Security 32 Veranstaltungen

Verwandte Suchbegriffe: wird geladen ...

Sophos UTM9 Certified Engineer - Schulung

Sponsored IKU GmbH & Co. KG

IKU bietet eine praxisorientierte Lab-Umgebung mit UTM Appliances, Laptops, Lab-Anleitungen und einen Kursleitfaden, der von Sophos-Experten geschrieben wurde und zahlreiche Tipps und Tricks und andere wichtige Informationen enthält, die Administratoren bei alltäglichen Routineaufgaben weiterhelfen.

mITSM GmbH (29)

ISO 27001 Foundation – English Content In our ISO 27001 Foundation training, you will learn the basics of information security management according to the international standard ISO/IEC 27001. The following content awaits you: Introduction to informa...

  • Seminar / Kurs
  • Grundlagen

mITSM GmbH (29)

ISO 27001 Foundation – English Content In our ISO 27001 Foundation training, you will learn the basics of information security management according to the international standard ISO/IEC 27001. The following content awaits you: Introduction to informa...

  • Webinar
  • Grundlagen

Albion Academy GmbH (11)

A web presence is critical for the success of any business. Therefore, it is essential for architects to acquire the necessary skills and knowledge to develop web-based software architectures that are secure, reliable, and efficient. This seminar pro...

  • Webinar
  • Grundlagen

PMI Production Management Institute GmbH (11)

The ASCM Technology Certificate covers key technologies that can streamline and improve operational performance, bolster reliability and advance processes, minimize security threats, and make informed and reliable decisions that affect overall supply...

  • Webinar
  • Ohne Einstufung

The Unit Company (3)

This TOGAF® EA Practitioner course is developed and run by The Unit Company since 2008and is accredited by The Open Group. In dieser von The Open Group akkreditierten TOGAF EA Training Version 10 lernen Sie alles über Enterprise Architecture und den...

  • Seminar / Kurs
  • Ohne Einstufung

Haufe Akademie GmbH & Co. KG (1518)

Managing without managerial authority Assuming and defining your management role within the organisation, Accepting responsibility and being accountable, Securing acceptance and recognition in your role, Security regarding your new role – in the offi...

  • Seminar / Kurs
  • Ohne Einstufung

Haufe Akademie GmbH & Co. KG (1518)

Setting the scene in general: What is so different about Germany and German laws: The German social security system., The Civil law systems. Hiring of employees Employees status or contractor., Reference letters., Job adverts. The employment contract...

  • Seminar / Kurs
  • Ohne Einstufung

Haufe Akademie GmbH & Co. KG (1518)

UX writing and what makes it unique Establishing differences and similarities with marketing and corporate communication., Assessing and grouping the needs and expectations of your users., Designing a positive and intuitive user experience., Striking...

  • Webinar
  • Ohne Einstufung

ETC - Enterprise Training Center GmbH (30)

Der Windows OS Troubleshooting Experten Workshop aus der ETC Lighthouse Series. Achtung - Kurssprache Englisch! In diesem Kurs lernen Sie, wie das Betriebssystem wirklich funktioniert und wie man Probleme effektiv beheben kann. Sie gilt für all...

  • Seminar / Kurs
  • Ohne Einstufung

NO MONKEY Security GmbH

Shifting your SAP systems to the cloud is inevitable. Thus, understanding how to protect your data and assets during the transition is critical. This training will enable you to define a governance model, understand your threat landscape, grasp the r...

  • Webinar
  • Ohne Einstufung

NO MONKEY Security GmbH

Finally, a course to demystify SAP for security professionals! In this Live Online Training, penetration testers and application security experts take a deep dive into the security traits of SAP technology and the organizations and processes running...

  • Webinar
  • Ohne Einstufung

NO MONKEY Security GmbH

This course covers the main security mechanisms that SAP provides as part of an SAP S/4HANA©system. S/4HANA©consists of two distinct components: the Application Server (ABAP) which contains the business logic, and the database (HANA) which stores the...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

NO MONKEY Security GmbH

Offered exclusively by NO MONKEY, this online classroom training brings together the SAP operations and IT Security lines of defense. It teaches them how to put preventive controls in place to detect and manage JavaScript code security flaws in the S...

  • Webinar
  • Ohne Einstufung

NO MONKEY Security GmbH

This class teaches you how to look for security vulnerabilities in ABAP® based business applications, understanding their root causes, what to do when you find them, and how to avoid creating them. In two four-hour sessions you will learn to detect c...

  • Webinar
  • Ohne Einstufung

NO MONKEY Security GmbH

Gain an overview of how the current threat situation in SAP systems is developing and learn how to check your SAP system for typical security vulnerabilities. This four-hour training begins by bringing you up-to-date on the most current attack vector...

  • Webinar
  • Ohne Einstufung

NO MONKEY Security GmbH

This online training is designed for SAP technology experts and security professionals looking to improve their incident detection and response skills within their SAP Landscape. You will learn about the MITRE Attack framework as a tool for realistic...

  • Webinar
  • Ohne Einstufung

NO MONKEY Security GmbH

As a developer or software security engineer, it's essential to know the security traits of the technology and tools used to create and run the software application. ABAP® is no different. Because of SAP's ABAP® product strategy and how specific prot...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

NO MONKEY Security GmbH

As with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

NO MONKEY Security GmbH

Learn threat modeling and how to apply this exercise for SAP system landscapes. Threat modeling is an important exercise to prioritize security activities according to the organization's cyber threats. It is key when dealing with limited resources to...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert

NO MONKEY Security GmbH

As with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to...

  • E-Learning
  • Ohne Einstufung
  • Durchführung garantiert