Hledat školení | Registrace Školícího střediska |
Kalendář | Poptávky | Komentáře | Přihlásit se |
---|
skoleni-kurzy.eu[skoleni-kurzy.eu] Zde najdete různé kurzy, školení, semináře a rekvalifikační kurzy z různých oborů.Nenašli jste kurz, školení a/nebo seminář?Pošlete nám nezávaznou poptávku po kurzu a my se ho pokusíme najít a pošleme Vám kontakt na vzdělávací firmu a/nebo Vaši poptávku kurzu zveřejníme v seznamu poptávek.Registrace školící firmyJste školící firma, vzdělávací instituce a/nebo pořádáte školení, kurzy, rekvalifikační semináře? Zaregistrujte svoji firmu na serveru a zvyšte počet svých klientů.Náhodný kurz/školeníJavaScript pro pokročilé a úvod do Node.js - ICT Pro s.r.o. – Kurzy, školení, konzultace ICT a Soft Skills JavaScript - Advanced Programming * Účastníci získají celkový přehled o jazyku JavaScript a jeho možnostech v prostředí internetových prohlížečů. Naučí se psát robustní, rychlé a bezpečné aplikace, moderní skripty pro běžně používané aplikace s minimálním úsilí. ^
Další zlevněné kurzy |
Výpis školení a/nebo kurzů podle klíčového slova: studium ex415 - pouze v názvu kurzu hledá aspoň jedno klíčové slovo [OR]Hledáno v oborech jednotlivých školení: studium ex415Pomaturitní studium Hledáno ve školících firmách: studium ex415Aqua Ventus Academy (odkaz na termíny kurzů) Samouk (odkaz na termíny kurzů) Institut Franka Dysona s.r.o. (odkaz na termíny kurzů) OBCHODNÍ INSTITUT (odkaz na termíny kurzů) Hvězda - vzdělávací studio (odkaz na termíny kurzů) Welko Team s.r.o. (odkaz na termíny kurzů) OKstep s r.o.- design studio (odkaz na termíny kurzů) EGALITÉ, spol. s r.o. (odkaz na termíny kurzů) Hledáno v názvu kurzu/školení: studium ex415Zobrazit jako:
Tabulka termínů kurzů (studium ex415) Počet nalezených kurzů : 31 EX413 - Red Hat Certified Specialist in Server Security and Hardening ExamStudy points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX413 - Red Hat Certified Specialist in Server Security and Hardening ExamStudy points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX415 - Red Hat Certified Specialist in Security: Linux examStudy points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login polic * for this exam These audiences may be interested in becoming a Red Hat Certified Specialist in Security: Linux: System administrators responsible for managing large enterprise environments System administrators responsible for securing their organization s infrastructure Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential Prerequisites for this exam Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux exam objectives or have comparable work experience using Red Hat OpenStack Platform. Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login policy. Modify PAM configuration files and parameters. Configure system auditing Write rules to log auditable events. Enable prepackaged rules. Produce audit reports. Configure SELinux Enable SELinux on a host running a simple application. Interpret SELinux violations and determine remedial action. Restrict user activity with SELinux user mappings. Analyze and correct existing SELinux configurations. Enforce security compliance Install OpenSCAP and Workbench. Use OpenSCAP and Red Hat Insights to scan hosts for security compliance. Use OpenSCAP Workbench to tailor policy. Use OpenSCAP Workbench to scan an individual host for security compliance. Use Red Hat Satellite server to implement an OpenSCAP policy. Apply OpenSCAP remediation scripts to hosts. As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Prerequisites Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux e ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX413 - Red Hat Certificate of Expertise in Server Hardening ExamStudy points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install a * The following audiences may be interested in earning the Red Hat Certificate of Expertise in Server Hardening: System administrators responsible for standards-compliant security on Red Hat Enterprise Linux systems System administrators responsible for security on Red Hat Enterprise Linux systems or who wish to harden systems beyond default configurations RHCEs who wish to ea> Red Hat Certified Architect (RHCA). Study points for the exam To help you prepare, review the exam objectives which highlights the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks: Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information Verify package security and validity Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files Manage user account security and user password security Manage system login security using pluggable authentication modules (PAM) Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords Configure system-wide acceptable use notifications Install, configure, and manage identity management services and configure identity management clients Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression Configure system auditing services and review audit reports Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central. Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as section scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites Be a Red Hat Certified System Administrator (RHCSA) or have comparable wor ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
EX415K - Red Hat Certified Specialist in Security: Linux examStudy points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login polic * for this exam These audiences may be interested in becoming a Red Hat Certified Specialist in Security: Linux: System administrators responsible for managing large enterprise environments System administrators responsible for securing their organization s infrastructure Red Hat Certified Engineers interested in pursuing the Red Hat Certified Architect (RHCA) credential Prerequisites for this exam Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux exam objectives or have comparable work experience using Red Hat OpenStack Platform. Study points for the exam Use Red Hat Ansible ® Engine Install Red Hat Ansible Engine on a control node. Configure managed nodes. Configure simple inventories. Perform basic management of systems. Run a provided playbook against specified nodes. Configure intrusion detection Install AIDE. Configure AIDE to monitor critical system files. Configure encrypted storage Encrypt and decrypt block devices using LUKS. Configure encrypted storage persistence using NBDE. Change encrypted storage passphrases. Restrict USB devices Install USBGuard. Write device policy rules with specific criteria to manage devices. Manage administrative policy and daemon configuration. Manage system login security using pluggable authentication modules (PAMs) Configure password quality requirements. Configure failed login policy. Modify PAM configuration files and parameters. Configure system auditing Write rules to log auditable events. Enable prepackaged rules. Produce audit reports. Configure SELinux Enable SELinux on a host running a simple application. Interpret SELinux violations and determine remedial action. Restrict user activity with SELinux user mappings. Analyze and correct existing SELinux configurations. Enforce security compliance Install OpenSCAP and Workbench. Use OpenSCAP and Red Hat Insights to scan hosts for security compliance. Use OpenSCAP Workbench to tailor policy. Use OpenSCAP Workbench to scan an individual host for security compliance. Use Red Hat Satellite server to implement an OpenSCAP policy. Apply OpenSCAP remediation scripts to hosts. As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Prerequisites Be a Red Hat Certified System Administrator or have comparable work experience and skills (Red Hat Certified Engineer would be even better) Review the Red Hat Certified Specialist in Security: Linux e ...
Podrobnosti ke kurzu, školení -
DataScript s.r.o.
Garantované studium - DESIGNÉR, DESIGNÉRKA INTERIÉRU - dlouhodobý kurzstudium zakončeno testem a obhajobou závěrečného projektu s udělením certfikátu [ celkem 264 hodin]. Výuka probíhá v perfektně vybavené učebně aktualními vzorky používaných v interierech,podlahové krytiny,dveře a zárubně,stínící technika,tapety,sedací nábytek,osvětlení, dekorace. Kapacita kurzu : 10 studentů max. Vstupní předpoklady : kreativita, zájem o design. ...
Podrobnosti ke kurzu, školení -
OKstep s r.o.- design studio
Školení Windows Presentation Foundation WPF v Microsoft Visual studiuKurz Windows Presentation Foundation WPF v Microsoft Visual studiu je určen pro zkušené vývojáře, kteří znají základy tvorby Windows Forms aplikací a chtějí se naučit pokročilejší techniky programování WinForms a Windows Presentation Foundation [WPF] aplikací pomocí Visual Studia 2015 a .NET Frameworku 4.5. ...
Podrobnosti ke kurzu, školení -
David Solnař
Tvůrčí fotografie - dálkové studiumRádi fotíte a jste otevřeni novým podnětům? Možná vám chybí technická znalost, tvůrčí inspirace nebo zpětná vazba na vaši tvorbu? Naučte se řemeslo, získejte sebejistotu a uplatněte svůj osobitý přístup v praxi. Zkuste to s námi v kurzu tvůrčí fotografie. ...
Podrobnosti ke kurzu, školení -
LŠF Liberec, s. r. o.
Studium pedagogiky v PlzniAbsolvent získá znalosti a dovednosti v oblasti pedagogiky, didaktiky a psychologie, které jsou nezbytnou součástí odborné kvalifikace pedagogického pracovníka. Znalosti a dovednosti získané studiem pedagogiky umožní absolventům kvalifikovaný výkon pedagogické praxe. ...
Podrobnosti ke kurzu, školení -
AM Solvo
Studium pedagogiky podle § 22, odst. 1, písm. b] zákona č. 563/2004 Sb. # pro učiteleCílem tohoto kurzu je získat znalosti a dovednosti v oblasti pedagogiky a psychologie, které podmiňují výkon činnosti učitele. ...
^
Podrobnosti ke kurzu, školení -
AM Solvo
Počet nalezených kurzů : 31
Celkem nalezeno kurzů, školení a/nebo rekvalifikací : 31
Nenašli jste kurz? Zkuste zadat jednoduché klíčové slovo, nezadávejte frázi nebo skloňování a zkontrolujte diakritiku Hledat kurzy po jednotlivých klíčových slovech:
| studiu| ex41 Nenašli jste kurz, školení, studium a/nebo seminář?Pošlete nám nezávaznou poptávku po školení a nebo kurzu a my ji zveřejníme na stránkách serveru skoleni-kurzy.eu. Možnost odpovědět na danou poptávku mají pouze
registrované školící firmy na serveru skoleni-kurzy.eu .
Seznam článků (doporučení)
|