Cyber Security 12 Veranstaltungen

Meinten Sie: cher security
Verwandte Suchbegriffe: wird geladen ...

Sophos UTM9 Certified Engineer - Schulung

Sponsored IKU GmbH & Co. KG

IKU bietet eine praxisorientierte Lab-Umgebung mit UTM Appliances, Laptops, Lab-Anleitungen und einen Kursleitfaden, der von Sophos-Experten geschrieben wurde und zahlreiche Tipps und Tricks und andere wichtige Informationen enthält, die Administratoren bei alltäglichen Routineaufgaben weiterhelfen.

PREFERRED

FORUM Institut für Management GmbH (147)

- Übersicht, gesetzliche Anforderungen, relevante Normen und Guidelines (EU und US) - Praktische Anwendung der Norm IEC 81001-5-1 und der MDCG 2019-16 - Cyber Security Risikomanagement in der Praxis - Software Bill of Materials und Schwachstellenmoni...

  • E-Learning
  • Ohne Einstufung

PREFERRED

NO MONKEY Security GmbH

As a developer or software security engineer, it's essential to know the security traits of the technology and tools used to create and run the software application. ABAP® is no different. Because of SAP's ABAP® product strategy and how specific prot...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

As with all programming languages, ABAP® based applications can contain security flaws. As a result of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

Learn threat modeling and how to apply this exercise for SAP system landscapes. Threat modeling is an important exercise to prioritize security activities according to the organization's cyber threats. It is key when dealing with limited resources to...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

As with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

As with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

Welcome to the fundamentals of SAP remote services. In this class you will learn how to safeguard the most important network services for SAP applications. Minimizing the exposure of services is crucial to the security of software. The same applies f...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

This course covers the main security mechanisms that SAP provides as part of an SAP S/4HANA©system. S/4HANA©consists of two distinct components: the Application Server (ABAP) which contains the business logic, and the database (HANA) which stores the...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

As with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

NO MONKEY Security GmbH

As with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

FORUM Institut für Management GmbH (147)

- Introduction and general IT-Security - Attacker, Vulnerabilities and Threats - IT-Security Strategy - Defense in Depth - Trends in IT and their Impact on IT-Security In Germany alone, IT failures and malfunctions cause damage running into billions...

  • E-Learning
  • Ohne Einstufung

PREFERRED

ExperTeach Gesellschaft für Netzwerkkompetenz mbH (153)

Der Kurs vermittelt ein Verständnis der Komponenten der Netzwerkinfrastruktur, des Betriebs und der Schwachstellen der TCP/IP-Protokollsuite (Transmission Control Protocol/Internet Protocol). Sie erhalten grundlegende Informationen über Sicherheitsko...

  • E-Learning
  • Ohne Einstufung