Hledat školení | Registrace Školícího střediska |
Kalendář | Poptávky | Komentáře | Přihlásit se |
---|
skoleni-kurzy.eu[skoleni-kurzy.eu] Zde najdete různé kurzy, školení, semináře a rekvalifikační kurzy z různých oborů.Nenašli jste kurz, školení a/nebo seminář?Pošlete nám nezávaznou poptávku po kurzu a my se ho pokusíme najít a pošleme Vám kontakt na vzdělávací firmu a/nebo Vaši poptávku kurzu zveřejníme v seznamu poptávek.Registrace školící firmyJste školící firma, vzdělávací instituce a/nebo pořádáte školení, kurzy, rekvalifikační semináře? Zaregistrujte svoji firmu na serveru a zvyšte počet svých klientů.Náhodný kurz/školeníNovela zákona o úřednících paragraf po paragrafu dvoudenní - Aliaves Co., a.s. Akreditace: MV - AK - PV-328 - 2023; Zákon o úřednících paragraf po paragrafu (webinář) 1. Den Na základě požadavku účastníků tohoto semináře vypisujeme další termíny v roce 2024. ^
Další zlevněné kurzy |
Výpis školení a/nebo kurzů podle klíčového slova: studi remedi - hledá všechna klíčová slova [AND]Hledáno v oborech jednotlivých školení: studi remediDalší kurzy a školení : Alias Studio
| Bakalářské studium (VŠ)
| Bakalářské studium [VŠ]
| Bc.studium nemovitý majetek - realitní makléř
| Doplnění vzdělání na úroveň studia diplomového a z
| Obecné studijní předpoklady [OSP]
| Ojedinělý zájmový kurz, příprava na studium, večer
| Pomaturitní studium
| Příprava na Testy studijních předpokladů
| Studium k získání pedagogické kvalifikace
| Studium v zahraničí
Hledáno ve školících firmách: studi remediHledáno v popisu kurzu/školení: studi remediZobrazit jako:
Tabulka termínů kurzů (studi remedi) Symantec Endpoint Protection 14.x: Manage and AdministerThis course is for IT and system administration professionals who are charged with managing and monitoring Symantec Endpoint Protection endpoints. Course objectives By the completion of this course, you will be able to: * Describe how the Symantec Endpoint Protection Manager (SEPM) communicates with clients and make appropriate changes as necessar ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Data Insight 6.1: Administration The Veritas Data Insight 6.1: Administration course is designed for the storage administration, IT security, and systems administration professional tasked with architecting, implementing, administering and using Veritas Data Insight. This class covers how to design, install, configure, administer and maintain Veritas Data Insight. Students will also lea> how to use the core features of Data Insight to investigate risk, compliance and data management use cases. This ...
= podobný kurz, školení a/nebo seminář ^
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX415 - Red Hat Certified Specialist in Security: Linux examStudy points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login polic * for this exam These audiences may be interested in becoming a Red Hat Certified Specialist in Security: Linux: System administrators responsible for managing large enterprise environments System administrators responsible for securing their organization s infrastructure Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential Prerequisites for this exam Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux exam objectives or have comparable work experience using Red Hat OpenStack Platform. Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login policy. Modify PAM configuration files and parameters. Configure system auditing Write rules to log auditable events. Enable prepackaged rules. Produce audit reports. Configure SELinux Enable SELinux on a host running a simple application. Interpret SELinux violations and determine remedial action. Restrict user activity with SELinux user mappings. Analyze and correct existing SELinux configurations. Enforce security compliance Install OpenSCAP and Workbench. Use OpenSCAP and Red Hat Insights to scan hosts for security compliance. Use OpenSCAP Workbench to tailor policy. Use OpenSCAP Workbench to scan an individual host for security compliance. Use Red Hat Satellite server to implement an OpenSCAP policy. Apply OpenSCAP remediation scripts to hosts. As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Prerequisites Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux e ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Veritas Data Insight 6.1: Administration The Veritas Data Insight 6.1: Administration course is designed for the storage administration, IT security, and systems administration professional tasked with architecting, implementing, administering and using Veritas Data Insight. This class covers how to design, install, configure, administer and maintain Veritas Data Insight. Students will also lea> how to use the core features of Data Insight to investigate risk, compliance and data management use cases. This course is for storag ...
= podobný kurz, školení a/nebo seminář ^
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
MOCAZ-500 - Microsoft Azure - zabezpečeníČtyřdenní kurz připravuje k certifikaci AZ-500 a seznamuje studenty s bezpečnostními technologiemi určenými pro ochranu Azure cloudových i onprem systémů. Kurz je složen z obsahu kurzu AZ-500T00. Kurz je vhodný jako příprava k získání titulu Microsoft Azure - Associate: Azure Security Technologies. ...
^
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
VMware vSphere – Install, Configure, Manage [V8] (EDU-VSICM8) Předpokládané znalosti Zkušenosti se správou operačních systémů Microsoft Windows nebo Linux. Zaměření kurzu Kurz je vhodný pro systémové integrátory a inženýry. Po celou dobu kurzu je pro vás připraveno bohaté občerstvení a kvalitní káva. ...
^
Podrobnosti ke kurzu, školení -
NICOM, a.s.
EX415K - Red Hat Certified Specialist in Security: Linux examStudy points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login polic * for this exam These audiences may be interested in becoming a Red Hat Certified Specialist in Security: Linux: System administrators responsible for managing large enterprise environments System administrators responsible for securing their organization s infrastructure Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential Prerequisites for this exam Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux exam objectives or have comparable work experience using Red Hat OpenStack Platform. Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login policy. Modify PAM configuration files and parameters. Configure system auditing Write rules to log auditable events. Enable prepackaged rules. Produce audit reports. Configure SELinux Enable SELinux on a host running a simple application. Interpret SELinux violations and determine remedial action. Restrict user activity with SELinux user mappings. Analyze and correct existing SELinux configurations. Enforce security compliance Install OpenSCAP and Workbench. Use OpenSCAP and Red Hat Insights to scan hosts for security compliance. Use OpenSCAP Workbench to tailor policy. Use OpenSCAP Workbench to scan an individual host for security compliance. Use Red Hat Satellite server to implement an OpenSCAP policy. Apply OpenSCAP remediation scripts to hosts. As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Prerequisites Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux e ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Veritas Data Insight 6.5: Administration The Veritas Data Insight 6.1: Administration course is designed for the storage administration, IT security, and systems administration professional tasked with architecting, implementing, administering and using Veritas Data Insight. This class covers how to design, install, configure, administer and maintain Veritas Data Insight. Students will also lea> how to use the core features of Data Insight to investigate risk, compliance and data management use cases. This course is for storag ...
^
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Počet nalezených kurzů : 8
Celkem nalezeno kurzů, školení a/nebo rekvalifikací : 8
Nenašli jste kurz? Zkuste zadat jednoduché klíčové slovo, nezadávejte frázi nebo skloňování a zkontrolujte diakritiku Hledat kurzy po jednotlivých klíčových slovech:
| stud| remed Nenašli jste kurz, školení, studium a/nebo seminář?Pošlete nám nezávaznou poptávku po školení a nebo kurzu a my ji zveřejníme na stránkách serveru skoleni-kurzy.eu. Možnost odpovědět na danou poptávku mají pouze
registrované školící firmy na serveru skoleni-kurzy.eu .
Seznam článků (doporučení)
|