validation 38 Veranstaltungen

Verwandte Suchbegriffe: wird geladen ...

PREFERRED

Cegos Integrata GmbH (256)

Die Kursagenda umfasst die folgenden Lernergebnisse/ Assessment-Kriterien, die Ihnen helfen sollen, die wichtigsten Faktoren zu verstehen, wie digitale Organisationen und digitale Betriebsmodelle in Hochgeschwindigkeitsumgebungen mit Hilfe des neuen...

  • Webinar
  • Ohne Einstufung

PREFERRED

Cegos Integrata GmbH (256)

Die Kursagenda umfasst die folgenden Lernergebnisse/ Assessment-Kriterien, die Ihnen helfen sollen, die wichtigsten Faktoren zu verstehen, wie digitale Organisationen und digitale Betriebsmodelle in Hochgeschwindigkeitsumgebungen mit Hilfe des neuen...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Cegos Integrata GmbH (256)

Grundlegende Einblicke in das Feld des Maschinellen Lernens: Einführung in das Gebiet des Maschinellen Lernens, Erläuterung der Unterschiede zwischen überwachtem und unüberwachtem Lernen, Überwindung von Overfitting durch kluge Da...

  • Webinar
  • Ohne Einstufung

PREFERRED

Cegos Integrata GmbH (256)

Python-Essentials: Installation von neuen Modulen, Jupyter Notebooks / Jupyter Lab, Verwendung von Funktionen und Methoden, Python im Vergleich zu anderen Sprachen Grundlegende Datenstrukturen: Einführung in grundlegende Datentypen (String, Inte...

  • Webinar
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Cyber security basics, Input validation, Security features, Using vulnerable components, Cryptography for developers, Common software security weaknesses, Wrap up

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Cyber security basics, Input validation, Security features, Using vulnerable components, Cryptography for developers, Common software security weaknesses, Wrap up

  • Webinar
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Cyber security basics, Machine learning security, Input validation, Security features, Time and state, Errors, Using vulnerable components, Cryptography for developers, Wrap up

  • Webinar
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Cyber security basics, Input validation, Security features, Time and state, Errors, Cryptography for developers, Common software security weaknesses, Using vulnerable components, Wrap up

  • Webinar
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Cyber security basics, Input validation, Security features, Time and state, Errors, Cryptography for developers, Common software security weaknesses, Using vulnerable components, Wrap up

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Cyber security basics, Input validation, Security features, Time and state, Errors, Cryptography for developers, Common software security weaknesses, Using vulnerable components, Wrap up

  • Webinar
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Cyber security basics, Machine learning security, Input validation, Security features, Time and state, Errors, Using vulnerable components, Cryptography for developers, Wrap up

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Cyber security threat types – the STRIDE model, Consequences of insecure software, Regulations and standardsHealthcare data protection regulati...

  • Webinar
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Cyber security threat types – the STRIDE model, Consequences of insecure software, Regulations and standardsHealthcare data protection regulati...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Cyber security threat types – the STRIDE model, Consequences of insecure software, Cloud security basicsCloud infrastructure basics, The Cloud...

  • Webinar
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Cyber security threat types – the STRIDE model, Consequences of insecure software, Cloud security basicsCloud infrastructure basics, The Cloud...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Angular IntroductionAngular Introduction & Technology Stack, Angular CLI Essentials, Debugging Angular, Bootstrapping & Configuration, Maintaining & Updating projectsTypeScript in the Angular EcosystemTypeScript Overview, ECMA Script Standards, Types...

  • Seminar / Kurs
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Angular IntroductionAngular Introduction & Technology Stack, Angular CLI Essentials, Debugging Angular, Bootstrapping & Configuration, Maintaining & Updating projectsTypeScript in the Angular EcosystemTypeScript Overview, ECMA Script Standards, Types...

  • Webinar
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Network RequirementsClearPass goals, Network topology, List of available resources, Scenario analysis, Authentication requirements, Multiple user account databases, User account attributes, High level designPDI and Digital CertificatesCertificate typ...

  • Webinar
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Troubleshoot Record Access and Field VisibilityTroubleshoot record access, Understand the impact of territory management on the sharing model, Manage field visibilityChange ManagementManagechanges in a sandbox, Deploy changes using change setsExtend...

  • Webinar
  • Ohne Einstufung

PREFERRED

Fast Lane Institute for Knowledge Transfer

Day 1Cyber security basicsWhat is security?, Threat and risk, Cyber security threat types – the CIA triad, Consequences of insecure software, The OWASP Top Ten 2021The OWASP Top 10 2021, A01 - Broken Access ControlAccess control basics, Failure to re...

  • Webinar
  • Ohne Einstufung