LPI 102-400 – 105.2 Customize or write shell scripts
Objectives Hello and welcome, students. So we are still in the shell scripting section, which is section 105. Today we’ll begin the subsection “customize” or “write shell script.” all script. Hour years. t is four. The key knowledge areas that to be going to be covered in this sari section use how to use the Shot and add Shy syntax, including loops and tests Use command substitution, test return values for success or failure, and other information provided by a command; execute change commands; perform conditional mailing to the super…
LPI 102-400 – 105.1 Customize and use the shell environment
PATH So we’re going to talk about paths in Linux. The dollar sign here defines the dent-my-space. PA commands. she searches pa-h for commands. It directories unseparated list of directories commands. the shell looks for commands. And Jiu were gild “an example, ifhome”rand “code,” chowouldlar sign home and directory. I’ll show me my hokey? directory. There’s a file where you can set all of these paths permanently. And the file is called a “dot profile.” It is located by default under every user’s home directory. And this is what the…
IAPP CIPM – Subject Access Requests (SARs/DSARs) – how to deal with Part 2
Supplying information to the requester Hi, guys. In this lesson, we will discuss supplying information to the requester. You should remember that subject access entitles an individual to more than just a copy of their personal data. An individual is also entitled to be told whether any personal data is being processed. So, even if you do not have any personal data on the requester, you must respond to let them know, providing a description of the personal data, the reasons it is being processed, whether it will be shared…
IAPP CIPM – Subject Access Requests (SARs/DSARs) – how to deal with
Overview of SARs Hi guys. In this lesson, we will discuss an overview of subject access requests, or SARS. A SAR or DSAR is a request from a data subject to be provided with a copy of the personal data being processed by a controller and an explanation of the purposes for which personal data is being used. A complaint or general query about how personal data is being used does not constitute a DSR. For example, a query about why marketing is being received or where you got someone’s…
IAPP CIPM – Step by Step Customer Personal Data Analysis
Customer Scenario Description Hi guys. In this lesson, I will describe one of my real customer scenarios, and during several lessons, I will present the way I have approached the first part of a GDPR project. You can find all the templates we will use in lesson number three as a downloadable resource in the introductory section. So, let me briefly describe the company and their goals. Sure, sure. Due to the confidentiality of the information, there is no real name involved here. The company operates in the telecommunications industry…
IAPP CIPM – International Transfers and DPO Part 2
Exceptions Hi, guys. In this lesson, we will discuss exceptions. If you are making a restricted transfer that is not covered by an adequacy decision or an appropriate safeguard, then you can only make the transfer if it is covered by one of the exceptions set out in Article 49 of the GDPR. You should only use these as true exceptions from the general rule that you should not make a restricted transfer unless it is covered by an adequacy decision or there are appropriate safeguards in place. If it…
IAPP CIPM – International Transfers and DPO
Mandatory and Voluntary DPO Hi guys. In this lesson, we will discuss mandatory and voluntary data protection officers, or DPOs, under Article 37. The GDPR specifies that a DPO is required to be appointed by a controller or processor in the following situations: when the processing is carried out by a public authority or body, except for courts acting in their judicial capacity. The controller’s or processor’s core activities are processing operations, which by definition necessitate regular and systematic monitoring of data subjects on a large scale. The controller’s or…
IAPP CIPM – IAPP exam questions analysed: CIPP/E, CIPM, CIPT Part 2
CIPM scenarios – part 3 Hi guys. Here we are at the last lesson of CIPM case studies, and we’ll finish it again with a scenario that will be bigger. Assume the amount of text is spread across three slides. So you also have all the presentations attached as a resource to all these lessons. So take the presentation and put it back. In a word, take a reading of the full scenario, and then, with you in front, take a look at all the questions and try to answer…
IAPP CIPM – IAPP exam questions analysed: CIPP/E, CIPM, CIPT
CIPP/E scenarios – part 1 Hi, guys. In the following nine lessons, we’ll understand different question types for the three IAPP certifications. which stands for “European-Certified Information in Privacy Professional.” For Europe. It’s the CIPM privacy manager and the CIPT privacy technologist. IAPP stands for the International Association of Privacy Professionals. And there are three certifications. They have a fairly good reputation both in Europe and around the world. Practically, they are the only privacy certifications existing nowadays. So let me just show you their website. So that’s iapp.org. You…
Amazon AWS DevOps Engineer Professional – Configuration Management and Infrastructure Part 13
ECS – Auto Scaling So now let’s talk about auto scaling for our ECS services. So if we go to the ECS classic one, we have our demo service, and we can go to the auto scaling tab. And in here right now, it says there are no auto-scaling resources configured for this service. To create an auto scaling, we must first click Update. So we’ll go here, click on Next, and then the network; everything is fine. Click on “next.” And here we can configure the service’s auto-scaling. And…
Popular posts
Recent Posts