvíte se vše ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX413 - Red Hat Certified Specialist in Server Security and Hardening ExamStudy points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX413 - Red Hat Certified Specialist in Server Security and Hardening ExamStudy points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX415 - Red Hat Certified Specialist in Security: Linux examStudy points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login polic * for this exam These audiences may be interested in becoming a Red Hat Certified Specialist in Security: Linux: System administrators responsible for managing large enterprise environments System administrators responsible for securing their organization s infrastructure Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential Prerequisites for this exam Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux exam objectives or have comparable work experience using Red Hat OpenStack Platform. Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login policy. Modify PAM configuration files and parameters. Configure system auditing Write rules to log auditable events. Enable prepackaged rules. Produce audit reports. Configure SELinux Enable SELinux on a host running a simple application. Interpret SELinux violations and determine remedial action. Restrict user activity with SELinux user mappings. Analyze and correct existing SELinux configurations. Enforce security compliance Install OpenSCAP and Workbench. Use OpenSCAP and Red Hat Insights to scan hosts for security compliance. Use OpenSCAP Workbench to tailor policy. Use OpenSCAP Workbench to scan an individual host for security compliance. Use Red Hat Satellite server to implement an OpenSCAP policy. Apply OpenSCAP remediation scripts to hosts. As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Prerequisites Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux e ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX425 - Red Hat Certified Specialist in Security: Containers and OpenShift Container Platform examStudy points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set Configure security context constraints Use trusted registries Load images into a registry Query images in a registry Work with trusted container images Identify a trusted container image Sign images View signed images Scan images Load signed images into a registry Build secure container images Perform simple S2I builds Implement S2I bui * System administrators or developers who want to demonstrate their ability to properly secure containers System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform Red Hat Certified Engineers who wish to become Red Hat Certified Architects Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set Configure security context constraints Use trusted registries Load images into a registry Query images in a registry Work with trusted container images Identify a trusted container image Sign images View signed images Scan images Load signed images into a registry Build secure container images Perform simple S2I builds Implement S2I build hooks Automate builds using Jenkins Automate scanning and code validations as part of the build process Control access to OpenShift Container Platform clusters Configure users with different permission levels, access, and bindings Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication Query users and groups in IdM Log into OpenShift Container Platform using an IdM managed account Configure single sign-on (SSO) Install SSO authentication Configure OpenShift Container Platform to use SSO Integrate web applications with SSO Automate policy-based deployments Configure policies to control the use of images and registries Use secrets to provide access to external registries Automatically pull and use images from a registry Use triggers to verify that automated deployments work Manage orchestration Restrict nodes on which containers may run Use quotas to limit resource utilization Use secrets to automate access to resources Configure network isolation Create software-defined networks (SDN) Associate containers and projects with SDNs Configure and manage secure container storage Configure and secure file-based container storage Configure and secure block-based container storage As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central . Red Hat does not authorize e ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Exam Readiness: AWS Certified Security - SpecialtyThe AWS Certified Security Specialty exam validates technical skills and experience in securing and hardening workloads and architectures on the AWS platform. Attendees with two or more years of hands-on experience designing and deploying cloud architecture on AWS should join this half-day, course to lea> how to prepare and succeed in the exam. We ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Počet nalezených kurzů : 368
Celkem nalezeno kurzů, školení a/nebo rekvalifikací : 368
Nenašli jste kurz? Zkuste zadat jednoduché klíčové slovo, nezadávejte frázi nebo skloňování a zkontrolujte diakritiku Hledat kurzy po jednotlivých klíčových slovech:
| osc| offensi| securi| certifi| professio Nenašli jste kurz, školení, studium a/nebo seminář?Pošlete nám nezávaznou poptávku po školení a nebo kurzu a my ji zveřejníme na stránkách serveru skoleni-kurzy.eu. Možnost odpovědět na danou poptávku mají pouze
registrované školící firmy na serveru skoleni-kurzy.eu .
Seznam článků (doporučení)
|