Security</p> 1412 Veranstaltungen

Verwandte Suchbegriffe: wird geladen ...

PREFERRED

Lehre und Dozentur Gernhuber (1)

GDPR Essentials Course objective and structure, General Data Protection Regulation, Data Protection overview, Key concepts, Gap analysis, Scope and goals, Risk Assessment under the GDPR Determine Readiness Challenges and issues, Preparing for the GDP...

  • Seminar / Kurs
  • Grundlagen
  • Durchführung garantiert

PREFERRED

Lehre und Dozentur Gernhuber (1)

Current Topics Cloud Computing in the enterprise Bring-Your-Own-Device-Programs Reform of employment data protection New decisions of the ECJ, BVerfG and BAG Employee data protection Fundamentals (sources, terms and basic principles as well as specia...

  • Seminar / Kurs
  • Grundlagen

PREFERRED

Akademie für modernes Marketing Inc. & Co. KG (2)

Themenfeld Konzeption Im Modul „Konzipieren von Veranstaltungsprojekten“ soll die Fähigkeit erworben werden, Konzepte für Veranstaltungen als Voraussetzung für eine solide Grundlage Planung und Durchführung zu entwickeln. Wir gliedern in: Ideenfindun...

  • Lehrgang
  • Ohne Einstufung

PREFERRED

akquinet finance & controlling GmbH (1)

… erweitern Sie Ihre Fähikeiten. Die Schulung bietet eine Mischung aus Demonstrationen und praktischen Übungen, die Szenario basiert durchspielt werden. Wesentliche Bestandteile sind Best Practice, der reiche Erfahrungsschatz unserer Trainer und Prax...

  • Training / Workshop
  • Ohne Einstufung

PREFERRED

akquinet finance & controlling GmbH (1)

Für Administratoren Ihrer Qlik Umgebung unerlässlich, bekommen Sie in diesen Kurs fundamentiertes Wissen über sämtliche Vorgänge und Einstellungsmöglichkeiten der administrativen Oberfläche. Der Kurs führt die Teilnehmer durch eine Kombination aus Pr...

  • Training / Workshop
  • Ohne Einstufung

PREFERRED

NO MONKEY Security GmbH

Finally, a course to demystify SAP for security professionals! In this Live Online Training, penetration testers and application security experts take a deep dive into the security traits of SAP technology and the organizations and processes running...

  • Webinar
  • Ohne Einstufung

PREFERRED

NO MONKEY Security GmbH

Shifting your SAP systems to the cloud is inevitable. Thus, understanding how to protect your data and assets during the transition is critical. This training will enable you to define a governance model, understand your threat landscape, grasp the r...

  • Webinar
  • Ohne Einstufung

PREFERRED

NO MONKEY Security GmbH

Offered exclusively by NO MONKEY, this online classroom training brings together the SAP operations and IT Security lines of defense. It teaches them how to put preventive controls in place to detect and manage JavaScript code security flaws in the S...

  • Webinar
  • Ohne Einstufung

PREFERRED

NO MONKEY Security GmbH

Gain an overview of how the current threat situation in SAP systems is developing and learn how to check your SAP system for typical security vulnerabilities. This four-hour training begins by bringing you up-to-date on the most current attack vector...

  • Webinar
  • Ohne Einstufung

PREFERRED

NO MONKEY Security GmbH

This class teaches you how to look for security vulnerabilities in ABAP® based business applications, understanding their root causes, what to do when you find them, and how to avoid creating them. In two four-hour sessions you will learn to detect c...

  • Webinar
  • Ohne Einstufung

PREFERRED

NO MONKEY Security GmbH

This online training is designed for SAP technology experts and security professionals looking to improve their incident detection and response skills within their SAP Landscape. You will learn about the MITRE Attack framework as a tool for realistic...

  • Webinar
  • Ohne Einstufung

PREFERRED

NO MONKEY Security GmbH

Sound knowledge of protection concepts, different implementation styles and attack vectors are the ‘basics’ when it comes to safeguarding cryptographic systems. Getting great at the basics is one of the most important ways to protect against cyber th...

  • Webinar
  • Ohne Einstufung

PREFERRED

NO MONKEY Security GmbH

Identity and access management is the cornerstone of an SAP ABAP© system's security posture. There are a lot of myths out there that result in blind spots, inaccurate recommendations, and unnecessary access risks. This training will debunk commonly h...

  • Webinar
  • Ohne Einstufung

PREFERRED

tecRacer Consulting GmbH (3)

This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are respo...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

tecRacer Consulting GmbH (3)

This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are respo...

  • Webinar
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineSetting up a DB2 database, Referential integrity, Getting data into and out of DB2, Keeping your DB2 data in good shape, Application data recovery basics, Program preparation and Bind, Security, SerializationThe course includes extensiv...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Cegos_Integrata GmbH (8)

Course OutlineSetting up a DB2 database, Referential integrity, Getting data into and out of DB2, Keeping your DB2 data in good shape, Application data recovery basics, Program preparation and Bind, Security, SerializationThe course includes extensiv...

  • Webinar
  • Ohne Einstufung

PREFERRED

MicroConsult GmbH (36)

Threats and Attack Scenarios Security incidents, Terms and definitions, Vulnerability databases, Impacts, Classes of attackers, Case study, Defense in depth, Security process/ mindset/ design, Security development lifecycle (SDL), Threat modelsRisks...

  • Webinar
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

GRUNDIG AKADEMIE (30)

Voraussetzungen Grundkenntnisse über Betriebssysteme und Netzwerke, Grundkenntnisse in LINUX und WINDOWS, Grundkenntnisse TCP/IP Schwerpunkte InformationsquellenWie verraten sich angreifbare und verwundbare Systeme?, Standard-Sicherheitswerkzeuge und...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

ExperTeach Gesellschaft für Netzwerkkompetenz mbH (154)

Auch als Online Training verfügbar! In der modernen Gesellschaft gewinnt die digitale Vernetzung in unterschiedlichen Lebensbereichen zunehmend an Bedeutung. Diesen Umstand machen sich Cyberkriminelle in großem Umfang zunutze, um ihre teilweise hochk...

  • Seminar / Kurs
  • Grundlagen
  • Durchführung garantiert