
Opleidingen
58.545
resultaten
SC-400 Administering Information Protection and Compliance in Microsoft 365 (SC-400) E-Learning (English)
Volg de SC-400 Training Microsoft Information Protection Administrator. Deze training richt zich op data governance en informatiebeveiliging binnen jouw organisatie. De training behandelt het voorkomen van gegevensverlies, gevoelige informatietypen, gevoeligheidslabels, beleid voor het bewaren van gegevens en Office 365-berichtversleuteling.
Na afronding van deze training kun je onder andere:
Preventiemaatregelen voor gegevensverlies configureren
De belangrijkste termen rondom de oplossingen voor informatiebescherming en governance van Microsoft beschrijven
DLP-rapporten bekijken en analyseren en het implementeren van Endpoint-DLP
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and Microsoft Purview message encryption among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).
Explain and use sensitivity labels.
Configure Data Loss Prevention policies.
Secure messages with Microsoft Purview
Describe the information governance configuration process.
Define key terms associated with Microsoft’s information protection and governance solutions.
Explain the Content explorer and Activity explorer.
Describe how to use sensitive information types and trainable classifiers.
Review and analyze DLP reports.
Identify and mitigate DLP policy violations.
Describe the integration of DLP with Microsoft Defender for Cloud Apps.
Deploy Endpoint DLP
Describe records management
Configure event driven retention
Import a file plan
Configure retention policies and labels
Create custom keyword dictionaries
Implement document fingerprinting
Lesmethode
Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet.
Doelgroep
The Information Protection Administrator plans and implements controls that meet organizational compliance needs. This person is responsible for translating requirements and compliance controls into technical implementation. They assist organizational control owners to become and stay compliant. They work with information technology (IT) personnel, business application owners, human resources, and legal stakeholders to implement technology that supports policies and controls necessary to sufficiently address regulatory requirements for their organization. They also work with the compliance and security leadership such as a Chief Compliance Officer and Security Officer to evaluate the full breadth of associated enterprise risk and partner to develop those policies. This person defines applicable requirements and tests IT processes and operations against those policies and controls. They are responsible for creating policies and rules for content classification, data loss prevention, governance, and protection.
The Information Protection Administrator plans and implements controls that meet organizational compliance needs. This person is responsible for translating requirements and compliance controls into technical implementation. They assist organizational control owners to become and stay compliant. They work with information technology (IT) personnel, business application owners, human resources, and legal stakeholders to implement technology that supports policies and controls necessary to sufficiently address regulatory requirements for their organization. They also work with the compliance and security leadership such as a Chief Compliance Officer and Security Officer to evaluate the full breadth of associated enterprise risk and partner to develop those policies. This person defines applicable requirements and tests IT processes and operations against those policies and controls. They are responsible for creating policies and rules for content classification, data loss prevention, governance, and protection.
Voorkennis
Before attending this course, students should have:
Foundational knowledge of Microsoft security and compliance technologies.
Basic knowledge of information protection concepts.
Understanding of cloud computing concepts.
Understanding of Microsoft 365 products and services.
Before attending this course, students should have:
Foundational knowledge of Microsoft security and compliance technologies.
Basic knowledge of information protection concepts.
Understanding of cloud computing concepts.
Understanding of Microsoft 365 products and services.
Onderdelen
Module 1: Implement Information Protection in Microsoft Purview
Organizations require information protection solutions to protect their data against theft and accidental loss. Learn how to protect your sensitive information. Learn how Microsoft Purview information protection and governance solutions help you protect and govern your data, throughout its lifecycle – wherever it lives, or wherever it travels. Learn about the information available to help you understand your data landscape and know your data. Learn how to use sensitive information types to support your information protection strategy. Learn about how sensitivity labels are used to classify and protect business data while making sure that user productivity and their ability to collaborate are not hindered.
Lessons
Introduction to information protection in Microsoft Purview
Classify data for protection and governance
Create and manage sensitive information types
Describe Microsoft 365 encryption
Deploy message encryption with Microsoft Purview
Protect information in Microsoft Purview
Apply and manage sensitivity labels
Lab : Implement Information Protection
Manage Compliance Roles
Manage Microsoft Purview message encryption
Manage Sensitive Information Types
Manage Trainable Classifiers
Manage Sensitivity Labels
After completing this module, students will be able to:
Describe Microsoft’s approach to information protection and governance.
List the components of the Data Classification solution.
Describe how to use sensitive information types and trainable classifiers.
Implement document fingerprinting
Create custom keyword dictionaries
Deploy message encryption in Microsoft Purview
Module 2: Implement Data Loss Prevention
In this module we discuss how to implement data loss prevention techniques to secure your Microsoft 365 data. Learn how to discover, classify, and protect sensitive and business-critical content throughout its lifecycle across your organization. Learn how to configure and implement data loss prevention policies and integrate them with Microsoft Defender for Cloud Apps. Learn how to respond to and mitigate data loss policy violations.
Lessons
Prevent Data loss with Microsoft Purview
Implement Endpoint data loss prevention
Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
Manage DLP policies and reports in Microsoft Purview
Lab : Implement Data Loss Prevention
Manage DLP policies
Manage Endpoint DLP
Manage DLP reports
After completing this module, students will be able to:
Describe the information protection configuration process.
Articulate deployment and adoption best practices.
Describe the integration of DLP with Microsoft Defender for Cloud Apps.
Configure policies in Microsoft Defender for Cloud Apps.
Review and analyze DLP reports.
Identify and mitigate DLP policy violations.
Mitigate DLP violations in Microsoft Defender for Cloud Apps.
Module 3: Implement Data Lifecycle and Records Management
In this module you will learn how to plan and implement information governance strategies for an organization. Learn how to manage your content lifecycle using solutions to import, store, and classify business-critical data so you can keep what you need and delete what you don't. Learn how to manage retention for Microsoft 365, and how retention solutions are implemented in the individual Microsoft 365 services. Learn how to use intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records in your organization.
Lessons
Data Lifecycle Management in Microsoft Purview
Manage data retention in Microsoft 365 workloads
Manage records in Microsoft Purview
Lab : Implement Data Lifecycle and Records Management
Configure Retention Labels
Implement Retention Labels
Configure Service-based Retention
Configure event-based Retention
Use eDiscovery for Recovery
Configure Records Management
After completing this module, students will be able to:
Describe the information governance configuration process.
Articulate deployment and adoption best practices.
Describe the retention features in Microsoft 365 workloads.
Configure retention settings in Microsoft Teams and SharePoint Online.
Implement retention for Exchange Mailbox items.
Recover content protected by retention settings.
Regain protected items from Exchange Mailboxes.
Describe the records management configuration process.
Module 1: Implement Information Protection in Microsoft Purview
Organizations require information protection solutions to protect their data against theft and accidental loss. Learn how to protect your sensitive information. Learn how Microsoft Purview information protection and governance solutions help you protect and govern your data, throughout its lifecycle – wherever it lives, or wherever it travels. Learn about the information available to help you understand your data landscape and know your data. Learn how to use sensitive information types to support your information protection strategy. Learn about how sensitivity labels are used to classify and protect business data while making sure that user productivity and their ability to collaborate are not hindered.
Lessons
Introduction to information protection in Microsoft Purview
Classify data for protection and governance
Create and manage sensitive information types
Describe Microsoft 365 encryption
Deploy message encryption with Microsoft Purview
Protect information in Microsoft Purview
Apply and manage sensitivity labels
Lab : Implement Information Protection
Manage Compliance Roles
Manage Microsoft Purview message encryption
Manage Sensitive Information Types
Manage Trainable Classifiers
Manage Sensitivity Labels
After completing this module, students will be able to:
Describe Microsoft’s approach to information protection and governance.
List the components of the Data Classification solution.
Describe how to use sensitive information types and trainable classifiers.
Implement document fingerprinting
Create custom keyword dictionaries
Deploy message encryption in Microsoft Purview
Module 2: Implement Data Loss Prevention
In this module we discuss how to implement data loss prevention techniques to secure your Microsoft 365 data. Learn how to discover, classify, and protect sensitive and business-critical content throughout its lifecycle across your organization. Learn how to configure and implement data loss prevention policies and integrate them with Microsoft Defender for Cloud Apps. Learn how to respond to and mitigate data loss policy violations.
Lessons
Prevent Data loss with Microsoft Purview
Implement Endpoint data loss prevention
Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
Manage DLP policies and reports in Microsoft Purview
Lab : Implement Data Loss Prevention
Manage DLP policies
Manage Endpoint DLP
Manage DLP reports
After completing this module, students will be able to:
Describe the information protection configuration process.
Articulate deployment and adoption best practices.
Describe the integration of DLP with Microsoft Defender for Cloud Apps.
Configure policies in Microsoft Defender for Cloud Apps.
Review and analyze DLP reports.
Identify and mitigate DLP policy violations.
Mitigate DLP violations in Microsoft Defender for Cloud Apps.
Module 3: Implement Data Lifecycle and Records Management
In this module you will learn how to plan and implement information governance strategies for an organization. Learn how to manage your content lifecycle using solutions to import, store, and classify business-critical data so you can keep what you need and delete what you don't. Learn how to manage retention for Microsoft 365, and how retention solutions are implemented in the individual Microsoft 365 services. Learn how to use intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records in your organization.
Lessons
Data Lifecycle Management in Microsoft Purview
Manage data retention in Microsoft 365 workloads
Manage records in Microsoft Purview
Lab : Implement Data Lifecycle and Records Management
Configure Retention Labels
Implement Retention Labels
Configure Service-based Retention
Configure event-based Retention
Use eDiscovery for Recovery
Configure Records Management
After completing this module, students will be able to:
Describe the information governance configuration process.
Articulate deployment and adoption best practices.
Describe the retention features in Microsoft 365 workloads.
Configure retention settings in Microsoft Teams and SharePoint Online.
Implement retention for Exchange Mailbox items.
Recover content protected by retention settings.
Regain protected items from Exchange Mailboxes.
Describe the records management configuration process.

€825
E-Learning
max 9
0 dagen
SC-900 Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Active Learning (English)
Eindhoven
ma 18 aug. 2025
en 9 andere data
Volg de SC-900 Training Microsoft Security, Compliance, and Identity. Kies deze training om vertrouwd te raken met de basisprincipes van beveiliging, compliance en identiteit (SCI) in cloudgebaseerde en gerelateerde Microsoft-services.
Na afronding van deze training kun je onder andere:
De basisconcepten van beveiliging, compliance en identiteit beschrijven
De concepten en mogelijkheden van Microsoft-oplossingen voor identiteits- en toegangsbeheer beschrijven
De mogelijkheden van Microsoft-beveiligingsoplossingen beschrijven
Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels).
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.
Describe basic concepts of security, compliance, and identity.
Describe the concepts and capabilities of Microsoft identity and access management solutions.
Describe the capabilities of Microsoft security solutions.
Describe the compliance management capabilities in Microsoft.
Lesmethode
Bij Master IT train je met onze unieke lesmethode Active Learning, hiermee leer je aantoonbaar effectiever!
Wij zjn er namelijk van overtuigd dat je slimmer en met meer plezier leert als je actief met je lesstof omgaat. Onze klassen zijn gevuld met maximaal 8 cursisten. Hierbij luister je niet passief naar een trainer, maar ga je interactief en 1-op-1 met de trainer aan de slag om ervoor te zorgen dat jouw leerdoelen behaald worden. De theorie maak je je zoveel mogelijk zelf eigen, de nadruk van de begeleiding ligt op het begrijpen en toepassen van die theorie in de praktijk. Zo leer je alleen datgene wat je echt nodig hebt.
Je bepaalt zelf je leertempo.
De trainer coacht je bij het definiëren van jouw leertraject.
Je onthoudt en begrijpt je nieuwe kennis beter.
Alles draait om toepassing van de stof in jouw praktijk.
Om alle beschikbare trainingsdata in te zien, bekijk dan onze eigen website
Doelgroep
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.
Voorkennis
Before attending this course, students must have:
General understanding of networking and cloud computing concepts.
General IT knowledge or any general experience working in an IT environment.
General understanding of Microsoft Azure and Microsoft 365.
Before attending this course, students must have:
General understanding of networking and cloud computing concepts.
General IT knowledge or any general experience working in an IT environment.
General understanding of Microsoft Azure and Microsoft 365.
Onderdelen
Module 1: Describe basic concepts of security, compliance, and identity.
Learn about core concepts, principles, and methodologies that are foundational to security, compliance, and identity solutions, including Zero-Trust, shared responsibility, our privacy principles, and more.
Lessons
Describe security concepts and methodologies.
Describe Microsoft security and compliance principles.
After completing this module, students will be able to:
Describe security concepts and methodologies.
Explore the Service Trust Portal.
Know where to go to find and review Azure compliance documentation.
Module 2: Describe the concepts and capabilities of Microsoft identity and access management solutions
Learn about Azure AD services and identity principals, secure authentication, access management capabilities, as well as identity protection and governance.
Lessons
Describe identity concepts
Describe the basic services and identity types of Azure AD
Describe the authentication capabilities of Azure AD
Describe the access management capabilities of Azure AD
Describe the identity protection and governance capabilities of Azure AD
After completing this module, students will be able to:
Describe basic identity concepts.
Describe the basic services and identity types of Azure AD
Describe the authentication capabilities of Azure AD.
Describe the access management capabilities of Azure AD.
Describe the identity protection and governance capabilities of Azure AD.
Module 3: Describe the capabilities of Microsoft security solutions
Learn about security capabilities in Microsoft. Topics covered will include network and platform capabilities of Azure, Azure security management, and Sentinel. You’ll learn about threat protection with Microsoft 365 Defender and Microsoft 365 security management, and you'll explore endpoint protection with Intune.
Lessons
Describe the basic security capabilities in Azure
Describe the security management capabilities of Azure
Describe the security capabilities of Azure Sentinel
Describe the threat protection capabilities of Microsoft 365
Describe the security management capabilities of Microsoft 365
Describe endpoint security with Microsoft Intune
Module summary
After completing this module, students will be able to:
Describe the basic security capabilities in Azure.
Describe the security management capabilities of Azure.
Describe the security capabilities of Azure Sentinel.
Describe the threat protection capabilities of Microsoft 365.
Describe the security management capabilities of Microsoft 365.
Describe endpoint security with Microsoft Intune.
Module 4: Describe the capabilities of Microsoft compliance solutions
Learn about compliance solutions in Microsoft. Topics covered will include Compliance center, Information protection and governance in Microsoft 365, Insider Risk, audit, and eDiscovery solutions. Also covered are Azure resources governance capabilities.
Lessons
Describe the compliance management capabilities in Microsoft
Describe the information protection and governance capabilities of Microsoft 365
Describe the insider risk capabilities in Microsoft 365
Describe the eDiscovery capabilities of Microsoft 365
Describe the audit capabilities of Microsoft 365
Describe the resource governance capabilities in Azure
After completing this module, students will be able to:
Describe the compliance management capabilities in Microsoft.
Describe the information protection and governance capabilities of Microsoft 365.
Describe the insider risk capabilities in Microsoft 365.
Describe the eDiscovery capabilities of Microsoft 365.
Describe the audit capabilities of Microsoft 365.
Describe the resource governance capabilities in Azure.
Module 1: Describe basic concepts of security, compliance, and identity.
Learn about core concepts, principles, and methodologies that are foundational to security, compliance, and identity solutions, including Zero-Trust, shared responsibility, our privacy principles, and more.
Lessons
Describe security concepts and methodologies.
Describe Microsoft security and compliance principles.
After completing this module, students will be able to:
Describe security concepts and methodologies.
Explore the Service Trust Portal.
Know where to go to find and review Azure compliance documentation.
Module 2: Describe the concepts and capabilities of Microsoft identity and access management solutions
Learn about Azure AD services and identity principals, secure authentication, access management capabilities, as well as identity protection and governance.
Lessons
Describe identity concepts
Describe the basic services and identity types of Azure AD
Describe the authentication capabilities of Azure AD
Describe the access management capabilities of Azure AD
Describe the identity protection and governance capabilities of Azure AD
After completing this module, students will be able to:
Describe basic identity concepts.
Describe the basic services and identity types of Azure AD
Describe the authentication capabilities of Azure AD.
Describe the access management capabilities of Azure AD.
Describe the identity protection and governance capabilities of Azure AD.
Module 3: Describe the capabilities of Microsoft security solutions
Learn about security capabilities in Microsoft. Topics covered will include network and platform capabilities of Azure, Azure security management, and Sentinel. You’ll learn about threat protection with Microsoft 365 Defender and Microsoft 365 security management, and you'll explore endpoint protection with Intune.
Lessons
Describe the basic security capabilities in Azure
Describe the security management capabilities of Azure
Describe the security capabilities of Azure Sentinel
Describe the threat protection capabilities of Microsoft 365
Describe the security management capabilities of Microsoft 365
Describe endpoint security with Microsoft Intune
Module summary
After completing this module, students will be able to:
Describe the basic security capabilities in Azure.
Describe the security management capabilities of Azure.
Describe the security capabilities of Azure Sentinel.
Describe the threat protection capabilities of Microsoft 365.
Describe the security management capabilities of Microsoft 365.
Describe endpoint security with Microsoft Intune.
Module 4: Describe the capabilities of Microsoft compliance solutions
Learn about compliance solutions in Microsoft. Topics covered will include Compliance center, Information protection and governance in Microsoft 365, Insider Risk, audit, and eDiscovery solutions. Also covered are Azure resources governance capabilities.
Lessons
Describe the compliance management capabilities in Microsoft
Describe the information protection and governance capabilities of Microsoft 365
Describe the insider risk capabilities in Microsoft 365
Describe the eDiscovery capabilities of Microsoft 365
Describe the audit capabilities of Microsoft 365
Describe the resource governance capabilities in Azure
After completing this module, students will be able to:
Describe the compliance management capabilities in Microsoft.
Describe the information protection and governance capabilities of Microsoft 365.
Describe the insider risk capabilities in Microsoft 365.
Describe the eDiscovery capabilities of Microsoft 365.
Describe the audit capabilities of Microsoft 365.
Describe the resource governance capabilities in Azure.

€695
Klassikaal
max 9
1 dag
SC-900 Microsoft Security, Compliance, and Identity Fundamentals (SC-900) E-Learning (English)
Volg de SC-900 Training Microsoft Security, Compliance, and Identity. Kies deze training om vertrouwd te raken met de basisprincipes van beveiliging, compliance en identiteit (SCI) in cloudgebaseerde en gerelateerde Microsoft-services.
Na afronding van deze training kun je onder andere:
De basisconcepten van beveiliging, compliance en identiteit beschrijven
De concepten en mogelijkheden van Microsoft-oplossingen voor identiteits- en toegangsbeheer beschrijven
De mogelijkheden van Microsoft-beveiligingsoplossingen beschrijven
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.
Describe basic concepts of security, compliance, and identity.
Describe the concepts and capabilities of Microsoft identity and access management solutions.
Describe the capabilities of Microsoft security solutions.
Describe the compliance management capabilities in Microsoft.
Lesmethode
Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet.
Doelgroep
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. The content for this course aligns to the SC-900 exam objective domain. Candidates should be familiar with Microsoft Azure and Microsoft 365 and understand how Microsoft security, compliance, and identity solutions can span across these solution areas to provide a holistic and end-to-end solution.
Voorkennis
Before attending this course, students must have:
General understanding of networking and cloud computing concepts.
General IT knowledge or any general experience working in an IT environment.
General understanding of Microsoft Azure and Microsoft 365.
Before attending this course, students must have:
General understanding of networking and cloud computing concepts.
General IT knowledge or any general experience working in an IT environment.
General understanding of Microsoft Azure and Microsoft 365.
Onderdelen
Module 1: Describe basic concepts of security, compliance, and identity.
Learn about core concepts, principles, and methodologies that are foundational to security, compliance, and identity solutions, including Zero-Trust, shared responsibility, our privacy principles, and more.
Lessons
Describe security concepts and methodologies.
Describe Microsoft security and compliance principles.
After completing this module, students will be able to:
Describe security concepts and methodologies.
Explore the Service Trust Portal.
Know where to go to find and review Azure compliance documentation.
Module 2: Describe the concepts and capabilities of Microsoft identity and access management solutions
Learn about Azure AD services and identity principals, secure authentication, access management capabilities, as well as identity protection and governance.
Lessons
Describe identity concepts
Describe the basic services and identity types of Azure AD
Describe the authentication capabilities of Azure AD
Describe the access management capabilities of Azure AD
Describe the identity protection and governance capabilities of Azure AD
After completing this module, students will be able to:
Describe basic identity concepts.
Describe the basic services and identity types of Azure AD
Describe the authentication capabilities of Azure AD.
Describe the access management capabilities of Azure AD.
Describe the identity protection and governance capabilities of Azure AD.
Module 3: Describe the capabilities of Microsoft security solutions
Learn about security capabilities in Microsoft. Topics covered will include network and platform capabilities of Azure, Azure security management, and Sentinel. You’ll learn about threat protection with Microsoft 365 Defender and Microsoft 365 security management, and you'll explore endpoint protection with Intune.
Lessons
Describe the basic security capabilities in Azure
Describe the security management capabilities of Azure
Describe the security capabilities of Azure Sentinel
Describe the threat protection capabilities of Microsoft 365
Describe the security management capabilities of Microsoft 365
Describe endpoint security with Microsoft Intune
Module summary
After completing this module, students will be able to:
Describe the basic security capabilities in Azure.
Describe the security management capabilities of Azure.
Describe the security capabilities of Azure Sentinel.
Describe the threat protection capabilities of Microsoft 365.
Describe the security management capabilities of Microsoft 365.
Describe endpoint security with Microsoft Intune.
Module 4: Describe the capabilities of Microsoft compliance solutions
Learn about compliance solutions in Microsoft. Topics covered will include Compliance center, Information protection and governance in Microsoft 365, Insider Risk, audit, and eDiscovery solutions. Also covered are Azure resources governance capabilities.
Lessons
Describe the compliance management capabilities in Microsoft
Describe the information protection and governance capabilities of Microsoft 365
Describe the insider risk capabilities in Microsoft 365
Describe the eDiscovery capabilities of Microsoft 365
Describe the audit capabilities of Microsoft 365
Describe the resource governance capabilities in Azure
After completing this module, students will be able to:
Describe the compliance management capabilities in Microsoft.
Describe the information protection and governance capabilities of Microsoft 365.
Describe the insider risk capabilities in Microsoft 365.
Describe the eDiscovery capabilities of Microsoft 365.
Describe the audit capabilities of Microsoft 365.
Describe the resource governance capabilities in Azure.
Module 1: Describe basic concepts of security, compliance, and identity.
Learn about core concepts, principles, and methodologies that are foundational to security, compliance, and identity solutions, including Zero-Trust, shared responsibility, our privacy principles, and more.
Lessons
Describe security concepts and methodologies.
Describe Microsoft security and compliance principles.
After completing this module, students will be able to:
Describe security concepts and methodologies.
Explore the Service Trust Portal.
Know where to go to find and review Azure compliance documentation.
Module 2: Describe the concepts and capabilities of Microsoft identity and access management solutions
Learn about Azure AD services and identity principals, secure authentication, access management capabilities, as well as identity protection and governance.
Lessons
Describe identity concepts
Describe the basic services and identity types of Azure AD
Describe the authentication capabilities of Azure AD
Describe the access management capabilities of Azure AD
Describe the identity protection and governance capabilities of Azure AD
After completing this module, students will be able to:
Describe basic identity concepts.
Describe the basic services and identity types of Azure AD
Describe the authentication capabilities of Azure AD.
Describe the access management capabilities of Azure AD.
Describe the identity protection and governance capabilities of Azure AD.
Module 3: Describe the capabilities of Microsoft security solutions
Learn about security capabilities in Microsoft. Topics covered will include network and platform capabilities of Azure, Azure security management, and Sentinel. You’ll learn about threat protection with Microsoft 365 Defender and Microsoft 365 security management, and you'll explore endpoint protection with Intune.
Lessons
Describe the basic security capabilities in Azure
Describe the security management capabilities of Azure
Describe the security capabilities of Azure Sentinel
Describe the threat protection capabilities of Microsoft 365
Describe the security management capabilities of Microsoft 365
Describe endpoint security with Microsoft Intune
Module summary
After completing this module, students will be able to:
Describe the basic security capabilities in Azure.
Describe the security management capabilities of Azure.
Describe the security capabilities of Azure Sentinel.
Describe the threat protection capabilities of Microsoft 365.
Describe the security management capabilities of Microsoft 365.
Describe endpoint security with Microsoft Intune.
Module 4: Describe the capabilities of Microsoft compliance solutions
Learn about compliance solutions in Microsoft. Topics covered will include Compliance center, Information protection and governance in Microsoft 365, Insider Risk, audit, and eDiscovery solutions. Also covered are Azure resources governance capabilities.
Lessons
Describe the compliance management capabilities in Microsoft
Describe the information protection and governance capabilities of Microsoft 365
Describe the insider risk capabilities in Microsoft 365
Describe the eDiscovery capabilities of Microsoft 365
Describe the audit capabilities of Microsoft 365
Describe the resource governance capabilities in Azure
After completing this module, students will be able to:
Describe the compliance management capabilities in Microsoft.
Describe the information protection and governance capabilities of Microsoft 365.
Describe the insider risk capabilities in Microsoft 365.
Describe the eDiscovery capabilities of Microsoft 365.
Describe the audit capabilities of Microsoft 365.
Describe the resource governance capabilities in Azure.

€490
E-Learning
max 9
0 dagen
VBA101 Programmeren in Visual Basic for Applications (VBA) Active Learning (English)
Nieuwegein
ma 1 sep. 2025
en 9 andere data
Volg de VBA101 Training Programmeren in Visual Basic for Applications. In deze VBA training komen aan de orde: macro's in applicaties, de basisprincipes van programmeren zoals statements, functies, variabelen, condities, loops, debugging en error afhandeling en de basis principes van object orientatie zoals objects, methods, properties en events.
Na afronding van deze training kun je onder andere:
De basisprincipes van programmeren toepassen, zoals statements, functies, variabelen, condities, loops, debugging en error afhandeling
De basisprincipes van object orientatie zoals objects, methods, properties en events gebruiken
Messagebox en inputbox toepassen
Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels).
In deze VBA training komen aan de orde: macro's in applicaties, de basisprincipes van programmeren zoals statements, functies, variabelen, condities, loops, debugging en error afhandeling en de basisprincipes van object orientatie zoals objects, methods, properties en events.
Ook wordt aandacht besteed aan de messagebox en inputbox. Door het praktijkgerichte karakter van de training is er voldoende mogelijkheid om jouw eigen voorbeelden in deze training mee te nemen.
Lesmethode
Bij Master IT train je met onze unieke lesmethode Active Learning, hiermee leer je aantoonbaar effectiever!
Wij zjn er namelijk van overtuigd dat je slimmer en met meer plezier leert als je actief met je lesstof omgaat. Onze klassen zijn gevuld met maximaal 8 cursisten. Hierbij luister je niet passief naar een trainer, maar ga je interactief en 1-op-1 met de trainer aan de slag om ervoor te zorgen dat jouw leerdoelen behaald worden. De theorie maak je je zoveel mogelijk zelf eigen, de nadruk van de begeleiding ligt op het begrijpen en toepassen van die theorie in de praktijk. Zo leer je alleen datgene wat je echt nodig hebt.
Je bepaalt zelf je leertempo.
De trainer coacht je bij het definiëren van jouw leertraject.
Je onthoudt en begrijpt je nieuwe kennis beter.
Alles draait om toepassing van de stof in jouw praktijk.
Om alle beschikbare trainingsdata in te zien, bekijk dan onze eigen website
Doelgroep
Deze training is bestemd voor hen die in de toekomst de macro taal Visual Basic for Applications (VBA) willen gebruiken om applicaties te automatiseren.Deze training is bestemd voor hen die in de toekomst de macro taal Visual Basic for Applications (VBA) willen gebruiken om applicaties te automatiseren.
Voorkennis
Voor deelname aan deze training is vereist dat men bekend is met het gebruik van de Windows interface en goede kennis heeft van de Office toepassingen Word en Excel.Voor deelname aan deze training is vereist dat men bekend is met het gebruik van de Windows interface en goede kennis heeft van de Office toepassingen Word en Excel.
Onderdelen
Programming Fundamentals
Exploring VB Editor
Mastering VB Editor
Advanced VB Editor Features
Creating Macros
Variables, Constants & Data types
Declarations & Scopes
Using Arrays
Using VBA Control Structures: If.. Then, Else & Select Case, Do.. Loop, For.. Next, With.. End With, For Each.. Next
Using Built-in VBA Procedures: Date & time, String and formatting function, MessageBox and InputBox function, Mathematical & Conversion Function
Creating Sub and Function Procedures
Parameter Passing, ByRef & ByVal
Operators
Using Forms and Modules
Properties, Methods and Events
Event-driven Programming
Using Objects
Analysing Object models with Object browser
Debugging & Error handling
Programming Fundamentals
Exploring VB Editor
Mastering VB Editor
Advanced VB Editor Features
Creating Macros
Variables, Constants & Data types
Declarations & Scopes
Using Arrays
Using VBA Control Structures: If.. Then, Else & Select Case, Do.. Loop, For.. Next, With.. End With, For Each.. Next
Using Built-in VBA Procedures: Date & time, String and formatting function, MessageBox and InputBox function, Mathematical & Conversion Function
Creating Sub and Function Procedures
Parameter Passing, ByRef & ByVal
Operators
Using Forms and Modules
Properties, Methods and Events
Event-driven Programming
Using Objects
Analysing Object models with Object browser
Debugging & Error handling

€1.645
Klassikaal
max 9
3 dagen
WORD Microsoft Word Active Learning (English)
Nieuwegein
ma 6 okt. 2025
en 6 andere data
Volg de Training Microsoft Word en leer hoe je Word efficiënt en snel kan gebruiken. Je gaat aan de slag met sjablonen, de verschillende opties in de document-, tekst- en alinea-opmaak en spellingscontrole.
Na afronding van deze training kun je onder andere:
Microsoft Word gebruiken voor de toepassing die jij nodig hebt
Documenten aanmaken en opmaken in Microsoft Word
Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels).
In deze Word training leer jij hoe je Word efficiënt en snel kan gebruiken. Je gaat aan de slag met sjablonen, de verschillende opties in de document-, tekst- en alinea-opmaak en spellingscontrole. Je gaat werken met afbeeldingen en tabellen. Ook leer je tijdens de training over Word hoe je makkeljker kan samenwerken in Word, ga je werken met objecten en leer je hoe je de opslag- en beveiligingsinstellingen kan wijzigen. Na deze training ken je alle belangrijke functies binnen Word.
Aan de hand van onze Active Learning lesmethode volg jij jouw Word training. De focus hierbij ligt op de praktijk. Alles wat je leert, breng je gelijk in de praktijk. Naast een boek en een oefenomgeving die je tijdens de training over Word gebruikt, bevat de trainingsbundel extra oefeningen waarmee je thuis ook nog mee aan de slag kan gaan. Wil jij ook goed worden met Word? Schrijf je dan nu gelijk in!
Deze training hebben we beschikbaar voor de Word versies 2013, 2016, 2019 en Word Online in Office 365.
Lesmethode
Bij Master IT train je met onze unieke lesmethode Active Learning, hiermee leer je aantoonbaar effectiever!
Wij zjn er namelijk van overtuigd dat je slimmer en met meer plezier leert als je actief met je lesstof omgaat. Onze klassen zijn gevuld met maximaal 8 cursisten. Hierbij luister je niet passief naar een trainer, maar ga je interactief en 1-op-1 met de trainer aan de slag om ervoor te zorgen dat jouw leerdoelen behaald worden. De theorie maak je je zoveel mogelijk zelf eigen, de nadruk van de begeleiding ligt op het begrijpen en toepassen van die theorie in de praktijk. Zo leer je alleen datgene wat je echt nodig hebt.
Je bepaalt zelf je leertempo.
De trainer coacht je bij het definiëren van jouw leertraject.
Je onthoudt en begrijpt je nieuwe kennis beter.
Alles draait om toepassing van de stof in jouw praktijk.
Om alle beschikbare trainingsdata in te zien, bekijk dan onze eigen website
Doelgroep
Deze training is bedoeld voor eindgebruikers die gaan werken met Word. Deze training is ook bestemd voor diegenen die nog niet eerder met een tekstverwerker of met een heel andere tekstverwerker gewerkt hebben.Deze training is bedoeld voor eindgebruikers die gaan werken met Word. Deze training is ook bestemd voor diegenen die nog niet eerder met een tekstverwerker of met een heel andere tekstverwerker gewerkt hebben.
Voorkennis
Voor het volgen van deze training dien je te beschikken over ervaring met Microsoft Windows.Voor het volgen van deze training dien je te beschikken over ervaring met Microsoft Windows.
Onderdelen
Kennismaken met Word
Nieuw document
Sjablonen
Tekstopmaak
Alinea-opmaak
Tekst controleren en afdrukken
Werken met afbeeldingen
Werken met tabellen
Documentenopmaak
Documentindeling
Samenwerken aan documenten
Werken met objecten
Werken met bestanden
Kennismaken met Word
Nieuw document
Sjablonen
Tekstopmaak
Alinea-opmaak
Tekst controleren en afdrukken
Werken met afbeeldingen
Werken met tabellen
Documentenopmaak
Documentindeling
Samenwerken aan documenten
Werken met objecten
Werken met bestanden

€795
Klassikaal
max 9
2 dagen
ISTQB - ISTQB Certified Tester Foundation Level (CTFL) 4.0 - Software Testing - Testmanagement - Testautomatisering
🗂ISTQB Certified Tester Foundation Level (CTFL) 4.0| 🇬🇧 Taal: Engels | 🗓 Abonnement: per jaar | 🎯Vakgebieden: IT, persoonlijk, internet.📲 PC, mobiel, tablet | 🗓 Abonnement: 365 dagen toegang tot revolutionaire E-learning om het examen te halen. Laat je Introduceren door te Leren via 1 Leerportaal (LMS) met Gecertificeerde Docenten. Exclusief 24/7 Online Mentor en Uitdagende Cursus Testen en alle Tips & Tricks. Gegarandeerd altijd het Officieel Proefexamen en een Officieel Certificaat van Deelname.
Taal: Engels
Doelgroep: ICT professionals die alles willen leren over Microsoft Azure
Vereiste kennisniveau: Geen
Cursusduur: 18:02 u (afhankelijk van persoonlijke snelheid)
Online toegang: 24/7, 365 dagen na activatie
MeasureUp Examensimulatie (150+ vragen)
Award Winning E-learning
Volledige training voor het officiële Examen
User-friendly engine
Inclusief Online Docent (via e-mail en chat)
Inclusief Certificaat van Deelname
Softwaresystemen zijn steeds vaker alomtegenwoordig in alle aspecten van ons leven. Storingen in deze systemen kunnen kostbaar zijn in termen van geld, tijd en bedrijfsreputatie. Sommige softwarefouten kunnen zelfs leiden tot persoonlijk letsel of overlijden. Effectief testen van software is een integraal onderdeel van het beperken van schade veroorzaakt door softwarefouten en het bieden van vertrouwen in softwaresystemen. Deze cursus introduceert de doelstellingen, principes, psychologie, ethiek en fundamentele processen van het testen van software. Het behandelt testen gedurende de gehele levenscyclus van software, statische technieken en testontwerptechnieken, waaronder black-box en white-box testen. Je leert over testmanagement, inclusief planning, configuratie, monitoring en risicomanagement. Tot slot leer je over de toolondersteuning voor testen - de soorten tools die beschikbaar zijn en hoe je tools kunt introduceren in je organisatie. Dit leerpad is bedoeld om aan te sluiten bij de Certified Tester Foundations Level Syllabus (CTFL) 4.0.
Cursusinhoud
E-learning courses (18 hours +):
Tester Foundation Level 4.0: Software Testing Basics
Course: 1 Hour, 19 Minutes
Course Overview
Software Testing
Software Testing Objectives
Software Testing vs. Debugging
The Purpose of Software Testing
Software Testing and Quality Assurance
Software Anomaly Classification
Software Testing Root Cause Analysis
Software Testing Errors and Defects
Software Testing Limitations
Software Testing Best Practices
The Software Testing Paradox
Software Testing Verification and Validation
Course Summary
Tester Foundation Level 4.0: Software Testing Processes
Course: 1 Hour, 54 Minutes
Course Overview
Software Testing Phases
Test Planning
Test Monitoring and Control
Test Analysis
Test Design
Test Implementation
Test Execution
Test Completion
Testing Process in Context
Software Testing Testware
Testing and Traceability
Traceability Matrix
Testing Roles
Test Manager Role
Software Tester Role
Course Summary
Software Testing Foundation: Software Development Testing Life Cycle
Course: 1 Hour, 45 Minutes
Course Overview
Incremental Development Models
Sequential Development Models
Software Testing Best Practices
Test-driven Development
Acceptance Test-driven Development
Behavior-driven Development
Software Testing and DevOps
Software Testing and Continuous Integration
Software Testing and Continuous Deployments
Software Testing Shift-left Approach
Software Testing Retrospective
Software Testing Continuous Improvement
Essential Testing Skills and Good Practices
Generic Testing Skills
Testing Whole Team Approach
Testing Independence
Course Summary
Tester Foundation Level 4.0: Software Test Types & Maintenance Testing
Course: 2 Hours
Course Overview
Component Testing
Component Integration Testing
System Integration Testing
System Testing
Forms of Acceptance Testing
Attributes of Acceptance Testing
Functional Testing
Non-Functional Testing
Black-box Testing
White-box Testing
Confirmation Testing
Regression Testing
Objectives of Maintenance Testing
Scope Considerations for Maintenance Testing
Triggers for Maintenance
Impact Analysis
Performance Testing
Performance Testing Metrics
Course Summary
Tester Foundation Level 4.0: Static Software Testing
Course: 2 Hours, 4 Minutes
Course Overview
Static Testing Methods
Static Testing Benefits
Code Reviews and Static Analysis
Dynamic vs. Static Testing
Static Testing Defects
Dynamic Testing Defects
Early Review Benefits
Work Product Review Process
Formal Review Roles and Responsibilities
Informal Review
Walkthrough Review
Technical Review
Inspection Review
Factors for a Successful Review
Conducting Reviews
Review Objectives and Exit Criteria
Review Selection Criteria
Review and Corporate Culture
Course Summary
Tester Foundation Level 4.0: Software Testing Techniques
Course: 1 Hour, 13 Minutes
Course Overview
Software Testing Techniques
Black-box Testing Techniques
White-box Testing Techniques
Gray-box Testing Techniques
Experienced-based Testing Techniques
Error Guessing
Exploratory Testing
Smoke Testing
Checklist-based Testing
Collaborative User Story Writing
Acceptance Criteria
Acceptance Test-driven Criteria
Course Summary
Tester Foundation Level 4.0: Black-box Testing Techniques
Course: 55 Minutes
Course Overview
Black-box Equivalence Partitioning
Black-box Boundary Value Analysis
Black-box Decision Table Testing
Black-box State Transition Testing
Black-box Usability Testing
Black-box User Interface Testing
Black-box Compatibility Testing
Black-box Security Testing
Course Summary
Software Testing Foundation: White-box Testing Techniques
Course: 41 Minutes
Course Overview
White-box Testing Techniques
White-box Application Programming Interface (API) Testing
White-box Statement Testing and Coverage
White-box Branch Testing and Coverage
White-box Testing Benefits
White-box Testing Challenges
Course Summary
Software Testing Foundation: Software Test Planning
Course: 57 Minutes
Course Overview
Test Plan Documentation
Test Plan Creation
Test Plan Software Tester Role
Software Testing Strategy
Software Testing Approach
Risk Register
Entry Criteria
Exit Criteria
Course Summary
Tester Foundation Level 4.0: Software Estimation & Prioritization Techniques
Course: 1 Hour, 28 Minutes
Course Overview
Test Estimation Techniques
Ratio-based Estimation
Extrapolation Estimation
Work Breakdown Structure Estimation
Functional Point Analysis Estimation
Three-point Estimation
Wideband Delphi Estimation
Test Execution Schedule
Risk-based Prioritization
Coverage-based Prioritization
Requirements-based Prioritization
Test Pyramid Model
Testing Quadrants
Course Summary
Tester Foundation Level 4.0: Test Monitoring & Control
Course: 1 Hour, 4 Minutes
Course Overview
Test Monitoring
Test Control
Test Completion
Test Metrics
Test Progress Report
Test Completion Report
Test Status Communication
Testing Configuration Management
Test Environment Configuration
Test Configuration Items
DevOps Configuration
Course Summary
Tester Foundation Level 4.0: Software Testing Risk & Defect Management
Course: 1 Hour, 18 Minutes
Course Overview
Software Development Risk Management
Software Development Product Risks
Software Development Project Risks
Product Risk Analysis Techniques
Product Risk Analysis Purposes
Product Risk Analysis Documentation
Product Risk Control Techniques
Product Risk Mitigation
Product Risk Monitoring
Defect Management
Defect Management Stakeholder Involvement
Defect Report Objectives
Defect Report Contents
Course Summary
Tester Foundation Level 4.0: Software Testing Support Tools
Course: 1 Hour, 24 Minutes
Course Overview
Software Testing Tools
Software Test Management Tools
Using TestRail Test Management Tool
Static Testing Tools
Test Design and Implementation Tools
Test Execution and Code Coverage Tools
Non-functional Testing Tools
DevOps Testing Tools
Test Collaboration Tools
Tools for Performance Measurement
Tools Supporting Scalability and Deployment
Test Automation Benefits
Test Automation Risks
Course Summary
MeasureUp Exam Simulation
Verfijn uw testvaardigheden met MeasureUp Exam Simulation, een geavanceerde tool die u een realistische examenervaring biedt. Oefen met nauwkeurig gemodelleerde vragen die de werkelijke examens nabootsen, zodat u kunt wennen aan de structuur en de druk. Met MeasureUp bereid u niet alleen voor op uw examen, u verhoogt ook uw kansen op succes.
110+ questions
Online Mentor
De online mentor kan al uw specifieke technische vragen beantwoorden via chat of e-mail met betrekking tot uw studie.
Online Mentor is 90 dagen of 365 dagen actief - na activering!
Tips, Tricks & Links
Maak gebruik van onze uitgebreide verzameling tips, trucs en links die speciaal zijn ontworpen om uw voorbereiding op certificeringsexamens te ondersteunen. Deze resources bieden waardevolle inzichten en beproefde strategieën om uw studie effectiever te maken. Versterk uw leerervaring en benader uw examens met vertrouwen!
Specificaties
Taal: Engels
Kwalificaties van de Instructeur: Gecertificeerd
Cursusformaat en Lengte: Lesvideo's met ondertiteling, interactieve elementen en opdrachten en testen
MeasureUp Examensimulatie: Ingebrepen
Online Virtuele labs: Ontvang 12 maanden toegang tot virtuele labs die overeenkomen met de traditionele cursusconfiguratie. Actief voor 365 dagen na activering, beschikbaarheid varieert per Training.
Tips & Tricks: Inbegrepen
Examen Quiz: Inbegrepen
Volledige training voor het officiële Examen: Ja
Lesduur: 18:02 uur
Voortgangsbewaking: Ja
Toegang tot Materiaal: 365 dagen
Technische Vereisten: Computer of mobiel apparaat, Stabiele internetverbindingen Webbrowserzoals Chrome, Firefox, Safari of Edge.
Support of Ondersteuning: Helpdesk en online kennisbank 24/7
Certificering: Certificaat van deelname in PDF formaat
Prijs en Kosten: Cursusprijs zonder extra kosten
Annuleringsbeleid en Geld-Terug-Garantie: Wij beoordelen dit per situatie
Award Winning E-learning: Ja
Tip! Zorg voor een rustige leeromgeving, tijd en motivatie, audioapparatuur zoals een koptelefoon of luidsprekers voor audio, accountinformatie zoals inloggegevens voor toegang tot het e-learning platform.

€369
E-Learning
Certificaten en Winstbewijzen, PO Deal aanbod
Breukelen
di 4 nov. 2025
Bestemd voor: (kandidaat-)notarissen
Certificaten van aandelen en winstbewijzen zijn flexibele instrumenten. Onder voorwaarden geven zij de houder recht op (een gedeelte van) de vennootschappelijke winst en reserves. Ook kan aan certificaten en winstbewijzen (mede)zeggenschap worden verbonden. Voor het inrichten van een structuur met certificaten of winstbewijzen bestaat echter geen standaardmodel. Dit is maatwerk, steeds afhankelijk van de motieven achter de deelneming in het kapitaal, waarbij jouw expertise als adviseur nodig is.
Tijdens deze cursus leer je over de basis van certificaten en winstbewijzen. De deskundige en ervaren docent behandelt en vergelijkt beide rechtsfiguren vanuit een vennootschapsrechtelijke optiek. Ook kijken we naar de praktische toepassing aan de hand van een interactieve casus.
Na het volgen van deze cursus:
Kan je op hoofdlijnen adviseren over certificaten van aandelen en winstbewijzen
Kan je beide rechtsfiguren in de basis toepassen
Ben je in staat je zelfstandig te verdiepen in beide rechtsfiguren

€609
Klassikaal
max 20
Actualiteiten Onderwijsrecht - primair en voortgezet, Bestuurs(proces)recht
Veenendaal
do 6 nov. 2025
Wil je in twee dagen helemaal bijgepraat worden over de actualiteiten binnen het onderwijsrecht? Schrijf je dan in voor deze cursus, waarbij je ook kunt kiezen om één cursusdag aanwezig te zijn. Goed om te weten: de cursus Actualiteiten Onderwijsrecht werd eerder beoordeeld met het gemiddelde rapportcijfer 9,3.
“Deze cursus is een must voor iedereen die zich met deze materie bezighoudt.”
Cursusopbouw
De cursus is verdeeld over twee dagen:
Cursusdag 1 - Toelating, verwijdering, beoordeling en examinering in het primair en voortgezet onderwijs
Op deze cursusdag komt de huidige wettelijke systematiek rond toelating en verwijdering van leerlingen aan bod. Ook de voorgenomen wetgeving op dit punt, zoals een centrale aanmelddatum in het voortgezet onderwijs, komt aan de orde. Evenals de actuele hoofdlijnen van de jurisprudentie.
Het tweede dagdeel is gereserveerd voor het bespreken van de toepasselijke wetgeving en beleidsregels rond beoordeling en examinering. De uitgangspunten volgend uit de jurisprudentie worden behandeld. Ook de voorgenomen wetgeving op dit punt komt aan bod, zoals het regelen van examencommissies in het voortgezet onderwijs.
Cursusdag 2 - Passend onderwijs in primair en voortgezet onderwijs
Deze tweede cursusdag staat onder meer in het teken van de huidige en komende (wets)wijzigingen rondom passend onderwijs en het relevante kader van de Wet Gelijke Behandeling Handicap of Chronische Ziekte. Verder wordt de jurisprudentie van instanties als de Geschillencommissie Passend Onderwijs (GPO), de Afdeling Bestuursrechtspraak van de Raad van State en de oordelen van het College van de Rechten van de Mens (CRM) behandeld.
Docenten met ruime ervaring op gebied van onderwijsrecht
De cursus wordt verzorgd door Marion Scholtes en Pieter Huisman.
Pieter Huisman is deeltijdhoogleraar onderwijsrecht bij de Tilburg Law School en is senior adviseur bij Hobéon.
Marion Scholtes treedt bij Brussee Lindeboom Advocaten zowel op als vaste huisadvocaat van onderwijsinstellingen als voor particulieren op het terrein van arbeidsrecht, familie en jeugdrecht en passend onderwijs.
Meer informatie en aanmelden
Wil je meer weten over deze cursus of wil je aanmelden voor een losse cursusdag? Mail dan naar opleidingen@sdu.nl.
Korting leden VVO en medewerkers onderwijsorganisatie
Leden van de VVO (Vereniging Voor Onderwijsrecht) en medewerkers van een onderwijsorganisatie ontvangen een korting van 20% op de standaardprijs.
Voor wie is deze cursus bedoeld?
Advocaten, juristen werkzaam op het gebied van onderwijsrecht, bestuurders en juristen die werken bij onderwijsinstellingen.

€1.225
Klassikaal
max 22
AI essentials voor marketing (Virtueel)
Virtueel
ma 15 sep. 2025
en 1 andere data
Lesmethode :
Virtueel
Algemeen :
In de cursus AI Essentials voor marketing leer je hoe je AI kunt inzetten om jouw marketingstrategieën te optimaliseren. Je krijgt inzicht in wat AI is en hoe het werkt binnen marketing, en ontdekt praktische toepassingen om je campagnes efficiënter en effectiever te maken. We behandelen onderwerpen zoals branding met AI, data-analyse, marketingautomatisering en contentcreatie.
Daarnaast leer je hoe je AI-tools kunt gebruiken om websites en SEO te verbeteren en krijg je handvatten voor ethisch en veilig gebruik van AI in marketingtoepassingen. Of je nu aan de slag wilt met e-mailautomatisering, creatieve content, of het optimaliseren van klantinteracties, deze cursus biedt jou de tools en kennis die je nodig hebt om AI succesvol te integreren in jouw dagelijkse werkzaamheden.
Doel :
Na deze cursus kun je:
#Uitleggen wat AI is en hoe het werkt binnen marketing.
#AI-tools toepassen om marketingstrategieën te verbeteren.
#Automatisering inzetten voor e-mailmarketing en social media.
#Creatieve content maken met behulp van AI.
#AI gebruiken om websites en SEO te optimaliseren.
#Veilig en ethisch omgaan met AI in marketingtoepassingen.
Doelgroep :
Deze cursus is voor marketeers, content creators, copywriters en social media managers die interesse hebben in AI en hiermee aan de slag willen gaan.
Voorkennis :
Een basisbegrip van marketingprincipes.
Onderwerpen :
- Introductie tot AI en genAI
- Een merk creëren met AI
- Branding AI
- Marketingstrategie met AI
- Data-analyse met AI
- Marketingautomatisering en AI
- Contentcreatie met AI
- Websites AI
- Kwaliteitscontrole en ethische aspecten
- Prompting voor marketeers
- Waar te beginnen

€715
Klassikaal
max 12
DAX functies in Power BI
Nieuwegein
di 5 aug. 2025
en 9 andere data
Lesmethode :
Persoonlijk begeleid
Algemeen :
In de cursus DAX functies in Power BI leer je hoe je meer uit je data kunt halen door gebruik te maken van krachtige DAX-functies (Data Analysis Expressions). Tijdens de cursus leer je meer over de toepassing van DAX, werk je met geavanceerde berekeningen en leer je hoe je met DAX complexe analyses en rapportages kunt maken. Aan het einde van deze cursus ben je in staat om DAX-formules toe te passen om geavanceerde analyses uit te voeren en rapportages in Power BI te optimaliseren.
Doel :
Na deze cursus kun je DAX functies maken en gebruiken in Power BI.
Doelgroep :
Iedereen met kennis van Power BI die DAX functies wil leren toepassen.
Voorkennis :
Basis kennis van rapporten maken met Power BI.
Onderwerpen :
- DAX functie syntax
- Aggregate functions (measures)
- CALCULATE()
- ALL(), ALLEXCEPT(), ALLSELECTED() en Filter()
- IF(), SWITCH() en FIND()
- Relatiefuncties
- Datum- en tijdfuncties
- SELECTEDVALUE(), VALUES(), HASONEVALUE()
- Time intelligence
- Logische functies
- Tekstfuncties

€625
Individueel
max 12