IT security 37 Veranstaltungen

Verwandte Suchbegriffe: wird geladen ...

Firmenprofil AKADEMIE HERKERT

Sponsored AKADEMIE HERKERT - Forum Verlag Herkert GmbH (25)

Ihr zuverlässiger Partner für Weiterbildungen im Bereich Assistenz, Datenschutz, IT-Sicherheit, Arbeitsrecht, Export- und Zollabwicklung, Führung, Gefahrstoffe, REACH, Maschinensicherheit und vielen weiteren Themengebieten! Entdecken Sie auch unsere zahlreichen Online-Weiterbildungsmöglichkeiten.

Sophos UTM9 Certified Engineer - Schulung

Sponsored IKU GmbH & Co. KG

IKU bietet eine praxisorientierte Lab-Umgebung mit UTM Appliances, Laptops, Lab-Anleitungen und einen Kursleitfaden, der von Sophos-Experten geschrieben wurde und zahlreiche Tipps und Tricks und andere wichtige Informationen enthält, die Administratoren bei alltäglichen Routineaufgaben weiterhelfen.

PREFERRED

mITSM GmbH (26)

ISO 27001 Foundation – English Content In our ISO 27001 Foundation training, you will learn the basics of information security management according to the international standard ISO/IEC 27001. The following content awaits you: Introduction to informa...

  • Webinar
  • Grundlagen

PREFERRED

mITSM GmbH (26)

ISO 27001 Foundation – English Content In our ISO 27001 Foundation training, you will learn the basics of information security management according to the international standard ISO/IEC 27001. The following content awaits you: Introduction to informa...

  • Seminar / Kurs
  • Grundlagen

PREFERRED

ETC - Enterprise Training Center GmbH (23)

Forensics and Incident Handling are constantly evolving and crucial topics in the area of cybersecurity.In order to stay on top of the attackers, the knowledge of Individuals and Teams responsible for collecting digital evidences and handling the inc...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

ETC - Enterprise Training Center GmbH (23)

The course is dedicated for people who want to learn about Microsofts cloud environment monitoring tools and framework. At the beginning, we will introduce you to the management of Azure Active Directory, service auditing and logs, roles related to m...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

ETC - Enterprise Training Center GmbH (23)

This 5-day course is considered essential for anyone who would like to expand their knowledge about Public Key Infrastructure (PKI) in Microsoft technologies. During the course PKI is covered in depth, starting from the best practices for implementin...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

ETC - Enterprise Training Center GmbH (23)

This is just a great workshop that teaches how to implement secure Microsoft Active Directory infrastructure. The course covers all modern attacks against core Windows identity solutionsthat everybody talks about and during the sessionyou will learn...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

ETC - Enterprise Training Center GmbH (23)

Die Hacking und Securing Windows Infrastructure Masterclass aus der ETC Lighthouse Series This is a deep dive course on infrastructure services security, a must-go for enterprise administrators, security officers and architects. It is delivered by on...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

ETC - Enterprise Training Center GmbH (23)

Der Windows OS Troubleshooting Experten Workshop aus der ETC Lighthouse Series. Achtung - Kurssprache Englisch! In diesem Kurs lernen Sie, wie das Betriebssystem wirklich funktioniert und wie man Probleme effektiv beheben kann. Sie gilt für alle...

  • Webinar
  • Ohne Einstufung

PREFERRED

ETC - Enterprise Training Center GmbH (23)

Der Windows OS Troubleshooting Experten Workshop aus der ETC Lighthouse Series. Achtung - Kurssprache Englisch! In diesem Kurs lernen Sie, wie das Betriebssystem wirklich funktioniert und wie man Probleme effektiv beheben kann. Sie gilt für alle...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

tectrain GmbH (CH) (5)

EC Council Certified Ethical Hacker (CEH) Seminar content: Basics of ethical hacking, Integration of ethical hacking and cybersecurity, Advanced hacking techniques, Application of hacker tools, Communication and collaboration in cybersecurity, Implem...

  • Seminar / Kurs
  • Grundlagen

PREFERRED

NO MONKEY Security GmbH

SAP systems have unique characteristics and potential vulnerabilities that are distinctive to SAP technology. Learning to conduct threat modeling specifically for your landscape can significantly improve how you identify and prioritize threats and vu...

  • Webinar
  • Ohne Einstufung

PREFERRED

ETC - Enterprise Training Center GmbH (23)

In the modern world of “work from anywhere”, it is more important than ever to aim for a Zero Trust solution. Zero Trust has a very negative vibe to it, but I believe that everyone wants it, when you just think about what it really aims to achieve: T...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

ETC - Enterprise Training Center GmbH (23)

In the modern world of “work from anywhere”, it is more important than ever to aim for a Zero Trust solution. Zero Trust has a very negative vibe to it, but I believe that everyone wants it, when you just think about what it really aims to achieve: T...

  • Webinar
  • Ohne Einstufung

PREFERRED

NO MONKEY Security GmbH

Offered exclusively by NO MONKEY, this online classroom training brings together the SAP operations and IT Security lines of defense. It teaches them how to put preventive controls in place to detect and manage JavaScript code security flaws in the S...

  • Webinar
  • Ohne Einstufung

PREFERRED

ETC - Enterprise Training Center GmbH (23)

This video-based training comprises a total of 44 video learning nuggets on the subject of security awareness! Increasing information security and adhering to the IT security policy is a central task of the organization and, in view of the threat sce...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

Haufe Akademie GmbH & Co. KG (1289)

Amazon EKS makes it easy for you to run Kubernetes on AWS without needing to install, operate, and maintain your own Kubernetes control plane. In this course, you will learn container management and orchestration for Kubernetes using Amazon EKS. You...

  • Webinar
  • Ohne Einstufung

PREFERRED

Haufe Akademie GmbH & Co. KG (1289)

UX writing and what makes it unique Establishing differences and similarities with marketing and corporate communication., Assessing and grouping the needs and expectations of your users., Designing a positive and intuitive user experience., Striking...

  • Webinar
  • Ohne Einstufung

PREFERRED

PDA Europe gGmbH (14)

TWO FOR ONE The conference will take place in parallel with the PDA Good Digitalization in Pharma Conference 2024! Don't miss this special 2-for-1 offer! Dear Colleagues, On behalf of the Scientific Program Planning Committee and PDA, we are proud t...

  • Kongress / Konferenz
  • Ohne Einstufung

PREFERRED

IBF Solutions GmbH (23)

Seminar programme Important basic knowledge What impact the transition from Directive to Regulation will have on businesses, Why was Directive 2006/42/EC amended?, By when does which regulation have to be applied?, Why there is no transitional perio...

  • Webinar
  • Ohne Einstufung

PREFERRED

NO MONKEY Security GmbH

Sound knowledge of protection concepts, different implementation styles and attack vectors are the ‘basics’ when it comes to safeguarding cryptographic systems. Getting great at the basics is one of the most important ways to protect against cyber th...

  • Webinar
  • Ohne Einstufung