Opleidingen
67.465
resultaten
Modeling based on ArchiMate® Practitioner - level 2 - Inclusief Examen [AMC]
VIRTUAL TRAINING CENTER
wo 19 nov. 2025
en 9 andere data
OVERVIEW
Deze 1-daagse Modeling based ArchiMate® Practitioner - level 2 training bereidt u optimaal voor op het nieuwste ArchiMate® Certified examen van The Open Group. In deze training wordt uitgebreid stilgestaan bij de toepassing van de ArchiMate® modelleertaal in meer complexere modelleer-vraagstukken, zoals gevraagd voor het certified examen. Daarnaast is er enige ruimte om modelleer-uitdagingen uit de eigen praktijk voor te leggen.
Na succesvolle voltooiing van het examen wordt u als ArchiMate® Certified professional geregistreerd bij the Open Group. Het examen kunt u op een zelf te kiezen moment bij een Pearson-Vue Testing Center van uw keuze afleggen, met de bijgeleverde examenvoucher.
This one-day course is for those who want become ArchiMate® Practitioners, and learn the advanced applications of the modeling language. You will learn advanced techniques, complex modeling situations and direct applications to your own real-world examples.
Upon successful completion of this course, you will be ready to take the newest ArchiMate® Practitioner exam at a Pearson Vue Testing Center.
'This course is being run by Global Knowledge under Commercial License'
OBJECTIVES
Na afloop heeft u het volgende leerresultaat:
Verdieping van uw ArchiMate® kennis, in vervolg op de ArchiMate Foundation certificering
Inzicht in de toepassing van ArchiMate® in complexe modelleervraagstukken
Kennis en inzicht om succesvol het ArchiMate® Certified examen af te leggen (het examen vereist naast de training enige zelfstudie).
Have revisited the ArchiMate® concepts
Be able to apply the derivation rules for relationships in the language
Understand the language customization mechanism
Be able to apply the ArchiMate® standard in complex modeling situations
Be able to complete the ArchiMate® Practitioner exam
AUDIENCE
This training is suited for
Architects
Business Analists
Information Analists
Designers
Product Owners
Project leaders
CERTIFICATION
The exam fee is included in the course fee.
ArchiMate® Part 2
Complex multiple-choice
scenario-based
8 questions/90 minutes
Supervised
Open Book
NEXT STEP
TF-TCC, TOGAF® Certified course
€850
Klassikaal
max 16
EC-Council Certified Incident Handler (ECIH) + Exam voucher [ECIH]
VIRTUAL TRAINING CENTER
wo 7 jan. 2026
en 6 andere data
€2.595
Klassikaal
max 16
ISO/IEC 27001:2022 Information Security: Lead Auditor (PECB certified) - Inclusief Examen [ISO27001LA]
VIRTUAL TRAINING CENTER
ma 1 dec. 2025
en 9 andere data
OVERVIEW
The PECB ISO/IEC 27001 Lead Auditor training course is designed to prepare you to audit an information security management system (ISMS) based on ISO/IEC 27001. During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process.
The training content is comprised of practical exercises and case studies which bring you real-world expertise that you can apply to your day-to-day operations and activities. Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution.
Our training courses are all-inclusive, meaning that they cover everything you need, in order to get the certificate. After acquiring the necessary expertise to perform an audit, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” credential. By holding a PECB Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices.
Apart from showcasing what the ISO/IEC 27001 standard tells you to do, this training course tells you how to do it, through various activities, exercises, case studies, multiple-choice standalone quizzes, and scenario-based quizzes. These will allow you to test your knowledge about the implementation process steps.
Please Note:
This training is based on both theory and best practices used in ISMS audits
Lecture sessions are illustrated with examples based on case studies
Practical exercises are based on a case study which includes role playing and discussions
Practice tests are similar to the Certification Exam
Certification and examination fees are included in the price of the training course
Training material containing over 450 pages of information and practical examples will be distributed
An Attestation of Course Completion worth 31 CPD (Continuing Professional Development) credits will be issued to all candidates who have attended the training course
OBJECTIVES
After completing this course you shoud be able to:
Explain the fundamental concepts and principles of an information security management system (ISMS) based on ISO/ IEC 27001
Interpret the ISO/IEC 27001 requirements for an ISMS from the perspective of an auditor
Evaluate the ISMS conformity to ISO/IEC 27001 requirements, in accordance with the fundamental audit concepts and principles
Plan, conduct, and close an ISO/IEC 27001 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best practices of auditing
Manage an ISO/IEC 27001 audit program
AUDIENCE
Auditors seeking to perform and lead Information Security Management System (ISMS) certification audits. Managers or consultants seeking to master an Information Security Management System audit process. Individuals responsible for maintaining conformance with Information Security Management System requirements. Technical experts seeking to prepare for an Information Security Management System audit. Expert advisors in Information Security Management.
CERTIFICATION
The “PECB Certified ISO/IEC 27001 Lead Auditor” exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competency domains:
Domain 1: Fundamental principles and concepts of Information Security Management System (ISMS)
Domain 2: Information Security Management System (ISMS)
Domain 3: Fundamental audit concepts and principles
Domain 4: Preparation of an ISO/IEC 27001 audit
Domain 5: Conducting an ISO/IEC 27001 audit
Domain 6: Closing an ISO/IEC 27001 audit
Domain 7: Managing an ISO/IEC 27001 audit program
Please note:
Certification and examination fees are included in the price of the training course
In case candidates fail the exam, they can retake it within 12 months following the initial attempt for free.
An Attestation of Course Completion worth 31 CPD (Continuing Professional Development) credits will be issued to the participants who have attended the training course.
NEXT STEP
CONTENT
Day 1: Introduction to Information Security Management Systems (ISMS) and ISO/IEC 27001
Training Course Objectives and Structure
Standards and Regulatory Frameworks
Certification Process
Fundamental concepts and principles of information security
Information security management system (ISMS)
Day 2: Audit principles, preparation and launching of an audit
Fundamental audit concepts and principles
The impact of trends and technology in auditing
Evidence-based auditing
Risk-based auditing
Initiation of the audit process
Stage 1 audit
Day 3: On-site audit activities
Preparing for stage 2 audit
Stage 2 audit
Communication during the audit
Audit procedures
Creating audit test plans
Day 4: Closing the audit
Drafting audit findings and nonconformity reports
Audit documentation and quality review
Closing of the audit
Evaluation of action plans by the auditor
Beyond the initial audit
Managing an internal audit program
Closing of the training course
€2.795
Klassikaal
max 16
Masterclass: Public Key Infrastructure Management [PKI]
VIRTUAL TRAINING CENTER
ma 17 nov. 2025
en 1 andere data
OVERVIEW
This 5-‐day course is considered essential for anyone who would like to expand knowledge about Public Key Infrastructure (PKI) in Microsoft technologies. During the course PKI is covered in depth, starting from the best practices for implementing PKI, ending up with advanced issues that happen during the implementation.
OBJECTIVES
At the end of the course you will be able to:
Learn how to evaluate and select appropriate PKI technology
Understand the benefits of certificates used in the infrastructure
Learn how to install and configure PKI environment according to the best practices taken from practical experience
Learn how to choose the right architecture, infrastructure, and practices for PKI implementation
Learn how to manage the certificate lifecycle
Adjust PKI to your business needs
Become familiar with advanced PKI settings and implementations
All exercises are based on Windows Server 2012 R2 and Windows 8.1. Some examples are also shown on Windows Server 2012 to accommodate the difference.
AUDIENCE
Network administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security, Chief Security Officers.
CONTENT
Module 1: Foundations of PKI
Cryptography basics
Certificate types (﴾X.509)﴿
Certification authorities
Certificate Revocation Lists
Module 2: Policies and PKI
Security Policy
Certificate Policy
Certification Practice Statements
Module 3: PKI in Windows domain
Managing PKI
Configure Certificate Templates
Configure Certificate Enrollment
Configuring Key Archival and Recovery
Configuring Trust Between Organizations
Deploying Smart Cards
Module 4: Designing and implementing CA Hierarchy
Planning
Preparing AD Environment
Implementing CA Hierarchy
Module 5: Upgrading PKI Infrastructure
Supported scenarios
Upgrading certificate templates
Module 6: PKI Security
Deploying certificates to Domain Controllers
Securing CA Hierarchy
Certificate Revocation
Certificate Validation
Role separation
Planning and implementing disaster recovery
Archiving encryption keys
Module 7: Deploying application-‐specific solutions
Secure Web Traffic by Using SSL
Configure email security
Encrypting file system
VPN
Wireless Networking
Document and code signing
AD RMS -‐ design and configuration
€3.500
Klassikaal
max 16
Red Hat High Availability Clustering [RH436]
Red Hat Virtual English
ma 16 feb. 2026
OVERVIEW
Red Hat® High Availability Clustering (RH436) provides intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, as well as cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.
This course is based on Red Hat Enterprise Linux 7.1.
Created for senior Linux® system administrators, this 4-day course strongly emphasizes lab-based activities. You'll learn how to deploy and manage shared storage and server clusters that provide highly available network services to a mission-critical enterprise environment.
This course also helps you prepare for the Red Hat Certified Specialist in High Availability Clustering exam (EX436).
OBJECTIVES
Review of Red Hat enterprise clustering and storage management technologies
Linux dynamic device management
iSCSI
Advanced software RAID
Device mapper and multipathing
AUDIENCE
Experienced Linux system administrators responsible for managing shared storage across one or more Linux systems and Experienced Linux system administrators responsible for maintaining a high availability service using cluster technology.
CERTIFICATION
Red Hat Enterprise Clustering and Storage Management Expertise Exam (EX436) Hands-on, performance-based, 4-hour exam.
This course prepares you for these credentials:
Red Hat Certified Architect — RHCA
Red Hat Certified Security Specialist — RHCDS
Certificates of Expertise
NEXT STEP
RH401, Red Hat Enterprise Deployment and Systems Management
RHS333, Red Hat Enterprise Security Network Services
RH442, Red Hat Enterprise Performance Tuning
CONTENT
· Clusters and storage
Get an overview of storage and cluster technologies.
· Create high-availability clusters
Review and create the architecture of Pacemaker-based high-availability clusters.
· Nodes and quorum
Review cluster node membership and how quorum is used to control clusters.
· Fencing
Understand fencing and fencing configuration.
· Resource groups
Create and configure simple resource groups to provide high-availability services to clients.
· Troubleshoot high-availability clusters
Identify and troubleshoot cluster problems.
· Complex resource groups
Control complex resource groups by using constraints.
· Two-node clusters
Identify and work around two-node clusters issues.
· ISCSI initiators
Manage iSCSI initiators for access to shared storage.
· Multipath Storage
Configure redundant storage access.
· Logical volume manager (LVM) clusters
Manage clustered LV.
· Global File System 2
Create symmetric shared file systems.
· Eliminate single points of failure
Eliminate single points of failure to increase service availability.
· Comprehensive review
Set up high-availability services and storage.
€3.740
Klassikaal
max 16
Masterclass: Windows Security and Infrastructure Management [WSI]
VIRTUAL TRAINING CENTER
di 9 dec. 2025
OVERVIEW
This is an international Live Virtual Class, which means you will share the learning experience in a group of IT pros from around the world! The class is taught in English by Cybersecurity Experts! Remember that this course is limited to 12 participants total to ensure the highest quality and unique learning experience.
During this course you will have an opportunity to interact with the instructor and get their help with any problems you might encounter, just as if it was a regular class. About the course The secure infrastructure configuration should be the most important line of defense in every organization. Unfortunately, people, the most valuable resource, are not always aware of the level of security in their companies, possible points of entry, how operating systems are attacked, and how to protect the infrastructure from successful attacks which are sometimes caused by configuration mistakes.
Understanding internal OS protection mechanisms and services/roles completely provides a huge impact on the whole infrastructure security level. Unfortunately, the problem is… rarely anyone has this impact! Advanced access rights, password mechanisms, windows internals, PowerShell usage for security purposes, gaining unauthorized access, advanced DNS configuration and common configuration mistakes, Active Directory security, IIS Security, debugging, advanced monitoring and troubleshooting and much more! Topics covered during this training will help you to walk in hackers’ shoes and evaluate your infrastructure from their point of view.
AUDIENCE
Enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security.
CERTIFICATION
What is wonderful about our certification is that it is lifetime valid with no renewal fees – the technology changes, but fundamentals and attitude remain mostly the same. Our Virtual Certificates, which entitle you to collect CPE Points, are issued via Accredible.
CONTENT
Module 1: Windows Internals & System Architecture
a) Introduction to the Windows 10 and Windows Server 2019 security concepts
b) Architecture overview and terms
c) Key System Components i. Processes, Threads and Jobs ii. Services, Functions and Routines iii. Sessions iv. Objects and Handles v. Registry
d) Advanced Local Procedure Call
e) Information gathering techniques i. Windows Debugging ii. Performance Monitor iii. Windows Driver Kit iv. Other useful tools
Module 2: Process and Thread Management
a) Process and thread internals
b) Protected processes
c) Process priority management
d) Examining Thread Activity
e) Process and thread monitoring and troubleshooting techniques (advanced usage of Process Explorer, Process Monitor, and other tools)
Module 3: System Security Mechanisms
a) Integrity Levels
b) Session Zero
c) Privileges, permissions and rights
d) Passwords security (techniques for getting and cracking passwords)
e) Registry Internals
f) Monitoring Registry Activity
g) Driver signing (Windows Driver Foundation)
h) User Account Control Virtualization
i) System Accounts and their functions
j) Boot configuration
k) Services architecture
l) Access tokens
m) Biometric framework for user authentication
Module 4: Debugging & Auditing
a) Available debuggers
b) Working with symbols
c) Windows Global Flags
d) Process debugging
e) Kernel-mode debugging
f) User-mode debugging
g) Setting up kernel debugging with a virtual machine as the target
h) Debugging the boot process
i) Crash dump analysis
j) Direct Kernel Object Manipulation
k) Finding hidden processes
l) Rootkit Detection
Module 5: Memory Analysis
a) Memory acquisition techniques
b) Finding data and activities in memory
c) Step-by-step memory analysis techniques
d) Tools and techniques to perform memory forensic
Module 6: Storage Management
a) Securing and monitoring Files and Folders
b) Protecting Shared Files and Folders by Using Shadow Copies
c) Implementing Storage Spaces
d) Implementing iSCSI
e) Implementing FSRM, managing Quotas, File Screens, and Storage Reports
f) Implementing Classification and File Management Tasks, Dynamic Access Control
g) Configuring and troubleshooting Distributed File System
Module 7: Startup and Shutdown
a) Boot Process overview
b) BIOS Boot Sector and Bootmgr vs. the UEFI Boot Process
c) Booting from iSCSI
d) Smss, Csrss, and Wininit
e) Last Known Good configuration
f) Safe Mode capabilities
g) Windows Recovery Environment (WinRE)
h) Troubleshooting Boot and Startup Problems
Module 8: Infrastructure Security Solutions
a) Windows Server Core Improvements in Windows Server 2019
b) AppLocker implementation scenarios
c) Advanced BitLocker implementation techniques (provisioning, Standard User Rights and Network Unlock﴿
d) Advanced Security Configuration Wizard
e) IPSec
f) Advanced GPO Management
g) Practicing Diagnostic and Recovery Toolkit
h) Tools
Module 9: Layered Network Services
a) Network sniffing techniques
b) Fingerprinting techniques
c) Enumeration techniques
d) Networking Services Security (DNS, DHCP, SNMP, SMTP and other)
e) Direct Access
f) High Availability features: cluster improvements and SMB ﴾Scale – Out File Server)
g) Network Load Balancing
Module 10: Monitoring and Event Tracing
a) Windows Diagnostic Infrastructure
b) Building auditing
c) Expression‐based audit policies
d) Logging Activity for Accounts and processes
e) Auditing tools, techniques and improvements
f) Auditing removable storage devices
Module 11: Points of Entry Analysis
a) Offline access
b) Kali Linux /other tools vs. Windows Security
c) Unpatched Windows and assigned attacks
d) Domain Controller attacks
e) Man‐in‐the Middle attacks
f) Services security
€3.000
Klassikaal
max 16
Executive Coaching voor managers, leidinggevenden en professionals
**Zolang de maatregelen met betrekking tot het coronavirus van kracht blijven worden alle Gingermood cursussen en trainingen online aangeboden.**
Voor wie?Voor managers, leidinggevende en professionals die een sparringpartner van hoog niveau zoeken om te sparren op het gebied van hun persoonlijke ontwikkeling.
Voorbeeldvraagstukken en onderwerpen bij executive coaching:
Ik zoek een sparringpartner om een nieuwe visie te ontwikkelen, welke strategische stappen moet ik zetten?
Hoe kan ik mijn leiderschapskwaliteiten verder ontwikkelen?
Hoe creëer ik meer draagvlak voor mijn ideeën?
Hoe motiveer ik mijn teamleden?
Executive coaching:De executive coach dient als klankbord of sparringpartner. De coach heeft kennis van de belevingswereld en de dilemma’s van de executive en heeft daarbij geen eigen belang. De executive of management coach heeft een flinke dosis levens-, ondernemers-, bestuurs – of managementervaring.
Gingermood helpt jou aan de kwaliteitscoach die het beste bij jouw voorkeuren, jouw vraagstuk, maar ook bij jou als persoon past.
Opbouw van het coaching traject:
Intake (1 uur);
Coaching traject (6 sessies à 1,5 uur);
Evaluatiegesprek (1 uur)
Eventueel: uitbreiding coaching traject met 2 sessies (zoek dan op: uitbreiding Executive Coaching voor managers, leidinggevende en professionals).
€2.760
Coaching
max 1
Executive Coaching voor senior managers en bestuurders
**Zolang de maatregelen met betrekking tot het coronavirus van kracht blijven worden alle Gingermood cursussen en trainingen online aangeboden.**
Voor wie?Voor senior managers en bestuurders die een sparringpartner van hoog niveau zoeken om te sparren op het gebied van hun persoonlijke ontwikkeling.
Voorbeeldvraagstukken bij executive coaching:
Hoe zet ik mijn gehele organisatie in beweging?
Ik zoek een sparringpartner om een nieuwe visie te ontwikkelen, welke strategische stappen moet ik zetten?
Hoe kan ik mijn leiderschapskwaliteiten nog verder ontwikkelen?
Hoe ga ik van direct leidinggeven naar leiderschap door beïnvloeding?
Executive coaching
De executive coach dient als klankbord of sparringpartner. De coach heeft kennis van de belevingswereld en de dilemma’s van de executive en heeft daarbij geen eigen belang. De executive of management coach heeft een flinke dosis levens-, ondernemers-, bestuurs – of managementervaring.
Gingermood helpt jou aan de kwaliteitscoach die het beste bij jouw voorkeuren, jouw vraagstuk, maar ook bij jou als persoon past.
Opbouw van het coaching traject:
Intake (1 uur);
Coaching traject (6 sessies à 1,5 uur);
Evaluatiegesprek (1 uur).
Eventueel: uitbreiding coaching traject met 2 sessies (zoek dan op: uitbreiding Executive Coaching voor senior managers en bestuurders).
€4.160
Coaching
max 1
Persoonlijk Leiderschap Coaching voor managers, leidinggevenden en professionals.
**Zolang de maatregelen met betrekking tot het coronavirus van kracht blijven worden alle Gingermood cursussen en trainingen online aangeboden.**
Voor wie?Voor managers, leidinggevenden en professionals die vanuit hun kracht willen werken en mensen achter zich willen krijgen (zoek ook eens op het Persoonlijk Leiderschap Coaching voor starters en young professionals en Persoonlijk Leiderschap coaching voor senior managers en bestuurders).
Voorbeeldvraagstukken bij coaching op persoonlijk leiderschap:
Hoe haal ik mijn leiderschapspotentieel uit mezelf?
Waar liggen mijn drijfveren en mijn kwaliteiten?
Hoe kan ik mijn invloed vergroten?
Hoe krijg ik grip op al mijn verantwoordelijkheden?
Persoonlijk leiderschap/persoonlijke effectiviteitDit coachingstraject helpt managers, leidinggevenden en professionals met het verbeteren van persoonlijke- en werkprestaties. Dit door te leren hoe je jezelf kunt leiden. Je leert jezelf te leiden in plaats van je te laten leiden door omgeving, collega’s, emoties of gedachten.
Gingermood helpt jou aan de kwaliteitscoach die het beste bij jouw voorkeuren, jouw vraagstuk, maar ook bij jou als persoon past.
Opbouw van het coachingstraject:
Intake (1 uur);
Coaching traject (6 sessies à 1,5 uur);
Evaluatiegesprek (1 uur).
Eventueel: uitbreiding coaching traject met 2 sessies (zoek dan op: uitbreiding Persoonlijk Leiderschap Coaching voor managers, leidinggevenden en professionals).
€2.760
Coaching
max 1
Persoonlijk Leiderschap Coaching voor starters en young professionals.
**Zolang de maatregelen met betrekking tot het coronavirus van kracht blijven worden alle Gingermood cursussen en trainingen online aangeboden.**
Voor wie?
Voor starters en young professionals die vanuit hun kracht willen leren werken (zoek ook eens op Persoonlijk Leiderschap voor managers, leidinggevenden en professionals traject en Persoonlijk Leiderschap coaching voor senior managers en bestuurders traject)
Voorbeeldvraagstukken bij coaching op persoonlijk leiderschap:
Wat zijn mijn drijfveren en mijn kwaliteiten?
Hoe bepaal ik mijn eigen koers in mijn carrière?
Waar liggen mijn persoonlijke leerdoelen?
Persoonlijk leiderschap/persoonlijke effectiviteit
Dit coachingstraject helpt starters en young professionals met het verbeteren van persoonlijke en werkprestaties. Dit door te leren hoe je jezelf kunt leiden. Je leert jezelf te leiden in plaats van je te laten leiden door omgeving, collega’s, emoties of gedachten.
Gingermood helpt jou aan de kwaliteitscoach die het beste bij jouw voorkeuren, jouw vraagstuk, maar ook bij jou als persoon past.
Opbouw van het coachingstraject:
Intake (1 uur);
Coaching traject (6 sessies à 1,5 uur);
Evaluatiegesprek (1 uur)
Eventueel: uitbreiding coaching traject met 2 sessies (zoek dan op: uitbreiding Persoonlijk Leiderschap voor starters en young professionals traject).
€1.780
Coaching
max 1