Duales Studium IT
... z.B. zur Auswahl: FOMCyber Security (B Sc.)Cyber Security Management (B Sc.)Informatik (B ... Sc.)iubhInformatik (B Sc.)Cyber Security (B Sc.)Softwareentwicklung (B Sc.) ...
... z.B. zur Auswahl: FOMCyber Security (B Sc.)Cyber Security Management (B Sc.)Informatik (B ... Sc.)iubhInformatik (B Sc.)Cyber Security (B Sc.)Softwareentwicklung (B Sc.) ...
... . Our multi-disciplinary team includes researchers, UX and visual designers, and ...
... . Our multi-disciplinary team includes researchers, UX and visual designers, and ...
... Management, Software Asset Management, IT-Security oder Cloud & Modern Workplace Steuerung ... Management, Software Asset Management, IT-Security oder CloudStrukturierte, analytische Arbeitsweise und ...
... in defining data access and security and acting as a point ... principles, including data lifecycle, quality, security, and privacy, as well as ...
... bei der Produktentwicklung zu berücksichtigen (security by design) Zentraler Ansprechpartner für ... . Durchführung von Penetrationtests) Veröffentlichung von Security Advisories für Kunden und Verantwortung ...
... Bereichen Space, Air, Land, Sea, Security, Cyber & Information Space. 2023 erzielte ... Entwicklung, ILS, QA, Programm, Airworthiness, Security Office Steuern, Überwachen und Berichten ...
... in Microsoft Intune for endpoint security, device compliance, and mobile device ... : Expertise in deploying and managing security tools, including Microsoft Defender for ...
... for keeping up with modern security and development best practices as we give great importance to privacy & security at Dataguard Implementing automated testing ...
... business operations. 6. Compliance and Security: Ensure compliance with company policies, ... IT. Support audits and implement security protocols to protect sensitive data ...