Atrakcyjny system wynagrodzenia
Na nasze szkolenia stać każdego!
Szkolenia językowe i z wykorzystania aplikacji są całkowicie bezpłatne! Za szkolenia autoryzowane Microsoft, Oracle zapłacisz jedynie ułamek ceny rynkowej!
Atrakcyjny system wynagrodzenia
Szkolenia autoryzowane
Microsoft, Oracle. Te nazwy otwierają przed Tobą nowe perspektywy pracy. Skorzystaj ze ścieżek szkoleniowych, składających się z dwóch szkoleń autoryzowanych!
Atrakcyjny system wynagrodzenia
Cenimy Twój czas!
Harmonogramy szkoleń będą dopasowane do potrzeb uczestników w zakresie: intensywności, dni tygodnia, preferowanych godzin i miejsc. Ponadto część kursów zostanie przeprowadzona w nowoczesnej, skondensowanej formie online – bez potrzeby wychodzenia z domu!
Atrakcyjny system wynagrodzenia
Potwierdzamy zdobytą wiedzę!
Każdy uczestnik, po odbyciu szkolenia i zdaniu egzaminu, otrzyma imienny certyfikat potwierdzający zdobytą wiedzę i uzyskane kwalifikacje.

AZ-900T00 Microsoft Azure Fundamentals (16h)

Informacje o szkoleniu:

This two-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support.Note: This course provides an Azure pass and time for students to participate in hands-on labs. If you do not need hands-on experience, consider the AZ-900T01: Microsoft Azure Fundamentals (1 day) course. The content for both courses align to the AZ-900 exam objective domain.

Target audience:
This course is suitable for IT personnel who are just beginning to work with Azure. This audience wants to learn about our offerings and get hands-on experience with the product. This course primarily uses the Azure portal to create services and does not require scripting skills. Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator. This course provides an Azure pass and optional lab environment. This course combines lecture, demonstrations, and hands-on labs. This course will also help prepare someone for the AZ-900 exam.

Prerequisites:

There are no prerequisites for taking this course. However, the moretechnical knowledge a student has the more they will understand about the cloud.

Zagadnienia poruszane podczas szkolenia:

  • Module 1: Cloud Concepts
  • Module 2: Core Azure Services
  • Module 3: Security, Privacy, Compliance, and Trust
  • Module 4: Azure Pricing and Support

AZ-104T00 Microsoft Azure Administrator (32h)

Informacje o szkoleniu:

This course teaches IT Professionals how to manage their Azure subscriptions, create and scale virtual machines, implement storage solutions, configure virtual networking, back up and share data, connect Azure and on-premises sites, manage network traffic, implement Azure Active Directory, secure identities, and monitor your solution.

Target audience:
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.

Prerequisites:

  • Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks.
  • Understanding of network configuration, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies.
  • Understanding of Active Directory concepts, including domains, forests, domain controllers, replication, Kerberos protocol, and Lightweight Directory Access Protocol (LDAP).
  • Understanding of resilience and disaster recovery, including backup and restore operations.

Zagadnienia poruszane podczas szkolenia:

  • Module 1: Azure Administration
  • Module 2: Azure Virtual Machines
  • Module 3: Azure Storage
  • Module 4: Virtual Networking
  • Module 5: Intersite Connectivity
  • Module 6: Monitoring
  • Module 7: Data Protection
  • Module 8: Network Traffic Management
  • Module 9: Azure Active Directory
  • Module 10: Securing Identities
  • Module 11: Governance and Compliance
  • Module 12: Data Services

AZ-500T00 Microsoft Azure Security Technologies (32h)

Informacje o szkoleniu:

This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.

Benefits:
After completing this course, students will be able to:

  • Describe specialized data classifications on Azure
  • Identify Azure data protection mechanisms
  • Implement Azure data encryption methods
  • Secure Internet protocols and how to implement them on Azure
  • Describe Azure security services and features

Target audience:
This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data.

Prerequisites:
To get the most out of this course students should:

  • Understand security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model.
  • Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods.
  • Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information.
  • Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI.
  • Microsoft Azure Administrator Associate

Zagadnienia poruszane podczas szkolenia:

  • Module 1: Manage Identity and Access
  • Module 2: Implement Platform Protection
  • Module 3: Secure Data and Applications
  • Module 4: Manage Security Operations

 

 

 

AZ-900T00 Microsoft Azure Fundamentals (16h)

Informacje o szkoleniu:

This two-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support.Note: This course provides an Azure pass and time for students to participate in hands-on labs. If you do not need hands-on experience, consider the AZ-900T01: Microsoft Azure Fundamentals (1 day) course. The content for both courses align to the AZ-900 exam objective domain.

Target audience:
This course is suitable for IT personnel who are just beginning to work with Azure. This audience wants to learn about our offerings and get hands-on experience with the product. This course primarily uses the Azure portal to create services and does not require scripting skills. Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator. This course provides an Azure pass and optional lab environment. This course combines lecture, demonstrations, and hands-on labs. This course will also help prepare someone for the AZ-900 exam.

Prerequisites:

There are no prerequisites for taking this course. However, the moretechnical knowledge a student has the more they will understand about the cloud.

Zagadnienia poruszane podczas szkolenia:

  • Module 1: Cloud Concepts
  • Module 2: Core Azure Services
  • Module 3: Security, Privacy, Compliance, and Trust
  • Module 4: Azure Pricing and Support

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure (32h)

Informacje o szkoleniu

This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment.

Skills gained

  • Use administrative techniques and tools in Windows Server.
  • Identify tools used to implement hybrid solutions, including Windows Admin Center and PowerShell.
  • Implement identity services in Windows Server.
  • Implement identity in hybrid scenarios, including Azure AD DS on Azure IaaS and managed AD DS.
  • Integrate Azure AD DS with Azure AD.
  • Manage network infrastructure services.
  • Deploy Azure VMs running Windows Server, and configure networking and storage.
  • Administer and manage Windows Server IaaS Virtual Machine remotely.
  • Manage and maintain Azure VMs running Windows Server.
  • Configure file servers and storage.
  • Implement File Services in hybrid scenarios, using Azure Files and Azure File Sync.

Audience Profile
This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment

Prerequisites
Before attending this course, students must have:

  • Experience with managing Windows Server operating system and Windows Server workloads in on-premises scenarios, including AD DS, DNS, DFS, Hyper-V, and File and Storage Services
  • Experience with common Windows Server management tools (implied in the first prerequisite).
  • Basic knowledge of core Microsoft compute, storage, networking, and virtualization technologies (implied in the first prerequisite).
  • Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP)
  • Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts
  • Basic experience with implementing and managing IaaS services in Microsoft Azure
  • Basic knowledge of Azure Active Directory
  • Experience working hands-on with Windows client operating systems such as Windows 10 or Windows 11
  • Basic experience with Windows PowerShell

Zagadnienia poruszane podczas szkolenia

Course outline

  • Module 1: Identity services in Windows Server
  • Module 2: Implementing identity in hybrid scenarios
  • Module 3: Windows Server administration
  • Module 4: Facilitating hybrid management
  • Module 5: Hyper-V virtualization in Windows Server
  • Module 6: Deploying and configuring Azure VMs
  • Module 7: Network infrastructure services in Windows Server
  • Module 8: Implementing hybrid networking infrastructure
  • Module 9: File servers and storage management in Windows Server
  • Module 10: Implementing a hybrid file server infrastructure

AZ-801T00 Configuring Windows Server Hybrid Advanced Services (32h)

Informacje o szkoleniu

This four-day instructor-led course is designed for IT professionals who configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. These professionals manage and support an infrastructure that includes on-premises and Azure IaaS-hosted Windows Server-based workloads. The course teaches IT professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to manage and secure Azure VMs running Windows Server. The course also covers how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights various administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor.

Skills gained

  • Harden the security configuration of the Windows Server operating system environment.
  • Enhance hybrid security using Azure Security Center, Azure Sentinel, and Windows Update Management.
  • Apply security features to protect critical resources.Implement high availability and disaster recovery solutions.
  • Implement recovery services in hybrid scenarios.
  • Plan and implement hybrid and cloud-only migration, backup, and recovery scenarios.
  • Perform upgrades and migration related to AD DS, and storage.
  • Manage and monitor hybrid scenarios using WAC, Azure Arc, Azure Automation and Azure Monitor.
  • Implement service monitoring and performance monitoring, and apply troubleshooting.


Audience Profile

This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting.

Prerequisites
Before attending this course, students must have:

  • Experience with managing Windows Server operating system and Windows Server workloads in on-premises scenarios, including AD DS, DNS, DFS, Hyper-V, and File and Storage Services
  • Experience with common Windows Server management tools (implied in the first prerequisite).
  • Basic knowledge of core Microsoft compute, storage, networking, and virtualization technologies (implied in the first prerequisite).
  • Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP)
  • Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts
  • An awareness of basic security best practices
  • Basic understanding of security-related technologies (firewalls, encryption, multi-factor authentication, SIEM/SOAR).
  • Basic knowledge of on-premises resiliency Windows Server-based compute and storage technologies (Failover Clustering, Storage Spaces).
  • Basic experience with implementing and managing IaaS services in Microsoft Azure
  • Basic knowledge of Azure Active Directory
  • Experience working hands-on with Windows client operating systems such as Windows 10 or Windows 11
  • Basic experience with Windows PowerShell

An understanding of the following concepts as related to Windows Server technologies:

  • High availability and disaster recovery
  • Automation
  • Monitoring
  • Troubleshooting

 

Zagadnienia poruszane podczas szkolenia

Course outline

  • Module 1: Windows Server security
  • Module 2: Implementing security solutions in hybrid scenarios
  • Module 3: Implementing high availability
  • Module 4: Disaster recovery in Windows Server
  • Module 5: Implementing recovery services in hybrid scenarios
  • Module 6: Upgrade and migrate in Windows Server
  • Module 7: Implementing migration in hybrid scenarios
  • Module 8: Server and performance monitoring in Windows Server
  • Module 9: Implementing operational monitoring in hybrid scenarios

AZ-500T00 Microsoft Azure Security Technologies (32h)

Informacje o szkoleniu:

This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.

Benefits:
After completing this course, students will be able to:

  • Describe specialized data classifications on Azure
  • Identify Azure data protection mechanisms
  • Implement Azure data encryption methods
  • Secure Internet protocols and how to implement them on Azure
  • Describe Azure security services and features

Target audience:
This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data.

Prerequisites:
To get the most out of this course students should:

  • Understand security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model.
  • Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods.
  • Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information.
  • Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI.
  • Microsoft Azure Administrator Associate

Zagadnienia poruszane podczas szkolenia:

  • Module 1: Manage Identity and Access
  • Module 2: Implement Platform Protection
  • Module 3: Secure Data and Applications
  • Module 4: Manage Security Operations

MS-500T00 Microsoft 365 Security Administration (32h)

Informacje o szkoleniu:

In this course you will learn how to secure user access to your organization’s resources. The course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to setup and use Azure AD Connect, and introduces you to conditional access in Microsoft 365. You will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, you will learn about threat vectors and Microsoft’s security solutions to mitigate threats. You will learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and threat management. In the course you will learn about information protection technologies that help secure your Microsoft 365 environment. The course discusses information rights managed content, message encryption, as well as labels, policies and rules that support data loss prevention and information protection. Lastly, you will learn about archiving and retention in Microsoft 365 as well as data governance and how to conduct content searches and investigations. This course covers data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations.

Benefits:
Learn to:

  • Administer user and group access in Microsoft 365.
  • Explain and manage Azure Identity Protection.
  • Plan and implement Azure AD Connect.
  • Manage synchronized user identities.
  • Explain and use conditional access.
  • Describe cyber-attack threat vectors.
  • Explain security solutions for Microsoft 365.
  • Use Microsoft Secure Score to evaluate and improve your security posture.
  • Configure various advanced threat protection services for Microsoft 365.
  • Plan for and deploy secure mobile devices.
  • Implement information rights management.
  • Secure messages in Office 365.
  • Configure Data Loss Prevention policies.
  • Deploy and manage Cloud App Security.
  • Implement Windows information protection for devices.
  • Plan and deploy a data archiving and retention system.
  • Create and manage an eDiscovery investigation.
  • Manage GDPR data subject requests.
  • Explain and use sensitivity labels.

Target Audience:

The Microsoft 365 Security administrator collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and to ensures that the solutions comply with the policies and regulations of the organization. This role proactively secures Microsoft 365 enterprise environments. Responsibilities include responding to threats, implementing, managing and monitoring security and compliance solutions for the Microsoft 365 environment. They respond to incidents, investigations and enforcement of data governance. The Microsoft 365 Security administrator is familiar with Microsoft 365 workloads and hybrid environments. This role has strong skills and experience with identity protection, information protection, threat protection, security management and data governance.

Prerequisites:
Learners should start this course already having the following skills:

  • Basic conceptual understanding of Microsoft Azure.
  • Experience with Windows 10 devices.
  • Experience with Office 365.
  • Basic understanding of authorization and authentication.
  • Basic understanding of computer networks.
  • Working knowledge of managing mobile devices.

Zagadnienia poruszane podczas szkolenia:

  • Module 1: User and Group Management
  • Module 2: Identity Synchronization and Protection
  • Module 3: Identity and Access Management
  • Module 4: Security in Microsoft 365
  • Module 5: Threat Protection
  • Module 6: Threat Management
  • Module 7: Microsoft Cloud Application Security
  • Module 8: Mobility
  • Module 9: Information Protection and Governance
  • Module 10: Rights Management and Encryption
  • Module 11: Data Loss Prevention
  • Module 12: Compliance Management
  • Module 13: Insider Risk Management
  • Module 14: Discover and Respond

SC-400T00 Microsoft Information Protection Administrator (16h)

Informacje o szkoleniu:

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and Office 365 message encryption among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).

Skills gained:

  • Explain and use sensitivity labels.
  • Configure Data Loss Prevention policies.
  • Secure messages in Office 365.
  • Describe the information governance configuration process.
  • Define key terms associated with Microsoft’s information protection and governance solutions.
  • Explain the Content explorer and Activity explorer.
  • Describe how to use sensitive information types and trainable classifiers.
  • Review and analyze DLP reports.
  • Identify and mitigate DLP policy violations.
  • Describe the integration of DLP with Microsoft Cloud App Security (MCAS).
  • Deploy Endpoint DLP
  • Describe records management
  • Configure event driven retention
  • Import a file plan
  • Configure retention policies and labels
  • Create custom keyword dictionaries
  • Implement document fingerprinting

The Information Protection Administrator plans and implements controls that meet organizational compliance needs. This person is responsible for translating requirements and compliance controls into technical implementation. They assist organizational control owners to become and stay compliant. They work with information technology (IT) personnel, business application owners, human resources, and legal stakeholders to implement technology that supports policies and controls necessary to sufficiently address regulatory requirements for their organization. They also work with the compliance and security leadership such as a Chief Compliance Officer and Security Officer to evaluate the full breadth of associated enterprise risk and partner to develop those policies. This person defines applicable requirements and tests IT processes and operations against those policies and controls. They are responsible for creating policies and rules for content classification, data loss prevention, governance, and protection.

Before attending this course, students should have:

  • Foundational knowledge of Microsoft security and compliance technologies.
  • Basic knowledge of information protection concepts.
  • Understanding of cloud computing concepts.
  • Understanding of Microsoft 365 products and services.

Zagadnienia poruszane podczas szkolenia:

Implement Information Protection in Microsoft 365

  • Introduction to information protection and governance in Microsoft 365
  • Classify data for protection and governance
  • Create and manage sensitive information types
  • Describe Microsoft 365 encryption
  • Deploy message encryption in Office 365
  • Configure sensitivity labels
  • Apply and manage sensitivity labels

Implement Data Loss Prevention in Microsoft 365

  • Prevent Data loss in Microsoft 365
  • Implement Endpoint data loss prevention
  • Configure DLP policies for Microsoft Cloud App Security and Power Platform
  • Manage DLP policies and reports in Microsoft 365

Implement Information Governance in Microsoft 365

  • Govern information in Microsoft 365
  • Manage data retention in Microsoft 365 workloads
  • Manage records in Microsoft 365

OR_SE_PRI Java SE: Programming I Ed 2 (40h)

Informacje o szkoleniu:

The course is designed for programmers who will apply these language skills to develop programs using the latest majorversions of the JDK, currently Java 11. Students practice the skills learned in each lesson through hands-on labs.

Course description:

This entry-level course is aimed at programmers who are new to Java and who need to learn its concepts, languageconstructs, and data types. Included in the agenda are topics on exception handling, lambda expressions, and modularprogramming.

Audience profile:
Architect Java
Developers System
Analysts Technical
Consultant

Prerequisites:
Required Prerequisites
Familiarity with general computer programming concepts and techniques
Suggested Prerequisites
Experience with another programming language

Zagadnienia poruszane podczas szkolenia:

Course Objectives

  • Write Java code that uses variables, arrays, conditional and loop constructs of achieve program objectives
  • Identify modular programming principlesAccess and create static fields and methods
  • Encapsulate a class using access modifiers and overloaded constructors
  • Manipulate numeric, text, and string data using appropriate Java operators
  • Set environment variables to allow the Java compiler and runtime executables to function properly
  • Create simple Java classes and use object references to access fields and methods in a class
  • Demonstrate polymorphism by implementing a Java interface
  • Handle a checked exception in a Java application
  • Use a Predicate Lambda expression as the argument to a method
  • Define and implement a simple class hierarchy that supports application requirements

OR_SE_PRII Java SE: Programming II (40h)

Informacje o szkoleniu:

This is a second-level course for programmers learning the Java language. It rounds-out the topics that were taught in the previous course, Java SE: Programming I, and provides additional key skills for Java programmers, such as secure coding, modular programming, and database access.

This course uses today's main Java version for its practices (currently Java 11).

Do kogo skierowane jest to szkolenie:
Data Scientist
Developer
Implementer

Wymagania wstępne: 

Required Prerequisite

Java SE: Programming I 

Zagadnienia poruszane podczas szkolenia:

  • Create Java applications that leverage the object-oriented features of the Java language, such as encapsulation, inheritance, and polymorphism,
  • Execute a Java application from the command line,
  • Create applications that use the Java Collections framework,
  • Search and filter collections using Lambda Expressions,
  • Implement error-handling techniques using exception handling,
  • Implement input/output (I/O) functionality to read from and write to data and text files,
  • Manipulate files, directories and file systems using the JDK NIO.2 specification,
  • Perform multiple operations on database tables, including creating, reading, updating and deleting using both JDBC and JPA technology,
  • Use Lambda Expression concurrency features,
  • Apply modular programming practices and services to applications,
  • Create high-performing multi-threaded applications

OR_19C_SQLW Oracle Database 19c: SQL Workshop (40h)

Informacje o szkoleniu:

Szkolenie Oracle Database 19c: SQL Workshop jest kursem wprowadzającym do technologii Oracle Database 19c. Uczestnicy szkolenia poznają pojęcia dotyczące relacyjnych baz danych oraz język programowania SQL. W trakcie szkolenia zdobędziesz umiejętność posługiwania się językiem SQL, co pozwoli Ci tworzyć zapytania pozwalające na pobieranie danych z jednej lub wielu tabel, zmieniające dane w tabelach oraz służące tworzeniu obiektów bazy danych.

W trakcie szkolenia nauczysz się:

  • Charakteryzować główne komponenty bazy danych Oracle
  • Pobierać i transformować dane z tabel z użyciem polecenia SELECT
  • Modyfikować dane w tabelach
  • Tworzyć raporty prezentujące posortowane dane zgodne z zadanymi kryteriami
  • Wykorzystywać funkcje języka SQL

Zagadnienia poruszane podczas szkolenia:

  • Wprowadzenie
  • Pobieranie danych z wykorzystaniem polecenia SELECT
  • Sortowanie danych i ograniczanie wyników według zadanych kryteriów
  • Użycie funkcji skalarnych 
  • Użycie funkcji konwersji i wyrażeń warunkowych
  • Grupowanie danych
  • Łączenie danych z wielu tabel z wykorzystaniem klauzuli JOIN
  • Użycie podzapytań
  • Użycie operatora SET
  • Zarządzanie tabelami z wykorzystaniem wyrażeń DML
  • Wstęp do języka definicji danych (Data Definition Language – DDL)
  • Wprowadzenie do widoków słownika danych (Data Dictionary Views)
  • Tworzenie sekwencji, synonimów i indeksów
  • Tworzenie widoków
  • Zarządzanie obiektami schematu bazy danych
  • Pobieranie danych z wykorzystaniem podzapytań
  • Modyfikowanie danych z wykorzystaniem podzapytań
  • Zarządzanie dostępem użytkowników do zasobów
  • Modyfikowanie danych z wykorzystaniem zaawansowanych zapytań
  • Zarządzanie danymi w różnych strefach czasowych 
  • Podsumowanie

OR_DB_AW Oracle Database: Administration Workshop (40h)

Informacje o szkoleniu:

This course provides detailed information on the architecture of an Oracle Database instance and database, enabling you to manage your database resources effectively. You learn how to create database storage structures appropriate for the business applications supported by your database. In addition, you learn how to create users and administer database security to meet your business requirements. This course provides basic information on backup and recovery techniques. To provide an acceptable response time to users and manage resources effectively, you learn how to monitor your database and manage performance.

Versions Supported: 19c, 18c, 12c

Benefits:
You will benefit from this course as you learn detailed information on the architecture of an Oracle Database instance and database, enabling you to manage your database resources effectively. You learn how to create database storage structures appropriate for the business applications supported by your database. In addition, you learn how to create users and administer database security to meet your business requirements. This course provides basic information on backup and recovery techniques. To provide an acceptable response time to users and manage resources effectively, you learn how to monitor your database and manage performance.

Czego się nauczysz:
Learn To:

  • Manage an Oracle Database instance.
  • Configure the Oracle Network environment.
  • Create and manage storage structures.
  • Manage and move data.
  • Create and manage users.
  • Monitor the database and manage performance.
  • Create and manage Database Cloud Service database deployments.

Do kogo skierowane jest to szkolenie:
Audience:

Data Warehouse Administrator
Database Administrator
Database Designer
Support Engineer
Technical Administrator

Wymagania wstępne:

Oracle Database 12c: Introduction to SQL

Zagadnienia poruszane podczas szkolenia:
Course Topics:

  • Introduction
  • Oracle Database Architecture
  • Introduction to Oracle Database Cloud Service
  • Creating DBCS Database Deployments
  • Accessing an Oracle Database
  • Managing DBCS Database Deployments
  • Managing Database Instances
  • Understanding Oracle Net Services
  • Administering User Security
  • Creating PDBs
  • Creating Master Encryption Keys for PDBs
  • Creating and Managing Tablespaces
  • Managing Storage Space
  • Managing Undo Data
  • Moving Data
  • Backup and Recovery Concepts
  • Backup and Recovery Configuration
  • Creating Database Backups
  • Performing Database Recovery
  • Monitoring and Tuning Database Performance
  • SQL Tuning

OR_SEC_PRC Oracle Database Security: Preventive Controls Ed 1 (40h)

Informacje o szkoleniu:

In the Oracle Database Security: Preventive Controls course, students learn how they can use Oracle Database Security products and technologies to meet the security, privacy and compliance requirements of their organization.

The current regulatory environment of the Sarbanes-Oxley Act, HIPAA, the UK Data Protection Act, and others, requires better security at the database level. Students learn how to secure the access to their databases and how to use the Oracle Database Security products and technologies that enhance data access and confidentiality. The course provides suggested Oracle solutions for common problems.

Benefits:
This course discusses the following security features of the database: authentication, data access control including user authorizations by using privileges and roles, data confidentiality including Data Redaction, Oracle Data Masking and Subsetting, Transparent Sensitive Data Protection, encryption at the column, tablespace and file levels by using Transparent Data Encryption. This course discusses the use of the Oracle Key Vault to centrally manage keys across the enterprise. Oracle Database Vault is used to enforce Separation of Duties at the DBA level.

Hands-on practices and available demonstrations help students learn how to use most of the features of Oracle Database 12c to secure their data center, by using Oracle Enterprise Manager Cloud Control or other simple tools such as SQL*Plus.

Course description:

  • Choose Oracle Database Security products and technologies to meet security requirements.
  • Secure the database access by database or enterprise users with basic or strong authentication such as SSL, Kerberos and Radius.
  • Protect against database bypass by using Transparent Database Encryption.
  • Use Oracle Wallets and Oracle Key Vault to manage encryption keys.
  • Discover sensitive columns such as Credit Card Numbers by using Application Data Modeling.
  • Minimize sensitive data proliferation to test/dev environments by using Data Masking.
  • Minimize storage costs in test/dev environments by using Data Subsetting.
  • Reduce sensitive data exposure in applications by using Data Redaction.
  • Understand and use Oracle Database Vault.

Audience profile:

  • Database Administrators
  • Network Administrator
  • Security Administrators
  • Support Engineer
  • System Analysts

Prerequisites:

  • Required Prerequisites
    • Create PL/SQL procedures
    • Create and manage tables and tablespaces
    • Create and manage users, roles, and privileges
    • Oracle Database 12c: Administration Workshop Ed 2
    • Introduction to Oracle Database Security Ed 1
  • Suggested Prerequisites
    • Familarity with Oracle Enterprise Manager Cloud Control
    • Familarity with SQL*Plus, SQL*Developer
    • Use Flashback Data Archive and Create PL/SQL procedures
    • Use Oracle Data Pump export and import and Perform RMAN back

Zagadnienia poruszane podczas szkolenia:
Course Objectives:

  • Configure and use Transparent Data Encryption
  • Understand and use Oracle Key Vault
  • Understand Oracle Data Redaction
  • Understand and use Oracle Data Masking and Subsetting
  • Understand security risks and identify appropriate Oracle solutions
  • Configure general authentication and authorization
  • Understand and implement Global Users
  • Set up and maintain a simple wallet
  • Install and use Oracle Database Vault
  • Configure and use Transparent Sensitive Data Protection

Course Topics:

Introduction

  • Course Objectives
  • Related courses and where this fits
  • Course Schedule and Appendices

Using Basic and Strong User Authentication

  • Basic Authentication
  • Strong Authentication
  • Database Link Passwords Protection
  • Security of Roles

Configuring Global User Authentication

  • About Enterprise User Management (EUS)
  • EUS and LDAP Integration

Using Proxy Authentication

  • Security Challenges of Three-Tier Computing
  • Proxy Authentication Solutions

Encryption Concepts and Solutions

  • Concepts
  • Solutions
  • Oracle Solutions

Using Built-In Encryption in Applications

  • Usage

Using Transparent Data Encryption (TDE)

  • Overview
  • The Master Keys and the Keystore
  • Hardware Keystore
  • Encryption

Database Storage Security

  • RMAN and OSB Backups
  • RMAN Encryption Modes
  • Data Pump Export and Import of Encrypted Data

Introduction to Oracle Key Vault

  • What is Oracle Key Vault?
  • Using Oracle Key Vault

Installing Oracle Key Vault

  • Installation
  • Endpoints

Using Oracle Key Vault

  • Reviewing or refreshing prerequisite knowledge
  • Contrasting Oracle Wallets and OKV Virtual Wallets

Administering Oracle Key Vault

  • Roles in detail
  • Best practice tips for Oracle Key Vault

Automated Sensitive Data Discovery

  • Overview
  • Application Data Modeling
  • Managing Application Data Models

Oracle Data Masking and Subsetting overview

  • Overview

Masking Sensitive Data in Non-Production Environments

  • Exploring Data Masking Format Library
  • Data Masking Transformations

Subsetting Data

  • Exploring Data Subsetting definitions

Managing Data Masking and Subsetting

  • Administering Data Masking and Subsetting
  • Heterogeneous masking and subsetting
  • Best Practices

Oracle Advanced Security - Data Redaction

  • Need to redact or dynamically mask data
  • Implementing Data Redaction
  • Data Redaction usage guidelines

Oracle Transparent Sensitive Data Protection (TSDP)

  • TSDP Implementation

Oracle Database Vault Overview

  • Understand Database Vault Controls
  • What is a Realm? A Rule Set? A Command Rule? A Secure Application Role?
  • What are Factors and Identities? Component Relationships and Evaluation?
  • Database Vault Effects and Example
  • Software Overview: API, Views, and Integration with Other Oracle Products

Configuring Database Vault

  • Configuring Database Vault
  • Database Vault Roles and Schema
  • What to Expect After You Enable Database Vault
  • Securing Data in Multitenant Environments
  • Configuring Database Vault Users in Cloud Control 12c

Analyzing Privileges

  • Privilege Analysis Overview and Features
  • How Does it Work?
  • What are The Types of Analysis, Tools, and Prerequisites?
  • Managing Privilege Analysis Policies
  • Use Cases

Informacje dodatkowe:
Kurs ma formę wykładów połączonych z ćwiczeniami praktycznymi i jest prowadzony przez instruktora. Uczestnik szkolenia otrzymuje autoryzowany podręcznik w wersji elektronicznej.

OR_SEC_DEC Oracle Database Security: Detective Controls Ed 1 (40h)

Informacje o szkoleniu:

In the Oracle Database Security: Detective Controls course, students learn how they can use Oracle Database administration auditing features to meet the compliance requirements of their organization. The current regulatory environment requires better security at the database level. Students learn how to audit the access to their databases and how to use the auditing and compliance features to monitor data access and confidentiality. The course provides suggested Oracle solutions for common problems.

Benefits:

Students will benefit by learning about the following security features of the database: Oracle Audit Vault, Oracle Database Firewall and Oracle Compliance Framework.

Hands-on practices and available demonstrations help students learn how to use detective control features of Oracle Database 12c to audit their database access using Oracle Enterprise Manager Cloud Control or other simple tools like SQL*Plus.

Learn To:

  • Enumerate Oracle auditing solutions to monitor database security requirements.
  • Implement Oracle Audit Vault and Oracle Database Firewall.
  • Configure Oracle Audit Vault and Oracle Database Firewall.
  • Explain Oracle Compliance Framework.
  • Configure basic Compliance Framework rules.

Target audience:

  • Database Administrators
  • Security Administrators
  • Security Compliance Professionals
  • System Analysts

Prerequisites:

Required Prerequisites

  • Create PL/SQL procedures
  • Good knowledge of Oracle Database Administration
  • Good understanding of SQL
  • Introduction to Oracle Database Security Ed 1

Suggested Prerequisites

  • Create and manage database users, roles, and privilege
  • Oracle Database 12c R2: Administration Workshop Ed 3 NEW
  • Oracle Database 12c: Administration Workshop Ed 2
  • Oracle Database: Develop PL/SQL Program Units
  • Oracle Database: Develop PL/SQL Program Units Ed 2

Zagadnienia poruszane podczas szkolenia:
Course Objectives

  • Enumerate Oracle auditing solutions to monitor database security requirements
  • Implement Oracle Audit Vault and Database Firewall
  • Configure Oracle Audit Vault and Database Firewall
  • Explain Oracle Compliance Framework
  • Configure basic Compliance Framework rules

Informacje dodatkowe:
Kurs ma formę wykładów połączonych z ćwiczeniami praktycznymi i jest prowadzony przez instruktora. Uczestnik szkolenia otrzymuje autoryzowany podręcznik w wersji elektronicznej.

 

Użytkowanie komputera w życiu codziennym i pracy (32h)

To szkolenie jest dla Ciebie, jeśli:

  • myślisz o pracy biurowej,
  • chcesz tworzyć pisma i raporty,
  • chcesz nauczyć się korzystania z komputera i aplikacji biurowych.

Podczas szkolenia nauczysz się:

  • wykorzystywania MS Word i MS Excel do pracy biurowej i codziennego użytku
  • używania tabel, filtrowania i sortowania danych
  • bezpiecznego korzystania z Internetu
  • posługiwania się danymi z sieci – wymiana informacji, poszukiwanie interesujących ofert
  • planowania pracy z wykorzystaniem Outlook

Microsoft Excel - poziom średniozaawansowany (32 h)

Szkolenie uczy jak wykorzystać zaawansowane narzędzia arkusza kalkulacyjnego Microsoft Excel do analizy danych, ich prezentacji i obliczeń z ich wykorzystaniem. Nauczysz się tez dostosowywać wygląd i zawartość arkuszy do własnych potrzeb, importowania i konsolidacji danych oraz zabezpieczania arkuszy i skoroszytów

Czego się nauczysz

  • Wykonywać operacje na kolumnach i wierszach, w tym ukrywać i blokować wiersze/kolumny.
  • Wykonywać operacje na arkuszach.
  • Tworzyć proste formuły obliczeniowe.
  • Wykorzystywać podstawowe funkcje.
  • Rozpoznawać i interpretować podstawowe błędy formuł.
  • Tworzyć ograniczenia możliwości wprowadzania danych, w tym definiować listy rozwijane dla pól.
  • Wykorzystywać zaawansowane narzędzia formatowania danych, w tym formatowanie warunkowe.
  • Importować dane zewnętrzne.
  • Tworzyć tabele i efektywnie z nimi pracować.
  • Stosować konspekt.
  • Chronić arkusz/skoroszyt za pomocą hasła.
  • Łączyć dane z różnych arkuszy.
  • Modyfikować poszczególne elementy wykresu
Microsoft Excel - poziom zaawansowany (32 h)

To szkolenie to wyższy poziom wtajemniczenia w precyzyjnej analizie danych, również przy założeniu zmiennych warunków wstępnych, zmiany sposoby prezentacji i agregowania danych oraz wykonywania skomplikowanych obliczeń. Dowiesz się także, jak tworzyć makroinstrukcje automatyzujące wybrane procesy oraz tworzyć funkcjonalne formularze do wprowadzania danych.

Czego się nauczysz

  • Zagnieżdżać funkcje z wykorzystaniem kryteriów ORAZ i LUB.
  • Stosować funkcje wyszukujące, funkcje daty i czasu, funkcje tekstowe, logiczne, matematyczne, statystyczne i finansowe.
  • Stosować funkcje bazodanowe.
  • Wykorzystywać formuły tablicowe.
  • Tworzyć tabele przestawne i efektywnie z nich korzystać.
  • Korzystać ze scenariuszy.
  • Stosować narzędzia analizy warunkowej.
  • Nagrywać i uruchamiać makroinstrukcje.
  • Tworzyć formularze.

Dla kogo?

Udział w projekcie nie jest niestety dostępny dla każdego. W oferowanych szkoleniach mogą wziąć udział osoby pracujące, które ukończyły 18 rok życia, mieszkające w województwie pomorskim.

Pierwszeństwo udziału w projekcie będą miały Panie. Preferowane także będą osoby, które ukończyły 50 lat oraz osoby, które zakończyły edukację na poziomie liceum lub niższym. Twoje szanse zwiększy także zatrudnienie w firmie MŚP.

Zajrzyj do regulaminu, aby zobaczyć szczegółowe warunki udziału w projekcie.

Realizacja szkoleń

Każde ze szkoleń będzie zakończone egzaminem, który formalnie potwierdzi uzyskane przez Państwa kompetencje. To może być klucz do nowych szans zawodowych!

Szkolenia będą realizowane w lokalizacjach wynikających z rozproszenia zgłaszających się uczestników. Dopasujemy więc lokalizację szkoleń do miejsca, gdzie większa grupa osób będzie wskazywała na podobne potrzeby szkoleniowe. Na chwilę obecną z uwagi większość szkoleń realizowana jest w formie zdalnej.

Dla Państwa wygody będziemy proponować harmonogram szkoleń zarówno weekendowych, jak i w ciągu tygodnia pracy. Czas trwania poszczególnych zajęć będziemy dobierać zarówno do typu szkolenia, jak i do preferencji uczestników.
Wychodząc naprzeciw Państwa oczekiwaniom, nasze szkolenia zostały tak skonstruowane by nie kolidowały z Państwa życiem zawodowym i prywatnym, a także były jak najbardziej dostosowane do Państwa indywidualnych potrzeb.
Prowadzone przez nas szkolenia są zgodne z najnowszymi trendami.