- Seminar / Training
- SUSE
- Management of the IT infrastructure
- Container and application platforms
- SUSE OpenStack Cloud Introduction
- SUSE OpenStack Cloud Administration
- SUSE OpenStack Cloud Deployment
- SUSE OpenStack Cloud Complete
- SUSE Enterprise Storage Administration
- SLES SUSE Linux Enterprise Administration
- SLES SUSE Linux Enterprise Update
- SLES SUSE Linux Enterprise Network Administration
- SLES SUSE Linux Enterprise Cluster
- SLES SUSE Linux Enterprise Security
- Seminar / Training
- SUSE
- Management of the IT infrastructure
- Container and application platforms
- SUSE OpenStack Cloud Introduction
- SUSE OpenStack Cloud Administration
- SUSE OpenStack Cloud Deployment
- SUSE OpenStack Cloud Complete
- SUSE Enterprise Storage Administration
- SLES SUSE Linux Enterprise Administration
- SLES SUSE Linux Enterprise Update
- SLES SUSE Linux Enterprise Network Administration
- SLES SUSE Linux Enterprise Cluster
- SLES SUSE Linux Enterprise Security
SLES SUSE Linux Enterprise Security
Seminar / Training SLES SUSE Linux Enterprise Security
Introduction to SLES Security Threats and Risk Assessment - Attack Types - Physical Access - Physical Security - Hardware Security - SLES Linux Boot Process SLES Logging - Logging Overview - Syslog Services SLES Linux Kernel Audit Daemon - SLES Linux Firewall Logging - Log Reports Auditing and Detection - Basics - Attack History - Detecting Attacks - Intrusion Detection System - Application Security - Bugs, Beetles - Tracking and Documentation of Changes - Resource Access Control - Policy-Based Access Control Frameworks SLES Kernel Vulnerabilities - Kernel and User Spaces - Reducing Kernel Vulnerabilities SLES Linux Authentication - Encryption - Authentication - Passwords - Hardware Tokens - Biometric Authentication - Network and Centralized Authentication Local System Security - Administrator Account - File System Integrity - Quotas Network Security - TCP/IP Protocols - Remote Trust Vectors - Remote Exploits SLES Network Services Security - Network Tools - Databases - Web Servers - File Servers Denial of Service - DoS Methods - Techniques to Reduce Remote Access - Unencrypted Protocols - Accessing Windows Systems - SSH - IPSEC VPNs SLES Firewall and Packet Filtering - Basics - Netfilters (IPTables) - Netfilter Implementation - Reducing Login Attempts
Requirements
SLES System Administration
We conduct this seminar online for you. You can book the training as a public seminar or as a company seminar. The practical exercises are carried out in our Remotelab and make up 40-50 percent of the seminar.
Your contacts
-
Promise Akachukwu Kelechi
E-Mail: promise@computer-training.ng
Phone: +234 1 227 9218 -
Peter Chidiebere Ugochukuw
E-Mail: peter@computer-training.ng
Phone: +234 1 227 9218 -
Raphael Chukuwgozie Ndubuisi
E-Mail: raphael@computer-training.ng
Phone: +234 1 227 9218
- Implementation guarantee - Implementation guarantee for two or more participants
- Mobile classrooms - the ideal complement for company seminars
- Free support - for questions after the seminar
- Delivery on account - no prepayment required
- Interview with the trainer / quality assurance - get to know and assess the trainer in advance
- Clarify seminar requirements - review your knowledge with the trainer
- Assistance with travel costs - we cover part of the costs of hotel accommodation
- Meals - all day cold / hot drinks and a full lunch in the restaurant
- Location of training centres - always centrally located and easily accessible
- Discount - we have attractive prices, take advantage of our additional discounts
- Remotelabs - rent our Remotelabs for your own seminars or as a complement to your company seminars
Prestations de service
Nous vous proposons des séminaires très pertinents sur le plan pratique. Le contenu et les exercices sont axés sur vos tâches quotidiennes dans l'entreprise et évitent totalement les références publicitaires à d'autres produits du fabricant de logiciels.
Toutes les formations que nous proposons sont indépendantes du fabricant. Cela nous permet d'offrir des observations critiques sur les produits eux-mêmes et des comparaisons avec les concurrents du fabricant dans le séminaire. Le contenu des cours nous est propre et découle de l'expérience pratique de nos formateurs dans le cadre de projets.
Bien entendu, le contenu des séminaires d'entreprise peut être adapté à vos besoins. N'hésitez pas à nous contacter.
Réservation
Das Seminar wurde auf die Merkliste gesetzt
Das von Ihnen gewählte Seminar wurde bereits auf die Merkliste gesetzt
Bitte wählen Sie einen freien Termin aus
Bitte geben Sie Ihren Wunschtermin im Format tt.mm.jjjj ein
Bitte wählen Sie einen freien Termin aus
Bitte geben Sie den gewünschten Termin im Format tt.mm.jjjj der Schulung ein