Onderwerp
Automatisering & ICT/IT
Communicatie
Financieel
HR
Inkoop & logistiek
Management
Secretarieel & Administratief
Marketing
Opleiding & Onderwijs
Persoonlijke Effectiviteit
Productie, techniek & bouw
Kwaliteit- & Projectmanagement
Sales
Vitaliteit & Gezondheid
Taalcursus
Zorg & Verzorging
Juridisch
Internet & Media
Arbo & Veiligheid
Hobby & Vrije Tijd
Vastgoed & Makelaardij
Abonnementen
Locatie
Niveau
Type
Keurmerk

Opleidingen

67.508 resultaten

VMware vSphere: Troubleshooting [VST]

Amsterdam ARISTO (Teleportboulevard 100) ma 16 feb. 2026 en 5 andere data
OVERVIEW This five-day training course provides you with the knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere® 8 environment. This course increases your skill level and competence in using the command-line interface, VMware vSphere® Client™, log files, and other tools to analyze and solve problems. Product Alignment - VMware ESXi 8.0 - VMware vCenter Server 8.0 OBJECTIVES By the end of the course, you should be able to meet the following objectives: Introduce troubleshooting principles and procedures Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment Explain the purpose of common vSphere log files Identify networking issues based on reported symptoms Validate and troubleshoot the reported networking issue Identify the root cause of networking issue Implement the appropriate resolution to recover from networking problems Analyze storage failure scenarios using a logical troubleshooting methodology identify the root cause of storage failure Apply the appropriate resolution to resolve storage failure problems Troubleshoot vSphere cluster failure scenarios Analyze possible vSphere cluster failure causes Diagnose common VMware vSphere® High Availability problems and provide solutions Identify and validate VMware ESXiTM host and VMware vCenter® problems Analyze failure scenarios of ESXi host and vCenter problems Select the correct resolution for the failure of ESXi host and vCenter problems Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems Troubleshoot performance problems with vSphere components AUDIENCE System architects and system administrators CERTIFICATION VMware Certified Professional Data Center Virtualization 2023 The VCP-DCV 2023 certification validates candidate skills to implement, manage, and troubleshoot a vSphere infrastructure, using best practices to provide a powerful, flexible, and secure foundation for business agility that can accelerate the transformation to cloud computing. CONTENT 1 Course Introduction Introductions and course logistics Course objectives 2 Introduction to Troubleshooting Define the scope of troubleshooting Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency 3 Troubleshooting Tools Discuss the various methods to run commands Discuss the various ways to access ESXi Shell Use commands to view, configure, and manage your vSphere components Use the vSphere CLI Use ESXCLI commands from the vSphere CLI Use Data Center CLI commands Identify the best tool for command-line interface troubleshooting Identify important log files for troubleshooting vCenter Server and ESXi Describe the benefits and capabilities of VMware SkylineTM Explain how VMware Skyline works Describe VMware SkylineTM Health Describe VMware Skyline AdvisorTM 4 Troubleshooting Virtual Networking Analyze and troubleshoot standard switch problems Analyze and troubleshoot virtual machine connectivity problems Analyze and troubleshoot management network problems Analyze and troubleshoot distributed switch problems 5 Troubleshooting Storage Discuss the vSphere storage architecture Identify the possible causes of problems in the various types of datastores Analyze the common storage connectivity and configuration problems Discuss the possible storage problems causes Solve the storage connectivity problems, correct misconfigurations, and restore LUN visibility Review vSphere storage architecture and functionality necessary to troubleshoot storage problems Use ESXi and Linux commands to troubleshoot storage problems Analyze log file entries to identify the root cause of storage problems Investigate ESXi storage issues Troubleshoot VM snapshots Troubleshoot storage performance problems Review multipathing Identify the common causes of missing paths, including PDL and APD conditions Solve the missing path problems between hosts and storage devices 6 Troubleshooting vSphere Clusters Identify and troubleshoot vSphere HA problems Analyze and solve vSphere vMotion problems Diagnose and troubleshoot common vSphere DRS problems 7 Troubleshooting Virtual Machines Discuss virtual machine files and disk content IDs Identify, analyze, and solve virtual machine snapshot problems Troubleshoot virtual machine power-on problems Identify possible causes and troubleshoot virtual machine connection state problems Diagnose and recover from VMware Tools installation failures 8 Troubleshooting vCenter Server and ESXi Analyze and solve vCenter Server service problems Diagnose and troubleshoot vCenter Server database problems Use vCenter Server Appliance shell and the Bash shell to identify and solve problems Identify and troubleshoot ESXi host problems
€3.750
Klassikaal
max 16

Resultaatgericht delegeren [8621]

Eindhoven (Evoluon Noord Brabantlaan 1) ma 9 mrt. 2026 en 5 andere data
OVERVIEW The ability to delegate deliberately and effectively is critical to a leader's success. Delegating work helps team members apply their strengths, develop their weaknesses, and connect to their passions. Delegating work also allows the leader to focus on leading. This course helps leaders define which tasks should be assigned to others and how to best delegate those tasks. You will learn to consider your team members' abilities and motivation, and you will learn a consistent framework for delegation that helps ensure required business results are achieved. Benefits for the Individual Enhanced ability to delegate work more effectively by: Completing an assessment of a team member's ability and motivation to complete the work Applying the right delegation style based on the team member's ability and motivation Applying a framework to clearly state expectations related to a task Assessing progress with sufficient detail and frequency according to the team member's ability and motivation Identifying potential obstacles and strategies to overcome obstacles when assigning tasks Using a four-step process to teach a new skill to team members who have never completed the task before Benefits for the Organization Increased likelihood of achieving organization's strategic goals Improved ability to plan and utilize resources Enhanced employee engagement Improved capacity to lead a diverse workforce Enhanced leadership capabilities to sustain an effective and efficient working climate Virtueel en Klassikaal™ Virtueel en Klassikaal™ is een eenvoudig leerconcept en biedt een flexibele oplossing voor het volgen van een klassikale training. Met Virtueel en Klassikaal™ kunt u zelf beslissen of u een klassikale training virtueel (vanuit huis of kantoor )of fysiek op locatie wilt volgen. De keuze is aan u! Cursisten die virtueel deelnemen aan de training ontvangen voor aanvang van de training alle benodigde informatie om de training te kunnen volgen. OBJECTIVES What You'll Learn: The importance of effectively delegating work to others Apply your knowledge of your team members to effectively delegate and follow up to ensure work is getting done AUDIENCE Leaders at all levels: vice presidents, directors, managers, supervisors, team leaders, and project managers NEXT STEP Motivate for Full Engagement Fundamentals of Communication Fundamentals of Feedback Performance Coaching
€595
Klassikaal
max 16

Beginselen van Professionele Coaching [8623]

Nieuwegein (Iepenhoeve 5) vr 6 feb. 2026 en 5 andere data
OVERVIEW In deze training leer je de basis van een goed coachingsgesprek. Of het nu gaat om het coachen van een directe collega, een medewerker uit je team, teamcoaching of agile coaching; de mindset, de stappen in het ‘engagement-proces’ en de technieken zijn hetzelfde en leer je in deze training. OBJECTIVES Aan het einde van de cursus: bent u in staat om coachingstechnieken effectief toe te passen kunt u coachingsbijeenkomsten professioneel opbouwen kunt u met succes de effectiviteit van anderen vergroten weet u anderen te stimuleren, uit te dagen en te inspireren beheerst u het vier-stappen coachings proces om te kunnen omgaan met weerstand en onverwachte situaties bent u zich bewust van uw persoonlijke kracht en weet deze op natuurlijke wijze in te zetten AUDIENCE Iedereen die zijn of haar coachingstechnieken wil vergroten en/of zich als professioneel coach wil ontwikkelen.
€595
Klassikaal
max 16
8.3 (4)

Modeling based on ArchiMate® Foundation - level 1 - Inclusief Examen [AM]

VIRTUAL TRAINING CENTER ma 17 nov. 2025 en 9 andere data
OVERVIEW In de training Modeling based on ArchiMate®  Foundation - level 1 leert u hoe u met de modelleertaal ArchiMate® enterprise architecturen modelleert en visualiseert. Na het succesvol afleggen van het examen in de training bent u 'ArchiMate® Foundation' gecertificeerd bij The Open Group. Waarom een training Modeling based on ArchiMate®? Enterprise architecten hebben behoefte aan een eenduidig framework om hun enterprise architecturen te beschrijven. ArchiMate® is een open standaard modelleertaal voor Enterprise Architectuur (EA). ArchiMate stelt architecten in staat om Enterprise Architectuur op consistente en coherente wijze vast te leggen en te communiceren op meerdere niveaus in de organisatie. Dit leidt tot een betere afstemming tussen business en IT. Gebruik van de EA-modelleertaal ArchiMate® In deze training leert u het gebruik van ArchiMate® als EA-modelleertaal, en u legt het, nieuwste, onafhankelijke Open Group ArchiMate® Foundation examen af. This two-day course is designed for those who want to learn about and apply ArchiMate® as a modeling language. You’ll gain knowledge of the structure, key concepts and techniques of the ArchiMate® standard, and learn how to model and visualize architectures. Upon successful completion of this course, you will be ready to take the newest ArchiMate® Foundation exam at a Pearson Vue Testing Center. 'This course is being run by Global Knowledge under Commercial License' OBJECTIVES Na afloop heeft u het volgende leerresultaat: Kennis van de achtergrond en structuur van ArchiMate® Kennis van en basisvaardigheid met de ArchiMate® kernconcepten voor het modelleren en beschrijven van architecturen Kennis van en basisvaardigheid met de ArchiMate® taal en technieken voor het visualiseren van architecturen. Kennis van de twee ArchiMate® extensies en hun relatie met de kernconcepten Kennis van de viewpoints voor de extensies Certificaat van The Open Group op Foundation niveau (na het succesvol afleggen van het examen, dat naast de training enige zelfstudie vereist.) Understand the background, key concepts and applications of ArchiMate® Core for modeling and describing architectures Be able to use the ArchiMate® language and techniques to visualize and communicate architectures Understand the additional layers and aspects of the ArchiMate® standard, their viewpoints and their application to core concepts Be able to interpret the ArchiMate 3® specification correctly prior to taking the ArchiMate® 3 Foundation exam   AUDIENCE This training is suited for Architects Business Analists Information Analists Designers Product Owners Project leaders CERTIFICATION The exam fee is included in the course fee, You will need about 5 to 10 hours selfstudy before making the exam. ArchiMate® Part 1 Multiple-choice 40 questions/60 minutes Supervised No Open Book NEXT STEP AMC, ArchiMate® level 2   CONTENT Definitie en doelstellingen van Enterprise Architectuur Aanleiding ArchiMate® ontwikkeling Structuur van de ArchiMate® taal Metamodel van de kernconcepten van ArchiMate® Concepten voor bedrijfs-, applicatie- en technologiearchitectuur Relaties tussen architectuurdomeinen Modelleren met ArchiMate® Viewpoints en views Visualisatie van architecturen Toolondersteuning voor ArchiMate® Motivatie-, Implementatie- en Migratie-extensie van ArchiMate® en de relatie met de kernconcepten en de Motivatie extensie Concepten, relaties en viewpoints van de Motivatie-, Implementatie- en Migratie-extensie Manieren om ArchiMate® uit te breiden of te specialiseren Relatie van ArchiMate® met andere architectuurraamwerken Examen voor ArchiMate® Foundation certificering  
€1.485
Klassikaal
max 16
4.0 (1)

Cisco Aggregation Services Router 9000 Series Essentials [ASR9KE]

Nieuwegein (Iepenhoeve 5) ma 2 feb. 2026 en 9 andere data
OVERVIEW The Cisco Aggregation Services Router 9000 Series Essentials course introduces you to the features and functions of the Cisco Aggregation Services Router (ASR) 9000 Series platforms. Through a combination of lecture and hands-on labs, you will gain an understanding of all major aspects of the platform, including hardware, Layer 2 and Layer 3 services, routing protocols including Segment Routing, Layer 2 and Layer 3 multicast, Quality of Service (QoS) features, and network virtualization. The course investigates Cisco Internetworking Operating System (IOS) XR 64-Bit Linux-based feature parity in the environment, as well as how to install Cisco IOS® XR 64-Bit software packages. This course is worth 32 Continuing Education (CE) Credits OBJECTIVES After you complete this course you will be able to: List and describe the major features and benefits of a Cisco ASR 9000 Series router List and describe the major features and benefits of the Cisco 64-Bit IOS XR operating system Understand data flow through the Cisco ASR 9000 Series router Configure Cisco ASR 9000, back out of configuration changes, and restore older versions of the configuration Install the Cisco IOS XR 64-Bit Software operating system, package information envelopes and software maintenance updates Enable multicast routing on a Cisco ASR 9900 Series router Configure Layer 3 VPN services Configure Ethernet link bundles Configure local Ethernet Line (E-Line) Layer 2 VPN (L2VPN) Configure Ethernet over Multiprotocol Label Switching (EoMPLS) E-Line L2VPN Configure EoMPLS with pseudowire backup Configure local Ethernet LAN(E-LAN) L2VPN Describe Virtual Private LAN Service (VPLS) L2VPN Describe VPLS with Border Gateway Protocol (BGP) autodiscovery Configure service-based Connectivity Fault Management (CFM) Configure Layer 2 multicast features Describe basic QoS implementation Describe how to configure and verify network Virtualization (nV) on the ASR 9000 series AUDIENCE Technical professionals who need to know how to deploy Cisco ASR 9000 Series routers in their network environment. CERTIFICATION Recommended preparation for exam(s): There is no exam aligned to this course CONTENT Cisco ASR 9000 Series Hardware Examining the Cisco ASR 9000 Series Chassis Examining the Cisco ASR 9000 Series Architecture Examining the Route Switch Processor/ Route Processor (RSP/RP) Functions and Fabric Architecture Examining the Cisco ASR 9000 Series Line Card Examining the Cisco ASR 9000 Power Subsystems Cisco IOS XR 64-Bit Software Architecture and Linux Fundamentals Cisco IOS XR 64-Bit Software Fundamentals Cisco ASR 9000 IOS XR 64-Bit vs. 32-Bit Exploring Linux Fundamentals Cisco IOS XR 64-Bit Software Installation Examining Resource Allocations and Media Mappings Migrating to Cisco IOS XR 64-Bit Software Performing Disaster Recovery Installing Software Packages Cisco IOS XR 64-Bit Software Configuration Basics Configuring Cisco IOS XR 64-Bit Basic Operations Cisco IOS XR 64-Bit Initial Configuration Reviewing the Configuration Cisco IOS XR 64-Bit Software Routing Protocols Exploring Intermediate System to Intermediate System (IS-IS) Exploring OSPF Exploring BGP Exploring Routing Protocol for LLN Multicast Routing Exploring Multicast Routing Exploring Protocol Independent Multicast (PIM) Cisco Multiprotocol Label Switching Examining the MPLS Forwarding Infrastructure Implementing the MPLS Label Distribution Protocol (LDP) Cisco IOS XR 64-Bit Segment Routing Segment Routing Concepts Interior Gateway Protocol Segment Routing (IGP SR) Control Plane Overview Prefix and Adjacency Segment IDs (SIDs) SR IS-IS Multi-Level and OSPF Multi-Area IS-IS SR Configuration and Verification OSPF SR Configuration and Verification Layer 3 VPNs Examining L3VPNs Exploring L3VPN Control and Data Flow Configuring L3VPNs Verifying the L3VPN Operation Cisco ASR 9000 Layer 2 Architecture Examining Carrier Ethernet and Flexible Ethernet Edge Comparing Layer 2 and Layer 3 VPNs Examining the ASR 9000 Layer 2 Infrastructure and Ethernet Flow Points (EFPs) Layers 2 and 3 Coexistence and VLAN Tag Manipulation Exploring the Layer 2 Network Infrastructure Point-to-Point Layer 2 Services Point-to-Point Alternating Current-Alternating Current (AC-AC) and Attachment Circuit Redundancy Point-to-Point AC-Pseudowire (PW) Cross-Connect Examining Pseudowire Redundancy and Resiliency Layer 2 Multicast Examining the Cisco ASR 9000 Series Multicast Implementing Multicast Quality of Service QoS Basics and the Modular QoS CLI (MQC) Mode Layer 2 QoS Example Labs: Lab 1: ASR 9904 Hardware Discovery Lab Lab 2: Device Discovery and Initial Configuration Lab 3: Installing Cisco IOS XR 64-Bit Software Lab 4: Cisco IOS XR 64-Bit Software Operations Lab 5: Configuring IS-IS Routing Lab 6: Configuring OSPF Routing Lab 7: Configuring Internal BGP (iBGP) Routing Lab 8: IPv4 Multicast Configuration Lab 9: Configuring Multiprotocol Label Switching Lab 10: Configuring and Verifying IGP Segment Routing Lab 11: Configuring Layer 3 Virtual Private Network Lab 12: Local E-Line Service Lab 13: EoMPLS Service
€3.395
Klassikaal
max 16

Application Services Library (ASL®3) Foundation [ASL]

Nieuwegein (Iepenhoeve 5) wo 19 nov. 2025 en 7 andere data
OVERVIEW Deze intensieve 2-daagse ASL® 3 Foundation training is specifiek ontworpen om IT-professionals te voorzien van een diepgaande kennis en begrip van Applicatie Service Library (ASL) versie 3, met een nadruk op applicatieportfoliomanagement binnen het IT-management domein. Door deze training zullen de deelnemers niet alleen vertrouwd raken met de fundamentele principes van ASL maar ook hoe deze te positioneren en te integreren binnen het bredere spectrum van IT-management practices. De KNVI interessegroep Open Standaarden beheert de verenigingsactiviteiten van ASL®. ASL® is a registered trademark of Van Haren Group OBJECTIVES Tijdens deze training leert de deelnemer het volgende: Kennismaking met ASL: Deelnemers worden geïntroduceerd aan de basisprincipes van ASL en het belang ervan binnen IT-management, waarbij speciale aandacht wordt besteed aan de positionering van ASL. Overzicht IT-management en ASL: Verkrijgen van inzicht in het IT-managementlandschap en hoe ASL zich hierbinnen positioneert. Integratie met andere practices: Exploratie van de relatie tussen ASL en andere management practices zoals ITIL, DevOps, SAFe, BiSL, Scrum, en verschillende projectmanagementmethodologieën, met het doel om te begrijpen hoe ASL complementair kan zijn en geïntegreerd kan worden binnen diverse IT-management praktijken.   AUDIENCE Deze training is ideaal voor IT-professionals die zich bezighouden met applicatiebeheer, IT-servicebeheer, of die betrokken zijn bij de integratie van IT-management practices binnen hun organisatie. Voorbeelden van jobrollen waar ASL interesant is: Applicatiebeheerder Service Desk medewerkers ICT-medewerkers die meer kennis willen vergaren over het ASL-raamwerk. Functioneel beheerders en andere geïnteresseerden uit de gebruikersorganisatie. CERTIFICATION Deze cursus geeft een goede voorbereiding op het officiële examen:  ASL® 3  Foundation De examenkosten niet inbegrepen bij de cursusprijs. Over het examen: Multiple choice 40 questions 26 marks required to pass (out of 40 available) - 65% 60 minutes duration Closed-book Exam Language Dutch   NEXT STEP Er is geen specifieke vervolgopleiding. CONTENT Introductie: 10% - Een inleiding tot de cursus, het belang van ASL, en de leerdoelen. ASL3-model: 15% - Een overzicht van het ASL3-model en zijn componenten. Strategisch Portfoliomanagement: 15% - Focus op het managen van het IT-applicatieportfolio vanuit een strategisch perspectief. Ontwikkeling, Verbetering en Onderhoud: 15% - Technieken en methodes voor het ontwikkelen, verbeteren, en onderhouden van applicaties. Verbindende Processen: 5% - Het begrijpen van processen die verschillende ASL-componenten met elkaar verbinden. Leveren & Ondersteunen: 15% - Best practices voor het leveren en ondersteunen van IT-services. Ondersteunende Processen: 15% - Diepgaande kijk op processen die IT-service management ondersteunen. Implementatie van ASL: 10% - Strategieën voor de implementatie van ASL binnen organisaties. Deelnemers zullen de training afronden met een solide begrip van ASL, klaar om de principes toe te passen in hun eigen werkpraktijken, de efficiëntie van IT-servicebeheer te verbeteren, en effectief te navigeren binnen het complexe landschap van moderne IT-management methodologieën.
€995
Klassikaal
max 16

BiSL® Foundation [BISL]

Groningen/Paterswolde (Groningerweg 19) ma 12 jan. 2026 en 9 andere data
OVERVIEW De Business Information Services Library (BiSL®) biedt een framework voor het werkveld dat zich bevindt tussen de aansluiting van ICT op het bedrijfsproces. Juist deze aansluiting is vaak niet optimaal. Het BiSL®-procesmodel geeft inzicht in alle hoofdprocessen van het werkveld, en de relaties tussen de processen. Het biedt aanknopingspunten voor verbetering van de processen, onder meer via 'best practices' en het verschaft een uniforme terminologie. De KNVI interessegroep Open Standaarden beheert de verenigingsactiviteiten van BiSL®. BiSL® is a registered trademark of Van Haren Group. OBJECTIVES Na afloop van deze training bent u in staat de context van het BiSL®-framework te verwoorden en kent u de onderling verhouding tussen functioneel, applicatie-, technisch beheer en de relatie van BiSL® met andere modellen en methoden (zoals ASL® en ITIL®). U krijg inzicht in het BiSL®-raamwerk en de interne samenhang van de processen. De specifieke leerdoelen zijn: Kennismaken met de verschillende BiSL® procesclusters, de BiSL® processen daarbinnen en BiSL® terminologie; Inzicht krijgen in het BiSL®-raamwerk en interne samenhang van de processen; Concrete handvatten verkrijgen voor toepassing van BiSL in uw organisatie; Het onderkennen van het toenemend belang van functioneel beheer; Het kweken van enthousiasme voor deze aanpak; Voorbereiding op het officiële examen.   AUDIENCE Operationeel niveau: Functioneel beheerder, kerngebruiker, super-user, applicatiebeheerder Tactisch niveau: Systeemeigenaar, opdrachtgever, productmanager, budgethouder Strategisch niveau: Informatiemanagement, programmamanager CERTIFICATION Deze cursus geeft een goede voorbereiding op het officiële BiSL® Foundation examen Het examen is optioneel en kunt u aanschaffen i.c.m. met deze training NEXT STEP BiSL-A, BiSL® BiSL® Practitioner   CONTENT Specifieke inhoud: introductie BiSL®-raamwerk de rol van functioneel beheer en informatiemanagement de uitvoerende processen: gebruikersbeheer en functionaliteitenbeheer de sturende processen de richtinggevende processen en het opstellen van strategieën voor de organisatie en de informatie de verbindende processen relaties naar andere beheervormen invoering en gebruik BiSL®
€845
Klassikaal
max 16

Persoonlijke effectiviteit voor IT- professionals [BSITP100E]

Nieuwegein (Iepenhoeve 5) ma 22 dec. 2025 en 7 andere data
OVERVIEW Voor IT-professionals zijn interpersoonlijke vaardigheden dé kritische succesfactor. De succesvolle professional is assertief, initiatiefrijk, heeft zakelijk inzicht, beïnvloedt zijn omgeving op een positieve manier en communiceert professioneel en resultaatgericht. Dat zijn de onderwerpen die daarom in deze compacte training worden behandeld. OBJECTIVES Wat je zult leren: Het proces van communicatie. Communicatie factoren. Persoonlijke behoeften van anderen herkennen en je aanpassen aan deze behoeften. Het ontwikkelen van invloedrijke communicatie. Het ontwikkelen en leveren van effectieve presentaties. Het beheren van meerdere prioriteiten. AUDIENCE Alle IT-professionals die geïnteresseerd zijn in het maximaliseren van hun persoonlijke effectiviteit.
€1.195
Klassikaal
max 16

EC-Council Certified Ethical Hacker (CEH) + Exam voucher [CEH]

VIRTUAL TRAINING CENTER ma 1 dec. 2025 en 9 andere data
OVERVIEW CEH v13 - Prepare for the CEH certification and learn to think like a hacker while looking for system weaknesses and vulnerabilities. With CEH v13, you’ll gain access to the world’s first ethical hacking certification powered by AI. By integrating AI into all five phases of ethical hacking, CEH v13 enables you to achieve 40% greater efficiency and double your productivity in cybersecurity tasks. EC Council’s unique Learn, Certify, Engage, and Compete framework guides you toward ethical hacking mastery. You’ll acquire hands-on experience through 220+ labs, 550+ attack techniques, and 4,000+ tools, while also testing your skills in global Capture the Flag (CTF) competitions. Validate your expertise with a 6-hour practical or 4-hour knowledge-based exam. Earn a top certification recognized by U.S. DoD 8140, ANAB 17024, and NCSC, adhering to NICE 2.0 and NIST standards. Open doors to opportunities with top employers by earning a certification trusted worldwide! This course includes both a knowledge exam voucher and practical exam voucher, subscription to CEH challenges, and over 4000 hacking tools and attack techniques OBJECTIVES This course will provide you with: In-depth knowledge of ethical hacking methodologies and practices, augmented with AI techniques The skills to integrate AI across ethical hacking phases: reconnaissance, scanning, gaining access, maintaining access, and covering tracks AI techniques to automate tasks, boost efficiency, and detect sophisticated threats beyond traditional methods Tools that will utilize AI for proactive threat hunting, anomaly detection, and predictive analysis to prevent cyber-attacks AUDIENCE Cybersecurity professionals - Those looking to drive their cybersecurity career forward with the power of AI. Teams and organizations - Teams looking to turbocharge their AI knowledge in order to stay one step ahead of malicious actors. Government and military - Government departments and defense bodies looking for a trusted and highly valued global certification partner. - Security officers - Auditors - Security professionals - Site administrators - Penetration testers - Individuals concerned about the integrity of network infrastructure CERTIFICATION This course is recommended as preparation for the Certified Ethical Hacker (CEH) certification exam CONTENT Module 01: Introduction to Ethical Hacking Module 02: Footprinting and Reconnaissance Module 03: Scanning Networks Module 04: Enumeration Module 05: Vulnerability Analysis Module 06: System Hacking Module 07: Malware Threats Module 08: Sniffing Module 09: Social Engineering Module 10: Denial-of-Service Module 11: Session Hijacking Module 12: Evading IDS, Firewalls, and Honeypots Module 13: Hacking Web Servers Module 14: Hacking Web Applications Module 15: SQL Injection Module 16: Hacking Wireless Networks Module 17: Hacking Mobile Platforms Module 18: IoT Hacking Module 19: Cloud Computing Module 20: Cryptography
€3.895
Klassikaal
max 16
10.0 (1)

CISA®, Certified Information Systems Auditor® + Oefen vragen (QAE) [CISAU]

Amsterdam ARISTO (Teleportboulevard 100) ma 17 nov. 2025 en 9 andere data
OVERVIEW CISA® - Certified Information Systems Auditor is de wereldwijd erkende gouden standaard voor IS-audit, controle en borging, veelgevraagd en gewaardeerd door toonaangevende wereldmerken. Het is vaak een verplichte kwalificatie voor een baan als IT-auditor. CISA professionals bieden de geloofwaardigheid om standaarden te gebruiken, kwetsbaarheden te beheren, compliance te verzekeren, oplossingen aan te bieden, controles in te stellen en waarde te leveren aan organisaties. Deze 4-daagse officiële CISA training is de voorbereiding op het nieuwste CISA certificaat. Tijdens deze cursus leert u over het IT audit proces. Continuing Professional Education (CPE) : 31 Oefenvragen (QAE = Questions, Answers and Explanations) : 12 maanden toegang Virtueel en Klassikaal™ Virtueel en Klassikaal™ is een eenvoudig leerconcept en biedt een flexibele oplossing voor het volgen van een klassikale training. Met Virtueel en Klassikaal™ kunt u zelf beslissen of u een klassikale training virtueel (vanuit huis of kantoor )of fysiek op locatie wilt volgen. De keuze is aan u! Cursisten die virtueel deelnemen aan de training ontvangen voor aanvang van de training alle benodigde informatie om de training te kunnen volgen. OBJECTIVES Domain 1 - Information System Auditing Process Plan an audit to determine whether information systems are protected, controlled, and provide value to the enterprise. Conduct an audit following IS audit standards and a risk-based IS audit strategy. Communicate audit progress, findings, results, and recommendations to stakeholders. Conduct audit follow-up to evaluate whether risks have been sufficiently addressed. Evaluate IT management and monitoring of controls. Utilize data analytics tools to streamline audit processes. Provide consulting services and guidance to the enterprise to improve the quality and control of information systems. Identify opportunities for process improvement in the enterprise's IT policies and practices. Domain 2 – Governance and Management of IT Evaluate the IT strategy for alignment with the enterprise’s strategies and objectives. Evaluate the effectiveness of IT governance structure and IT organizational structure. Evaluate the enterprise’s management of IT policies and practices. Evaluate the enterprise’s IT policies and practices for compliance with regulatory and legal requirements. Evaluate IT resource and portfolio management for alignment with the enterprise’s strategies and objectives. Evaluate the enterprise’s risk management policies and practices. Evaluate IT management and monitoring of controls. Evaluate the monitoring and reporting of IT key performance indicators (KPIs). Evaluate whether IT supplier selection and contract management processes align with business requirements. Evaluate whether IT service management practices align with business requirements. Conduct periodic review of information systems and enterprise architecture. Evaluate data governance policies and practices. Evaluate the information security program to determine its effectiveness and alignment with the enterprise’s strategies and objectives. Evaluate potential opportunities and threats associated with emerging technologies, regulations, and industry practices. Domain 3 – Information Systems Acquisition, Development, and Implementation Evaluate whether the business case for proposed changes to information systems meet business objectives. Evaluate the enterprise's project management policies and practices. Evaluate controls at all stages of the information systems development lifecycle. Evaluate the readiness of information systems for implementation and migration into production. Conduct post-implementation review of systems to determine whether project deliverables, controls, and requirements are met. Evaluate change, configuration, release, and patch management policies and practices. Domain 4 – Information Systems Operations and Business Resilience Evaluate the enterprise’s ability to continue business operations. Evaluate whether IT service management practices align with business requirements. Conduct periodic review of information systems and enterprise architecture. Evaluate IT operations to determine whether they are controlled effectively and continue to support the enterprise’s objectives. Evaluate IT maintenance practices to determine whether they are controlled effectively and continue to support the enterprise’s objectives. Evaluate database management practices. Evaluate data governance policies and practices. Evaluate problem and incident management policies and practices. Evaluate change, configuration, release, and patch management policies and practices. Evaluate end-user computing to determine whether the processes are effectively controlled. Evaluate policies and practices related to asset lifecycle management. Domain 5 – Protection of Information Assets Conduct audit in accordance with IS audit standards and a risk-based IS audit strategy. Evaluate problem and incident management policies and practices. Evaluate the enterprise's information security and privacy policies and practices. Evaluate physical and environmental controls to determine whether information assets are adequately safeguarded. Evaluate logical security controls to verify the confidentiality, integrity, and availability of information. Evaluate data classification practices for alignment with the enterprise’s policies and applicable external requirements. Evaluate policies and practices related to asset lifecycle management. Evaluate the information security program to determine its effectiveness and alignment with the enterprise’s strategies and objectives. Perform technical security testing to identify potential threats and vulnerabilities. Evaluate potential opportunities and threats associated with emerging technologies, regulations, and industry practices. AUDIENCE Designed for mid-career IS audit, control and assurance professionals looking to leverage career growth including: IT Audit Directors/Managers/Consultants IT Auditors Compliance/Risk/Privacy Directors IT Directors/Managers/Consultants CERTIFICATION Please note: The examvoucher is not included in the courseprice. 4 hours (240 minutes), 150 multiple choice questions In addition to passing the examination, there are additional requirements for obtaining the certificate. These can be found at: https://www.isaca.org/credentialing/cisa/get-cisa-certified NEXT STEP CISSP Certification Preparation   CONTENT Domain 1 - Information System Auditing Process IS Audit Standards, Guidelines, Functions, and Codes of Ethics Types of Audits, Assessments, and Reviews Risk-based Audit Planning Types of Controls and Considerations Audit Project Management Audit Testing and Sampling Methodology Audit Evidence Collection Techniques Audit Data Analytics Reporting and Communication Techniques Quality Assurance and Improvement of Audit Process Domain 2 – Governance and Management of IT Laws, Regulations, and Industry Standards Organizational Structure, IT Governance, and IT Strategy IT Policies, Standards, Procedures, and Guidelines Enterprise Architecture and Considerations Enterprise Risk Management (ERM) Privacy Program and Principles Data Governance and Classification IT Resource Management IT Vendor Management IT Performance Monitoring and Reporting Quality Assurance and Quality Management of IT Domain 3 – Information Systems Acquisition, Development, and Implementation Project Governance and Management Business Case and Feasibility Analysis System Development Methodologies Control Identification and Design System Readiness and Implementation Testing Implementation Configuration and Release Management System Migration, Infrastructure Deployment, and Data Conversion Postimplementation Review Domain 4 – Information Systems Operations and Business Resilience IT Components IT Asset Management Job Scheduling and Production Process Automation System Interfaces End-user Computing and Shadow IT Systems Availability and Capacity Management Problem and Incident Management IT Change, Configuration, and Patch Management Operational Log Management IT Service Level Management Database Management Business Impact Analysis System and Operational Resilience Data Backup, Storage, and Restoration Business Continuity Plan Disaster Recovery Plans Domain 5 – Protection of Information Assets Information Asset Security Policies, Frameworks, Standards, and Guidelines Physical and Environmental Controls Identity and Access Management Network and End-Point Security Data Loss Prevention Data Encryption Public Key Infrastructure (PKI) Cloud and Virtualized Environments Mobile, Wireless, and Internet-of-Things Devices Security Awareness Training and Programs Information System Attack Methods and Techniques Security Testing Tools and Techniques Security Monitoring Logs, Tools, and Techniques Security Incident Response Management Evidence Collection and Forensics CISA Exam Preparation CISA Exam Rules Exam Tips Day of the Exam CISA Certification Steps
€3.495
Klassikaal
max 16
8.0 (1)