iSAQB CPSA-Advanced webbasierte Softwarearchitektur (WEB) Schulung Eine Webpräsenz ist für den Erfolg eines jeden Unternehmens von entscheidender Bedeutung. Daher ist es für Architekten essentiell, die notwendigen Fähigkeiten und Kenntnisse zu erwerb...
Setzen Sie Ihre Software zur Webprogrammierung wie DHTML, ASP.NET, Tomcat etc. noch besser ein durch gezielte Schulungen bundesweit mit Durchführungsgarantie bei PC-COLLEGE
Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Consequences of insecure software, The OWASP Top Ten 2021The OWASP Top 10 2021, A01 - Broken Access ControlAccess control basics, Confused depu...
Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Consequences of insecure software, The OWASP Top Ten 2021The OWASP Top 10 2021, A01 - Broken Access ControlAccess control basics, Failure to re...
Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Consequences of insecure software, The OWASP Top Ten 2021The OWASP Top 10 2021, A01 – Broken Access ControlAccess Control Basics, Confused depu...
Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Consequences of insecure software, The OWASP Top Ten 2021The OWASP Top 10 2021, A01 - Broken Access ControlAccess control basics, Confused depu...
Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types - the CIA triad, Consequences of insecure software, The OWASP Top Ten 2021The OWASP Top 10 2021, A01 - Broken Access ControlAccess control basics, Confused depu...
Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Consequences of insecure software, Constraints and the market, The OWASP Top Ten 2021The OWASP Top 10 2021, A01 - Broken Access ControlAccess c...
Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Consequences of insecure software, Constraints and the market, The OWASP Top Ten 2021The OWASP Top 10 2021, A01 - Broken Access ControlAccess c...
Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Consequences of insecure software, Constraints and the market, The OWASP Top Ten 2021The OWASP Top 10 2021, A01 - Broken Access ControlAccess c...
Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Consequences of insecure software, The OWASP Top Ten 2021The OWASP Top 10 2021, A01 - Broken Access ControlAccess control basics, Missing or im...
Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Cyber security threat types – the STRIDE model, Consequences of insecure software, Cloud security basicsCloud infrastructure basics, The Cloud...
Modul 1: Beschreibung der wichtigsten Azure-KonzepteIn diesem Modul erhalten Sie einen umfassenden Einblick in Azure und seine Funktionen, der Ihnen eine solide Grundlage für die Vervollständigung der verfügbaren Module für Azure Fundamentals bietet....