
Opleidingen
58.886
resultaten
Coachsessie
Welkom bij ActieCoaching. Mijn naam is Pjotr Paijmans, eigenaar van ActieCoaching. ActieCoaching bied een persoonlijk coachtraject aan jongeren en (jong-)volwassenen die last hebben van een burn-out, overstresst zijn, controle over het eigen leven missen, moeite hebben met het vinden van de echte ”ik” of gewoon even niet lekker in zijn/haar vel zit.
Mijn NLP studies vormen de basis voor de coachtrajecten. Naast NLP wordt er ook inspiratie gehaald uit Systemisch werk, Huna en 365 dagen succesvol. Tot slot zorgt mijn achtergrond als bedrijfskundige ervoor dat je niet alleen geinspireerd uit de coachgesprekken komt maar ook praktische handvaten hebt om effectief en efficient met je uitdagingen aan de slag te gaan.
De meest voorkomende klachten waar ik mee werk zijn: stress, burn-out, overgewicht, relatieproblemen (liefdes, zakelijk familie), contact met jezelf of een ander missen of het gevoel te hebben dat je je ware ''ik'' nog niet hebt gevonden.
Vervolgens leer je door middel van een persoonlijk traject waar jij gelukkig van wordt, hoe je daar concreet naar toe kan werken terwijl je ondertussen in optimaal contact blijft met jezelf en een ander.

€45
Coaching
SCOR Implementing and Operating Cisco Security Core Technologies Klassikaal
Nieuwegein
ma 14 jul. 2025
en 7 andere data
Volg de Implementing and Operating Cisco Security Core Technologies training. In deze ttraining leer je de vaardigheden en technologieën die je nodig hebt om de belangrijkste Cisco-beveiligingsoplossingen te implementeren om geavanceerde bescherming tegen cyberaanvallen te bieden.
Na afronding van deze training kun je onder andere:
Veel voorkomende TCP/IP, network application, en endpoint aanvallen beschrijven
Beschrijven hoe een cloud omgeving te beveiligen is
Cisco IOS Software Layer 2 en Layer 3 Data Plane Controls configureren en verifiëren
Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels).
This 5 day Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks.You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features.
Please note that this course is a combination of Instructor-Led and Self-Paced Study - 5 days in the classroom and approx 3 days of self study. The self-study content will be provided as part of the digital courseware that you will recieve at the beginning of the course and should be part of your preparation for the exam.
After completing this course you should be able to:
Describe information security concepts and strategies within the network
Describe common TCP/IP, network application, and endpoint attacks
Describe how various network security technologies work together to guard against attacks
Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall
Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance
Describe and implement web content security features and functions provided by Cisco Web Security Appliance
Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console
Introduce VPNs and describe cryptography solutions and algorithms
Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS VTI-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco FirePower NGFW
Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and EAP authentication
Provide basic understanding of endpoint security and describe AMP for Endpoints architecture and basic features
Examine various defenses on Cisco devices that protect the control and management plane
Configure and verify Cisco IOS Software Layer 2 and Layer 3 Data Plane Controls
Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions
Describe basics of cloud computing and common cloud attacks and how to secure cloud environment
Recommended as preparation for the following exams:
350-701 - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)
This is the core exam for the Cisco CCNP Security certification, in order to gain the CCNP Security certification you will also need to pass one of the concentration exams.
Lesmethode
Dit is een klassikale training en wordt verzorgd op locatie of in een virtual classroom.
Doelgroep
Security individuals who need to be able to implement and operate core security technologies including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility and enforcements.
Security individuals who need to be able to implement and operate core security technologies including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility and enforcements.
Voorkennis
Attendees should meet the following prerequisites:
Familiarity with Ethernet and TCP/IP networking
Working Knowledge of the Windows operating system
Working Knowledge of Cisco IOS networking and concepts
Familiarity with basics of networking security concepts
Attendees should meet the following prerequisites:
Familiarity with Ethernet and TCP/IP networking
Working Knowledge of the Windows operating system
Working Knowledge of Cisco IOS networking and concepts
Familiarity with basics of networking security concepts
Onderdelen
Describing Information Security Concepts (Self-Study)
Information Security Overview
Managing Risk
Vulnerability Assessment
Understanding CVSS
Describing Common TCP/IP Attacks (Self-Study)
Legacy TCP/IP Vulnerabilities
IP Vulnerabilities
ICMP Vulnerabilities
TCP Vulnerabilities
UDP Vulnerabilities
Attack Surface and Attack Vectors
Reconnaissance Attacks
Access Attacks
Man-In-The-Middle Attacks
Denial of Service and Distributed Denial of Service Attacks
Reflection and Amplification Attacks
Spoofing Attacks
DHCP Attacks
Describing Common Network Application Attacks (Self-Study)
Password Attacks
DNS-Based Attacks
DNS Tunneling
Web-Based Attacks
HTTP 302 Cushioning
Command Injections
SQL Injections
Cross-Site Scripting and Request Forgery
Email-Based Attacks
Describing Common Endpoint Attacks (Self-Study)
Buffer Overflow
Malware
Reconnaissance Attack
Gaining Access and Control
Gaining Access via Social Engineering
Gaining Access via Web-Based Attacks
Exploit Kits and Rootkits
Privilege Escalation
Post-Exploitation Phase
Angler Exploit Kit
Describing Network Security Technologies
Defense-in-Depth Strategy
Defending Across the Attack Continuum
Network Segmentation and Virtualization Overview
Stateful Firewall Overview
Security Intelligence Overview
Threat Information Standardization
Network-Based Malware Protection Overview
IPS Overview
Next Generation Firewall Overview
Email Content Security Overview
Web Content Security Overview
Threat Analytic Systems Overview
DNS Security Overview
Authentication, Authorization, and Accounting Overview
Identity and Access Management Overview
Virtual Private Network Technology Overview
Network Security Device Form Factors Overview
Deploying Cisco ASA Firewall
Cisco ASA Deployment Types
Cisco ASA Interface Security Levels
Cisco ASA Objects and Object Groups
Network Address Translation
Cisco ASA Interface ACLs
Cisco ASA Global ACLs
Cisco ASA Advanced Access Policies
Cisco ASA High Availability Overview
Deploying Cisco Firepower Next-Generation Firewall
Cisco Firepower NGFW Deployments
Cisco Firepower NGFW Packet Processing and Policies
Cisco Firepower NGFW Objects
Cisco Firepower NGFW NAT
Cisco Firepower NGFW Prefilter Policies
Cisco Firepower NGFW Access Control Policies
Cisco Firepower NGFW Security Intelligence
Cisco Firepower NGFW Discovery Policies
Cisco Firepower NGFW IPS Policies
Cisco Firepower NGFW Malware and File Policies
Deploying Email Content Security
Cisco Email Content Security Overview
SMTP Overview
Email Pipeline Overview
Public and Private Listeners
Host Access Table Overview
Recipient Access Table Overview
Mail Policies Overview
Protection Against Spam and Graymail
Anti-virus and Anti-malware Protection
Outbreak Filters
Content Filters
Data Loss Prevention
Email Encryption
Deploying Web Content Security
Cisco WSA Overview
Deployment Options
Network Users Authentication
HTTPS Traffic Decryption
Access Policies and Identification Profiles
Acceptable Use Controls Settings
Anti-Malware Protection
Deploying Cisco Umbrella (Self-Study)
Cisco Umbrella Architecture
Deploying Cisco Umbrella
Cisco Umbrella Roaming Client
Managing Cisco Umbrella
Cisco Umbrella Investigate Overview
Explaining VPN Technologies and Cryptography
VPN Definition
VPN Types
Secure Communication and Cryptographic Services
Keys in Cryptography
Public Key Infrastructure
Introducing Cisco Secure Site-to-Site VPN Solutions
Site-to-Site VPN Topologies
IPsec VPN Overview
IPsec Static Crypto Maps
IPsec Static Virtual Tunnel Interface
Dynamic Multipoint VPN
Cisco IOS FlexVPN
Deploying Cisco IOS VTI-Based Point-to-Point
Cisco IOS VTIs
Static VTI Point-to-Point IPsec IKEv2 VPN Configuration
Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
Cisco ASA Point-to-Point VPN Configuration
Cisco Firepower NGFW Point-to-Point VPN Configuration
Introducing Cisco Secure Remote Access VPN Solutions
Remote Access VPN Components
Remote Access VPN Technologies
SSL Overview
Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
Remote Access Configuration Concepts
Connection Profiles
Group Policies
Cisco ASA Remote Access VPN Configuration
Cisco Firepower NGFW Remote Access VPN Configuration
Explaining Cisco Secure Network Access Solutions
Cisco Secure Network Access
Cisco Secure Network Access Components
AAA Role in Cisco Secure Network Access Solution
Cisco Identity Services Engine
Cisco TrustSec
Describing 802.1X Authentication
802.1X and EAP
EAP Methods
Role of RADIUS in 802.1X Communications
RADIUS Change of Authorization
Configuring 802.1X Authentication
Cisco Catalyst Switch 802.1X Configuration
Cisco WLC 802.1X Configuration
Cisco ISE 802.1X Configuration
Supplicant 802.1x Configuration
Cisco Central Web Authentication
Describing Endpoint Security Technologies (Self-Study)
Host-Based Personal Firewall
Host-Based Anti-Virus
Host-Based Intrusion Prevention System
Application Whitelists and Blacklists
Host-Based Malware Protection
Sandboxing Overview
File Integrity Checking
Deploying Cisco AMP for Endpoints (Self-study)
Cisco AMP for Endpoints Architecture
Cisco AMP for Endpoints Engines
Retrospective Security with Cisco AMP
Cisco AMP Device and File Trajectory
Managing Cisco AMP for Endpoints
Introducing Network Infrastructure Protection (Self-Study)
Identifying Network Device Planes
Control Plane Security Controls
Management Plane Security Controls
Network Telemetry
Layer 2 Data Plane Security Controls
Layer 3 Data Plane Security Controls
Deploying Control Plane Security Controls (Self-Study)
Infrastructure ACLs
Control Plane Policing
Control Plane Protection
Routing Protocol Security
Deploying Layer 2 Data Plane Security Controls (Self-Study)
Overview of Layer 2 Data Plane Security Controls
VLAN-Based Attacks Mitigation
STP Attacks Mitigation
Port Security
Private VLANs
DHCP Snooping
ARP Inspection
Storm Control
MACsec Encryption
Deploying Layer 3 Data Plane Security Controls (Self-Study)
Infrastructure Antispoofing ACLs
Unicast Reverse Path Forwarding
IP Source Guard
Labs
Configure Network Settings And NAT On Cisco ASA
Configure Cisco ASA Access Control Policies
Configure Cisco Firepower NGFW NAT
Configure Cisco Firepower NGFW Access Control Policy
Configure Cisco Firepower NGFW Discovery and IPS Policy
Configure Cisco NGFW Malware and File Policy
Configure Listener, HAT, and RAT on Cisco ESA
Configure Mail Policies
Configure Proxy Services, Authentication, and HTTPS Decryption
Enforce Acceptable Use Control and Malware Protection
Examine the Umbrella Dashboard
Examine Cisco Umbrella Investigate
Explore DNS Ransomware Protection by Cisco Umbrella
Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
Configure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW
Configure Remote Access VPN on the Cisco Firepower NGFW
Explore Cisco AMP for Endpoints
Perform Endpoint Analysis Using AMP for Endpoints Console
Explore File Ransomware Protection by Cisco AMP for Endpoints Console
Explore Cisco Stealthwatch Enterprise v6.9.3
Explore CTA in Stealthwatch Enterprise v7.0
Explore the Cisco Cloudlock Dashboard and User Security
Explore Cisco Cloudlock Application and Data Security
Explore Cisco Stealthwatch Cloud
Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors
Describing Information Security Concepts (Self-Study)
Information Security Overview
Managing Risk
Vulnerability Assessment
Understanding CVSS
Describing Common TCP/IP Attacks (Self-Study)
Legacy TCP/IP Vulnerabilities
IP Vulnerabilities
ICMP Vulnerabilities
TCP Vulnerabilities
UDP Vulnerabilities
Attack Surface and Attack Vectors
Reconnaissance Attacks
Access Attacks
Man-In-The-Middle Attacks
Denial of Service and Distributed Denial of Service Attacks
Reflection and Amplification Attacks
Spoofing Attacks
DHCP Attacks
Describing Common Network Application Attacks (Self-Study)
Password Attacks
DNS-Based Attacks
DNS Tunneling
Web-Based Attacks
HTTP 302 Cushioning
Command Injections
SQL Injections
Cross-Site Scripting and Request Forgery
Email-Based Attacks
Describing Common Endpoint Attacks (Self-Study)
Buffer Overflow
Malware
Reconnaissance Attack
Gaining Access and Control
Gaining Access via Social Engineering
Gaining Access via Web-Based Attacks
Exploit Kits and Rootkits
Privilege Escalation
Post-Exploitation Phase
Angler Exploit Kit
Describing Network Security Technologies
Defense-in-Depth Strategy
Defending Across the Attack Continuum
Network Segmentation and Virtualization Overview
Stateful Firewall Overview
Security Intelligence Overview
Threat Information Standardization
Network-Based Malware Protection Overview
IPS Overview
Next Generation Firewall Overview
Email Content Security Overview
Web Content Security Overview
Threat Analytic Systems Overview
DNS Security Overview
Authentication, Authorization, and Accounting Overview
Identity and Access Management Overview
Virtual Private Network Technology Overview
Network Security Device Form Factors Overview
Deploying Cisco ASA Firewall
Cisco ASA Deployment Types
Cisco ASA Interface Security Levels
Cisco ASA Objects and Object Groups
Network Address Translation
Cisco ASA Interface ACLs
Cisco ASA Global ACLs
Cisco ASA Advanced Access Policies
Cisco ASA High Availability Overview
Deploying Cisco Firepower Next-Generation Firewall
Cisco Firepower NGFW Deployments
Cisco Firepower NGFW Packet Processing and Policies
Cisco Firepower NGFW Objects
Cisco Firepower NGFW NAT
Cisco Firepower NGFW Prefilter Policies
Cisco Firepower NGFW Access Control Policies
Cisco Firepower NGFW Security Intelligence
Cisco Firepower NGFW Discovery Policies
Cisco Firepower NGFW IPS Policies
Cisco Firepower NGFW Malware and File Policies
Deploying Email Content Security
Cisco Email Content Security Overview
SMTP Overview
Email Pipeline Overview
Public and Private Listeners
Host Access Table Overview
Recipient Access Table Overview
Mail Policies Overview
Protection Against Spam and Graymail
Anti-virus and Anti-malware Protection
Outbreak Filters
Content Filters
Data Loss Prevention
Email Encryption
Deploying Web Content Security
Cisco WSA Overview
Deployment Options
Network Users Authentication
HTTPS Traffic Decryption
Access Policies and Identification Profiles
Acceptable Use Controls Settings
Anti-Malware Protection
Deploying Cisco Umbrella (Self-Study)
Cisco Umbrella Architecture
Deploying Cisco Umbrella
Cisco Umbrella Roaming Client
Managing Cisco Umbrella
Cisco Umbrella Investigate Overview
Explaining VPN Technologies and Cryptography
VPN Definition
VPN Types
Secure Communication and Cryptographic Services
Keys in Cryptography
Public Key Infrastructure
Introducing Cisco Secure Site-to-Site VPN Solutions
Site-to-Site VPN Topologies
IPsec VPN Overview
IPsec Static Crypto Maps
IPsec Static Virtual Tunnel Interface
Dynamic Multipoint VPN
Cisco IOS FlexVPN
Deploying Cisco IOS VTI-Based Point-to-Point
Cisco IOS VTIs
Static VTI Point-to-Point IPsec IKEv2 VPN Configuration
Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
Cisco ASA Point-to-Point VPN Configuration
Cisco Firepower NGFW Point-to-Point VPN Configuration
Introducing Cisco Secure Remote Access VPN Solutions
Remote Access VPN Components
Remote Access VPN Technologies
SSL Overview
Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
Remote Access Configuration Concepts
Connection Profiles
Group Policies
Cisco ASA Remote Access VPN Configuration
Cisco Firepower NGFW Remote Access VPN Configuration
Explaining Cisco Secure Network Access Solutions
Cisco Secure Network Access
Cisco Secure Network Access Components
AAA Role in Cisco Secure Network Access Solution
Cisco Identity Services Engine
Cisco TrustSec
Describing 802.1X Authentication
802.1X and EAP
EAP Methods
Role of RADIUS in 802.1X Communications
RADIUS Change of Authorization
Configuring 802.1X Authentication
Cisco Catalyst Switch 802.1X Configuration
Cisco WLC 802.1X Configuration
Cisco ISE 802.1X Configuration
Supplicant 802.1x Configuration
Cisco Central Web Authentication
Describing Endpoint Security Technologies (Self-Study)
Host-Based Personal Firewall
Host-Based Anti-Virus
Host-Based Intrusion Prevention System
Application Whitelists and Blacklists
Host-Based Malware Protection
Sandboxing Overview
File Integrity Checking
Deploying Cisco AMP for Endpoints (Self-study)
Cisco AMP for Endpoints Architecture
Cisco AMP for Endpoints Engines
Retrospective Security with Cisco AMP
Cisco AMP Device and File Trajectory
Managing Cisco AMP for Endpoints
Introducing Network Infrastructure Protection (Self-Study)
Identifying Network Device Planes
Control Plane Security Controls
Management Plane Security Controls
Network Telemetry
Layer 2 Data Plane Security Controls
Layer 3 Data Plane Security Controls
Deploying Control Plane Security Controls (Self-Study)
Infrastructure ACLs
Control Plane Policing
Control Plane Protection
Routing Protocol Security
Deploying Layer 2 Data Plane Security Controls (Self-Study)
Overview of Layer 2 Data Plane Security Controls
VLAN-Based Attacks Mitigation
STP Attacks Mitigation
Port Security
Private VLANs
DHCP Snooping
ARP Inspection
Storm Control
MACsec Encryption
Deploying Layer 3 Data Plane Security Controls (Self-Study)
Infrastructure Antispoofing ACLs
Unicast Reverse Path Forwarding
IP Source Guard
Labs
Configure Network Settings And NAT On Cisco ASA
Configure Cisco ASA Access Control Policies
Configure Cisco Firepower NGFW NAT
Configure Cisco Firepower NGFW Access Control Policy
Configure Cisco Firepower NGFW Discovery and IPS Policy
Configure Cisco NGFW Malware and File Policy
Configure Listener, HAT, and RAT on Cisco ESA
Configure Mail Policies
Configure Proxy Services, Authentication, and HTTPS Decryption
Enforce Acceptable Use Control and Malware Protection
Examine the Umbrella Dashboard
Examine Cisco Umbrella Investigate
Explore DNS Ransomware Protection by Cisco Umbrella
Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
Configure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW
Configure Remote Access VPN on the Cisco Firepower NGFW
Explore Cisco AMP for Endpoints
Perform Endpoint Analysis Using AMP for Endpoints Console
Explore File Ransomware Protection by Cisco AMP for Endpoints Console
Explore Cisco Stealthwatch Enterprise v6.9.3
Explore CTA in Stealthwatch Enterprise v7.0
Explore the Cisco Cloudlock Dashboard and User Security
Explore Cisco Cloudlock Application and Data Security
Explore Cisco Stealthwatch Cloud
Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors

€2.990
E-Learning
max 9
MBO
5 dagen
SISE Implementing and Configuring Cisco Identity Services Engine Klassikaal
Online
ma 7 jul. 2025
en 5 andere data
Volg de SISE Training Implementing and Configuring Cisco Identity Services Engine. De training Cisco Identity Services Engine configureren laat je zien hoe je Cisco Identity Services Engine (ISE) v2.4 implementeert en gebruikt. Dit is een platform voor identiteits- en toegangscontrolebeleid dat de levering van consistente, zeer veilige toegangscontrole over bekabelde, draadloze en VPN-verbindingen vereenvoudigt.
Na afronding van deze training kun je onder andere:
TACACS+ device administration beschrijven en configureren met Cisco ISE
TACACS+ functionaliteit migreren van Cisco Secure Access Control System (ACS) naar Cisco ISE
Cisco ISE deployments beschrijven
Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels).
The 5-day SISE Implementing and Configuring Cisco Identity Services Engine course shows you how to deploy and use Cisco Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless and VPN connections. This hands-on course provides you with the knowledge and skills required to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management and contribute to operational efficiency.
Delegates will be expected to work in groups and share lab equipment, If you are attending virtually you may also be required to work in virtual breakout rooms. Extended hours may also be required to cover all of the content included in this class.
After completing this course you should be able to:
Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages.
Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services.
Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization.
Describe third-party network access devices (NADs), Cisco TrustSec®, and Easy Connect.
Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios.
Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment.
Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution.
Describe the value of the My Devices portal and how to configure this portal.
Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE.
Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the authentication, authentication, and accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols.
Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool.
Recommended preparation for exam:
300-715 - Implementing and Configuring Cisco Identity Services Engine
Passing this exam will provide you with the CIsco Certified Specialist - Security Identity Management certification and satisfy the concentration requirement for the CCNP Security certification.
Lesmethode
Dit is een klassikale training en wordt verzorgd op locatie of in een virtual classroom.
Doelgroep
Individuals involved in the deployment and maintenance of the Cisco ISE platform.
Individuals involved in the deployment and maintenance of the Cisco ISE platform.
Voorkennis
Attendees should meet the following prerequisites:
Foundational level understanding of Security Concepts
Understand the concepts of 802.1X.
Familiarity with Cisco AnyConnect Secure Mobility Client.
Familiarity with Microsoft Windows and Active Directory.
Attendees should meet the following prerequisites:
Foundational level understanding of Security Concepts
Understand the concepts of 802.1X.
Familiarity with Cisco AnyConnect Secure Mobility Client.
Familiarity with Microsoft Windows and Active Directory.
Onderdelen
Introducing Cisco ISE Architecture and Deployment
Using Cisco ISE as a Network Access Policy Engine
Cisco ISE Use Cases
Describing Cisco ISE Fucntions
Cisco ISE Deployment Models
Context Visibility
Cisco ISE Policy Enforcement
Using 802.1X for Wired and Wireless Access
Using MAC Authentication Bypass for Wired and Wireless Access
Introducing Identity Management
Configuring Certificate Services
Introducing Cisco ISE Policy
Implementing Third-Party Network Access Device Support
Introducing Cisco TrustSec
TrustSec Configuration
Easy Connect
Web Authentication and Guest Services
Introducing Web Access with Cisco ISE
Introducing Guest Access Components
Configuring Guest Access Services
Configure Sponsor and Guest Portals
Cisco ISE Profiler
Introducing Cisco ISE Profiler
Profiling Deployment and Best Practices
Cisco ISE BYOD
Introducing the Cisco ISE BYOD Process
Describing BYOD Flow
Configuring the My Devices Portal
Configuring Certificates in BYOD Scenarios
Cisco ISE Endpoint Compliance Services
Introducing Endpoint Compliance Services
Configuring Client Posture Services and Provisioning
Working with Network Access Devices
Cisco ISE TACACS+ Device Administration
Configure TACACS+ Device Administration Guidelines and Best Practices
Migrating from Cisco ACS to Cisco ISE
Labs
Lab 1: Access the SISE Lab and Install ISE 2.4
Lab 2 : Configure Initial Cisco ISE Setup, Gui Familiarization and System Certificate Usage
Lab 3: Integrate Cisco ISE with Active Directory
Lab 4: Configure Cisco ISE Policy
Lab 5: Configure Access Policy for Easy Connect
Lab 6: Configure Guest Access
Lab 7: Configure Guest Access Operations
Lab 8: Create Guest Reports
Lab 9: Configure Profiling
Lab 10: Customize the Cisco ISE Profiling Configuration
Lab 11: Create Cisco ISE Profiling Reports
Lab 12: Configure BYOD
Lab 13: Blacklisting a Device
Lab 14: Configure Cisco ISE Compliance Services
Lab 15: Configure Client Provisioning
Lab 16: Configure Posture Policies
Lab 17: Test and Monitor Compliance Based Access
Lab 18: Test Compliance Policy
Lab 19: Configure Cisco ISE for Basic Device Administration
Lab 20: Configure TACACS+ Command Authorization
Introducing Cisco ISE Architecture and Deployment
Using Cisco ISE as a Network Access Policy Engine
Cisco ISE Use Cases
Describing Cisco ISE Fucntions
Cisco ISE Deployment Models
Context Visibility
Cisco ISE Policy Enforcement
Using 802.1X for Wired and Wireless Access
Using MAC Authentication Bypass for Wired and Wireless Access
Introducing Identity Management
Configuring Certificate Services
Introducing Cisco ISE Policy
Implementing Third-Party Network Access Device Support
Introducing Cisco TrustSec
TrustSec Configuration
Easy Connect
Web Authentication and Guest Services
Introducing Web Access with Cisco ISE
Introducing Guest Access Components
Configuring Guest Access Services
Configure Sponsor and Guest Portals
Cisco ISE Profiler
Introducing Cisco ISE Profiler
Profiling Deployment and Best Practices
Cisco ISE BYOD
Introducing the Cisco ISE BYOD Process
Describing BYOD Flow
Configuring the My Devices Portal
Configuring Certificates in BYOD Scenarios
Cisco ISE Endpoint Compliance Services
Introducing Endpoint Compliance Services
Configuring Client Posture Services and Provisioning
Working with Network Access Devices
Cisco ISE TACACS+ Device Administration
Configure TACACS+ Device Administration Guidelines and Best Practices
Migrating from Cisco ACS to Cisco ISE
Labs
Lab 1: Access the SISE Lab and Install ISE 2.4
Lab 2 : Configure Initial Cisco ISE Setup, Gui Familiarization and System Certificate Usage
Lab 3: Integrate Cisco ISE with Active Directory
Lab 4: Configure Cisco ISE Policy
Lab 5: Configure Access Policy for Easy Connect
Lab 6: Configure Guest Access
Lab 7: Configure Guest Access Operations
Lab 8: Create Guest Reports
Lab 9: Configure Profiling
Lab 10: Customize the Cisco ISE Profiling Configuration
Lab 11: Create Cisco ISE Profiling Reports
Lab 12: Configure BYOD
Lab 13: Blacklisting a Device
Lab 14: Configure Cisco ISE Compliance Services
Lab 15: Configure Client Provisioning
Lab 16: Configure Posture Policies
Lab 17: Test and Monitor Compliance Based Access
Lab 18: Test Compliance Policy
Lab 19: Configure Cisco ISE for Basic Device Administration
Lab 20: Configure TACACS+ Command Authorization

€2.995
E-Learning
max 9
MBO
5 dagen
Training OpenCV
Rotterdam
ma 7 jul. 2025
en 9 andere data
Beeldinterpretatie is een veel ingezette vorm van automatisering bij Machine en Deep Learning toepassingen. Denk bijvoorbeeld aan het automatisch herkennen van objecten in afbeeldingen of gezichtsherkenning als authenticatiemethode. Hiervoor zijn vele algoritmen en methodes beschikbaar en om te voorkomen dat deze functionaliteiten iedere keer opnieuw worden ontwikkeld zijn er maar liefst 2500 gebundeld in de OpenCV (Computer Vision) library voor zowel bewerking als interpretatie. De library is vrij te gebruiken en o.a. benaderbaar met o.a. de programmeertalen Python, C++, Java en Android SDK.
Tijdens de training
Tijdens deze training leer je hoe je OpenCV installeert, configureert en benadert in Python, welke algoritmen het beste aansluiten bij je Machine en Deep Learning doelen en hoe je deze kan aanspreken. Dit geheel ondersteunen we met een aantal praktische voorbeelden van veel voorkomende toepassingen.
Bedrijfstraining OpenCV
Wil je de stof liever toegespitst zien op de IT situatie binnen je eigen organisatie of een specifiek systeem? In een bedrijfstraining kunnen wij de training volledig op maat verzorgen, voor jou en wellicht een groep van je collega’s. Zo sluit een bedrijfstraining perfect aan bij wat jij moet beheersen om deze technieken direct voor je organisatie te kunnen inzetten.
Tijdens de training OpenCV behandelen we de volgende onderdelen:
Introductie OpenCV
Installatie en aanspreken in Python
Beeldmateriaal
Inlezen, tonen, en bewaren
Colour Spaces
Transformatie: rotatie, schalen en filters
Egomotion
Analyse
Keypoints
Motion detection en tracking
Contour herkenning
Gezichtsherkenning
Object detectie en herkenning
Censurering
Segmentatie
SIFT, SURF, FAST en BRIEF
Stereopsis
Machine en Deep Learning
Boosting
Decision trees
Random forest
Support vector machines
k-nearest neighbor algoritme
Naive Bayes classifier
Praktijkvoorbeelden
Tips en valkuilen

€899
Klassikaal
max 13
Training Keras
Rotterdam
ma 7 jul. 2025
en 9 andere data
Taken die voorheen een menselijke interventie nodig hadden worden steeds meer geautomatiseerd. Denk hierbij aan het analyseren van beeld- of geluidsmateriaal, het herkennen van patronen in data of het voorspellen van een uitkomsten. Hoewel er ruime keus in softwarepakketten is die in deze behoefte voorzien, zijn ze vaak niet heel gebruiksvriendelijk of bewerkelijk in het gebruik. Met de Python module Keras, die je kan verbinden met populaire Deep Learning pakketten als TensorFlow, Theano, en Microsoft Cognitive Toolkit, realiseer je een eenvoudigere en snellere manier om de modellen die deze pakketten bieden te benaderen.
Tijdens de training leer je hoe je Keras installeert, configureert en koppelt aan het Machine of Deep Learning framework van jouw keuze. Vervolgens leer je op praktische wijze, aan de hand van modellen aanwezig in de onderliggende pakketten, verschillende machine learning methoden toepassen. De training Keras is zeer praktijkgericht en je ziet, na het aanpassen van code, direct het resultaat. Op deze manier haal je optimaal rendement uit de training.
Bedrijfstraining Keras
Wil je de stof liever toegespitst zien op de IT situatie binnen je eigen organisatie, met eigen data of unieke omstandigheden? In een bedrijfstraining kunnen wij de training volledig op maat verzorgen, voor jou en wellicht een groep van je collega’s. Zo sluit een bedrijfstraining perfect aan bij wat jij moet beheersen om deze technieken direct voor je organisatie te kunnen inzetten.
Tijdens de Cursus Keras behandelen we de volgende onderdelen:
Introductie Keras
Installatie en configuratie
Koppeling met Tensorflow
De Keras API
Data
Data aanspreken
Ongestructureerde data versus gestructureerde
Plotting met Matplotlib
Beeld en geluid benaderen met Jupyter
Machine Learning
Geschikte cases
Supervised versus unsupervised Learning
Lineaire Regressie
Model keuze en performance
Deep Learning
Neurale netwerken
Classificatie
Modellen bouwen op basis van algoritmes
Gebruik maken van resources als CPU en GPU’s
Cloud offloading
Inspectie en evaluatie
Code optimalisatie en performanceverbetering
Tips en tricks

€1.599
Klassikaal
max 13
Procesmodelleren met BPMN 2.0 You-Get
BPMN staat voor Business Process Model and Notation. Tijdens deze training leer je zelfstandig bedrijfs- en werkprocessen modelleren met BPMN 2.0.
BPMN staat voor Business Process Model and Notation. Tijdens deze training leer je zelfstandig bedrijfs- en werkprocessen modelleren met BPMN 2.0. Je leert diverse best practices kennen om tot een goed procesmodel te komen.
Deze training is bedoeld voor iedereen die betrokken is bij procesmodellering:
Testers
Proces Teams
Proces managers en Process owners
Business Analisten/ Proces modelleurs
Tijdens de training staat het volgende centraal:
Waarom en wanneer pas je BPMN toe?
BPMN binnen jouw bedrijf
BPMN elementen en betekenis van de symbolen
Aanpak voor procesmodelleren, de 3 BPMN lagen:
1. Descriptive
2. Analytical
3. Executable
Oefeningen met BPMN procesmodellering, best practices en valkuilen
Procesmodellering level 1: high-level gestructureerd procesmodel
Level 2: gedetailleerd procesmodel
Level 3: technisch procesmodel
Per level gaan we in op:
Symbolen die gebruikt worden
Stappen die gezet worden
Best practices
Voorbeelden + oefeningen
BPMN i.c.m. Business Rules
Gebruik van BPMN voor procesautomatisering
Integrale case BPMN level 1, 2 en 3
Planning lesdagen
Normaliter plant You-Get maximaal twee trainingsdagen per week. De exacte trainingsdagen en eventuele tussenliggende periode worden in overleg met de klant bepaald.
Voorafgaande en vervolgtrainingen
Deze training is een uitbreiding op de Proces Analyse & Ontwerp Training.
Voorafgaand aan deze training:
BPM Introductie Training
Voor wie?
Deze training is bedoeld voor iedereen die betrokken is bij procesmodellering, waaronder:
Testers
Proces Teams
Proces managers en Process owners
Business Analisten/ Proces modelleurs

€1.401
Klassikaal
2 dagen
DevOps CI/CD Overview (Virtueel)
Lesmethode :
Virtueel
Algemeen :
DevOps vraagt om een nieuwe manier van werken, bijvoorbeeld door een groot gedeelte van de deployment te automatiseren met Continuous Integration Continuous Deployment (CI/CD).
Omdat de basis voor het succes van DevOps wordt gevormd door een nauwe samenwerking tussen ontwikkelaars en systeembeheerders is het belangrijk om goede gedegen en kennis te hebben van de onderdelen van de CI/CD pijplijn. Er is echter een overvloed aan (open source)tools beschikbaar, dus welke tool kies je nu en wat doen al die tools precies?
Deze cursus zorgt voor ervoor dat je op conceptueel niveau een goed beeld krijgt van de meest gebruikte tools voor CI/CD. Het bouwen van een microservice op basis van de programmeertaal Python vormt de rode draad van de cursus. Hiermee komen de concepten tot leven. Aan het eind van de dag wordt een kleine applicatie door de CI/CD pijplijn gehaald en uitgerold op een Kubernetes-omgeving: klaar voor gebruik door de klant!
We also offer this course in English, check it out here: DevOps CI/CD Overview (English).
Doel :
Na het volgen van deze cursus ben je bekend met de concepten en werking van een CI/CD pijplijn.
Je kunt na deze cursus beter een keuze maken welke tool voor jouw situatie geschikt is.
Doelgroep :
Systeembeheerders en softwareontwikkelaars die gaan werken binnen een DevOps team
Voorkennis :
Er is geen voorkennis nodig.
Onderwerpen :
- Conceptuele Overview van een CI/CD pijplijn
- Code editors, weke code editor gebruik bij bepaalde situaties?
- Source control met git en github
- Continuous Integration en Building met Jenkins Pipelines, Docker Vagrant
- Testing met Selenium, Soapui, Postman, Junit, Cucumber
- Configuration Management met Ansible, Puppet, Chef
- Container-orkestratie met Docker Swarm en Kubernetes.
- Deployment on premise of in de cloud : Amazon Web Services, Pivotal Cloudfoundry, Microsoft Azure, Google Cloud Services of Open Stack met Docker of Packer.
- Inrichten van CI/CD, zit door de cursus heen

€765
Klassikaal
max 12
AWS Security Essentials [GK3337]
VIRTUAL TRAINING CENTER
do 21 aug. 2025
en 9 andere data
OVERVIEW
AWS Security Essentials covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization. This course enables you to dive deep, ask questions, work through solutions, and get feedback from AWS-accredited instructors with deep technical knowledge. This is a fundamental level course and is a part of the AWS Security learning path.
OBJECTIVES
This course is designed to teach you how to:
Identify security benefits and responsibilities when using the AWS Cloud
Describe the access control and management features of AWS
Understand the different data encryption methods to secure sensitive data
Describe how to secure network access to your AWS resources
Determine which AWS services can be used for security logging and monitoring
AUDIENCE
This course is intended for:
- IT business-level professionals interested in cloud security practices
- Security professionals with minimal working knowledge of AWS
CONTENT
Module 1: Exploring the Security Pillar
AWS Well-Architected Framework: Security Pillar
Module 2: Security of the Cloud
Shared responsibility model
AWS Global Infrastructure
Compliance and governance
Module 3: Identity and Access Management
Identity and access management
Data access and protection essentials
Lab 1: Introduction to Security Policies
Module 4: Protecting Infrastructure and Data
Protecting your network infrastructure
Edge Security
DDoS Mitigation
Protecting compute resources
Lab 2: Securing VPC Resources with Security Groups
Module 5: Detection and Response
Monitoring and detective controls
Incident response essentials
Module 6: Course Wrap-Up
Course review

€695
Klassikaal
max 16
SAFe® Agile Product Management + Examenvoucher
Nieuwegein
do 3 jul. 2025
en 2 andere data
Wil jij weten hoe Scaled Agile Framework (SAFe) werkt en wat Agile Product Management daarbinnen omvat?
Wat is de markt- en klantgerichte rol van de Product Manager binnen SAFe?
Volg dan deze 3
Wil jij weten hoe Scaled Agile Framework (SAFe) werkt en wat Agile Product Management daarbinnen omvat?
Wat is de markt- en klantgerichte rol van de Product Manager binnen SAFe?
Volg dan deze 3-daagse training en behaal de SAFe® Agile Product Manager certificering.
Tijdens deze training gaan we in op Agile Product Management. Een Agile Product Manager combineert Design Thinking met Lean-Agile waarden en principes om producten en oplossingen te creëren die wenselijk, rendabel, haalbaar en duurzaam zijn.
Cursuseigenaar - Cibit
Lesmethode - Klassikaal
Productgroep - Agile
Soort - Open rooster

€2.395
Klassikaal
max 12
24 uren
SAFe® Lean Portfolio Management + Examenvoucher
Nieuwegein
do 4 sep. 2025
en 1 andere data
Is jouw organisatie bezig met het Scaled Agile Framework? Ga jij aan de slag als Lean Portfolio Manager?
Bereid je voor om SAFe® toe te passen op portfolioniveau!
In deze 2-daagse training krijg
Is jouw organisatie bezig met het Scaled Agile Framework? Ga jij aan de slag als Lean Portfolio Manager?
Bereid je voor om SAFe® toe te passen op portfolioniveau!
In deze 2-daagse training krijg je een goed beeld van de werking van SAFe en de specifieke aspecten van Lean Portfolio Management zoals Strategie, Investeringen, Portfolio Operations en Lean Governance.
Na afloop van deze Lean Portfolio Management (LPM) training kan je:
Lean Portfolio Management (LPM) beschrijven
Lean Portfolio laten aansluiten op je bedrijfsstrategie
Portfolio visie vaststellen
Lean Budgeting en Guardrails implementeren
Portfolio Kanban inzetten
Agile Program Management Office (PMO) inrichten en Communities of Practice (CoP's) ondersteunen
Value streams coördineren
Lean Portfolio prestaties meten
Een implementatieplan opzetten voor LPM
or iedereen die aan de slag gaat met Lean Portfolio Management.
Deze opleiding veronderstelt fundamentele kennis van Agile en Scrum.
Cursuseigenaar - Cibit
Lesmethode - Klassikaal
Productgroep - Agile
Soort - Open rooster

€1.695
Klassikaal
max 12
16 uren