Onderwerp
Automatisering & ICT/IT
Communicatie
Financieel
HR
Inkoop & logistiek
Management
Secretarieel & Administratief
Marketing
Opleiding & Onderwijs
Persoonlijke Effectiviteit
Productie, techniek & bouw
Kwaliteit- & Projectmanagement
Sales
Vitaliteit & Gezondheid
Taalcursus
Zorg & Verzorging
Juridisch
Internet & Media
Arbo & Veiligheid
Hobby & Vrije Tijd
Vastgoed & Makelaardij
Abonnementen
Locatie
Niveau
Type
Keurmerk

Opleidingen

58.886 resultaten

Coachsessie

Welkom bij ActieCoaching. Mijn naam is Pjotr Paijmans, eigenaar van ActieCoaching. ActieCoaching bied een persoonlijk coachtraject aan jongeren en (jong-)volwassenen die last hebben van een burn-out, overstresst zijn, controle over het eigen leven missen, moeite hebben met het vinden van de echte ”ik” of gewoon even niet lekker in zijn/haar vel zit. Mijn NLP studies vormen de basis voor de coachtrajecten. Naast NLP wordt er ook inspiratie gehaald uit Systemisch werk, Huna en 365 dagen succesvol. Tot slot zorgt mijn achtergrond als bedrijfskundige ervoor dat je niet alleen geinspireerd uit de coachgesprekken komt maar ook praktische handvaten hebt om effectief en efficient met je uitdagingen aan de slag te gaan. De meest voorkomende klachten waar ik mee werk zijn: stress, burn-out, overgewicht, relatieproblemen (liefdes, zakelijk familie), contact met jezelf of een ander missen of het gevoel te hebben dat je je ware ''ik'' nog niet hebt gevonden. Vervolgens leer je door middel van een persoonlijk traject waar jij gelukkig van wordt, hoe je daar concreet naar toe kan werken terwijl je ondertussen in optimaal contact blijft met jezelf en een ander.
€45
Coaching

SCOR Implementing and Operating Cisco Security Core Technologies Klassikaal

Nieuwegein ma 14 jul. 2025 en 7 andere data
Volg de Implementing and Operating Cisco Security Core Technologies training. In deze ttraining leer je de vaardigheden en technologieën die je nodig hebt om de belangrijkste Cisco-beveiligingsoplossingen te implementeren om geavanceerde bescherming tegen cyberaanvallen te bieden. Na afronding van deze training kun je onder andere: Veel voorkomende TCP/IP, network application, en endpoint aanvallen beschrijven Beschrijven hoe een cloud omgeving te beveiligen is Cisco IOS Software Layer 2 en Layer 3 Data Plane Controls configureren en verifiëren Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels). This 5 day Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks.You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features. Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx 3 days of self study. The self-study content will be provided as part of the digital courseware that you will recieve at the beginning of the course and should be part of your preparation for the exam. After completing this course you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS VTI-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco FirePower NGFW Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and EAP authentication Provide basic understanding of endpoint security and describe AMP for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS Software Layer 2 and Layer 3 Data Plane Controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment Recommended as preparation for the following exams: 350-701 - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) This is the core exam for the Cisco CCNP Security certification, in order to gain the CCNP Security certification you will also need to pass one of the concentration exams. Lesmethode Dit is een klassikale training en wordt verzorgd op locatie of in een virtual classroom. Doelgroep Security individuals who need to be able to implement and operate core security technologies including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility and enforcements. Security individuals who need to be able to implement and operate core security technologies including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility and enforcements. Voorkennis Attendees should meet the following prerequisites: Familiarity with Ethernet and TCP/IP networking Working Knowledge of the Windows operating system Working Knowledge of Cisco IOS networking and concepts Familiarity with basics of networking security concepts Attendees should meet the following prerequisites: Familiarity with Ethernet and TCP/IP networking Working Knowledge of the Windows operating system Working Knowledge of Cisco IOS networking and concepts Familiarity with basics of networking security concepts Onderdelen Describing Information Security Concepts (Self-Study) Information Security Overview Managing Risk Vulnerability Assessment Understanding CVSS Describing Common TCP/IP Attacks (Self-Study) Legacy TCP/IP Vulnerabilities IP Vulnerabilities ICMP Vulnerabilities TCP Vulnerabilities UDP Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-In-The-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks DHCP Attacks Describing Common Network Application Attacks (Self-Study) Password Attacks DNS-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks (Self-Study) Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview IPS Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface ACLs Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW NAT Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview SMTP Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco WSA Overview Deployment Options Network Users Authentication HTTPS Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella (Self-Study) Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point Cisco IOS VTIs Static VTI Point-to-Point IPsec IKEv2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies SSL Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and EAP EAP Methods Role of RADIUS in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst Switch 802.1X Configuration Cisco WLC 802.1X Configuration Cisco ISE 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies (Self-Study) Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco AMP for Endpoints (Self-study) Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection (Self-Study) Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls (Self-Study) Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls (Self-Study) Overview of Layer 2 Data Plane Security Controls VLAN-Based Attacks Mitigation STP Attacks Mitigation Port Security Private VLANs DHCP Snooping ARP Inspection Storm Control MACsec Encryption Deploying Layer 3 Data Plane Security Controls (Self-Study) Infrastructure Antispoofing ACLs Unicast Reverse Path Forwarding IP Source Guard Labs Configure Network Settings And NAT On Cisco ASA Configure Cisco ASA Access Control Policies Configure Cisco Firepower NGFW NAT Configure Cisco Firepower NGFW Access Control Policy Configure Cisco Firepower NGFW Discovery and IPS Policy Configure Cisco NGFW Malware and File Policy Configure Listener, HAT, and RAT on Cisco ESA Configure Mail Policies Configure Proxy Services, Authentication, and HTTPS Decryption Enforce Acceptable Use Control and Malware Protection Examine the Umbrella Dashboard Examine Cisco Umbrella Investigate Explore DNS Ransomware Protection by Cisco Umbrella Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel Configure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW Configure Remote Access VPN on the Cisco Firepower NGFW Explore Cisco AMP for Endpoints Perform Endpoint Analysis Using AMP for Endpoints Console Explore File Ransomware Protection by Cisco AMP for Endpoints Console Explore Cisco Stealthwatch Enterprise v6.9.3 Explore CTA in Stealthwatch Enterprise v7.0 Explore the Cisco Cloudlock Dashboard and User Security Explore Cisco Cloudlock Application and Data Security Explore Cisco Stealthwatch Cloud Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors Describing Information Security Concepts (Self-Study) Information Security Overview Managing Risk Vulnerability Assessment Understanding CVSS Describing Common TCP/IP Attacks (Self-Study) Legacy TCP/IP Vulnerabilities IP Vulnerabilities ICMP Vulnerabilities TCP Vulnerabilities UDP Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-In-The-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks DHCP Attacks Describing Common Network Application Attacks (Self-Study) Password Attacks DNS-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks (Self-Study) Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview IPS Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface ACLs Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW NAT Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview SMTP Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco WSA Overview Deployment Options Network Users Authentication HTTPS Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella (Self-Study) Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point Cisco IOS VTIs Static VTI Point-to-Point IPsec IKEv2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies SSL Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and EAP EAP Methods Role of RADIUS in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst Switch 802.1X Configuration Cisco WLC 802.1X Configuration Cisco ISE 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies (Self-Study) Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco AMP for Endpoints (Self-study) Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection (Self-Study) Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls (Self-Study) Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls (Self-Study) Overview of Layer 2 Data Plane Security Controls VLAN-Based Attacks Mitigation STP Attacks Mitigation Port Security Private VLANs DHCP Snooping ARP Inspection Storm Control MACsec Encryption Deploying Layer 3 Data Plane Security Controls (Self-Study) Infrastructure Antispoofing ACLs Unicast Reverse Path Forwarding IP Source Guard Labs Configure Network Settings And NAT On Cisco ASA Configure Cisco ASA Access Control Policies Configure Cisco Firepower NGFW NAT Configure Cisco Firepower NGFW Access Control Policy Configure Cisco Firepower NGFW Discovery and IPS Policy Configure Cisco NGFW Malware and File Policy Configure Listener, HAT, and RAT on Cisco ESA Configure Mail Policies Configure Proxy Services, Authentication, and HTTPS Decryption Enforce Acceptable Use Control and Malware Protection Examine the Umbrella Dashboard Examine Cisco Umbrella Investigate Explore DNS Ransomware Protection by Cisco Umbrella Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel Configure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW Configure Remote Access VPN on the Cisco Firepower NGFW Explore Cisco AMP for Endpoints Perform Endpoint Analysis Using AMP for Endpoints Console Explore File Ransomware Protection by Cisco AMP for Endpoints Console Explore Cisco Stealthwatch Enterprise v6.9.3 Explore CTA in Stealthwatch Enterprise v7.0 Explore the Cisco Cloudlock Dashboard and User Security Explore Cisco Cloudlock Application and Data Security Explore Cisco Stealthwatch Cloud Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors
€2.990
E-Learning
max 9
MBO
5 dagen

SISE Implementing and Configuring Cisco Identity Services Engine Klassikaal

Online ma 7 jul. 2025 en 5 andere data
Volg de SISE Training Implementing and Configuring Cisco Identity Services Engine. De training Cisco Identity Services Engine configureren laat je zien hoe je Cisco Identity Services Engine (ISE) v2.4 implementeert en gebruikt. Dit is een platform voor identiteits- en toegangscontrolebeleid dat de levering van consistente, zeer veilige toegangscontrole over bekabelde, draadloze en VPN-verbindingen vereenvoudigt. Na afronding van deze training kun je onder andere: TACACS+ device administration beschrijven en configureren met Cisco ISE TACACS+ functionaliteit migreren van Cisco Secure Access Control System (ACS) naar Cisco ISE Cisco ISE deployments beschrijven Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels). The 5-day SISE Implementing and Configuring Cisco Identity Services Engine course shows you how to deploy and use Cisco Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless and VPN connections. This hands-on course provides you with the knowledge and skills required to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management and contribute to operational efficiency. Delegates will be expected to work in groups and share lab equipment, If you are attending virtually you may also be required to work in virtual breakout rooms. Extended hours may also be required to cover all of the content included in this class. After completing this course you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party network access devices (NADs), Cisco TrustSec®, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the authentication, authentication, and accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. Recommended preparation for exam: 300-715 - Implementing and Configuring Cisco Identity Services Engine Passing this exam will provide you with the CIsco Certified Specialist - Security Identity Management certification and satisfy the concentration requirement for the CCNP Security certification. Lesmethode Dit is een klassikale training en wordt verzorgd op locatie of in een virtual classroom. Doelgroep Individuals involved in the deployment and maintenance of the Cisco ISE platform. Individuals involved in the deployment and maintenance of the Cisco ISE platform. Voorkennis Attendees should meet the following prerequisites: Foundational level understanding of Security Concepts Understand the concepts of 802.1X. Familiarity with Cisco AnyConnect Secure Mobility Client. Familiarity with Microsoft Windows and Active Directory. Attendees should meet the following prerequisites: Foundational level understanding of Security Concepts Understand the concepts of 802.1X. Familiarity with Cisco AnyConnect Secure Mobility Client. Familiarity with Microsoft Windows and Active Directory. Onderdelen Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Fucntions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Services Configure Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning Working with Network Access Devices Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Labs Lab 1: Access the SISE Lab and Install ISE 2.4 Lab 2 : Configure Initial Cisco ISE Setup, Gui Familiarization and System Certificate Usage Lab 3: Integrate Cisco ISE with Active Directory Lab 4: Configure Cisco ISE Policy Lab 5: Configure Access Policy for Easy Connect Lab 6: Configure Guest Access Lab 7: Configure Guest Access Operations Lab 8: Create Guest Reports Lab 9: Configure Profiling Lab 10: Customize the Cisco ISE Profiling Configuration Lab 11: Create Cisco ISE Profiling Reports Lab 12: Configure BYOD Lab 13: Blacklisting a Device Lab 14: Configure Cisco ISE Compliance Services Lab 15: Configure Client Provisioning Lab 16: Configure Posture Policies Lab 17: Test and Monitor Compliance Based Access Lab 18: Test Compliance Policy Lab 19: Configure Cisco ISE for Basic Device Administration Lab 20: Configure TACACS+ Command Authorization Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Fucntions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Services Configure Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning Working with Network Access Devices Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Labs Lab 1: Access the SISE Lab and Install ISE 2.4 Lab 2 : Configure Initial Cisco ISE Setup, Gui Familiarization and System Certificate Usage Lab 3: Integrate Cisco ISE with Active Directory Lab 4: Configure Cisco ISE Policy Lab 5: Configure Access Policy for Easy Connect Lab 6: Configure Guest Access Lab 7: Configure Guest Access Operations Lab 8: Create Guest Reports Lab 9: Configure Profiling Lab 10: Customize the Cisco ISE Profiling Configuration Lab 11: Create Cisco ISE Profiling Reports Lab 12: Configure BYOD Lab 13: Blacklisting a Device Lab 14: Configure Cisco ISE Compliance Services Lab 15: Configure Client Provisioning Lab 16: Configure Posture Policies Lab 17: Test and Monitor Compliance Based Access Lab 18: Test Compliance Policy Lab 19: Configure Cisco ISE for Basic Device Administration Lab 20: Configure TACACS+ Command Authorization
€2.995
E-Learning
max 9
MBO
5 dagen

Training OpenCV

Rotterdam ma 7 jul. 2025 en 9 andere data
Beeldinterpretatie is een veel ingezette vorm van automatisering bij Machine en Deep Learning toepassingen. Denk bijvoorbeeld aan het automatisch herkennen van objecten in afbeeldingen of gezichtsherkenning als authenticatiemethode. Hiervoor zijn vele algoritmen en methodes beschikbaar en om te voorkomen dat deze functionaliteiten iedere keer opnieuw worden ontwikkeld zijn er maar liefst 2500 gebundeld in de OpenCV (Computer Vision) library voor zowel bewerking als interpretatie. De library is vrij te gebruiken en o.a. benaderbaar met o.a. de programmeertalen Python, C++, Java en Android SDK. Tijdens de training Tijdens deze training leer je hoe je OpenCV installeert, configureert en benadert in Python, welke algoritmen het beste aansluiten bij je Machine en Deep Learning doelen en hoe je deze kan aanspreken. Dit geheel ondersteunen we met een aantal praktische voorbeelden van veel voorkomende toepassingen. Bedrijfstraining OpenCV Wil je de stof liever toegespitst zien op de IT situatie binnen je eigen organisatie of een specifiek systeem? In een bedrijfstraining kunnen wij de training volledig op maat verzorgen, voor jou en wellicht een groep van je collega’s. Zo sluit een bedrijfstraining perfect aan bij wat jij moet beheersen om deze technieken direct voor je organisatie te kunnen inzetten. Tijdens de training OpenCV behandelen we de volgende onderdelen: Introductie OpenCV Installatie en aanspreken in Python Beeldmateriaal Inlezen, tonen, en bewaren Colour Spaces Transformatie: rotatie, schalen en filters Egomotion Analyse Keypoints Motion detection en tracking Contour herkenning Gezichtsherkenning Object detectie en herkenning Censurering Segmentatie SIFT, SURF, FAST en BRIEF Stereopsis Machine en Deep Learning Boosting Decision trees Random forest Support vector machines k-nearest neighbor algoritme Naive Bayes classifier Praktijkvoorbeelden Tips en valkuilen
€899
Klassikaal
max 13

Training Keras

Rotterdam ma 7 jul. 2025 en 9 andere data
Taken die voorheen een menselijke interventie nodig hadden worden steeds meer geautomatiseerd. Denk hierbij aan het analyseren van beeld- of geluidsmateriaal, het herkennen van patronen in data of het voorspellen van een uitkomsten. Hoewel er ruime keus in softwarepakketten is die in deze behoefte voorzien, zijn ze vaak niet heel gebruiksvriendelijk of bewerkelijk in het gebruik. Met de Python module Keras, die je kan verbinden met populaire Deep Learning pakketten als TensorFlow, Theano, en Microsoft Cognitive Toolkit, realiseer je een eenvoudigere en snellere manier om de modellen die deze pakketten bieden te benaderen. Tijdens de training leer je hoe je Keras installeert, configureert en koppelt aan het Machine of Deep Learning framework van jouw keuze. Vervolgens leer je op praktische wijze, aan de hand van modellen aanwezig in de onderliggende pakketten, verschillende machine learning methoden toepassen. De training Keras is zeer praktijkgericht en je ziet, na het aanpassen van code, direct het resultaat. Op deze manier haal je optimaal rendement uit de training. Bedrijfstraining Keras Wil je de stof liever toegespitst zien op de IT situatie binnen je eigen organisatie, met eigen data of unieke omstandigheden? In een bedrijfstraining kunnen wij de training volledig op maat verzorgen, voor jou en wellicht een groep van je collega’s. Zo sluit een bedrijfstraining perfect aan bij wat jij moet beheersen om deze technieken direct voor je organisatie te kunnen inzetten. Tijdens de Cursus Keras behandelen we de volgende onderdelen: Introductie Keras Installatie en configuratie Koppeling met Tensorflow De Keras API Data Data aanspreken Ongestructureerde data versus gestructureerde Plotting met Matplotlib Beeld en geluid benaderen met Jupyter Machine Learning Geschikte cases Supervised versus unsupervised Learning Lineaire Regressie Model keuze en performance Deep Learning Neurale netwerken Classificatie Modellen bouwen op basis van algoritmes Gebruik maken van resources als CPU en GPU’s Cloud offloading Inspectie en evaluatie Code optimalisatie en performanceverbetering Tips en tricks
€1.599
Klassikaal
max 13

Procesmodelleren met BPMN 2.0 You-Get

BPMN staat voor Business Process Model and Notation. Tijdens deze training leer je zelfstandig bedrijfs- en werkprocessen modelleren met BPMN 2.0. BPMN staat voor Business Process Model and Notation. Tijdens deze training leer je zelfstandig bedrijfs- en werkprocessen modelleren met BPMN 2.0. Je leert diverse best practices kennen om tot een goed procesmodel te komen. Deze training is bedoeld voor iedereen die betrokken is bij procesmodellering: Testers Proces Teams Proces managers en Process owners Business Analisten/ Proces modelleurs Tijdens de training staat het volgende centraal: Waarom en wanneer pas je BPMN toe? BPMN binnen jouw bedrijf BPMN elementen en betekenis van de symbolen Aanpak voor procesmodelleren, de 3 BPMN lagen:    1.      Descriptive    2.      Analytical    3.      Executable Oefeningen met BPMN procesmodellering, best practices en valkuilen Procesmodellering level 1: high-level gestructureerd procesmodel Level 2: gedetailleerd procesmodel Level 3: technisch procesmodel Per level gaan we in op: Symbolen die gebruikt worden Stappen die gezet worden Best practices Voorbeelden + oefeningen BPMN i.c.m. Business Rules Gebruik van BPMN voor procesautomatisering Integrale case BPMN level 1, 2 en 3 Planning lesdagen Normaliter plant You-Get maximaal twee trainingsdagen per week. De exacte trainingsdagen en eventuele tussenliggende periode worden in overleg met de klant bepaald. Voorafgaande en vervolgtrainingen Deze training is een uitbreiding op de Proces Analyse & Ontwerp Training. Voorafgaand aan deze training:  BPM Introductie Training Voor wie? Deze training is bedoeld voor iedereen die betrokken is bij procesmodellering, waaronder: Testers Proces Teams Proces managers en Process owners Business Analisten/ Proces modelleurs
€1.401
Klassikaal
2 dagen

DevOps CI/CD Overview (Virtueel)

Lesmethode : Virtueel Algemeen : DevOps vraagt om een nieuwe manier van werken, bijvoorbeeld door een groot gedeelte van de deployment te automatiseren met Continuous Integration Continuous Deployment (CI/CD). Omdat de basis voor het succes van DevOps wordt gevormd door een nauwe samenwerking tussen ontwikkelaars en systeembeheerders is het belangrijk om goede gedegen en kennis te hebben van de onderdelen van de CI/CD pijplijn. Er is echter een overvloed aan (open source)tools beschikbaar, dus welke tool kies je nu en wat doen al die tools precies? Deze cursus zorgt voor ervoor dat je op conceptueel niveau een goed beeld krijgt van de meest gebruikte tools voor CI/CD. Het bouwen van een microservice op basis van de programmeertaal Python vormt de rode draad van de cursus. Hiermee komen de concepten tot leven. Aan het eind van de dag wordt een kleine applicatie door de CI/CD pijplijn gehaald en uitgerold op een Kubernetes-omgeving: klaar voor gebruik door de klant! We also offer this course in English, check it out here: DevOps CI/CD Overview (English). Doel : Na het volgen van deze cursus ben je bekend met de concepten en werking van een CI/CD pijplijn. Je kunt na deze cursus beter een keuze maken welke tool voor jouw situatie geschikt is. Doelgroep : Systeembeheerders en softwareontwikkelaars die gaan werken binnen een DevOps team Voorkennis : Er is geen voorkennis nodig. Onderwerpen : - Conceptuele Overview van een CI/CD pijplijn    - Code editors, weke code editor gebruik bij bepaalde situaties?    - Source control met git en github    - Continuous Integration en Building met Jenkins Pipelines, Docker Vagrant    - Testing met Selenium, Soapui, Postman, Junit, Cucumber    - Configuration Management met Ansible, Puppet, Chef    - Container-orkestratie met Docker Swarm en Kubernetes.    - Deployment on premise of in de cloud : Amazon Web Services, Pivotal Cloudfoundry, Microsoft Azure, Google Cloud Services of Open Stack met Docker of Packer. - Inrichten van CI/CD, zit door de cursus heen
€765
Klassikaal
max 12

AWS Security Essentials [GK3337]

VIRTUAL TRAINING CENTER do 21 aug. 2025 en 9 andere data
OVERVIEW AWS Security Essentials covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization.  This course enables you to dive deep, ask questions, work through solutions, and get feedback from AWS-accredited instructors with deep technical knowledge. This is a fundamental level course and is a part of the AWS Security learning path. OBJECTIVES This course is designed to teach you how to: Identify security benefits and responsibilities when using the AWS Cloud Describe the access control and management features of AWS  Understand the different data encryption methods to secure sensitive data Describe how to secure network access to your AWS resources  Determine which AWS services can be used for security logging and monitoring AUDIENCE This course is intended for: - IT business-level professionals interested in cloud security practices - Security professionals with minimal working knowledge of AWS CONTENT Module 1: Exploring the Security Pillar AWS Well-Architected Framework: Security Pillar Module 2: Security of the Cloud Shared responsibility model AWS Global Infrastructure Compliance and governance Module 3: Identity and Access Management Identity and access management Data access and protection essentials Lab 1: Introduction to Security Policies Module 4: Protecting Infrastructure and Data Protecting your network infrastructure Edge Security DDoS Mitigation Protecting compute resources Lab 2: Securing VPC Resources with Security Groups Module 5: Detection and Response Monitoring and detective controls Incident response essentials Module 6: Course Wrap-Up Course review
€695
Klassikaal
max 16

SAFe® Agile Product Management + Examenvoucher

Nieuwegein do 3 jul. 2025 en 2 andere data
Wil jij weten hoe Scaled Agile Framework (SAFe) werkt en wat Agile Product Management daarbinnen omvat? Wat is de markt- en klantgerichte rol van de Product Manager binnen SAFe? Volg dan deze 3 Wil jij weten hoe Scaled Agile Framework (SAFe) werkt en wat Agile Product Management daarbinnen omvat? Wat is de markt- en klantgerichte rol van de Product Manager binnen SAFe? Volg dan deze 3-daagse training en behaal de SAFe® Agile Product Manager certificering. Tijdens deze training gaan we in op Agile Product Management. Een Agile Product Manager combineert Design Thinking met Lean-Agile waarden en principes om producten en oplossingen te creëren die wenselijk, rendabel, haalbaar en duurzaam zijn. Cursuseigenaar - Cibit Lesmethode - Klassikaal Productgroep - Agile Soort - Open rooster
€2.395
Klassikaal
max 12
24 uren

SAFe® Lean Portfolio Management + Examenvoucher

Nieuwegein do 4 sep. 2025 en 1 andere data
Is jouw organisatie bezig met het Scaled Agile Framework? Ga jij aan de slag als Lean Portfolio Manager? Bereid je voor om SAFe® toe te passen op portfolioniveau! In deze 2-daagse training krijg Is jouw organisatie bezig met het Scaled Agile Framework? Ga jij aan de slag als Lean Portfolio Manager? Bereid je voor om SAFe® toe te passen op portfolioniveau! In deze 2-daagse training krijg je een goed beeld van de werking van SAFe en de specifieke aspecten van Lean Portfolio Management zoals Strategie, Investeringen, Portfolio Operations en Lean Governance. Na afloop van deze Lean Portfolio Management (LPM) training kan je: Lean Portfolio Management (LPM) beschrijven Lean Portfolio laten aansluiten op je bedrijfsstrategie Portfolio visie vaststellen Lean Budgeting en Guardrails implementeren Portfolio Kanban inzetten Agile Program Management Office (PMO) inrichten en Communities of Practice (CoP's) ondersteunen Value streams coördineren Lean Portfolio prestaties meten Een implementatieplan opzetten voor LPM or iedereen die aan de slag gaat met Lean Portfolio Management. Deze opleiding veronderstelt fundamentele kennis van Agile en Scrum. Cursuseigenaar - Cibit Lesmethode - Klassikaal Productgroep - Agile Soort - Open rooster
€1.695
Klassikaal
max 12
16 uren