Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "rman backup "
- Status: New
Skills you'll gain: Vulnerability Management, Risk Analysis, Risk Management, Disaster Recovery, Incident Response, Business Continuity Planning, Security Management, Vulnerability Assessments, Threat Modeling, Computer Security Incident Management, Threat Management, Business Risk Management, Cyber Risk, Continuous Monitoring, Cybersecurity, Cyber Threat Intelligence, General Data Protection Regulation (GDPR)
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Cloud Management, Cloud Computing, Cloud Infrastructure, Cloud Storage, Cloud Technologies, Server Administration, Private Cloud, Cloud Security, User Accounts, Docker (Software), Scalability
- Status: New
Skills you'll gain: Disaster Recovery, Server Administration, Windows Servers, Linux Servers, Servers, Systems Administration, Network Troubleshooting, IT Infrastructure, Cloud Computing, Hardware Troubleshooting, Data Storage Technologies, IT Automation, Security Controls, Technical Support and Services, Networking Hardware, Computer Hardware, Data Security
- Status: New
Skills you'll gain: Data Centers, Infrastructure as Code (IaC), Role-Based Access Control (RBAC), Network Security, Proxy Servers, Service Oriented Architecture, Configuration Management, Systems Architecture, Disaster Recovery, Encryption, Scalability
- Status: New
Skills you'll gain: IT Security Architecture, Security Controls, Identity and Access Management, Incident Response, Vulnerability Management, Network Security, Cloud Security, Vulnerability Assessments, Threat Detection, Cybersecurity, Data Security, Infrastructure Security, Computer Networking, Cloud Computing, Firewall, Encryption
- Status: New
Skills you'll gain: Penetration Testing, Security Testing, Vulnerability Scanning, Application Security, Vulnerability Assessments, Infrastructure Security, Web Applications, Data Security, Cybersecurity, Web Servers, SQL