Get an overview about security-related aspects of using KFS like utilized ports and protocols. Develop some awareness of which kind of data is transferred and how events in the system can be monitored with the audit logs.
Service Technician, Sales Representative
Theoretical and practical contents
Access to KFS
Using network protocols and ports
After this training you will be able to…
identify the differences between monitoring and management mode
recognize the logs within KFS and their scope
put the utilized protocols and ports into context
evaluate the type and size of data transferred by KFS
see the advantages of complying to security certifications
Cookies and your privacy
Essential cookies are required for basic website functions. Examples: Session cookies required to submit the site, authentication cookies, and security cookies. You can only block these cookies in the settings of your browser, but this may lead to functional limitations of this website.