Security</p> 112 Veranstaltungen

Verwandte Suchbegriffe: wird geladen ...

PREFERRED

Cegos_Integrata GmbH (8)

Course Outline• Overview of Db2 11.1• Db2 Command Line Processor (CLP) and GUI tools• The Db2 database manager instance• Creating Databases and Data Placement• Creating Database Objects• Moving Data• Backup and Recovery• Database Maintenance, Monitor...

  • Webinar
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineUnit 1: Introduction to the IBM Z Systems environment Topic 1: Architecture in the z Systems environment Topic 2: Operating systems Topic 3: IBM z Systems Unit 2: z/OS security Topic 1: System security Topic 2: RACF Topic 3: RACF profil...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineUnit 1: Introduction to the IBM Z Systems environment Topic 1: Architecture in the z Systems environment Topic 2: Operating systems Topic 3: IBM z Systems Unit 2: z/OS security Topic 1: System security Topic 2: RACF Topic 3: RACF profil...

  • Webinar
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineUnit 1: Information Server technical overview • List the Information Server functional categories • List the Information Server products and components that support these functional categories • List the Information Server architectural...

  • Webinar
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineIntroduction to VSAM data sets describe the structure, organization, and use of VSAM clusters, explain the function of Control Intervals (CI) and Control Areas (CA), describe the purpose of CI splits and CA splits and how they are accom...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineIntroduction to VSAM data sets describe the structure, organization, and use of VSAM clusters, explain the function of Control Intervals (CI) and Control Areas (CA), describe the purpose of CI splits and CA splits and how they are accom...

  • Webinar
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineUnit 1 Overview of security deployment• Describe the process for deploying a security configuration.• Identify the security goals for each environment typeUnit 2 Work with project areas• Create a project area• Add users to a project are...

  • Webinar
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineWelcome Unit 1 - Introduction and overview to IBM i Unit 2 - Using the 5250 emulation interface Exercise 1- Using the 5250 emulation interface Unit 3 – Overview of IBM I Access Client Solutions Exercise 2 – Overview of IBM i Access Clie...

  • Webinar
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineIntroduction to IMS Security, IMS Security Facilities, IMS Security Options, Introduction to RACF, User ID and Sign On Verification, Securing the IMS Control Region, IMS Transaction Security, IMS Command Security, Security for Time Cont...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineOverview of DB2 on Linux, UNIX and Windows, Command Line Processor (CLP) and GUI usage, The DB2 environment, Creating databases and data placement, Creating database objects, Moving data, Backup and recovery, Database Maintenance, Monit...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineIntroduction to Netcool/OMNIbus administration Overview, Stopping and starting components, Backing up and restoring, Applying maintenance, Modifying behaviorObjectServer administration ObjectServer structure, Modifying the ObjectServer...

  • Webinar
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineIntroduction to Netcool/OMNIbus administration Overview, Stopping and starting components, Backing up and restoring, Applying maintenance, Modifying behaviorObjectServer administration ObjectServer structure, Modifying the ObjectServer...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineDay 1 Welcome, Unit 1: z/OS UNIX implementation overview, Unit 2: z/OS UNIX services initial installation, Exercise 1: Move from default to full mode function, Exercise 2: IPL in full function mode and enable a nonvolatile root HFS, Uni...

  • Webinar
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineIntroduction to IMS Security, IMS Security Facilities, IMS Security Options, Introduction to RACF, User ID and Sign On Verification, Securing the IMS Control Region, IMS Transaction Security, IMS Command Security, Security for Time Cont...

  • Webinar
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineIntroduction to IMS Security, IMS Security Facilities, IMS Security Options, Introduction to RACF, User ID and Sign On Verification, Securing the IMS Control Region, IMS Transaction Security, IMS Command Security, Security for Time Cont...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Grundlagen des Testens der Sicherheit: Sicherheitsrisiken, Informationssicherheitsrichtlinien und -verfahren, Sicherheitsaudits und ihre Rolle beim Testen der Sicherheit Zwecke, Ziele und Strategien von Sicherheitstests: Der Zweck von Sicherheitstest...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineIntroduction to IMS Security, IMS Security Facilities, IMS Security Options, Introduction to RACF, User ID and Sign On Verification, Securing the IMS Control Region, IMS Transaction Security, IMS Command Security, Security for Time Cont...

  • Webinar
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Beschreiben von Informationssicherheitskonzepten*, Beschreibung gängiger TCP/IP-Angriffe*, Beschreibung gängiger Angriffe auf Netzwerkanwendungen*, Beschreibung gängiger Endpunkt-Angriffe*, Beschreiben von Netzwerksicherheitstechnolog...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineClass administration and introductions, IBM i overview and concepts, Management central overview, Security concepts and overview, System values, User security, Resource security, Security auditing, Designing security, IBM i availability...

  • Webinar
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Modul 0: Einführung, Modul 1: Überprüfung der Cisco Email Security Appliance, Modul 2: Verwaltung der Cisco Email Security Appliance, Modul 3: Kontrolle von Sender- und Empfängerdomänen, Modul 4: Spam mit Cisco SensorBase un...

  • Seminar / Kurs
  • Ohne Einstufung