process monitoring 10 Veranstaltungen

Verwandte Suchbegriffe: wird geladen ...

PREFERRED

Sponsored xamira networks GmbH

Die Teilnehmer:innen erlernen die Bereitstellung von Applikationen auf Kubernetes sowie die Administration einfacher Kubernetes-Cluster. Dazu gehört das Erstellen von Kubernetes-Manifesten und Kenntnis über die im Alltag wichtigen Ressource-Typen. Mi...

  • Webinar
  • Grundlagen
  • Durchführung garantiert

PREFERRED

PROKODA GmbH (28)

Introduction, Linux Filesystem Tree Layout, User Environment, User Account Management, Group Management, File Permissions and Ownership, Package Management Systems, dpkg, APT, RPM, dnf and yum, zypper, Introduction to GIT, Using Git: an Example, Proc...

  • Seminar / Kurs
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

PROKODA GmbH (28)

Introduction, Linux Filesystem Tree Layout, User Environment, User Account Management, Group Management, File Permissions and Ownership, Package Management Systems, dpkg, APT, RPM, dnf and yum, zypper, Introduction to GIT, Using Git: an Example, Proc...

  • Webinar
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

PROKODA GmbH (28)

Inhalt Tag 1 - 3 Security Incident Management im Unternehmen, Referent Senior Cyber Security Consultant Einleitung & Definitionen Über dieses Training, Was versteht man unter Cyber Angriffen?, Aktuelle Bedrohungslage, Einheitliche Begriffsdefinition...

  • Seminar / Kurs
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

PROKODA GmbH (28)

Inhalt Tag 1 - 3 Security Incident Management im Unternehmen, Referent Senior Cyber Security Consultant Einleitung & Definitionen Über dieses Training, Was versteht man unter Cyber Angriffen?, Aktuelle Bedrohungslage, Einheitliche Begriffsdefinition...

  • Webinar
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

tecRacer Consulting GmbH (3)

BESCHREIBUNG Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you unders...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

tecRacer Consulting GmbH (3)

BESCHREIBUNG Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you unders...

  • Webinar
  • Ohne Einstufung

PREFERRED

tecRacer Consulting GmbH (3)

Amazon SageMaker Studio helps data scientists prepare, build, train, deploy, and monitor machinelearning (ML) models quickly. It does this by bringing together a broad set of capabilities purpose-built forML. This course prepares experienced data sci...

  • Webinar
  • Ohne Einstufung

PREFERRED

tecRacer Consulting GmbH (3)

BESCHREIBUNG In this course, you will learn to build batch data analytics solutions using Amazon EMR, an enterprise-grade Apache Spark and Apache Hadoop managed service. You will learn how Amazon EMR integrates with open-source projects such as Apach...

  • Webinar
  • Ohne Einstufung

PREFERRED

PROKODA GmbH (28)

Course IntroductionIntroductions and course logistics, Course objectives, Artificial Intelligence and Machine LearningDescribe how device groups support AI and ML in vSphere 8, Describe how device virtualization extensions support AI and ML in vSpher...

  • Webinar
  • Ohne Einstufung
  • Durchführung garantiert

PREFERRED

PROKODA GmbH (28)

Course IntroductionIntroductions and course logistics, Course objectives, Artificial Intelligence and Machine LearningDescribe how device groups support AI and ML in vSphere 8, Describe how device virtualization extensions support AI and ML in vSpher...

  • Seminar / Kurs
  • Ohne Einstufung
  • Durchführung garantiert