
Opleidingen
58.413
resultaten
CompTIA-CE CompTIA Cloud Essentials+ (CLO-002) Active Learning (English)
Nieuwegein
ma 7 jul. 2025
en 9 andere data
Tijdens de CompTIA Cloud Essentials+ training leer je hoe je efficiëntie kunt verhogen, kosten kunt beheren en beveiligingsrisico's kan verminderen door over te stappen op cloudtechnologie. Deze training is specifiek gericht op medewerkers die besluiten moeten nemen over het invoeren van cloudtoepassingen.
Na afronding van deze training kun je onder andere:
Meerdere benaderingen beschrijven voor het migreren van applicaties.
Het verschil begrijpen tussen private en publieke typen clouds vanuit een technisch perspectief
Beschrijven van de relatie tussen cloud computing en virtualisatie
Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels).
CompTIA Cloud Essentials+ utilizes key business principles and fundamental cloud concepts that validate data-driven cloud recommendations. It stands alone in this field by demonstrating that all necessary staff members – not just the IT specialists – understand how to increase efficiency, manage costs, and reduce security risks for organizations whenever tasked with making current cloud technology decisions.Business analysts and IT pros alike are consistently called upon to assist their organization in determining which cloud service provider(s) to use, what to migrate to the cloud, and when to implement. Collecting and analyzing cloud products and services information is essential when making operational cloud business decisions. The financial and operational impacts covered by Cloud Essentials+ ensure an ability to develop and implement solid cloud strategies. CompTIA Cloud Essentials+ will show that successful candidates:
Have the knowledge and understanding of the foundational business and technical components included in a cloud assessment
Understand specific security concerns and measures
Comprehend new technology concepts, solutions, and benefits to an organization
Lesmethode
Bij Master IT train je met onze unieke lesmethode Active Learning, hiermee leer je aantoonbaar effectiever!
Wij zjn er namelijk van overtuigd dat je slimmer en met meer plezier leert als je actief met je lesstof omgaat. Onze klassen zijn gevuld met maximaal 8 cursisten. Hierbij luister je niet passief naar een trainer, maar ga je interactief en 1-op-1 met de trainer aan de slag om ervoor te zorgen dat jouw leerdoelen behaald worden. De theorie maak je je zoveel mogelijk zelf eigen, de nadruk van de begeleiding ligt op het begrijpen en toepassen van die theorie in de praktijk. Zo leer je alleen datgene wat je echt nodig hebt.
Je bepaalt zelf je leertempo.
De trainer coacht je bij het definiëren van jouw leertraject.
Je onthoudt en begrijpt je nieuwe kennis beter.
Alles draait om toepassing van de stof in jouw praktijk.
Om alle beschikbare trainingsdata in te zien, bekijk dan onze eigen website
Doelgroep
Jobs That Use Cloud Essentials+:
Sales and Marketing Staff in cloud product or service management
Business Analysts
Business Process Owners
Managed Service Provider Personnel
New Data Center Staff
Technical Support Staff
Jobs That Use Cloud Essentials+:
Sales and Marketing Staff in cloud product or service management
Business Analysts
Business Process Owners
Managed Service Provider Personnel
New Data Center Staff
Technical Support Staff
Voorkennis
Between six months to a year of work experience as a business analyst in an IT environment with some exposure to cloud technologiesBetween six months to a year of work experience as a business analyst in an IT environment with some exposure to cloud technologies
Onderdelen
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Hiermee kun je indien gewenst thuis extra oefenen. Characteristics of Cloud Services from a Business Perspecitive
Understand common terms and definitions of cloud computing and provide examples.
Describe the relationship between cloud computing and virtualization.
Name early examples of cloud computing.
Understand several common definitions of cloud computing and their commonalities/differences.
Recognize what types organizations might benefit from cloud computing.
Recognize what types organizations might not benefit from cloud computing.
Distinguish between the different types of clouds, including XaaS, IaaS and PaaS, and give examples of them.
Cloud Computing and Business Value
Recognize the similarities and differences between cloud computing and outsourcing.
Understand the following characteristics of clouds and cloud services from a business perspective:
Scalability
Security
Hardware independence
Variable costs
Time to market
Distribution over the Internet
Demonstrate how the characteristics of cloud computing enhance business value.
Technical Perspectives/Cloud Types
Understand the difference between private and public types of clouds from a technical perspective and provide examples.
Understand at a high level the following important techniques and methods for cloud computing deployment:
Networking
Automation and self-service
Federation
The role of standardization
Explain technical challenges and risks for cloud computing and methods to mitigate them for:
Cloud storage
Application performance
Data integration
Security
Describe the impact of cloud computing on application architecture and the application development process.
Steps to Successful Adoption of Cloud Computing
Explain typical steps that lead to a successful adoption of cloud computing services:
Understand selection criteria for a pilot
Relate SaaS, PaaS and IaaS deployment to organizational goals
Understand the roles and capabilities of cloud computing vendors and dependencies on the vendors.
Understand the following organizational capabilities that are relevant for realizing cloud benefits:
Skills that are required in an organization that is adopting cloud computing
Critical success factors
Describe multiple approaches for migrating applications.
Impact and Changes of Cloud Computing on IT Service Management
Understand the impact and changes of cloud computing on IT service management in a typical organization:
Service strategy
Service design
Service operation
Service transition
Use a structured approach based on ITIL to explore the potential impact of cloud computing in an organization.
Risks and Consequences of Cloud Computing
Explain and identify the issues associated with integrating cloud computing into an organization’s existing compliance risk and regulatory framework:
Security, legal, compliance and privacy risks
Explain the implications for direct cost and cost allocations.
Understand how to maintain strategic flexibility.
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Hiermee kun je indien gewenst thuis extra oefenen. Characteristics of Cloud Services from a Business Perspecitive
Understand common terms and definitions of cloud computing and provide examples.
Describe the relationship between cloud computing and virtualization.
Name early examples of cloud computing.
Understand several common definitions of cloud computing and their commonalities/differences.
Recognize what types organizations might benefit from cloud computing.
Recognize what types organizations might not benefit from cloud computing.
Distinguish between the different types of clouds, including XaaS, IaaS and PaaS, and give examples of them.
Cloud Computing and Business Value
Recognize the similarities and differences between cloud computing and outsourcing.
Understand the following characteristics of clouds and cloud services from a business perspective:
Scalability
Security
Hardware independence
Variable costs
Time to market
Distribution over the Internet
Demonstrate how the characteristics of cloud computing enhance business value.
Technical Perspectives/Cloud Types
Understand the difference between private and public types of clouds from a technical perspective and provide examples.
Understand at a high level the following important techniques and methods for cloud computing deployment:
Networking
Automation and self-service
Federation
The role of standardization
Explain technical challenges and risks for cloud computing and methods to mitigate them for:
Cloud storage
Application performance
Data integration
Security
Describe the impact of cloud computing on application architecture and the application development process.
Steps to Successful Adoption of Cloud Computing
Explain typical steps that lead to a successful adoption of cloud computing services:
Understand selection criteria for a pilot
Relate SaaS, PaaS and IaaS deployment to organizational goals
Understand the roles and capabilities of cloud computing vendors and dependencies on the vendors.
Understand the following organizational capabilities that are relevant for realizing cloud benefits:
Skills that are required in an organization that is adopting cloud computing
Critical success factors
Describe multiple approaches for migrating applications.
Impact and Changes of Cloud Computing on IT Service Management
Understand the impact and changes of cloud computing on IT service management in a typical organization:
Service strategy
Service design
Service operation
Service transition
Use a structured approach based on ITIL to explore the potential impact of cloud computing in an organization.
Risks and Consequences of Cloud Computing
Explain and identify the issues associated with integrating cloud computing into an organization’s existing compliance risk and regulatory framework:
Security, legal, compliance and privacy risks
Explain the implications for direct cost and cost allocations.
Understand how to maintain strategic flexibility.

€895
Klassikaal
max 9
2 dagen
CompTIA-CE CompTIA Cloud Essentials+ (CLO-002) E-Learning (English)
Tijdens de CompTIA Cloud Essentials+ training leer je hoe je efficiëntie kunt verhogen, kosten kunt beheren en beveiligingsrisico's kan verminderen door over te stappen op cloudtechnologie. Deze training is specifiek gericht op medewerkers die besluiten moeten nemen over het invoeren van cloudtoepassingen.
Na afronding van deze training kun je onder andere:
Meerdere benaderingen beschrijven voor het migreren van applicaties.
Het verschil begrijpen tussen private en publieke typen clouds vanuit een technisch perspectief
Beschrijven van de relatie tussen cloud computing en virtualisatie
CompTIA Cloud Essentials+ utilizes key business principles and fundamental cloud concepts that validate data-driven cloud recommendations. It stands alone in this field by demonstrating that all necessary staff members – not just the IT specialists – understand how to increase efficiency, manage costs, and reduce security risks for organizations whenever tasked with making current cloud technology decisions.Business analysts and IT pros alike are consistently called upon to assist their organization in determining which cloud service provider(s) to use, what to migrate to the cloud, and when to implement. Collecting and analyzing cloud products and services information is essential when making operational cloud business decisions. The financial and operational impacts covered by Cloud Essentials+ ensure an ability to develop and implement solid cloud strategies. CompTIA Cloud Essentials+ will show that successful candidates:
Have the knowledge and understanding of the foundational business and technical components included in a cloud assessment
Understand specific security concerns and measures
Comprehend new technology concepts, solutions, and benefits to an organization
Lesmethode
Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet.
Doelgroep
Jobs That Use Cloud Essentials+:
Sales and Marketing Staff in cloud product or service management
Business Analysts
Business Process Owners
Managed Service Provider Personnel
New Data Center Staff
Technical Support Staff
Jobs That Use Cloud Essentials+:
Sales and Marketing Staff in cloud product or service management
Business Analysts
Business Process Owners
Managed Service Provider Personnel
New Data Center Staff
Technical Support Staff
Voorkennis
Between six months to a year of work experience as a business analyst in an IT environment with some exposure to cloud technologiesBetween six months to a year of work experience as a business analyst in an IT environment with some exposure to cloud technologies
Onderdelen
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Hiermee kun je indien gewenst thuis extra oefenen. Characteristics of Cloud Services from a Business Perspecitive
Understand common terms and definitions of cloud computing and provide examples.
Describe the relationship between cloud computing and virtualization.
Name early examples of cloud computing.
Understand several common definitions of cloud computing and their commonalities/differences.
Recognize what types organizations might benefit from cloud computing.
Recognize what types organizations might not benefit from cloud computing.
Distinguish between the different types of clouds, including XaaS, IaaS and PaaS, and give examples of them.
Cloud Computing and Business Value
Recognize the similarities and differences between cloud computing and outsourcing.
Understand the following characteristics of clouds and cloud services from a business perspective:
Scalability
Security
Hardware independence
Variable costs
Time to market
Distribution over the Internet
Demonstrate how the characteristics of cloud computing enhance business value.
Technical Perspectives/Cloud Types
Understand the difference between private and public types of clouds from a technical perspective and provide examples.
Understand at a high level the following important techniques and methods for cloud computing deployment:
Networking
Automation and self-service
Federation
The role of standardization
Explain technical challenges and risks for cloud computing and methods to mitigate them for:
Cloud storage
Application performance
Data integration
Security
Describe the impact of cloud computing on application architecture and the application development process.
Steps to Successful Adoption of Cloud Computing
Explain typical steps that lead to a successful adoption of cloud computing services:
Understand selection criteria for a pilot
Relate SaaS, PaaS and IaaS deployment to organizational goals
Understand the roles and capabilities of cloud computing vendors and dependencies on the vendors.
Understand the following organizational capabilities that are relevant for realizing cloud benefits:
Skills that are required in an organization that is adopting cloud computing
Critical success factors
Describe multiple approaches for migrating applications.
Impact and Changes of Cloud Computing on IT Service Management
Understand the impact and changes of cloud computing on IT service management in a typical organization:
Service strategy
Service design
Service operation
Service transition
Use a structured approach based on ITIL to explore the potential impact of cloud computing in an organization.
Risks and Consequences of Cloud Computing
Explain and identify the issues associated with integrating cloud computing into an organization’s existing compliance risk and regulatory framework:
Security, legal, compliance and privacy risks
Explain the implications for direct cost and cost allocations.
Understand how to maintain strategic flexibility.
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Hiermee kun je indien gewenst thuis extra oefenen. Characteristics of Cloud Services from a Business Perspecitive
Understand common terms and definitions of cloud computing and provide examples.
Describe the relationship between cloud computing and virtualization.
Name early examples of cloud computing.
Understand several common definitions of cloud computing and their commonalities/differences.
Recognize what types organizations might benefit from cloud computing.
Recognize what types organizations might not benefit from cloud computing.
Distinguish between the different types of clouds, including XaaS, IaaS and PaaS, and give examples of them.
Cloud Computing and Business Value
Recognize the similarities and differences between cloud computing and outsourcing.
Understand the following characteristics of clouds and cloud services from a business perspective:
Scalability
Security
Hardware independence
Variable costs
Time to market
Distribution over the Internet
Demonstrate how the characteristics of cloud computing enhance business value.
Technical Perspectives/Cloud Types
Understand the difference between private and public types of clouds from a technical perspective and provide examples.
Understand at a high level the following important techniques and methods for cloud computing deployment:
Networking
Automation and self-service
Federation
The role of standardization
Explain technical challenges and risks for cloud computing and methods to mitigate them for:
Cloud storage
Application performance
Data integration
Security
Describe the impact of cloud computing on application architecture and the application development process.
Steps to Successful Adoption of Cloud Computing
Explain typical steps that lead to a successful adoption of cloud computing services:
Understand selection criteria for a pilot
Relate SaaS, PaaS and IaaS deployment to organizational goals
Understand the roles and capabilities of cloud computing vendors and dependencies on the vendors.
Understand the following organizational capabilities that are relevant for realizing cloud benefits:
Skills that are required in an organization that is adopting cloud computing
Critical success factors
Describe multiple approaches for migrating applications.
Impact and Changes of Cloud Computing on IT Service Management
Understand the impact and changes of cloud computing on IT service management in a typical organization:
Service strategy
Service design
Service operation
Service transition
Use a structured approach based on ITIL to explore the potential impact of cloud computing in an organization.
Risks and Consequences of Cloud Computing
Explain and identify the issues associated with integrating cloud computing into an organization’s existing compliance risk and regulatory framework:
Security, legal, compliance and privacy risks
Explain the implications for direct cost and cost allocations.
Understand how to maintain strategic flexibility.

€690
E-Learning
max 9
0 dagen
CompTIA-C CompTIA Cloud+ (CV0-003) Active Learning (English)
Nieuwegein
ma 7 jul. 2025
en 9 andere data
Tijdens de CompTIA Cloud + training bekijk je cloudgebaseerde infrastructuurdiensten in de context van bredere IT-systeemactiviteiten, ongeacht het platform. Jij leert vaardigheden die nodig zijn voor het implementeren en automatiseren van veilige cloudomgevingen die de hoge beschikbaarheid van bedrijfssystemen en gegevens ondersteunen.
Na afronding van deze training kun je onder andere:
Beveiligen van een netwerk in een cloud omgeving
Maatregelen implementeren om aan de security eisen te voldoen
Uitrollen van cloud networking solutions
Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels).
CompTIA Cloud+ validates the skills needed to deploy and automate secure cloud environments that support the high availability of business systems and data. CompTIA Cloud+ views cloud-based infrastructure services in the context of broader IT systems operations regardless of the platform. Migrating to the cloud presents opportunities to deploy, optimize, and protect mission critical applications and data storage. CompTIA Cloud+ validates the technical skills needed to secure these valuable assets. The reality of operating multicloud environments poses new challenges. CompTIA Cloud+ is ideal for cloud engineers who need to have expertise across multiple products and systems. CompTIA Cloud+ now features flexible training options including self-paced learning, live online training, custom training and labs to advance the career development of IT professionals in server administration.
Lesmethode
Bij Master IT train je met onze unieke lesmethode Active Learning, hiermee leer je aantoonbaar effectiever!
Wij zjn er namelijk van overtuigd dat je slimmer en met meer plezier leert als je actief met je lesstof omgaat. Onze klassen zijn gevuld met maximaal 8 cursisten. Hierbij luister je niet passief naar een trainer, maar ga je interactief en 1-op-1 met de trainer aan de slag om ervoor te zorgen dat jouw leerdoelen behaald worden. De theorie maak je je zoveel mogelijk zelf eigen, de nadruk van de begeleiding ligt op het begrijpen en toepassen van die theorie in de praktijk. Zo leer je alleen datgene wat je echt nodig hebt.
Je bepaalt zelf je leertempo.
De trainer coacht je bij het definiëren van jouw leertraject.
Je onthoudt en begrijpt je nieuwe kennis beter.
Alles draait om toepassing van de stof in jouw praktijk.
Om alle beschikbare trainingsdata in te zien, bekijk dan onze eigen website
Doelgroep
Jobs That Use Cloud+:
Sr. Systems Administrator
Cloud Engineer
Systems Engineer
Sr. Network Administrator
Sr. Network Engineer
Cloud Specialist
Cloud Project Manager
Jobs That Use Cloud+:
Sr. Systems Administrator
Cloud Engineer
Systems Engineer
Sr. Network Administrator
Sr. Network Engineer
Cloud Specialist
Cloud Project Manager
Voorkennis
CompTIA Network+ and Server+ and 2-3 years of experience in systems administration or networking.CompTIA Network+ and Server+ and 2-3 years of experience in systems administration or networking.
Onderdelen
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen. Cloud Architecture and Design 13%Compare and contrast the different types of cloud models.
Deployment models
Service models
Advanced cloud services
Shared responsibility model
Explain the factors that contribute to capacity planning.
Requirements
Standard templates
Licensing
User density
System load
Trend analysis
Performance capacity planning
Explain the importance of high availability and scaling in cloud environments.
Hypervisors
Oversubscription
Regions and zones
Applications
Containers
Clusters
High availability of network functions
Avoid single points of failure
Scalability
Given a scenario, analyze the solution design in support of the business requirements.
Requirement analysis
Environments
Testing techniques
Security 20%Given a scenario, configure identity and access management.
Identification and authorization
Directory services
Federation
Certificate management
Multifactor authentication (MFA)
Single sign-on (SSO)
Public key infrastructure (PKI)
Secret management
Key management
Given a scenario, secure a network in a cloud environment.
Network segmentation
Protocols
Network services
Log and event monitoring
Network flows
Hardening and configuration changes
Given a scenario, apply the appropriate OS and application security controls.
Policies
User permissions
Antivirus/anti-malware/endpoint detection and response (EDR)
Host-based IDS (HIDS)/Host-based IPS (HIPS)
Hardened baselines
File integrity
Log and event monitoring
Configuration management
Builds
Operating system (OS) upgrades
Encryption
Mandatory access control
Software firewall
Given a scenario, apply data security and compliance controls in cloud environments.
Encryption
Integrity
Classification
Segmentation
Access control
Impact of laws and regulations
Records management
Data loss prevention (DLP)
Cloud access security broker (CASB)
Given a scenario, implement measures to meet security requirements.
Tools
Vulnerability assessment
Security patches
Risk register
Prioritization of patch application
Deactivate default accounts
Impacts of security tools on systems and services
Effects of cloud service models on security implementation
Explain the importance of incident response procedures.
Preparation
Incident response procedures
Deployment 23%Given a scenario, integrate components into a cloud solution.
Subscription services
Provisioning resources
Application
Deploying virtual machines (VMs) and custom images
Templates
Identity management
Containers
Auto-scaling
Post-deployment validation
Given a scenario, provision storage in cloud environments.
Types
Tiers
Input/output operations per second (IOPS) and read/write
Protocols
Redundant array of inexpensive disks (RAID)
Storage system features
User quotas
Hyperconverged
Software-defined storage (SDS)
Given a scenario, deploy cloud networking solutions.
Services
Virtual private networks (VPNs)
Virtual routing
Network appliances
Virtual private cloud (VPC)
VLAN/VXLAN/GENEVE
Single root input/output virtualization (SR-IOV)
Software-defined network (SDN)
Given a scenario, configure the appropriate compute sizing for a deployment.
Virtualization
Central processing unit (CPU)/ virtual CPU (vCPU)
Graphics processing unit (GPU)
Clock speed/Instructions per cycle (IPC)
Hyperconverged
Memory
Given a scenario, perform cloud migrations.
Physical to virtual (P2V)
Virtual to virtual (V2V)
Cloud-to-cloud migrations
Storage migrations
Database migrations
Operations and Support 22%Given a scenario, configure logging, monitoring, and alerting to maintain operational status.
Logging
Monitoring
Alerting
Given a scenario, maintain efficient operation of a cloud environment.
Confirm completion of backups
Life-cycle management
Change management
Asset management
Patching
Impacts of process improvements on systems
Upgrade methods
Dashboard and reporting
Given a scenario, optimize cloud environments.
Right-sizing
Compute
Storage
Network
Placement
Device drivers and firmware
Given a scenario, apply proper automation and orchestration techniques.
Infrastructure as code
Continuous integration/continuous deployment (CI/CD)
Version control
Configuration management
Containers
Automation activities
Secure scripting
Orchestration sequencing
Given a scenario, perform appropriate backup and restore operations.
Backup types
Backup objects
Backup targets
Backup and restore policies
Restoration methods
Given a scenario, perform disaster recovery tasks.
Failovers
Failback
Restore backups
Replication
Network configurations
On-premises and cloud sites
Requirements
Documentation
Geographical datacenter requirements
Troubleshooting 22%Given a scenario, use the troubleshooting methodology to resolve cloud-related issues.
Always consider corporate policies, procedures, and impacts before implementing changes.
Identify the problem
Establish a theory of probable
Test the theory to determine cause
Establish a plan of action to resolve the problem and implement the solution
Verify full system functionality and, if applicable, implement preventive measures
Document the findings, actions, and outcomes throughout the process.
Given a scenario, troubleshoot security issues.
Privilege
Authentication
Authorization
Security groups
Keys and certificates
Misconfigured or misapplied policies
Data security issues
Exposed endpoints
Misconfigured or failed security appliances
Unsupported protocols
External/internal attacks
Given a scenario, troubleshoot deployment issues.
Connectivity issues
Performance degradation
Configurations
Applications in containers
Misconfigured templates
Missing or incorrect tags
Insufficient capacity
Licensing issues
Vendor-related issues
Given a scenario, troubleshoot connectivity issues.
Network security group misconfigurations
Common networking configuration issues
Network troubleshooting tools
Given a scenario, troubleshoot common performance issues.
Resource utilization
Application
Incorrectly configured or failed load balancing
Given a scenario, troubleshoot automation or orchestration issues.
Account mismatches
Change management failures
Server name changes
IP address changes
Location changes
Version/feature mismatch
Automation tool incompatibility
Job validation issue
Patching failure
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen. Cloud Architecture and Design 13%Compare and contrast the different types of cloud models.
Deployment models
Service models
Advanced cloud services
Shared responsibility model
Explain the factors that contribute to capacity planning.
Requirements
Standard templates
Licensing
User density
System load
Trend analysis
Performance capacity planning
Explain the importance of high availability and scaling in cloud environments.
Hypervisors
Oversubscription
Regions and zones
Applications
Containers
Clusters
High availability of network functions
Avoid single points of failure
Scalability
Given a scenario, analyze the solution design in support of the business requirements.
Requirement analysis
Environments
Testing techniques
Security 20%Given a scenario, configure identity and access management.
Identification and authorization
Directory services
Federation
Certificate management
Multifactor authentication (MFA)
Single sign-on (SSO)
Public key infrastructure (PKI)
Secret management
Key management
Given a scenario, secure a network in a cloud environment.
Network segmentation
Protocols
Network services
Log and event monitoring
Network flows
Hardening and configuration changes
Given a scenario, apply the appropriate OS and application security controls.
Policies
User permissions
Antivirus/anti-malware/endpoint detection and response (EDR)
Host-based IDS (HIDS)/Host-based IPS (HIPS)
Hardened baselines
File integrity
Log and event monitoring
Configuration management
Builds
Operating system (OS) upgrades
Encryption
Mandatory access control
Software firewall
Given a scenario, apply data security and compliance controls in cloud environments.
Encryption
Integrity
Classification
Segmentation
Access control
Impact of laws and regulations
Records management
Data loss prevention (DLP)
Cloud access security broker (CASB)
Given a scenario, implement measures to meet security requirements.
Tools
Vulnerability assessment
Security patches
Risk register
Prioritization of patch application
Deactivate default accounts
Impacts of security tools on systems and services
Effects of cloud service models on security implementation
Explain the importance of incident response procedures.
Preparation
Incident response procedures
Deployment 23%Given a scenario, integrate components into a cloud solution.
Subscription services
Provisioning resources
Application
Deploying virtual machines (VMs) and custom images
Templates
Identity management
Containers
Auto-scaling
Post-deployment validation
Given a scenario, provision storage in cloud environments.
Types
Tiers
Input/output operations per second (IOPS) and read/write
Protocols
Redundant array of inexpensive disks (RAID)
Storage system features
User quotas
Hyperconverged
Software-defined storage (SDS)
Given a scenario, deploy cloud networking solutions.
Services
Virtual private networks (VPNs)
Virtual routing
Network appliances
Virtual private cloud (VPC)
VLAN/VXLAN/GENEVE
Single root input/output virtualization (SR-IOV)
Software-defined network (SDN)
Given a scenario, configure the appropriate compute sizing for a deployment.
Virtualization
Central processing unit (CPU)/ virtual CPU (vCPU)
Graphics processing unit (GPU)
Clock speed/Instructions per cycle (IPC)
Hyperconverged
Memory
Given a scenario, perform cloud migrations.
Physical to virtual (P2V)
Virtual to virtual (V2V)
Cloud-to-cloud migrations
Storage migrations
Database migrations
Operations and Support 22%Given a scenario, configure logging, monitoring, and alerting to maintain operational status.
Logging
Monitoring
Alerting
Given a scenario, maintain efficient operation of a cloud environment.
Confirm completion of backups
Life-cycle management
Change management
Asset management
Patching
Impacts of process improvements on systems
Upgrade methods
Dashboard and reporting
Given a scenario, optimize cloud environments.
Right-sizing
Compute
Storage
Network
Placement
Device drivers and firmware
Given a scenario, apply proper automation and orchestration techniques.
Infrastructure as code
Continuous integration/continuous deployment (CI/CD)
Version control
Configuration management
Containers
Automation activities
Secure scripting
Orchestration sequencing
Given a scenario, perform appropriate backup and restore operations.
Backup types
Backup objects
Backup targets
Backup and restore policies
Restoration methods
Given a scenario, perform disaster recovery tasks.
Failovers
Failback
Restore backups
Replication
Network configurations
On-premises and cloud sites
Requirements
Documentation
Geographical datacenter requirements
Troubleshooting 22%Given a scenario, use the troubleshooting methodology to resolve cloud-related issues.
Always consider corporate policies, procedures, and impacts before implementing changes.
Identify the problem
Establish a theory of probable
Test the theory to determine cause
Establish a plan of action to resolve the problem and implement the solution
Verify full system functionality and, if applicable, implement preventive measures
Document the findings, actions, and outcomes throughout the process.
Given a scenario, troubleshoot security issues.
Privilege
Authentication
Authorization
Security groups
Keys and certificates
Misconfigured or misapplied policies
Data security issues
Exposed endpoints
Misconfigured or failed security appliances
Unsupported protocols
External/internal attacks
Given a scenario, troubleshoot deployment issues.
Connectivity issues
Performance degradation
Configurations
Applications in containers
Misconfigured templates
Missing or incorrect tags
Insufficient capacity
Licensing issues
Vendor-related issues
Given a scenario, troubleshoot connectivity issues.
Network security group misconfigurations
Common networking configuration issues
Network troubleshooting tools
Given a scenario, troubleshoot common performance issues.
Resource utilization
Application
Incorrectly configured or failed load balancing
Given a scenario, troubleshoot automation or orchestration issues.
Account mismatches
Change management failures
Server name changes
IP address changes
Location changes
Version/feature mismatch
Automation tool incompatibility
Job validation issue
Patching failure

€2.395
Klassikaal
max 9
5 dagen
CompTIA-C CompTIA Cloud+ (CV0-003) E-Learning (English)
Tijdens de CompTIA Cloud + training bekijk je cloudgebaseerde infrastructuurdiensten in de context van bredere IT-systeemactiviteiten, ongeacht het platform. Jij leert vaardigheden die nodig zijn voor het implementeren en automatiseren van veilige cloudomgevingen die de hoge beschikbaarheid van bedrijfssystemen en gegevens ondersteunen.
Na afronding van deze training kun je onder andere:
Beveiligen van een netwerk in een cloud omgeving
Maatregelen implementeren om aan de security eisen te voldoen
Uitrollen van cloud networking solutions
CompTIA Cloud+ validates the skills needed to deploy and automate secure cloud environments that support the high availability of business systems and data. CompTIA Cloud+ views cloud-based infrastructure services in the context of broader IT systems operations regardless of the platform. Migrating to the cloud presents opportunities to deploy, optimize, and protect mission critical applications and data storage. CompTIA Cloud+ validates the technical skills needed to secure these valuable assets. The reality of operating multicloud environments poses new challenges. CompTIA Cloud+ is ideal for cloud engineers who need to have expertise across multiple products and systems. CompTIA Cloud+ now features flexible training options including self-paced learning, live online training, custom training and labs to advance the career development of IT professionals in server administration.
Lesmethode
Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet.
Doelgroep
Jobs That Use Cloud+:
Sr. Systems Administrator
Cloud Engineer
Systems Engineer
Sr. Network Administrator
Sr. Network Engineer
Cloud Specialist
Cloud Project Manager
Jobs That Use Cloud+:
Sr. Systems Administrator
Cloud Engineer
Systems Engineer
Sr. Network Administrator
Sr. Network Engineer
Cloud Specialist
Cloud Project Manager
Voorkennis
CompTIA Network+ and Server+ and 2-3 years of experience in systems administration or networking.CompTIA Network+ and Server+ and 2-3 years of experience in systems administration or networking.
Onderdelen
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen. Cloud Architecture and Design 13%Compare and contrast the different types of cloud models.
Deployment models
Service models
Advanced cloud services
Shared responsibility model
Explain the factors that contribute to capacity planning.
Requirements
Standard templates
Licensing
User density
System load
Trend analysis
Performance capacity planning
Explain the importance of high availability and scaling in cloud environments.
Hypervisors
Oversubscription
Regions and zones
Applications
Containers
Clusters
High availability of network functions
Avoid single points of failure
Scalability
Given a scenario, analyze the solution design in support of the business requirements.
Requirement analysis
Environments
Testing techniques
Security 20%Given a scenario, configure identity and access management.
Identification and authorization
Directory services
Federation
Certificate management
Multifactor authentication (MFA)
Single sign-on (SSO)
Public key infrastructure (PKI)
Secret management
Key management
Given a scenario, secure a network in a cloud environment.
Network segmentation
Protocols
Network services
Log and event monitoring
Network flows
Hardening and configuration changes
Given a scenario, apply the appropriate OS and application security controls.
Policies
User permissions
Antivirus/anti-malware/endpoint detection and response (EDR)
Host-based IDS (HIDS)/Host-based IPS (HIPS)
Hardened baselines
File integrity
Log and event monitoring
Configuration management
Builds
Operating system (OS) upgrades
Encryption
Mandatory access control
Software firewall
Given a scenario, apply data security and compliance controls in cloud environments.
Encryption
Integrity
Classification
Segmentation
Access control
Impact of laws and regulations
Records management
Data loss prevention (DLP)
Cloud access security broker (CASB)
Given a scenario, implement measures to meet security requirements.
Tools
Vulnerability assessment
Security patches
Risk register
Prioritization of patch application
Deactivate default accounts
Impacts of security tools on systems and services
Effects of cloud service models on security implementation
Explain the importance of incident response procedures.
Preparation
Incident response procedures
Deployment 23%Given a scenario, integrate components into a cloud solution.
Subscription services
Provisioning resources
Application
Deploying virtual machines (VMs) and custom images
Templates
Identity management
Containers
Auto-scaling
Post-deployment validation
Given a scenario, provision storage in cloud environments.
Types
Tiers
Input/output operations per second (IOPS) and read/write
Protocols
Redundant array of inexpensive disks (RAID)
Storage system features
User quotas
Hyperconverged
Software-defined storage (SDS)
Given a scenario, deploy cloud networking solutions.
Services
Virtual private networks (VPNs)
Virtual routing
Network appliances
Virtual private cloud (VPC)
VLAN/VXLAN/GENEVE
Single root input/output virtualization (SR-IOV)
Software-defined network (SDN)
Given a scenario, configure the appropriate compute sizing for a deployment.
Virtualization
Central processing unit (CPU)/ virtual CPU (vCPU)
Graphics processing unit (GPU)
Clock speed/Instructions per cycle (IPC)
Hyperconverged
Memory
Given a scenario, perform cloud migrations.
Physical to virtual (P2V)
Virtual to virtual (V2V)
Cloud-to-cloud migrations
Storage migrations
Database migrations
Operations and Support 22%Given a scenario, configure logging, monitoring, and alerting to maintain operational status.
Logging
Monitoring
Alerting
Given a scenario, maintain efficient operation of a cloud environment.
Confirm completion of backups
Life-cycle management
Change management
Asset management
Patching
Impacts of process improvements on systems
Upgrade methods
Dashboard and reporting
Given a scenario, optimize cloud environments.
Right-sizing
Compute
Storage
Network
Placement
Device drivers and firmware
Given a scenario, apply proper automation and orchestration techniques.
Infrastructure as code
Continuous integration/continuous deployment (CI/CD)
Version control
Configuration management
Containers
Automation activities
Secure scripting
Orchestration sequencing
Given a scenario, perform appropriate backup and restore operations.
Backup types
Backup objects
Backup targets
Backup and restore policies
Restoration methods
Given a scenario, perform disaster recovery tasks.
Failovers
Failback
Restore backups
Replication
Network configurations
On-premises and cloud sites
Requirements
Documentation
Geographical datacenter requirements
Troubleshooting 22%Given a scenario, use the troubleshooting methodology to resolve cloud-related issues.
Always consider corporate policies, procedures, and impacts before implementing changes.
Identify the problem
Establish a theory of probable
Test the theory to determine cause
Establish a plan of action to resolve the problem and implement the solution
Verify full system functionality and, if applicable, implement preventive measures
Document the findings, actions, and outcomes throughout the process.
Given a scenario, troubleshoot security issues.
Privilege
Authentication
Authorization
Security groups
Keys and certificates
Misconfigured or misapplied policies
Data security issues
Exposed endpoints
Misconfigured or failed security appliances
Unsupported protocols
External/internal attacks
Given a scenario, troubleshoot deployment issues.
Connectivity issues
Performance degradation
Configurations
Applications in containers
Misconfigured templates
Missing or incorrect tags
Insufficient capacity
Licensing issues
Vendor-related issues
Given a scenario, troubleshoot connectivity issues.
Network security group misconfigurations
Common networking configuration issues
Network troubleshooting tools
Given a scenario, troubleshoot common performance issues.
Resource utilization
Application
Incorrectly configured or failed load balancing
Given a scenario, troubleshoot automation or orchestration issues.
Account mismatches
Change management failures
Server name changes
IP address changes
Location changes
Version/feature mismatch
Automation tool incompatibility
Job validation issue
Patching failure
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen. Cloud Architecture and Design 13%Compare and contrast the different types of cloud models.
Deployment models
Service models
Advanced cloud services
Shared responsibility model
Explain the factors that contribute to capacity planning.
Requirements
Standard templates
Licensing
User density
System load
Trend analysis
Performance capacity planning
Explain the importance of high availability and scaling in cloud environments.
Hypervisors
Oversubscription
Regions and zones
Applications
Containers
Clusters
High availability of network functions
Avoid single points of failure
Scalability
Given a scenario, analyze the solution design in support of the business requirements.
Requirement analysis
Environments
Testing techniques
Security 20%Given a scenario, configure identity and access management.
Identification and authorization
Directory services
Federation
Certificate management
Multifactor authentication (MFA)
Single sign-on (SSO)
Public key infrastructure (PKI)
Secret management
Key management
Given a scenario, secure a network in a cloud environment.
Network segmentation
Protocols
Network services
Log and event monitoring
Network flows
Hardening and configuration changes
Given a scenario, apply the appropriate OS and application security controls.
Policies
User permissions
Antivirus/anti-malware/endpoint detection and response (EDR)
Host-based IDS (HIDS)/Host-based IPS (HIPS)
Hardened baselines
File integrity
Log and event monitoring
Configuration management
Builds
Operating system (OS) upgrades
Encryption
Mandatory access control
Software firewall
Given a scenario, apply data security and compliance controls in cloud environments.
Encryption
Integrity
Classification
Segmentation
Access control
Impact of laws and regulations
Records management
Data loss prevention (DLP)
Cloud access security broker (CASB)
Given a scenario, implement measures to meet security requirements.
Tools
Vulnerability assessment
Security patches
Risk register
Prioritization of patch application
Deactivate default accounts
Impacts of security tools on systems and services
Effects of cloud service models on security implementation
Explain the importance of incident response procedures.
Preparation
Incident response procedures
Deployment 23%Given a scenario, integrate components into a cloud solution.
Subscription services
Provisioning resources
Application
Deploying virtual machines (VMs) and custom images
Templates
Identity management
Containers
Auto-scaling
Post-deployment validation
Given a scenario, provision storage in cloud environments.
Types
Tiers
Input/output operations per second (IOPS) and read/write
Protocols
Redundant array of inexpensive disks (RAID)
Storage system features
User quotas
Hyperconverged
Software-defined storage (SDS)
Given a scenario, deploy cloud networking solutions.
Services
Virtual private networks (VPNs)
Virtual routing
Network appliances
Virtual private cloud (VPC)
VLAN/VXLAN/GENEVE
Single root input/output virtualization (SR-IOV)
Software-defined network (SDN)
Given a scenario, configure the appropriate compute sizing for a deployment.
Virtualization
Central processing unit (CPU)/ virtual CPU (vCPU)
Graphics processing unit (GPU)
Clock speed/Instructions per cycle (IPC)
Hyperconverged
Memory
Given a scenario, perform cloud migrations.
Physical to virtual (P2V)
Virtual to virtual (V2V)
Cloud-to-cloud migrations
Storage migrations
Database migrations
Operations and Support 22%Given a scenario, configure logging, monitoring, and alerting to maintain operational status.
Logging
Monitoring
Alerting
Given a scenario, maintain efficient operation of a cloud environment.
Confirm completion of backups
Life-cycle management
Change management
Asset management
Patching
Impacts of process improvements on systems
Upgrade methods
Dashboard and reporting
Given a scenario, optimize cloud environments.
Right-sizing
Compute
Storage
Network
Placement
Device drivers and firmware
Given a scenario, apply proper automation and orchestration techniques.
Infrastructure as code
Continuous integration/continuous deployment (CI/CD)
Version control
Configuration management
Containers
Automation activities
Secure scripting
Orchestration sequencing
Given a scenario, perform appropriate backup and restore operations.
Backup types
Backup objects
Backup targets
Backup and restore policies
Restoration methods
Given a scenario, perform disaster recovery tasks.
Failovers
Failback
Restore backups
Replication
Network configurations
On-premises and cloud sites
Requirements
Documentation
Geographical datacenter requirements
Troubleshooting 22%Given a scenario, use the troubleshooting methodology to resolve cloud-related issues.
Always consider corporate policies, procedures, and impacts before implementing changes.
Identify the problem
Establish a theory of probable
Test the theory to determine cause
Establish a plan of action to resolve the problem and implement the solution
Verify full system functionality and, if applicable, implement preventive measures
Document the findings, actions, and outcomes throughout the process.
Given a scenario, troubleshoot security issues.
Privilege
Authentication
Authorization
Security groups
Keys and certificates
Misconfigured or misapplied policies
Data security issues
Exposed endpoints
Misconfigured or failed security appliances
Unsupported protocols
External/internal attacks
Given a scenario, troubleshoot deployment issues.
Connectivity issues
Performance degradation
Configurations
Applications in containers
Misconfigured templates
Missing or incorrect tags
Insufficient capacity
Licensing issues
Vendor-related issues
Given a scenario, troubleshoot connectivity issues.
Network security group misconfigurations
Common networking configuration issues
Network troubleshooting tools
Given a scenario, troubleshoot common performance issues.
Resource utilization
Application
Incorrectly configured or failed load balancing
Given a scenario, troubleshoot automation or orchestration issues.
Account mismatches
Change management failures
Server name changes
IP address changes
Location changes
Version/feature mismatch
Automation tool incompatibility
Job validation issue
Patching failure

€690
E-Learning
max 9
0 dagen
CompTIA-ITF CompTIA IT Fundamentals (ITF+) (FC0-U61) Active Learning (English)
Nieuwegein
ma 7 jul. 2025
en 9 andere data
Volg de training CompTIA IT Fundamentals en kom erachter of de IT wereld iets voor je is! ITF+ is de enige certificering die alle gebieden van IT dekt, waardoor je een breder begrip van IT krijgt. Hierdoor is deze training ideaal voor niet-technische professionals.
Na afronding van deze training kun je onder andere:
Een draadloos netwerk instellen en beveiligen
Verschillende categorieën programmeertalen onderscheiden en herkennen
Databaseconcepten en -structuren uitleggen
Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels).
CompTIA ITF+ helps professionals to decide if a career in IT is right for them or to develop a broader understanding of IT.
ITF+ is the only pre-career certification that helps students or career changers determine if they have a competency for information technology and if it is the right career path for them.
ITF+ is the only single certification that covers all areas of IT foundations, creating a broader understanding of IT making it ideal for non-technical professionals.
ITF+ establishes an IT education framework for students in secondary and post-secondary settings.
Lesmethode
Bij Master IT train je met onze unieke lesmethode Active Learning, hiermee leer je aantoonbaar effectiever!
Wij zjn er namelijk van overtuigd dat je slimmer en met meer plezier leert als je actief met je lesstof omgaat. Onze klassen zijn gevuld met maximaal 8 cursisten. Hierbij luister je niet passief naar een trainer, maar ga je interactief en 1-op-1 met de trainer aan de slag om ervoor te zorgen dat jouw leerdoelen behaald worden. De theorie maak je je zoveel mogelijk zelf eigen, de nadruk van de begeleiding ligt op het begrijpen en toepassen van die theorie in de praktijk. Zo leer je alleen datgene wat je echt nodig hebt.
Je bepaalt zelf je leertempo.
De trainer coacht je bij het definiëren van jouw leertraject.
Je onthoudt en begrijpt je nieuwe kennis beter.
Alles draait om toepassing van de stof in jouw praktijk.
Om alle beschikbare trainingsdata in te zien, bekijk dan onze eigen website
Doelgroep
Students considering a career in IT.
Professionals working in fields that require a broad understanding of IT.
Marketing, sales and operations staff in IT-based organizations.
Students considering a career in IT.
Professionals working in fields that require a broad understanding of IT.
Marketing, sales and operations staff in IT-based organizations.
Voorkennis
No prior experience necessaryNo prior experience necessary
Onderdelen
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.1 Core Hardware Components2 Peripherals and Connectors3 Computing Devices and the Internet of Things4 Operating Systems5 Software Applications6 Software Development7 Database Fundamentals8 Networking Concepts and Technologies9 Security Concepts and Threats10 Security Best Practices11 Business Continuity and Customer SupportHet lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.1 Core Hardware Components2 Peripherals and Connectors3 Computing Devices and the Internet of Things4 Operating Systems5 Software Applications6 Software Development7 Database Fundamentals8 Networking Concepts and Technologies9 Security Concepts and Threats10 Security Best Practices11 Business Continuity and Customer Support

€2.195
Klassikaal
max 9
4 dagen
CompTIA-ITF CompTIA IT Fundamentals (ITF+) (FC0-U61) E-Learning (English)
Volg de training CompTIA IT Fundamentals en kom erachter of de IT wereld iets voor je is! ITF+ is de enige certificering die alle gebieden van IT dekt, waardoor je een breder begrip van IT krijgt. Hierdoor is deze training ideaal voor niet-technische professionals.
Na afronding van deze training kun je onder andere:
Een draadloos netwerk instellen en beveiligen
Verschillende categorieën programmeertalen onderscheiden en herkennen
Databaseconcepten en -structuren uitleggen
CompTIA ITF+ helps professionals to decide if a career in IT is right for them or to develop a broader understanding of IT.
ITF+ is the only pre-career certification that helps students or career changers determine if they have a competency for information technology and if it is the right career path for them.
ITF+ is the only single certification that covers all areas of IT foundations, creating a broader understanding of IT making it ideal for non-technical professionals.
ITF+ establishes an IT education framework for students in secondary and post-secondary settings.
Lesmethode
Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet.
Doelgroep
Students considering a career in IT.
Professionals working in fields that require a broad understanding of IT.
Marketing, sales and operations staff in IT-based organizations.
Students considering a career in IT.
Professionals working in fields that require a broad understanding of IT.
Marketing, sales and operations staff in IT-based organizations.
Voorkennis
No prior experience necessaryNo prior experience necessary
Onderdelen
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.1 Core Hardware Components2 Peripherals and Connectors3 Computing Devices and the Internet of Things4 Operating Systems5 Software Applications6 Software Development7 Database Fundamentals8 Networking Concepts and Technologies9 Security Concepts and Threats10 Security Best Practices11 Business Continuity and Customer SupportHet lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.1 Core Hardware Components2 Peripherals and Connectors3 Computing Devices and the Internet of Things4 Operating Systems5 Software Applications6 Software Development7 Database Fundamentals8 Networking Concepts and Technologies9 Security Concepts and Threats10 Security Best Practices11 Business Continuity and Customer Support

€690
E-Learning
max 9
0 dagen
CompTIA-L CompTIA Linux+ E-learning (XK0-005) (English)
Volg de CompTIA Linux+ E-learning bij Master IT! De nieuwe CompTIA Linux+ is voor de IT-professional die Linux zal gebruiken om alles te beheren, van auto's en smartphones tot servers en supercomputers, aangezien een groot aantal ondernemingen Linux gebruiken in cloud-, cyberbeveiligings-, mobiele en webbeheertoepassingen.
Na afronding van deze training kun je onder andere:
Configureer systemen met of zonder externe randapparatuur zoals toetsenborden
Commandos geven aan de bootloader en opties aan de kernel tijdens het opstarten
Processen op de juiste manier beëindigen
The new CompTIA Linux+ is for the IT pro who will use Linux to manage everything from cars and smartphones to servers and supercomputers, as a vast number of enterprises use Linux in cloud, cybersecurity, mobile and web administration applications.In the new CompTIA Linux+, candidates are only required to pass one exam for certification. However, the new certification is no longer eligible for the LPI 2-for-1 offer.
CompTIA Linux+ is the only job-focused Linux certification covering the latest foundational skills demanded by hiring managers.
Unlike other certifications, the new exam includes performance-based and multiple-choice questions to identify the employees who can do the job.
The exam covers tasks associated with all major distributions of Linux, setting the foundation for advanced vendor/distro-specific knowledge.
CompTIA Linux+ covers common tasks in major distributions of Linux, including the Linux command line, basic maintenance, installing and configuring workstations, and networking.
Lesmethode
Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet.
Doelgroep
Jobs that use CompTIA Linux+:
Linux Administrator
Network Administrator
Technical Support Specialist
Web Administrator
Systems Administrator
Jobs that use CompTIA Linux+:
Linux Administrator
Network Administrator
Technical Support Specialist
Web Administrator
Systems Administrator
Voorkennis
CompTIA A+, CompTIA Network+ and 12 months of Linux admin experienceCompTIA A+, CompTIA Network+ and 12 months of Linux admin experience
Onderdelen
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen. System Architecture 14%Determine and configure hardware settings.
Enable and disable integrated peripherals
Configure systems with or without external peripherals such as keyboards
Differentiate between the various types of mass storage devices
Know the differences between coldplug and hotplug devices
Determine hardware resources for devices
Tools and utilities to list various hardware information (e.g., Isusb, lspci)
ools and utilities to manipulate USB devices
Conceptual understanding of sysfs, udev, dbus
Boot the system
Provide common commands to the boot loader and options to the kernel at boot time
Demonstrate knowledge of the boot sequence from BIOS to boot completion
Understanding of SysVinit and systemd
Awareness of Upstart
Check boot events in the log file
Change runlevels/boot targets and shutdown or reboot system.
Set the default runlevel or boot target
Change between runlevels/boot targets including single user mode
Shutdown and reboot from the command line
Alert users before switching runlevels/ boot targets or other major system events
Properly terminate processes
Linux Installation and Package Management 18%Design hard disk layout.
Allocate filesystems and swap space to separate partitions or disks
Tailor the design to the intended use of the system
Ensure the /boot partition conforms to the hardware architecture requirements for booting
Knowledge of basic features of LVM
Install a boot manager.
Providing alternative boot locations and backup boot options
Install and configure a boot loader such as GRUB Legacy
Perform basic configuration changes for GRUB 2
Interact with the boot loader
Manage shared libraries.
Identify shared libraries
Identify the typical locations of system libraries
Load shared libraries
Use Debian package management.
Install, upgrade and uninstall Debian binary packages
Find packages containing specific files or libraries that may or may not be installed
Obtain package information such as version, content, dependencies, package integrity and installation status (whether or not the package is installed)
Use RPM and YUM package management.
Install, re-install, upgrade and remove packages using RPM and YUM
Obtain information on RPM packages such as version, status, dependencies, integrity and signatures
Determine what files a package provides, as well as find which package a specific file comes from
GNU and Unix Commands 43%Work on the command line.
Use single shell commands and one line command sequences to perform basic tasks on the command line
Use and modify the shell environment including defining, referencing and exporting environment variables
Use and edit command history
Invoke commands inside and outside the defined path
Process text streams using filters.
Send text files and output streams through text utility filters to modify the output using standard UNIX commands found in the GNU textutils package
Perform basic file management.
Copy, move and remove files and directories individually
Copy multiple files and directories recursively
Remove files and directories recursively
Use simple and advanced wildcard specifications in commands
Use find to locate and act on files based on type, size or time
Usage of tar, cpio and dd
Use streams, pipes and redirects.
Redirecting standard input, standard output and standard error
Pipe the output of one command to the input of another command
Use the output of one command as arguments to another command
Send output to both stdout and a file
Create, monitor and kill processes.
Run jobs in the foreground and background
Signal a program to continue running after logout
Monitor active processes
Select and sort processes for display
Send signals to processes
Modify process execution priorities.
Know the default priority of a job that is created
Run a program with higher or lower priority than the default
Change the priority of a running process
Search text files using regular expressions.
Create simple regular expressions containing several notational elements
Use regular expression tools to perform searches through a filesystem or file content
Perform basic file editing operations using vi.
Navigate a document using vi
Use basic vi modes
Insert, edit, delete, copy and find text
Devices, Linux Filesystems and Filesystem Hierarchy Standard 25%Create partitions and filesystems.
Manage MBR partition tables
Use various mkfs commands to create various filesystems such as:
ext2/ext3/ext4
XFS
VFAT
Awareness of ReiserFS and Btrfs
Basic knowledge of gdisk and parted with GPT
Maintain the integrity of filesystems.
Verify the integrity of filesystems
Monitor free space and inodes
Repair simple filesystem problems
Control mounting and unmounting of filesystems.
Manually mount and unmount filesystems
Configure filesystem mounting on bootup
Configure user mountable removeable filesystems
Manage disk quotas.
Set up a disk quota for a filesystem
Edit, check and generate user quota reports
Manage file permissions and ownership.
Manage access permissions on regular and special files as well as directories
Use access modes such as suid, sgid and the sticky bit to maintain security
Know how to change the file creation mask
Use the group field to grant file access to group members
Create and change hard and symbolic links.
Create links
Identify hard and/or soft links
Copying versus linking files
Use links to support system administration tasks
Find system files and place files in the correct location.
Understand the correct locations of files under the FHS
Find files and commands on a Linux system
Know the location and propose of important file and directories as defined in the FHS
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen. System Architecture 14%Determine and configure hardware settings.
Enable and disable integrated peripherals
Configure systems with or without external peripherals such as keyboards
Differentiate between the various types of mass storage devices
Know the differences between coldplug and hotplug devices
Determine hardware resources for devices
Tools and utilities to list various hardware information (e.g., Isusb, lspci)
ools and utilities to manipulate USB devices
Conceptual understanding of sysfs, udev, dbus
Boot the system
Provide common commands to the boot loader and options to the kernel at boot time
Demonstrate knowledge of the boot sequence from BIOS to boot completion
Understanding of SysVinit and systemd
Awareness of Upstart
Check boot events in the log file
Change runlevels/boot targets and shutdown or reboot system.
Set the default runlevel or boot target
Change between runlevels/boot targets including single user mode
Shutdown and reboot from the command line
Alert users before switching runlevels/ boot targets or other major system events
Properly terminate processes
Linux Installation and Package Management 18%Design hard disk layout.
Allocate filesystems and swap space to separate partitions or disks
Tailor the design to the intended use of the system
Ensure the /boot partition conforms to the hardware architecture requirements for booting
Knowledge of basic features of LVM
Install a boot manager.
Providing alternative boot locations and backup boot options
Install and configure a boot loader such as GRUB Legacy
Perform basic configuration changes for GRUB 2
Interact with the boot loader
Manage shared libraries.
Identify shared libraries
Identify the typical locations of system libraries
Load shared libraries
Use Debian package management.
Install, upgrade and uninstall Debian binary packages
Find packages containing specific files or libraries that may or may not be installed
Obtain package information such as version, content, dependencies, package integrity and installation status (whether or not the package is installed)
Use RPM and YUM package management.
Install, re-install, upgrade and remove packages using RPM and YUM
Obtain information on RPM packages such as version, status, dependencies, integrity and signatures
Determine what files a package provides, as well as find which package a specific file comes from
GNU and Unix Commands 43%Work on the command line.
Use single shell commands and one line command sequences to perform basic tasks on the command line
Use and modify the shell environment including defining, referencing and exporting environment variables
Use and edit command history
Invoke commands inside and outside the defined path
Process text streams using filters.
Send text files and output streams through text utility filters to modify the output using standard UNIX commands found in the GNU textutils package
Perform basic file management.
Copy, move and remove files and directories individually
Copy multiple files and directories recursively
Remove files and directories recursively
Use simple and advanced wildcard specifications in commands
Use find to locate and act on files based on type, size or time
Usage of tar, cpio and dd
Use streams, pipes and redirects.
Redirecting standard input, standard output and standard error
Pipe the output of one command to the input of another command
Use the output of one command as arguments to another command
Send output to both stdout and a file
Create, monitor and kill processes.
Run jobs in the foreground and background
Signal a program to continue running after logout
Monitor active processes
Select and sort processes for display
Send signals to processes
Modify process execution priorities.
Know the default priority of a job that is created
Run a program with higher or lower priority than the default
Change the priority of a running process
Search text files using regular expressions.
Create simple regular expressions containing several notational elements
Use regular expression tools to perform searches through a filesystem or file content
Perform basic file editing operations using vi.
Navigate a document using vi
Use basic vi modes
Insert, edit, delete, copy and find text
Devices, Linux Filesystems and Filesystem Hierarchy Standard 25%Create partitions and filesystems.
Manage MBR partition tables
Use various mkfs commands to create various filesystems such as:
ext2/ext3/ext4
XFS
VFAT
Awareness of ReiserFS and Btrfs
Basic knowledge of gdisk and parted with GPT
Maintain the integrity of filesystems.
Verify the integrity of filesystems
Monitor free space and inodes
Repair simple filesystem problems
Control mounting and unmounting of filesystems.
Manually mount and unmount filesystems
Configure filesystem mounting on bootup
Configure user mountable removeable filesystems
Manage disk quotas.
Set up a disk quota for a filesystem
Edit, check and generate user quota reports
Manage file permissions and ownership.
Manage access permissions on regular and special files as well as directories
Use access modes such as suid, sgid and the sticky bit to maintain security
Know how to change the file creation mask
Use the group field to grant file access to group members
Create and change hard and symbolic links.
Create links
Identify hard and/or soft links
Copying versus linking files
Use links to support system administration tasks
Find system files and place files in the correct location.
Understand the correct locations of files under the FHS
Find files and commands on a Linux system
Know the location and propose of important file and directories as defined in the FHS

€690
E-Learning
max 9
0 dagen
CompTIA-N CompTIA Network+ (N10-009) Active Learning (English)
Nieuwegein
ma 7 jul. 2025
en 9 andere data
Volg de CompTIA Network+ training en leer de fundamentele principes van het instelleren, configureren en troubleshooten van netwerk technologieën
Na afronding van deze training kun je onder andere:
De features van verschillende netwerk protocollen en producten voor LANs, WANs en draadloze netwerken beschrijven
Netwerk bedreigingen en toepasselijke tegenmaatregelen identificeren
Netwerken managen, monitoren en troubleshooten
Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels).
Deze training is ontworpen voor cursisten die de CompTIA Network+ certificering willen behalen. Deze certificering is op foundation-level en bedoeld voor IT professionals met ongeveer 1 jaar werkervaring met netwerkbeheer.
Dit examen bevestigd dat de cursist over de kennis en vaardigheden beschikt die vereist zijn om veelvoorkomende netwerk apparaten te troubleshooten, configureren en managen; netwerk connectiviteit tot stand te brengen; netwerk documentatie begrijpen en onderhouden; en netwerk security, standaarden en protocollen te implementeren. De cursist zal bedrijfstechnologieën leren begrijpen op basisniveau, waaronder cloud en virtualisatie technologieën.
Deze training leert je de fundamentele principes van het instelleren, configureren en troubleshooten van netwerk technologieën en helpt je verder te komen in je carrière als netwerkbeheerder. Het bereid je voor op het CompTIA Network+ N10-007 examen door 100% van de doelstellingen en content voorbeelden die in de syllabus staan te behandelen. Het deelnemen aan de training kan ook helpen voorbereiden op vendor-specific technical support kwalificaties en basis fungeren voor de meer geavanceerde trainingen.
Na het afronden van de training kun je:
De features van verschillende netwerk protocollen en producten voor LANs, WANs en draadloze netwerken beschrijven.
De features en functies van TCP/IP adressing en protocollen begrijpen.
Netwerk bedreigingen en toepasselijke tegenmaatregelen identificeren.
Netwerk bekabeling en toepassingen installeren en configureren.
Netwerken managen, monitoren en troubleshooten.
Lesmethode
Bij Master IT train je met onze unieke lesmethode Active Learning, hiermee leer je aantoonbaar effectiever!
Wij zjn er namelijk van overtuigd dat je slimmer en met meer plezier leert als je actief met je lesstof omgaat. Onze klassen zijn gevuld met maximaal 8 cursisten. Hierbij luister je niet passief naar een trainer, maar ga je interactief en 1-op-1 met de trainer aan de slag om ervoor te zorgen dat jouw leerdoelen behaald worden. De theorie maak je je zoveel mogelijk zelf eigen, de nadruk van de begeleiding ligt op het begrijpen en toepassen van die theorie in de praktijk. Zo leer je alleen datgene wat je echt nodig hebt.
Je bepaalt zelf je leertempo.
De trainer coacht je bij het definiëren van jouw leertraject.
Je onthoudt en begrijpt je nieuwe kennis beter.
Alles draait om toepassing van de stof in jouw praktijk.
Om alle beschikbare trainingsdata in te zien, bekijk dan onze eigen website
Doelgroep
CompTIA Network+ is de eerste certificering die IT professionals gespecialiseerd in netwerkbeheer en support zouden moeten behalen. Network+ is gericht op IT professionals met als functie netwerkbeheerder, netwerk techneuten, mensen verantwoordelijk voor het installeren van een netwerk, help desk techneuten en mensen belast met het installeren van IT kabels.CompTIA Network+ is de eerste certificering die IT professionals gespecialiseerd in netwerkbeheer en support zouden moeten behalen. Network+ is gericht op IT professionals met als functie netwerkbeheerder, netwerk techneuten, mensen verantwoordelijk voor het installeren van een netwerk, help desk techneuten en mensen belast met het installeren van IT kabels.
Voorkennis
Voor het volgen van deze training dien je te beschikken over een behaalde A+ certificering en/of 9 tot 12 maanden ervaring met IT beheer. Het is niet nodig om de A+ certificering te behalen voor je deze training gaat volgen, maar het wordt wel aangeraden. Het wordt vooral aangeraden dat je voor het volgen van deze training beschikt over:
Kennis van het configureren en supporten van PCs, laptops, mobiele apparaten (smartphones/tablets) en printers.
Kennis hebben van basis netwerk terminologieën en functies (zoals Ethernet, TCP/IP, switches en routers).
Vaardigheden in het configureren en managen van gebruikers, groepen en gedeelde resources in een simpel SOHO netwerk.
De werking van basic access control mesures begrijpen, zoals authenticatie, security policy, encryptie en firewalls.
Voor het volgen van deze training dien je te beschikken over een behaalde A+ certificering en/of 9 tot 12 maanden ervaring met IT beheer. Het is niet nodig om de A+ certificering te behalen voor je deze training gaat volgen, maar het wordt wel aangeraden. Het wordt vooral aangeraden dat je voor het volgen van deze training beschikt over:
Kennis van het configureren en supporten van PCs, laptops, mobiele apparaten (smartphones/tablets) en printers.
Kennis hebben van basis netwerk terminologieën en functies (zoals Ethernet, TCP/IP, switches en routers).
Vaardigheden in het configureren en managen van gebruikers, groepen en gedeelde resources in een simpel SOHO netwerk.
De werking van basic access control mesures begrijpen, zoals authenticatie, security policy, encryptie en firewalls.
Onderdelen
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kan voorbereiden op het examen. Lesson 1: Introduction to NetworksLesson 2: The Open Systems Interconnection (OSI) Reference ModelLesson 3: Networking Connectors and Wiring StandardsLesson 4: The Current Ethernet SpecificationsLesson 5: Networking Devices Lesson 6: Introduction to the Internet ProtocolLesson 7: IP AddressingLesson 8: IP Subnetting, Troubleshooting IP, and introduction to NATLesson 9: Introduction to IP RoutingLesson 10: Routing Protocols Lesson 11: Switching and Virtual LANsLesson 12: Wireless NetworkingLesson 13: Remote Network AccesLesson 14: Using Statistics and Sensors to Ensure Network AvailabilityLesson 15: Organizational Documents and PoliciesLesson 16: High Availability and Disaster Recovery Lesson 17: Data Center Architecture and Cloud ConceptsLesson 18: Network Troubleshooting MethodologyLesson 19: Network Software Tools and CommandsLesson 20: Network Security Concepts Lesson 21: Common Types of AttackHet lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kan voorbereiden op het examen. Lesson 1: Introduction to NetworksLesson 2: The Open Systems Interconnection (OSI) Reference ModelLesson 3: Networking Connectors and Wiring StandardsLesson 4: The Current Ethernet SpecificationsLesson 5: Networking Devices Lesson 6: Introduction to the Internet ProtocolLesson 7: IP AddressingLesson 8: IP Subnetting, Troubleshooting IP, and introduction to NATLesson 9: Introduction to IP RoutingLesson 10: Routing Protocols Lesson 11: Switching and Virtual LANsLesson 12: Wireless NetworkingLesson 13: Remote Network AccesLesson 14: Using Statistics and Sensors to Ensure Network AvailabilityLesson 15: Organizational Documents and PoliciesLesson 16: High Availability and Disaster Recovery Lesson 17: Data Center Architecture and Cloud ConceptsLesson 18: Network Troubleshooting MethodologyLesson 19: Network Software Tools and CommandsLesson 20: Network Security Concepts Lesson 21: Common Types of Attack

€2.395
Klassikaal
max 9
5 dagen
CompTIA-N CompTIA Network+ (N10-009) E-Learning (English)
Volg de CompTIA Network+ training en leer de fundamentele principes van het instelleren, configureren en troubleshooten van netwerk technologieën
Na afronding van deze training kun je onder andere:
De features van verschillende netwerk protocollen en producten voor LANs, WANs en draadloze netwerken beschrijven
Netwerk bedreigingen en toepasselijke tegenmaatregelen identificeren
Netwerken managen, monitoren en troubleshooten
Deze training is ontworpen voor cursisten die de CompTIA Network+ certificering willen behalen. Deze certificering is op foundation-level en bedoeld voor IT professionals met ongeveer 1 jaar werkervaring met netwerkbeheer.
Dit examen bevestigd dat de cursist over de kennis en vaardigheden beschikt die vereist zijn om veelvoorkomende netwerk apparaten te troubleshooten, configureren en managen; netwerk connectiviteit tot stand te brengen; netwerk documentatie begrijpen en onderhouden; en netwerk security, standaarden en protocollen te implementeren. De cursist zal bedrijfstechnologieën leren begrijpen op basisniveau, waaronder cloud en virtualisatie technologieën.
Deze training leert je de fundamentele principes van het instelleren, configureren en troubleshooten van netwerk technologieën en helpt je verder te komen in je carrière als netwerkbeheerder. Het bereid je voor op het CompTIA Network+ N10-007 examen door 100% van de doelstellingen en content voorbeelden die in de syllabus staan te behandelen. Het deelnemen aan de training kan ook helpen voorbereiden op vendor-specific technical support kwalificaties en basis fungeren voor de meer geavanceerde trainingen.
Na het afronden van de training kun je:
De features van verschillende netwerk protocollen en producten voor LANs, WANs en draadloze netwerken beschrijven.
De features en functies van TCP/IP adressing en protocollen begrijpen.
Netwerk bedreigingen en toepasselijke tegenmaatregelen identificeren.
Netwerk bekabeling en toepassingen installeren en configureren.
Netwerken managen, monitoren en troubleshooten.
Lesmethode
Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet.
Doelgroep
CompTIA Network+ is de eerste certificering die IT professionals gespecialiseerd in netwerkbeheer en support zouden moeten behalen. Network+ is gericht op IT professionals met als functie netwerkbeheerder, netwerk techneuten, mensen verantwoordelijk voor het installeren van een netwerk, help desk techneuten en mensen belast met het installeren van IT kabels.CompTIA Network+ is de eerste certificering die IT professionals gespecialiseerd in netwerkbeheer en support zouden moeten behalen. Network+ is gericht op IT professionals met als functie netwerkbeheerder, netwerk techneuten, mensen verantwoordelijk voor het installeren van een netwerk, help desk techneuten en mensen belast met het installeren van IT kabels.
Voorkennis
Voor het volgen van deze training dien je te beschikken over een behaalde A+ certificering en/of 9 tot 12 maanden ervaring met IT beheer. Het is niet nodig om de A+ certificering te behalen voor je deze training gaat volgen, maar het wordt wel aangeraden. Het wordt vooral aangeraden dat je voor het volgen van deze training beschikt over:
Kennis van het configureren en supporten van PCs, laptops, mobiele apparaten (smartphones/tablets) en printers.
Kennis hebben van basis netwerk terminologieën en functies (zoals Ethernet, TCP/IP, switches en routers).
Vaardigheden in het configureren en managen van gebruikers, groepen en gedeelde resources in een simpel SOHO netwerk.
De werking van basic access control mesures begrijpen, zoals authenticatie, security policy, encryptie en firewalls.
Voor het volgen van deze training dien je te beschikken over een behaalde A+ certificering en/of 9 tot 12 maanden ervaring met IT beheer. Het is niet nodig om de A+ certificering te behalen voor je deze training gaat volgen, maar het wordt wel aangeraden. Het wordt vooral aangeraden dat je voor het volgen van deze training beschikt over:
Kennis van het configureren en supporten van PCs, laptops, mobiele apparaten (smartphones/tablets) en printers.
Kennis hebben van basis netwerk terminologieën en functies (zoals Ethernet, TCP/IP, switches en routers).
Vaardigheden in het configureren en managen van gebruikers, groepen en gedeelde resources in een simpel SOHO netwerk.
De werking van basic access control mesures begrijpen, zoals authenticatie, security policy, encryptie en firewalls.
Onderdelen
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kan voorbereiden op het examen. Lesson 1: Introduction to NetworksLesson 2: The Open Systems Interconnection (OSI) Reference ModelLesson 3: Networking Connectors and Wiring StandardsLesson 4: The Current Ethernet SpecificationsLesson 5: Networking Devices Lesson 6: Introduction to the Internet ProtocolLesson 7: IP AddressingLesson 8: IP Subnetting, Troubleshooting IP, and introduction to NATLesson 9: Introduction to IP RoutingLesson 10: Routing Protocols Lesson 11: Switching and Virtual LANsLesson 12: Wireless NetworkingLesson 13: Remote Network AccesLesson 14: Using Statistics and Sensors to Ensure Network AvailabilityLesson 15: Organizational Documents and PoliciesLesson 16: High Availability and Disaster Recovery Lesson 17: Data Center Architecture and Cloud ConceptsLesson 18: Network Troubleshooting MethodologyLesson 19: Network Software Tools and CommandsLesson 20: Network Security Concepts Lesson 21: Common Types of AttackHet lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kan voorbereiden op het examen. Lesson 1: Introduction to NetworksLesson 2: The Open Systems Interconnection (OSI) Reference ModelLesson 3: Networking Connectors and Wiring StandardsLesson 4: The Current Ethernet SpecificationsLesson 5: Networking Devices Lesson 6: Introduction to the Internet ProtocolLesson 7: IP AddressingLesson 8: IP Subnetting, Troubleshooting IP, and introduction to NATLesson 9: Introduction to IP RoutingLesson 10: Routing Protocols Lesson 11: Switching and Virtual LANsLesson 12: Wireless NetworkingLesson 13: Remote Network AccesLesson 14: Using Statistics and Sensors to Ensure Network AvailabilityLesson 15: Organizational Documents and PoliciesLesson 16: High Availability and Disaster Recovery Lesson 17: Data Center Architecture and Cloud ConceptsLesson 18: Network Troubleshooting MethodologyLesson 19: Network Software Tools and CommandsLesson 20: Network Security Concepts Lesson 21: Common Types of Attack

€690
E-Learning
max 9
0 dagen
CompTIA-PT CompTIA PenTest+ E-Learning (PT0-002) (English)
Volg de CompTIA PenTest+ E-learning bij Master IT! De CompTIA PenTest+ E-learning leert je de nieuwste mogelijkheden omtrent penetratietesten, kwetsbaarheidsbeoordeling en managementvaardigheden die essentieel zijn om systemen tegen aanvallen te beschermen.
Na afronding van deze training kun je onder andere:
Uitleggen van key aspects van compliance-based assessments
Uitvoeren van een kwetsbaarheid scan
Analyseren van de resultaten van de kwetsbaarheidscan
De CompTIA PenTest+ E-learning leert je de nieuwste mogelijkheden omtrent penetratietesten, kwetsbaarheidsbeoordeling en managementvaardigheden die essentieel zijn om systemen tegen aanvallen te beschermen.Jouw CompTIA PenTest+ E-learning bevat: officieel lesmateriaal, Quizzes, een lab waarin je kan oefenen, Assessments, proefexamenvragen en videolessen.De PenTest+ e-learning training omvat alle doelstellingen van het CompTIA PenTest+ PT0-001-examen en leert je de basis van het penetratietesten. Je gaat onder andere in op planning, rapportage en scoping van een penetratietestbeoordeling, het begrijpen van wettelijke en nalevingsvereisten, het uitvoeren van penetratietesten en het scannen van kwetsbaarheden, het interpreteren van gegevens en het adequaat rapporteren van de resultaten.
Lesmethode
Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet.
Doelgroep
Iedereen die geavanceerde kennis op wil doen in informatiebeveiliging. Carrierekansen na deze training zijn:
Penetration Tester
Vulnerability Tester
Network Security Operations
Application Security Vulnerability
Vulnerability Assessment Analyst
Iedereen die geavanceerde kennis op wil doen in informatiebeveiliging. Carrierekansen na deze training zijn:
Penetration Tester
Vulnerability Tester
Network Security Operations
Application Security Vulnerability
Vulnerability Assessment Analyst
Voorkennis
Voor deze training heb je:
Network+, Security+ of gelijkwaardige kennis.
Minimaal 3-4 jaar hands-on informatiebeveiliging of aanverwante ervaring.
Voor deze training heb je:
Network+, Security+ of gelijkwaardige kennis.
Minimaal 3-4 jaar hands-on informatiebeveiliging of aanverwante ervaring.
Onderdelen
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen. Planning and Scoping - 15%SExplain the importance of planning for an engagement.
Understanding the target audience
Rules of engagement
Communication escalation path
Resources and requirements
Budget
Impact analysis and remediation timelines
Disclaimers
Technical constraints
Support resources
Explain key legal concepts.
Contracts
Environmental differences
Written authorization
Explain the importance of scoping an engagement properly.
Types of assessment
Special scoping considerations
Target selection
Strategy
Risk acceptance
Tolerance to impact
Scheduling
Scope creep
Threat actors
Explain the key aspects of compliance-based assessments.
Compliance-based assessments, limitations and caveats
Clearly defined objectives based on regulations
Information Gathering and Vulnerability Identification - 22%Given a scenario, conduct information gathering using appropriate techniques.
Scanning
Enumeration
Packet crafting
Packet inspection
Fingerprinting
Cryptography
Eavesdropping
Decompilation
Debugging
Open Source Intelligence Gathering
Given a scenario, perform a vulnerability scan.
Credentialed vs. non-credentialed
Types of scans
Container securit
Application scan
Considerations of vulnerability scanning
Given a scenario, analyze vulnerability scan results.
Asset categorization
Adjudication
Prioritization of vulnerabilities
Common themes
Explain the process of leveraging information to prepare for exploitation.
Map vulnerabilities to potential exploits
Prioritize activities in preparation for penetration test
Describe common techniques to complete attack
Explain weaknesses related to specialized systems.
ICS
SCADA
Mobile
IoT
Embedded
Point-of-sale system
Biometrics
Application containers
RTOS
Attacks and Exploits - 30%Compare and contrast social engineering attacks.
Phishing
Elicitation
Interrogation
Impersonation
Shoulder surfing
USB key drop
Motivation techniques
Pass the hash
Man-in-the-middle
DoS/stress test
NAC bypass
VLAN hopping
Given a scenario, exploit wireless and RF-based vulnerabilities.
Evil twin
Deauthentication attacks
Fragmentation attacks
Credential harvesting
WPS implementation weakness
Bluejacking
Bluesnarfing
RFID cloning
Jamming
Repeating
Given a scenario, exploit application-based vulnerabilities.
Injections
Authentication
Authorization
Cross-site scripting (XSS)
Cross-site request forgery (CSRF/XSRF)
Clickjacking
Security misconfiguration
File inclusion
Unsecure code practices
Given a scenario, exploit local host vulnerabilities.
OS vulnerabilities
Unsecure service and protocol configurations
Privilege escalation
Default account settings
Sandbox escape
Physical device security
Summarize physical security attacks related to facilities.
Piggybacking/tailgating
Fence jumping
Dumpster diving
Lock picking
Lock bypass
Egress sensor
Badge cloning
Given a scenario, perform post-exploitation techniques.
Lateral movement
Persistence
Covering your tracks
Penetration Testing Tools - 17%Given a scenario, use Nmap to conduct information gathering exercises.
SYN scan (-sS) vs. full connect scan (-sT)
Port selection (-p)
Service identification (-sV)
OS fingerprinting (-O)
Disabling ping (-Pn)
Target input file (-iL)
Timing (-T)
Output parameters
Compare and contrast various use cases of tools.
Use cases
Tools
Given a scenario, analyze tool output or data related to a penetration test.
Password cracking
Pass the hash
Setting up a bind shell
Getting a reverse shell
Proxying a connection
Uploading a web shell
Injections
Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell).
Logic
I/O
Substitutions
Variables
Common operations
Error handling
Arrays
Encoding/decoding
Reporting and Communication - 16%Given a scenario, use report writing and handling best practices.
Normalization of data
Written report of findings and remediation
Risk appetite
Storage time for report
Secure handling and disposition of reports
Explain post-report delivery activities.
Post-engagement cleanup
Client acceptance
Lessons learned
Follow-up actions/retest
Attestation of findings
Given a scenario, recommend mitigation strategies for discovered vulnerabilities.
Solutions
Findings
Remediation
Explain the importance of communication during the penetration testing process.
Communication path
Communication triggers
Reasons for communication
Goal reprioritization
Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen. Planning and Scoping - 15%SExplain the importance of planning for an engagement.
Understanding the target audience
Rules of engagement
Communication escalation path
Resources and requirements
Budget
Impact analysis and remediation timelines
Disclaimers
Technical constraints
Support resources
Explain key legal concepts.
Contracts
Environmental differences
Written authorization
Explain the importance of scoping an engagement properly.
Types of assessment
Special scoping considerations
Target selection
Strategy
Risk acceptance
Tolerance to impact
Scheduling
Scope creep
Threat actors
Explain the key aspects of compliance-based assessments.
Compliance-based assessments, limitations and caveats
Clearly defined objectives based on regulations
Information Gathering and Vulnerability Identification - 22%Given a scenario, conduct information gathering using appropriate techniques.
Scanning
Enumeration
Packet crafting
Packet inspection
Fingerprinting
Cryptography
Eavesdropping
Decompilation
Debugging
Open Source Intelligence Gathering
Given a scenario, perform a vulnerability scan.
Credentialed vs. non-credentialed
Types of scans
Container securit
Application scan
Considerations of vulnerability scanning
Given a scenario, analyze vulnerability scan results.
Asset categorization
Adjudication
Prioritization of vulnerabilities
Common themes
Explain the process of leveraging information to prepare for exploitation.
Map vulnerabilities to potential exploits
Prioritize activities in preparation for penetration test
Describe common techniques to complete attack
Explain weaknesses related to specialized systems.
ICS
SCADA
Mobile
IoT
Embedded
Point-of-sale system
Biometrics
Application containers
RTOS
Attacks and Exploits - 30%Compare and contrast social engineering attacks.
Phishing
Elicitation
Interrogation
Impersonation
Shoulder surfing
USB key drop
Motivation techniques
Pass the hash
Man-in-the-middle
DoS/stress test
NAC bypass
VLAN hopping
Given a scenario, exploit wireless and RF-based vulnerabilities.
Evil twin
Deauthentication attacks
Fragmentation attacks
Credential harvesting
WPS implementation weakness
Bluejacking
Bluesnarfing
RFID cloning
Jamming
Repeating
Given a scenario, exploit application-based vulnerabilities.
Injections
Authentication
Authorization
Cross-site scripting (XSS)
Cross-site request forgery (CSRF/XSRF)
Clickjacking
Security misconfiguration
File inclusion
Unsecure code practices
Given a scenario, exploit local host vulnerabilities.
OS vulnerabilities
Unsecure service and protocol configurations
Privilege escalation
Default account settings
Sandbox escape
Physical device security
Summarize physical security attacks related to facilities.
Piggybacking/tailgating
Fence jumping
Dumpster diving
Lock picking
Lock bypass
Egress sensor
Badge cloning
Given a scenario, perform post-exploitation techniques.
Lateral movement
Persistence
Covering your tracks
Penetration Testing Tools - 17%Given a scenario, use Nmap to conduct information gathering exercises.
SYN scan (-sS) vs. full connect scan (-sT)
Port selection (-p)
Service identification (-sV)
OS fingerprinting (-O)
Disabling ping (-Pn)
Target input file (-iL)
Timing (-T)
Output parameters
Compare and contrast various use cases of tools.
Use cases
Tools
Given a scenario, analyze tool output or data related to a penetration test.
Password cracking
Pass the hash
Setting up a bind shell
Getting a reverse shell
Proxying a connection
Uploading a web shell
Injections
Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell).
Logic
I/O
Substitutions
Variables
Common operations
Error handling
Arrays
Encoding/decoding
Reporting and Communication - 16%Given a scenario, use report writing and handling best practices.
Normalization of data
Written report of findings and remediation
Risk appetite
Storage time for report
Secure handling and disposition of reports
Explain post-report delivery activities.
Post-engagement cleanup
Client acceptance
Lessons learned
Follow-up actions/retest
Attestation of findings
Given a scenario, recommend mitigation strategies for discovered vulnerabilities.
Solutions
Findings
Remediation
Explain the importance of communication during the penetration testing process.
Communication path
Communication triggers
Reasons for communication
Goal reprioritization

€690
E-Learning
max 9
0 dagen