[skoleni-kurzy.eu] Zde najdete různé kurzy, školení, semináře a rekvalifikační kurzy z různých oborů.
Nenašli jste kurz, školení a/nebo seminář?
Pošlete nám nezávaznou poptávku po kurzu a my se ho pokusíme najít a pošleme Vám kontakt na vzdělávací firmu a/nebo Vaši poptávku kurzu zveřejníme v seznamu poptávek.
Jste školící firma, vzdělávací instituce a/nebo pořádáte školení, kurzy, rekvalifikační semináře?
Zaregistrujte svoji firmu na serveru a zvyšte počet svých klientů.
Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set Configure security context constraints Use trusted registries Load images into a registry Query images in a registry Work with trusted container images Identify a trusted container image Sign images View signed images Scan images Load signed images into a registry Build secure container images Perform simple S2I builds Implement S2I bui * System administrators or developers who want to demonstrate their ability to properly secure containers System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform Red Hat Certified Engineers who wish to become Red Hat Certified Architects Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set Configure security context constraints Use trusted registries Load images into a registry Query images in a registry Work with trusted container images Identify a trusted container image Sign images View signed images Scan images Load signed images into a registry Build secure container images Perform simple S2I builds Implement S2I build hooks Automate builds using Jenkins Automate scanning and code validations as part of the build process Control access to OpenShift Container Platform clusters Configure users with different permission levels, access, and bindings Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication Query users and groups in IdM Log into OpenShift Container Platform using an IdM managed account Configure single sign-on (SSO) Install SSO authentication Configure OpenShift Container Platform to use SSO Integrate web applications with SSO Automate policy-based deployments Configure policies to control the use of images and registries Use secrets to provide access to external registries Automatically pull and use images from a registry Use triggers to verify that automated deployments work Manage orchestration Restrict nodes on which containers may run Use quotas to limit resource utilization Use secrets to automate access to resources Configure network isolation Create software-defined networks (SDN) Associate containers and projects with SDNs Configure and manage secure container storage Configure and secure file-based container storage Configure and secure block-based container storage As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central . Red Hat does not authorize e ...
Cena kurzu: ...
425 EUR / Kurz
... včetně DPH: 514 EUR / Kurz
Objednat - pro přihlášení na kurz/školení klikněte na zvolený termín školení a místo konání
Popis kurzu EX425 - Red Hat Certified Specialist in Security: Containers and OpenShift Container Platform exam
Kurz je určen pro ...
Audience
System administrators or developers who want to demonstrate their ability to properly secure containers
System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform
Red Hat Certified Engineers who wish to become Red Hat Certified Architects
Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features
Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups
Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set
Configure security context constraints
Use trusted registries
Load images into a registry
Query images in a registry
Work with trusted container images
Identify a trusted container image
Sign images
View signed images
Scan images
Load signed images into a registry
Build secure container images
Perform simple S2I builds
Implement S2I build hooks
Automate builds using Jenkins
Automate scanning and code validations as part of the build process
Control access to OpenShift Container Platform clusters
Configure users with different permission levels, access, and bindings
Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication
Query users and groups in IdM
Log into OpenShift Container Platform using an IdM managed account
Configure single sign-on (SSO)
Ins
Lektoři kurzu
Lektoři z firmy: DataScript s.r.o.
[Kurz] Program kurzu (obsah přednášky/semináře/rekvalifikace/studia) ...
System administrators or developers who want to demonstrate their ability to properly secure containers
System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform
Red Hat Certified Engineers who wish to become Red Hat Certified Architects
Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features
Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups
Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set
Configure security context constraints
Use trusted registries
Load images into a registry
Query images in a registry
Work with trusted container images
Identify a trusted container image
Sign images
View signed images
Scan images
Load signed images into a registry
Build secure container images
Perform simple S2I builds
Implement S2I build hooks
Automate builds using Jenkins
Automate scanning and code validations as part of the build process
Control access to OpenShift Container Platform clusters
Configure users with different permission levels, access, and bindings
Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication
Query users and groups in IdM
Log into OpenShift Container Platform using an IdM managed account
Configure single sign-on (SSO)
Install SSO authentication
Configure OpenShift Container Platform to use SSO
Integrate web applications with SSO
Automate policy-based deployments
Configure policies to control the use of images and registries
Use secrets to provide access to external registries
Automatically pull and use images from a registry
Use triggers to verify that automated deployments work
Manage orchestration
Restrict nodes on which containers may run
Use quotas to limit resource utilization
Use secrets to automate access to resources
Configure network isolation
Create software-defined networks (SDN)
Associate containers and projects with SDNs
Configure and manage secure container storage
Configure and secure file-based container storage
Configure and secure block-based container storage
As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central . Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as total scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites for this exam
Become a Red Hat Certified System Administrator , or possess comparable work experience and skills ( Red Hat Certified Engineer would be even better)
Take Red Hat OpenShift I: Containers & Kubernetes (DO180) , or possess comparable work experience using containers
Review the exam objectives
Recommended courses Red Hat Security: Containers and OpenShift Container Platform (DO425)
[Kurz] Obsah kurzu/školení...
System administrators or developers who want to demonstrate their ability to properly secure containers
System administrators or developers who are working in a DevOps environment using Red Hat OpenShift Container Platform
Red Hat Certified Engineers who wish to become Red Hat Certified Architects
Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features
Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups
Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set
Configure security context constraints
Use trusted registries
Load images into a registry
Query images in a registry
Work with trusted container images
Identify a trusted container image
Sign images
View signed images
Scan images
Load signed images into a registry
Build secure container images
Perform simple S2I builds
Implement S2I build hooks
Automate builds using Jenkins
Automate scanning and code validations as part of the build process
Control access to OpenShift Container Platform clusters
Configure users with different permission levels, access, and bindings
Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication
Query users and groups in IdM
Log into OpenShift Container Platform using an IdM managed account
Configure single sign-on (SSO)
Install SSO authentication
Configure OpenShift Container Platform to use SSO
Integrate web applications with SSO
Automate policy-based deployments
Configure policies to control the use of images and registries
Use secrets to provide access to external registries
Automatically pull and use images from a registry
Use triggers to verify that automated deployments work
Manage orchestration
Restrict nodes on which containers may run
Use quotas to limit resource utilization
Use secrets to automate access to resources
Configure network isolation
Create software-defined networks (SDN)
Associate containers and projects with SDNs
Configure and manage secure container storage
Configure and secure file-based container storage
Configure and secure block-based container storage
As with all Red Hat performance-based exams, configurations must persist after reboot without intervention. Scores and reporting Official scores for exams come exclusively from Red Hat Certification Central . Red Hat does not authorize examiners or training partners to report results to candidates directly. Scores on the exam are usually reported within 3 U.S. business days. Exam results are reported as total scores. Red Hat does not report performance on individual items, nor will it provide additional information upon request. Prerequisites for this exam
Become a Red Hat Certified System Administrator , or possess comparable work experience and skills ( Red Hat Certified Engineer would be even better)
Take Red Hat OpenShift I: Containers & Kubernetes (DO180) , or possess comparable work experience using containers
Review the exam objectives
Recommended courses Red Hat Security: Containers and OpenShift Container Platform (DO425)
[Kurz] Cíl školení / poznámka ke kurzu...
Study points for the exam To help you prepare, these exam objectives highlight the task areas you can expect to see covered in the exam. Red Hat reserves the right to add, modify, and remove exam objectives. Such changes will be made public in advance. Understand, identify, and work with containerization features
Deploy a preconfigured application and identify crucial features such as namespaces, SELinux labels, and cgroups
Deploy a preconfigured application with security context constraint capabilities and view the application’s capability set
Configure security context constraints
Use trusted registries
Load images into a registry
Query images in a registry
Work with trusted container images
Identify a trusted container image
Sign images
View signed images
Scan images
Load signed images into a registry
Build secure container images
Perform simple S2I builds
Implement S2I build hooks
Automate builds using Jenkins
Automate scanning and code validations as part of the build process
Control access to OpenShift Container Platform clusters
Configure users with different permission levels, access, and bindings
Configure OpenShift Container Platform to use Red Hat Identity Management services (IdM) for authentication
Query users and groups in IdM
Log into OpenShift Container Platform using an IdM managed account
Configure single sign-on (SSO)
Install SSO authentication
Configure OpenShift Container Platform to use SSO
Integrate web applications with SSO
Automate policy-based deployments
Configure policies to control the use of images and registries
Use secrets to provide access to external registries
Automatically pull and use images from a registry
Use triggers to verify that automated deployments work
Manage orchestration
Restrict nodes on which containers may run
Use quotas to limit resource utilization
Use secrets to automate access to resources
Configure network isolation
Create software-defined networks (SDN)
Associate containers and projects with SDNs
Configure and manage secure container storage
Configure and secure file-based container storage
Configure and secure block-based container storage
As with all Red Hat performance-based exams, configurations must persist after reboot without intervention.
[Školení] Další popis kurzu (úroveň, minimální znalosti, informace o cenách kurzu) ...
Prerequisites for this exam
Become a Red Hat Certified System Administrator , or possess comparable work experience and skills ( Red Hat Certified Engineer would be even better)
Take Red Hat OpenShift I: Containers & Kubernetes (DO180) , or possess comparable work experience using containers
Review the exam objectives
Recommended courses Red Hat Security: Containers and OpenShift Container Platform (DO425)
[dotaz na školení/kurz] Formulář pro komentáře, dotazy a odpovědi
::
DataScript je autorizovaným poskytovatelem IT kurzů a certifikací. V našich školících prostorách poskytujeme řadu vysoce odborných a respektovaných IT kurzů, specializovaných technologických školení i certifikací IT specialistů, systémových administrátorů a techniků. V nabídce naší činnosti nechybí ani speciální tréninky určené ke zvýšení profesionálních dovedností a schopností odborných pracovníků. DataScript klade důraz nejen na dokonalou teoretickou přípravu a odborné znalosti, ale rovněž na jejich praktické využití a řešení konkrétních situací. DataScript je součástí koncernu Servodata. Společnost Servodata je významným Value Added Distributorem komponent a infrastruktury podnikových ICT řešení. Dlouhodobě se specializuje na distribuci ...
Platební podmínky pro účast na kurzu
Objednavateli bude zaslána závazná přihláška k podpisu. Poté bude účastník na školení registrován. Objednavatel uhradí částku kurzovného za výše uvedeného posluchače na základě faktury vystavené poskytovatelem.
Jiný kurz v jiné ceně : Amazon EKS makes it easy for you to run Kubernetes on AWS without needing to install, operate, and maintain your own Kubernetes control plane. In this course, you will lea> container management and orchestration for Kubernetes using Amazon EKS.
Jiný kurz v jiné ceně : Načerpejte znalosti o Zabbixu a mějte pod kontrolou firemní síť i aplikace. Školení je realizováno na poslední stabilní verzi Zabbix 7.
Jiný kurz v jiné ceně : This course is intended for: IT business-level professionals interested in cloud security practices Security professionals with minimal working knowledge of AWS Course Objectives In this course, you will lea> to: Identify security benefits and responsibilities
Jiný kurz v jiné ceně : OPEN Enterprise security architecture * Kurz poskytuje účastníkům komplexní přehled pro navržení bezpečnostní architektury v rámci podnikového bezpečnostního programu. Zahrnuje strategické plánování, návrh architektury, implementaci a správu dle definovaných politik.
Jiný kurz v jiné ceně : Baví Vás marketing, provádění výzkumů, stanovení strategií či marketingová komunikace? Hledáte v této oblasti uplatnění, máte praxi, ale chybí Vám doklad, který by potvrdil, že máte i odborné vzdělání?
Jiný kurz v jiné ceně : Cíle kurzu : V kurzu Daňový specialista on-line se naučíte orientovat v daňových předpisech ČR. Seznámíte se s problematikou DPPO, DPFO, DPH, s oblastí majetkových daní, daní převodových, silničních a spotřebních.
[RSS] Nechte si posílat nové termíny kurzuChcete vědět kdy bude další termín kurzu? - Využijte RSS a nechte si posílat každé změny a/nebo nové termíny kurzu do Vaší čtečky RSS (bez registrace)
Objednavateli bude zaslána závazná přihláška k podpisu. Poté bude účastník na školení registrován. Objednavatel uhradí částku kurzovného za výše uvedeného posluchače na základě faktury vystavené poskytovatelem.