Opleidingen
67.508
resultaten
VMware vSphere: Troubleshooting [VST]
Amsterdam ARISTO (Teleportboulevard 100)
ma 16 feb. 2026
en 5 andere data
OVERVIEW
This five-day training course provides you with the knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere® 8 environment. This course increases your skill level and competence in using the command-line interface, VMware vSphere® Client™, log files, and other tools to analyze and solve problems.
Product Alignment
- VMware ESXi 8.0
- VMware vCenter Server 8.0
OBJECTIVES
By the end of the course, you should be able to meet the following objectives:
Introduce troubleshooting principles and procedures
Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment
Explain the purpose of common vSphere log files
Identify networking issues based on reported symptoms
Validate and troubleshoot the reported networking issue
Identify the root cause of networking issue
Implement the appropriate resolution to recover from networking problems
Analyze storage failure scenarios using a logical troubleshooting methodology
identify the root cause of storage failure
Apply the appropriate resolution to resolve storage failure problems
Troubleshoot vSphere cluster failure scenarios
Analyze possible vSphere cluster failure causes
Diagnose common VMware vSphere® High Availability problems and provide solutions
Identify and validate VMware ESXiTM host and VMware vCenter® problems
Analyze failure scenarios of ESXi host and vCenter problems
Select the correct resolution for the failure of ESXi host and vCenter problems
Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems
Troubleshoot performance problems with vSphere components
AUDIENCE
System architects and system administrators
CERTIFICATION
VMware Certified Professional
Data Center Virtualization 2023
The VCP-DCV 2023 certification validates candidate skills to implement, manage, and troubleshoot a vSphere infrastructure, using best practices to provide a powerful, flexible, and secure foundation for business agility that can accelerate the transformation to cloud computing.
CONTENT
1 Course Introduction
Introductions and course logistics
Course objectives
2 Introduction to Troubleshooting
Define the scope of troubleshooting
Use a structured approach to solve configuration and operational problems
Apply troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency
3 Troubleshooting Tools
Discuss the various methods to run commands
Discuss the various ways to access ESXi Shell
Use commands to view, configure, and manage your vSphere components
Use the vSphere CLI
Use ESXCLI commands from the vSphere CLI
Use Data Center CLI commands
Identify the best tool for command-line interface troubleshooting
Identify important log files for troubleshooting vCenter Server and ESXi
Describe the benefits and capabilities of VMware SkylineTM
Explain how VMware Skyline works
Describe VMware SkylineTM Health
Describe VMware Skyline AdvisorTM
4 Troubleshooting Virtual Networking
Analyze and troubleshoot standard switch problems
Analyze and troubleshoot virtual machine connectivity problems
Analyze and troubleshoot management network problems
Analyze and troubleshoot distributed switch problems
5 Troubleshooting Storage
Discuss the vSphere storage architecture
Identify the possible causes of problems in the various types of datastores
Analyze the common storage connectivity and configuration problems
Discuss the possible storage problems causes
Solve the storage connectivity problems, correct misconfigurations, and restore LUN visibility
Review vSphere storage architecture and functionality necessary to troubleshoot storage problems
Use ESXi and Linux commands to troubleshoot storage problems
Analyze log file entries to identify the root cause of storage problems
Investigate ESXi storage issues
Troubleshoot VM snapshots
Troubleshoot storage performance problems
Review multipathing
Identify the common causes of missing paths, including PDL and APD conditions
Solve the missing path problems between hosts and storage devices
6 Troubleshooting vSphere Clusters
Identify and troubleshoot vSphere HA problems
Analyze and solve vSphere vMotion problems
Diagnose and troubleshoot common vSphere DRS problems
7 Troubleshooting Virtual Machines
Discuss virtual machine files and disk content IDs
Identify, analyze, and solve virtual machine snapshot problems
Troubleshoot virtual machine power-on problems
Identify possible causes and troubleshoot virtual machine connection state problems
Diagnose and recover from VMware Tools installation failures
8 Troubleshooting vCenter Server and ESXi
Analyze and solve vCenter Server service problems
Diagnose and troubleshoot vCenter Server database problems
Use vCenter Server Appliance shell and the Bash shell to identify and solve problems
Identify and troubleshoot ESXi host problems
€3.750
Klassikaal
max 16
Resultaatgericht delegeren [8621]
Eindhoven (Evoluon Noord Brabantlaan 1)
ma 9 mrt. 2026
en 5 andere data
OVERVIEW
The ability to delegate deliberately and effectively is critical to a leader's success. Delegating work helps team members apply their strengths, develop their weaknesses, and connect to their passions. Delegating work also allows the leader to focus on leading.
This course helps leaders define which tasks should be assigned to others and how to best delegate those tasks. You will learn to consider your team members' abilities and motivation, and you will learn a consistent framework for delegation that helps ensure required business results are achieved.
Benefits for the Individual
Enhanced ability to delegate work more effectively by:
Completing an assessment of a team member's ability and motivation to complete the work
Applying the right delegation style based on the team member's ability and motivation
Applying a framework to clearly state expectations related to a task
Assessing progress with sufficient detail and frequency according to the team member's ability and motivation
Identifying potential obstacles and strategies to overcome obstacles when assigning tasks
Using a four-step process to teach a new skill to team members who have never completed the task before
Benefits for the Organization
Increased likelihood of achieving organization's strategic goals
Improved ability to plan and utilize resources
Enhanced employee engagement
Improved capacity to lead a diverse workforce
Enhanced leadership capabilities to sustain an effective and efficient working climate
Virtueel en Klassikaal™
Virtueel en Klassikaal™ is een eenvoudig leerconcept en biedt een flexibele oplossing voor het volgen van een klassikale training. Met Virtueel en Klassikaal™ kunt u zelf beslissen of u een klassikale training virtueel (vanuit huis of kantoor )of fysiek op locatie wilt volgen. De keuze is aan u! Cursisten die virtueel deelnemen aan de training ontvangen voor aanvang van de training alle benodigde informatie om de training te kunnen volgen.
OBJECTIVES
What You'll Learn:
The importance of effectively delegating work to others
Apply your knowledge of your team members to effectively delegate and follow up to ensure work is getting done
AUDIENCE
Leaders at all levels: vice presidents, directors, managers, supervisors, team leaders, and project managers
NEXT STEP
Motivate for Full Engagement
Fundamentals of Communication
Fundamentals of Feedback
Performance Coaching
€595
Klassikaal
max 16
Beginselen van Professionele Coaching [8623]
Nieuwegein (Iepenhoeve 5)
vr 6 feb. 2026
en 5 andere data
OVERVIEW
In deze training leer je de basis van een goed coachingsgesprek. Of het nu gaat om het coachen van een directe collega, een medewerker uit je team, teamcoaching of agile coaching; de mindset, de stappen in het ‘engagement-proces’ en de technieken zijn hetzelfde en leer je in deze training.
OBJECTIVES
Aan het einde van de cursus:
bent u in staat om coachingstechnieken effectief toe te passen
kunt u coachingsbijeenkomsten professioneel opbouwen
kunt u met succes de effectiviteit van anderen vergroten
weet u anderen te stimuleren, uit te dagen en te inspireren
beheerst u het vier-stappen coachings proces om te kunnen omgaan met weerstand en onverwachte situaties
bent u zich bewust van uw persoonlijke kracht en weet deze op natuurlijke wijze in te zetten
AUDIENCE
Iedereen die zijn of haar coachingstechnieken wil vergroten en/of zich als professioneel coach wil ontwikkelen.
€595
Klassikaal
max 16
Modeling based on ArchiMate® Foundation - level 1 - Inclusief Examen [AM]
VIRTUAL TRAINING CENTER
ma 17 nov. 2025
en 9 andere data
OVERVIEW
In de training Modeling based on ArchiMate® Foundation - level 1 leert u hoe u met de modelleertaal ArchiMate® enterprise architecturen modelleert en visualiseert. Na het succesvol afleggen van het examen in de training bent u 'ArchiMate® Foundation' gecertificeerd bij The Open Group.
Waarom een training Modeling based on ArchiMate®?
Enterprise architecten hebben behoefte aan een eenduidig framework om hun enterprise architecturen te beschrijven. ArchiMate® is een open standaard modelleertaal voor Enterprise Architectuur (EA). ArchiMate stelt architecten in staat om Enterprise Architectuur op consistente en coherente wijze vast te leggen en te communiceren op meerdere niveaus in de organisatie. Dit leidt tot een betere afstemming tussen business en IT.
Gebruik van de EA-modelleertaal ArchiMate®
In deze training leert u het gebruik van ArchiMate® als EA-modelleertaal, en u legt het, nieuwste, onafhankelijke Open Group ArchiMate® Foundation examen af.
This two-day course is designed for those who want to learn about and apply ArchiMate® as a modeling language. You’ll gain knowledge of the structure, key concepts and techniques of the ArchiMate® standard, and learn how to model and visualize architectures.
Upon successful completion of this course, you will be ready to take the newest ArchiMate® Foundation exam at a Pearson Vue Testing Center.
'This course is being run by Global Knowledge under Commercial License'
OBJECTIVES
Na afloop heeft u het volgende leerresultaat:
Kennis van de achtergrond en structuur van ArchiMate®
Kennis van en basisvaardigheid met de ArchiMate® kernconcepten voor het modelleren en beschrijven van architecturen
Kennis van en basisvaardigheid met de ArchiMate® taal en technieken voor het visualiseren van architecturen.
Kennis van de twee ArchiMate® extensies en hun relatie met de kernconcepten
Kennis van de viewpoints voor de extensies
Certificaat van The Open Group op Foundation niveau (na het succesvol afleggen van het examen, dat naast de training enige zelfstudie vereist.)
Understand the background, key concepts and applications of ArchiMate® Core for modeling and describing architectures
Be able to use the ArchiMate® language and techniques to visualize and communicate architectures
Understand the additional layers and aspects of the ArchiMate® standard, their viewpoints and their application to core concepts
Be able to interpret the ArchiMate 3® specification correctly prior to taking the ArchiMate® 3 Foundation exam
AUDIENCE
This training is suited for
Architects
Business Analists
Information Analists
Designers
Product Owners
Project leaders
CERTIFICATION
The exam fee is included in the course fee,
You will need about 5 to 10 hours selfstudy before making the exam.
ArchiMate® Part 1
Multiple-choice
40 questions/60 minutes
Supervised
No Open Book
NEXT STEP
AMC, ArchiMate® level 2
CONTENT
Definitie en doelstellingen van Enterprise Architectuur
Aanleiding ArchiMate® ontwikkeling
Structuur van de ArchiMate® taal
Metamodel van de kernconcepten van ArchiMate®
Concepten voor bedrijfs-, applicatie- en technologiearchitectuur
Relaties tussen architectuurdomeinen
Modelleren met ArchiMate®
Viewpoints en views
Visualisatie van architecturen
Toolondersteuning voor ArchiMate®
Motivatie-, Implementatie- en Migratie-extensie van ArchiMate® en de relatie met de kernconcepten en de Motivatie extensie
Concepten, relaties en viewpoints van de Motivatie-, Implementatie- en Migratie-extensie
Manieren om ArchiMate® uit te breiden of te specialiseren
Relatie van ArchiMate® met andere architectuurraamwerken
Examen voor ArchiMate® Foundation certificering
€1.485
Klassikaal
max 16
Cisco Aggregation Services Router 9000 Series Essentials [ASR9KE]
Nieuwegein (Iepenhoeve 5)
ma 2 feb. 2026
en 9 andere data
OVERVIEW
The Cisco Aggregation Services Router 9000 Series Essentials course introduces you to the features and functions of the Cisco Aggregation Services Router (ASR) 9000 Series platforms. Through a combination of lecture and hands-on labs, you will gain an understanding of all major aspects of the platform, including hardware, Layer 2 and Layer 3 services, routing protocols including Segment Routing, Layer 2 and Layer 3 multicast, Quality of Service (QoS) features, and network virtualization. The course investigates Cisco Internetworking Operating System (IOS) XR 64-Bit Linux-based feature parity in the environment, as well as how to install Cisco IOS® XR 64-Bit software packages.
This course is worth 32 Continuing Education (CE) Credits
OBJECTIVES
After you complete this course you will be able to:
List and describe the major features and benefits of a Cisco ASR 9000 Series router
List and describe the major features and benefits of the Cisco 64-Bit IOS XR operating system
Understand data flow through the Cisco ASR 9000 Series router
Configure Cisco ASR 9000, back out of configuration changes, and restore older versions of the configuration
Install the Cisco IOS XR 64-Bit Software operating system, package information envelopes and software maintenance updates
Enable multicast routing on a Cisco ASR 9900 Series router
Configure Layer 3 VPN services
Configure Ethernet link bundles
Configure local Ethernet Line (E-Line) Layer 2 VPN (L2VPN)
Configure Ethernet over Multiprotocol Label Switching (EoMPLS) E-Line L2VPN
Configure EoMPLS with pseudowire backup
Configure local Ethernet LAN(E-LAN) L2VPN
Describe Virtual Private LAN Service (VPLS) L2VPN
Describe VPLS with Border Gateway Protocol (BGP) autodiscovery
Configure service-based Connectivity Fault Management (CFM)
Configure Layer 2 multicast features
Describe basic QoS implementation
Describe how to configure and verify network Virtualization (nV) on the ASR 9000 series
AUDIENCE
Technical professionals who need to know how to deploy Cisco ASR 9000 Series routers in their network environment.
CERTIFICATION
Recommended preparation for exam(s):
There is no exam aligned to this course
CONTENT
Cisco ASR 9000 Series Hardware
Examining the Cisco ASR 9000 Series Chassis
Examining the Cisco ASR 9000 Series Architecture
Examining the Route Switch Processor/ Route Processor (RSP/RP) Functions and Fabric Architecture
Examining the Cisco ASR 9000 Series Line Card
Examining the Cisco ASR 9000 Power Subsystems
Cisco IOS XR 64-Bit Software Architecture and Linux Fundamentals
Cisco IOS XR 64-Bit Software Fundamentals
Cisco ASR 9000 IOS XR 64-Bit vs. 32-Bit
Exploring Linux Fundamentals
Cisco IOS XR 64-Bit Software Installation
Examining Resource Allocations and Media Mappings
Migrating to Cisco IOS XR 64-Bit Software
Performing Disaster Recovery
Installing Software Packages
Cisco IOS XR 64-Bit Software Configuration Basics
Configuring Cisco IOS XR 64-Bit Basic Operations
Cisco IOS XR 64-Bit Initial Configuration
Reviewing the Configuration
Cisco IOS XR 64-Bit Software Routing Protocols
Exploring Intermediate System to Intermediate System (IS-IS)
Exploring OSPF
Exploring BGP
Exploring Routing Protocol for LLN
Multicast Routing
Exploring Multicast Routing
Exploring Protocol Independent Multicast (PIM)
Cisco Multiprotocol Label Switching
Examining the MPLS Forwarding Infrastructure
Implementing the MPLS Label Distribution Protocol (LDP)
Cisco IOS XR 64-Bit Segment Routing
Segment Routing Concepts
Interior Gateway Protocol Segment Routing (IGP SR) Control Plane Overview
Prefix and Adjacency Segment IDs (SIDs)
SR IS-IS Multi-Level and OSPF Multi-Area
IS-IS SR Configuration and Verification
OSPF SR Configuration and Verification
Layer 3 VPNs
Examining L3VPNs
Exploring L3VPN Control and Data Flow
Configuring L3VPNs
Verifying the L3VPN Operation
Cisco ASR 9000 Layer 2 Architecture
Examining Carrier Ethernet and Flexible Ethernet Edge
Comparing Layer 2 and Layer 3 VPNs
Examining the ASR 9000 Layer 2 Infrastructure and Ethernet Flow Points (EFPs)
Layers 2 and 3 Coexistence and VLAN Tag Manipulation
Exploring the Layer 2 Network Infrastructure
Point-to-Point Layer 2 Services
Point-to-Point Alternating Current-Alternating Current (AC-AC) and Attachment Circuit Redundancy
Point-to-Point AC-Pseudowire (PW) Cross-Connect
Examining Pseudowire Redundancy and Resiliency
Layer 2 Multicast
Examining the Cisco ASR 9000 Series Multicast
Implementing Multicast
Quality of Service
QoS Basics and the Modular QoS CLI (MQC) Mode
Layer 2 QoS Example
Labs:
Lab 1: ASR 9904 Hardware Discovery Lab
Lab 2: Device Discovery and Initial Configuration
Lab 3: Installing Cisco IOS XR 64-Bit Software
Lab 4: Cisco IOS XR 64-Bit Software Operations
Lab 5: Configuring IS-IS Routing
Lab 6: Configuring OSPF Routing
Lab 7: Configuring Internal BGP (iBGP) Routing
Lab 8: IPv4 Multicast Configuration
Lab 9: Configuring Multiprotocol Label Switching
Lab 10: Configuring and Verifying IGP Segment Routing
Lab 11: Configuring Layer 3 Virtual Private Network
Lab 12: Local E-Line Service
Lab 13: EoMPLS Service
€3.395
Klassikaal
max 16
Application Services Library (ASL®3) Foundation [ASL]
Nieuwegein (Iepenhoeve 5)
wo 19 nov. 2025
en 7 andere data
OVERVIEW
Deze intensieve 2-daagse ASL® 3 Foundation training is specifiek ontworpen om IT-professionals te voorzien van een diepgaande kennis en begrip van Applicatie Service Library (ASL) versie 3, met een nadruk op applicatieportfoliomanagement binnen het IT-management domein. Door deze training zullen de deelnemers niet alleen vertrouwd raken met de fundamentele principes van ASL maar ook hoe deze te positioneren en te integreren binnen het bredere spectrum van IT-management practices.
De KNVI interessegroep Open Standaarden beheert de verenigingsactiviteiten van ASL®.
ASL® is a registered trademark of Van Haren Group
OBJECTIVES
Tijdens deze training leert de deelnemer het volgende:
Kennismaking met ASL: Deelnemers worden geïntroduceerd aan de basisprincipes van ASL en het belang ervan binnen IT-management, waarbij speciale aandacht wordt besteed aan de positionering van ASL.
Overzicht IT-management en ASL: Verkrijgen van inzicht in het IT-managementlandschap en hoe ASL zich hierbinnen positioneert.
Integratie met andere practices: Exploratie van de relatie tussen ASL en andere management practices zoals ITIL, DevOps, SAFe, BiSL, Scrum, en verschillende projectmanagementmethodologieën, met het doel om te begrijpen hoe ASL complementair kan zijn en geïntegreerd kan worden binnen diverse IT-management praktijken.
AUDIENCE
Deze training is ideaal voor IT-professionals die zich bezighouden met applicatiebeheer, IT-servicebeheer, of die betrokken zijn bij de integratie van IT-management practices binnen hun organisatie.
Voorbeelden van jobrollen waar ASL interesant is:
Applicatiebeheerder
Service Desk medewerkers
ICT-medewerkers die meer kennis willen vergaren over het ASL-raamwerk.
Functioneel beheerders en andere geïnteresseerden uit de gebruikersorganisatie.
CERTIFICATION
Deze cursus geeft een goede voorbereiding op het officiële examen: ASL® 3 Foundation
De examenkosten niet inbegrepen bij de cursusprijs.
Over het examen:
Multiple choice
40 questions
26 marks required to pass (out of 40 available) - 65%
60 minutes duration
Closed-book
Exam Language Dutch
NEXT STEP
Er is geen specifieke vervolgopleiding.
CONTENT
Introductie: 10% - Een inleiding tot de cursus, het belang van ASL, en de leerdoelen.
ASL3-model: 15% - Een overzicht van het ASL3-model en zijn componenten.
Strategisch Portfoliomanagement: 15% - Focus op het managen van het IT-applicatieportfolio vanuit een strategisch perspectief.
Ontwikkeling, Verbetering en Onderhoud: 15% - Technieken en methodes voor het ontwikkelen, verbeteren, en onderhouden van applicaties.
Verbindende Processen: 5% - Het begrijpen van processen die verschillende ASL-componenten met elkaar verbinden.
Leveren & Ondersteunen: 15% - Best practices voor het leveren en ondersteunen van IT-services.
Ondersteunende Processen: 15% - Diepgaande kijk op processen die IT-service management ondersteunen.
Implementatie van ASL: 10% - Strategieën voor de implementatie van ASL binnen organisaties.
Deelnemers zullen de training afronden met een solide begrip van ASL, klaar om de principes toe te passen in hun eigen werkpraktijken, de efficiëntie van IT-servicebeheer te verbeteren, en effectief te navigeren binnen het complexe landschap van moderne IT-management methodologieën.
€995
Klassikaal
max 16
BiSL® Foundation [BISL]
Groningen/Paterswolde (Groningerweg 19)
ma 12 jan. 2026
en 9 andere data
OVERVIEW
De Business Information Services Library (BiSL®) biedt een framework voor het werkveld dat zich bevindt tussen de aansluiting van ICT op het bedrijfsproces. Juist deze aansluiting is vaak niet optimaal. Het BiSL®-procesmodel geeft inzicht in alle hoofdprocessen van het werkveld, en de relaties tussen de processen. Het biedt aanknopingspunten voor verbetering van de processen, onder meer via 'best practices' en het verschaft een uniforme terminologie.
De KNVI interessegroep Open Standaarden beheert de verenigingsactiviteiten van BiSL®.
BiSL® is a registered trademark of Van Haren Group.
OBJECTIVES
Na afloop van deze training bent u in staat de context van het BiSL®-framework te verwoorden en kent u de onderling verhouding tussen functioneel, applicatie-, technisch beheer en de relatie van BiSL® met andere modellen en methoden (zoals ASL® en ITIL®). U krijg inzicht in het BiSL®-raamwerk en de interne samenhang van de processen. De specifieke leerdoelen zijn:
Kennismaken met de verschillende BiSL® procesclusters, de BiSL® processen daarbinnen en BiSL® terminologie;
Inzicht krijgen in het BiSL®-raamwerk en interne samenhang van de processen;
Concrete handvatten verkrijgen voor toepassing van BiSL in uw organisatie;
Het onderkennen van het toenemend belang van functioneel beheer;
Het kweken van enthousiasme voor deze aanpak;
Voorbereiding op het officiële examen.
AUDIENCE
Operationeel niveau: Functioneel beheerder, kerngebruiker, super-user, applicatiebeheerder
Tactisch niveau: Systeemeigenaar, opdrachtgever, productmanager, budgethouder
Strategisch niveau: Informatiemanagement, programmamanager
CERTIFICATION
Deze cursus geeft een goede voorbereiding op het officiële BiSL® Foundation examen
Het examen is optioneel en kunt u aanschaffen i.c.m. met deze training
NEXT STEP
BiSL-A, BiSL® BiSL® Practitioner
CONTENT
Specifieke inhoud:
introductie BiSL®-raamwerk
de rol van functioneel beheer en informatiemanagement
de uitvoerende processen: gebruikersbeheer en functionaliteitenbeheer
de sturende processen
de richtinggevende processen en het opstellen van strategieën voor de organisatie en de informatie
de verbindende processen
relaties naar andere beheervormen
invoering en gebruik BiSL®
€845
Klassikaal
max 16
Persoonlijke effectiviteit voor IT- professionals [BSITP100E]
Nieuwegein (Iepenhoeve 5)
ma 22 dec. 2025
en 7 andere data
OVERVIEW
Voor IT-professionals zijn interpersoonlijke vaardigheden dé kritische succesfactor. De succesvolle professional is assertief, initiatiefrijk, heeft zakelijk inzicht, beïnvloedt zijn omgeving op een positieve manier en communiceert professioneel en resultaatgericht. Dat zijn de onderwerpen die daarom in deze compacte training worden behandeld.
OBJECTIVES
Wat je zult leren:
Het proces van communicatie.
Communicatie factoren.
Persoonlijke behoeften van anderen herkennen en je aanpassen aan deze behoeften.
Het ontwikkelen van invloedrijke communicatie.
Het ontwikkelen en leveren van effectieve presentaties.
Het beheren van meerdere prioriteiten.
AUDIENCE
Alle IT-professionals die geïnteresseerd zijn in het maximaliseren van hun persoonlijke effectiviteit.
€1.195
Klassikaal
max 16
EC-Council Certified Ethical Hacker (CEH) + Exam voucher [CEH]
VIRTUAL TRAINING CENTER
ma 1 dec. 2025
en 9 andere data
OVERVIEW
CEH v13 - Prepare for the CEH certification and learn to think like a hacker while looking for system weaknesses and vulnerabilities.
With CEH v13, you’ll gain access to the world’s first ethical hacking certification powered by AI. By integrating AI into all five phases of ethical hacking, CEH v13 enables you to achieve 40% greater efficiency and double your productivity in cybersecurity tasks.
EC Council’s unique Learn, Certify, Engage, and Compete framework guides you toward ethical hacking mastery. You’ll acquire hands-on experience through 220+ labs, 550+ attack techniques, and 4,000+ tools, while also testing your skills in global Capture the Flag (CTF) competitions. Validate your expertise with a 6-hour practical or 4-hour knowledge-based exam.
Earn a top certification recognized by U.S. DoD 8140, ANAB 17024, and NCSC, adhering to NICE 2.0 and NIST standards.
Open doors to opportunities with top employers by earning a certification trusted worldwide!
This course includes both a knowledge exam voucher and practical exam voucher, subscription to CEH challenges, and over 4000 hacking tools and attack techniques
OBJECTIVES
This course will provide you with:
In-depth knowledge of ethical hacking methodologies and practices, augmented with AI techniques
The skills to integrate AI across ethical hacking phases: reconnaissance, scanning, gaining access, maintaining access, and covering tracks
AI techniques to automate tasks, boost efficiency, and detect sophisticated threats beyond traditional methods
Tools that will utilize AI for proactive threat hunting, anomaly detection, and predictive analysis to prevent cyber-attacks
AUDIENCE
Cybersecurity professionals - Those looking to drive their cybersecurity career forward with the power of AI.
Teams and organizations - Teams looking to turbocharge their AI knowledge in order to stay one step ahead of malicious actors.
Government and military - Government departments and defense bodies looking for a trusted and highly valued global certification partner.
- Security officers
- Auditors
- Security professionals
- Site administrators
- Penetration testers
- Individuals concerned about the integrity of network infrastructure
CERTIFICATION
This course is recommended as preparation for the Certified Ethical Hacker (CEH) certification exam
CONTENT
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
€3.895
Klassikaal
max 16
CISA®, Certified Information Systems Auditor® + Oefen vragen (QAE) [CISAU]
Amsterdam ARISTO (Teleportboulevard 100)
ma 17 nov. 2025
en 9 andere data
OVERVIEW
CISA® - Certified Information Systems Auditor is de wereldwijd erkende gouden standaard voor IS-audit, controle en borging, veelgevraagd en gewaardeerd door toonaangevende wereldmerken. Het is vaak een verplichte kwalificatie voor een baan als IT-auditor. CISA professionals bieden de geloofwaardigheid om standaarden te gebruiken, kwetsbaarheden te beheren, compliance te verzekeren, oplossingen aan te bieden, controles in te stellen en waarde te leveren aan organisaties.
Deze 4-daagse officiële CISA training is de voorbereiding op het nieuwste CISA certificaat. Tijdens deze cursus leert u over het IT audit proces.
Continuing Professional Education (CPE) : 31
Oefenvragen (QAE = Questions, Answers and Explanations) : 12 maanden toegang
Virtueel en Klassikaal™
Virtueel en Klassikaal™ is een eenvoudig leerconcept en biedt een flexibele oplossing voor het volgen van een klassikale training. Met Virtueel en Klassikaal™ kunt u zelf beslissen of u een klassikale training virtueel (vanuit huis of kantoor )of fysiek op locatie wilt volgen. De keuze is aan u! Cursisten die virtueel deelnemen aan de training ontvangen voor aanvang van de training alle benodigde informatie om de training te kunnen volgen.
OBJECTIVES
Domain 1 - Information System Auditing Process
Plan an audit to determine whether information systems are protected, controlled, and provide value to the enterprise.
Conduct an audit following IS audit standards and a risk-based IS audit strategy.
Communicate audit progress, findings, results, and recommendations to stakeholders.
Conduct audit follow-up to evaluate whether risks have been sufficiently addressed.
Evaluate IT management and monitoring of controls.
Utilize data analytics tools to streamline audit processes.
Provide consulting services and guidance to the enterprise to improve the quality and control of information systems.
Identify opportunities for process improvement in the enterprise's IT policies and practices.
Domain 2 – Governance and Management of IT
Evaluate the IT strategy for alignment with the enterprise’s strategies and objectives.
Evaluate the effectiveness of IT governance structure and IT organizational structure.
Evaluate the enterprise’s management of IT policies and practices.
Evaluate the enterprise’s IT policies and practices for compliance with regulatory and legal requirements.
Evaluate IT resource and portfolio management for alignment with the enterprise’s strategies and objectives.
Evaluate the enterprise’s risk management policies and practices.
Evaluate IT management and monitoring of controls.
Evaluate the monitoring and reporting of IT key performance indicators (KPIs).
Evaluate whether IT supplier selection and contract management processes align with business requirements.
Evaluate whether IT service management practices align with business requirements.
Conduct periodic review of information systems and enterprise architecture. Evaluate data governance policies and practices.
Evaluate the information security program to determine its effectiveness and alignment with the enterprise’s strategies and objectives.
Evaluate potential opportunities and threats associated with emerging technologies, regulations, and industry practices.
Domain 3 – Information Systems Acquisition, Development, and Implementation
Evaluate whether the business case for proposed changes to information systems meet business objectives.
Evaluate the enterprise's project management policies and practices.
Evaluate controls at all stages of the information systems development lifecycle.
Evaluate the readiness of information systems for implementation and migration into production.
Conduct post-implementation review of systems to determine whether project deliverables, controls, and requirements are met.
Evaluate change, configuration, release, and patch management policies and practices.
Domain 4 – Information Systems Operations and Business Resilience
Evaluate the enterprise’s ability to continue business operations.
Evaluate whether IT service management practices align with business requirements.
Conduct periodic review of information systems and enterprise architecture.
Evaluate IT operations to determine whether they are controlled effectively and continue to support the enterprise’s objectives.
Evaluate IT maintenance practices to determine whether they are controlled effectively and continue to support the enterprise’s objectives.
Evaluate database management practices.
Evaluate data governance policies and practices.
Evaluate problem and incident management policies and practices.
Evaluate change, configuration, release, and patch management policies and practices.
Evaluate end-user computing to determine whether the processes are effectively controlled.
Evaluate policies and practices related to asset lifecycle management.
Domain 5 – Protection of Information Assets
Conduct audit in accordance with IS audit standards and a risk-based IS audit strategy.
Evaluate problem and incident management policies and practices.
Evaluate the enterprise's information security and privacy policies and practices.
Evaluate physical and environmental controls to determine whether information assets are adequately safeguarded.
Evaluate logical security controls to verify the confidentiality, integrity, and availability of information.
Evaluate data classification practices for alignment with the enterprise’s policies and applicable external requirements.
Evaluate policies and practices related to asset lifecycle management.
Evaluate the information security program to determine its effectiveness and alignment with the enterprise’s strategies and objectives.
Perform technical security testing to identify potential threats and vulnerabilities.
Evaluate potential opportunities and threats associated with emerging technologies, regulations, and industry practices.
AUDIENCE
Designed for mid-career IS audit, control and assurance professionals looking to leverage career growth including:
IT Audit Directors/Managers/Consultants
IT Auditors
Compliance/Risk/Privacy Directors
IT Directors/Managers/Consultants
CERTIFICATION
Please note: The examvoucher is not included in the courseprice.
4 hours (240 minutes),
150 multiple choice questions
In addition to passing the examination, there are additional requirements for obtaining the certificate. These can be found at: https://www.isaca.org/credentialing/cisa/get-cisa-certified
NEXT STEP
CISSP Certification Preparation
CONTENT
Domain 1 - Information System Auditing Process
IS Audit Standards, Guidelines, Functions, and Codes of Ethics
Types of Audits, Assessments, and Reviews
Risk-based Audit Planning
Types of Controls and Considerations
Audit Project Management
Audit Testing and Sampling Methodology
Audit Evidence Collection Techniques
Audit Data Analytics
Reporting and Communication Techniques
Quality Assurance and Improvement of Audit Process
Domain 2 – Governance and Management of IT
Laws, Regulations, and Industry Standards
Organizational Structure, IT Governance, and IT Strategy
IT Policies, Standards, Procedures, and Guidelines
Enterprise Architecture and Considerations
Enterprise Risk Management (ERM)
Privacy Program and Principles
Data Governance and Classification
IT Resource Management
IT Vendor Management
IT Performance Monitoring and Reporting
Quality Assurance and Quality Management of IT
Domain 3 – Information Systems Acquisition, Development, and Implementation
Project Governance and Management
Business Case and Feasibility Analysis
System Development Methodologies
Control Identification and Design
System Readiness and Implementation Testing
Implementation Configuration and Release Management
System Migration, Infrastructure Deployment, and Data Conversion
Postimplementation Review
Domain 4 – Information Systems Operations and Business Resilience
IT Components
IT Asset Management
Job Scheduling and Production Process Automation
System Interfaces
End-user Computing and Shadow IT
Systems Availability and Capacity Management
Problem and Incident Management
IT Change, Configuration, and Patch Management
Operational Log Management
IT Service Level Management
Database Management
Business Impact Analysis
System and Operational Resilience
Data Backup, Storage, and Restoration
Business Continuity Plan
Disaster Recovery Plans
Domain 5 – Protection of Information Assets
Information Asset Security Policies, Frameworks, Standards, and Guidelines
Physical and Environmental Controls
Identity and Access Management
Network and End-Point Security
Data Loss Prevention
Data Encryption
Public Key Infrastructure (PKI)
Cloud and Virtualized Environments
Mobile, Wireless, and Internet-of-Things Devices
Security Awareness Training and Programs
Information System Attack Methods and Techniques
Security Testing Tools and Techniques
Security Monitoring Logs, Tools, and Techniques
Security Incident Response Management
Evidence Collection and Forensics
CISA Exam Preparation
CISA Exam Rules
Exam Tips
Day of the Exam
CISA Certification Steps
€3.495
Klassikaal
max 16