Onderwerp
Automatisering & ICT/IT
Communicatie
Financieel
HR
Inkoop & logistiek
Management
Secretarieel & Administratief
Marketing
Opleiding & Onderwijs
Persoonlijke Effectiviteit
Productie, techniek & bouw
Kwaliteit- & Projectmanagement
Sales
Vitaliteit & Gezondheid
Taalcursus
Zorg & Verzorging
Juridisch
Internet & Media
Arbo & Veiligheid
Hobby & Vrije Tijd
Vastgoed & Makelaardij
Abonnementen
Locatie
Niveau
Type
Keurmerk

Opleidingen

58.413 resultaten

CompTIA-CE CompTIA Cloud Essentials+ (CLO-002) Active Learning (English)

Nieuwegein ma 7 jul. 2025 en 9 andere data
Tijdens de CompTIA Cloud Essentials+ training leer je hoe je efficiëntie kunt verhogen, kosten kunt beheren en beveiligingsrisico's kan verminderen door over te stappen op cloudtechnologie. Deze training is specifiek gericht op medewerkers die besluiten moeten nemen over het invoeren van cloudtoepassingen. Na afronding van deze training kun je onder andere: Meerdere benaderingen beschrijven voor het migreren van applicaties. Het verschil begrijpen tussen private en publieke typen clouds vanuit een technisch perspectief Beschrijven van de relatie tussen cloud computing en virtualisatie Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels). CompTIA Cloud Essentials+ utilizes key business principles and fundamental cloud concepts that validate data-driven cloud recommendations. It stands alone in this field by demonstrating that all necessary staff members – not just the IT specialists – understand how to increase efficiency, manage costs, and reduce security risks for organizations whenever tasked with making current cloud technology decisions.Business analysts and IT pros alike are consistently called upon to assist their organization in determining which cloud service provider(s) to use, what to migrate to the cloud, and when to implement. Collecting and analyzing cloud products and services information is essential when making operational cloud business decisions. The financial and operational impacts covered by Cloud Essentials+ ensure an ability to develop and implement solid cloud strategies. CompTIA Cloud Essentials+ will show that successful candidates: Have the knowledge and understanding of the foundational business and technical components included in a cloud assessment Understand specific security concerns and measures Comprehend new technology concepts, solutions, and benefits to an organization Lesmethode Bij Master IT train je met onze unieke lesmethode Active Learning, hiermee leer je aantoonbaar effectiever! Wij zjn er namelijk van overtuigd dat je slimmer en met meer plezier leert als je actief met je lesstof omgaat. Onze klassen zijn gevuld met maximaal 8 cursisten. Hierbij luister je niet passief naar een trainer, maar ga je interactief en 1-op-1 met de trainer aan de slag om ervoor te zorgen dat jouw leerdoelen behaald worden. De theorie maak je je zoveel mogelijk zelf eigen, de nadruk van de begeleiding ligt op het begrijpen en toepassen van die theorie in de praktijk. Zo leer je alleen datgene wat je echt nodig hebt. Je bepaalt zelf je leertempo. De trainer coacht je bij het definiëren van jouw leertraject. Je onthoudt en begrijpt je nieuwe kennis beter. Alles draait om toepassing van de stof in jouw praktijk. Om alle beschikbare trainingsdata in te zien, bekijk dan onze eigen website Doelgroep Jobs That Use Cloud Essentials+: Sales and Marketing Staff in cloud product or service management Business Analysts Business Process Owners Managed Service Provider Personnel New Data Center Staff Technical Support Staff  Jobs That Use Cloud Essentials+: Sales and Marketing Staff in cloud product or service management Business Analysts Business Process Owners Managed Service Provider Personnel New Data Center Staff Technical Support Staff   Voorkennis Between six months to a year of work experience as a business analyst in an IT environment with some exposure to cloud technologiesBetween six months to a year of work experience as a business analyst in an IT environment with some exposure to cloud technologies Onderdelen Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Hiermee kun je indien gewenst thuis extra oefenen.  Characteristics of Cloud Services from a Business Perspecitive       Understand common terms and definitions of cloud computing and provide examples. Describe the relationship between cloud computing and virtualization. Name early examples of cloud computing. Understand several common definitions of cloud computing and their commonalities/differences. Recognize what types organizations might benefit from cloud computing. Recognize what types organizations might not benefit from cloud computing. Distinguish between the different types of clouds, including XaaS, IaaS and PaaS, and give examples of them. Cloud Computing and Business Value    Recognize the similarities and differences between cloud computing and outsourcing. Understand the following characteristics of clouds and cloud services from a business perspective: Scalability Security Hardware independence Variable costs Time to market Distribution over the Internet Demonstrate how the characteristics of cloud computing enhance business value. Technical Perspectives/Cloud Types       Understand the difference between private and public types of clouds from a technical perspective and provide examples. Understand at a high level the following important techniques and methods for cloud computing deployment: Networking Automation and self-service Federation The role of standardization Explain technical challenges and risks for cloud computing and methods to mitigate them for: Cloud storage Application performance Data integration Security Describe the impact of cloud computing on application architecture and the application development process. Steps to Successful Adoption of Cloud Computing             Explain typical steps that lead to a successful adoption of cloud computing services: Understand selection criteria for a pilot Relate SaaS, PaaS and IaaS deployment to organizational goals Understand the roles and capabilities of cloud computing vendors and dependencies on the vendors. Understand the following organizational capabilities that are relevant for realizing cloud benefits: Skills that are required in an organization that is adopting cloud computing Critical success factors Describe multiple approaches for migrating applications. Impact and Changes of Cloud Computing on IT Service Management    Understand the impact and changes of cloud computing on IT service management in a typical organization: Service strategy Service design Service operation Service transition Use a structured approach based on ITIL to explore the potential impact of cloud computing in an organization. Risks and Consequences of Cloud Computing     Explain and identify the issues associated with integrating cloud computing into an organization’s existing compliance risk and regulatory framework: Security, legal, compliance and privacy risks Explain the implications for direct cost and cost allocations. Understand how to maintain strategic flexibility. Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Hiermee kun je indien gewenst thuis extra oefenen.  Characteristics of Cloud Services from a Business Perspecitive       Understand common terms and definitions of cloud computing and provide examples. Describe the relationship between cloud computing and virtualization. Name early examples of cloud computing. Understand several common definitions of cloud computing and their commonalities/differences. Recognize what types organizations might benefit from cloud computing. Recognize what types organizations might not benefit from cloud computing. Distinguish between the different types of clouds, including XaaS, IaaS and PaaS, and give examples of them. Cloud Computing and Business Value    Recognize the similarities and differences between cloud computing and outsourcing. Understand the following characteristics of clouds and cloud services from a business perspective: Scalability Security Hardware independence Variable costs Time to market Distribution over the Internet Demonstrate how the characteristics of cloud computing enhance business value. Technical Perspectives/Cloud Types       Understand the difference between private and public types of clouds from a technical perspective and provide examples. Understand at a high level the following important techniques and methods for cloud computing deployment: Networking Automation and self-service Federation The role of standardization Explain technical challenges and risks for cloud computing and methods to mitigate them for: Cloud storage Application performance Data integration Security Describe the impact of cloud computing on application architecture and the application development process. Steps to Successful Adoption of Cloud Computing             Explain typical steps that lead to a successful adoption of cloud computing services: Understand selection criteria for a pilot Relate SaaS, PaaS and IaaS deployment to organizational goals Understand the roles and capabilities of cloud computing vendors and dependencies on the vendors. Understand the following organizational capabilities that are relevant for realizing cloud benefits: Skills that are required in an organization that is adopting cloud computing Critical success factors Describe multiple approaches for migrating applications. Impact and Changes of Cloud Computing on IT Service Management    Understand the impact and changes of cloud computing on IT service management in a typical organization: Service strategy Service design Service operation Service transition Use a structured approach based on ITIL to explore the potential impact of cloud computing in an organization. Risks and Consequences of Cloud Computing     Explain and identify the issues associated with integrating cloud computing into an organization’s existing compliance risk and regulatory framework: Security, legal, compliance and privacy risks Explain the implications for direct cost and cost allocations. Understand how to maintain strategic flexibility.
€895
Klassikaal
max 9
2 dagen

CompTIA-CE CompTIA Cloud Essentials+ (CLO-002) E-Learning (English)

Tijdens de CompTIA Cloud Essentials+ training leer je hoe je efficiëntie kunt verhogen, kosten kunt beheren en beveiligingsrisico's kan verminderen door over te stappen op cloudtechnologie. Deze training is specifiek gericht op medewerkers die besluiten moeten nemen over het invoeren van cloudtoepassingen. Na afronding van deze training kun je onder andere: Meerdere benaderingen beschrijven voor het migreren van applicaties. Het verschil begrijpen tussen private en publieke typen clouds vanuit een technisch perspectief Beschrijven van de relatie tussen cloud computing en virtualisatie CompTIA Cloud Essentials+ utilizes key business principles and fundamental cloud concepts that validate data-driven cloud recommendations. It stands alone in this field by demonstrating that all necessary staff members – not just the IT specialists – understand how to increase efficiency, manage costs, and reduce security risks for organizations whenever tasked with making current cloud technology decisions.Business analysts and IT pros alike are consistently called upon to assist their organization in determining which cloud service provider(s) to use, what to migrate to the cloud, and when to implement. Collecting and analyzing cloud products and services information is essential when making operational cloud business decisions. The financial and operational impacts covered by Cloud Essentials+ ensure an ability to develop and implement solid cloud strategies. CompTIA Cloud Essentials+ will show that successful candidates: Have the knowledge and understanding of the foundational business and technical components included in a cloud assessment Understand specific security concerns and measures Comprehend new technology concepts, solutions, and benefits to an organization Lesmethode Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet. Doelgroep Jobs That Use Cloud Essentials+: Sales and Marketing Staff in cloud product or service management Business Analysts Business Process Owners Managed Service Provider Personnel New Data Center Staff Technical Support Staff  Jobs That Use Cloud Essentials+: Sales and Marketing Staff in cloud product or service management Business Analysts Business Process Owners Managed Service Provider Personnel New Data Center Staff Technical Support Staff   Voorkennis Between six months to a year of work experience as a business analyst in an IT environment with some exposure to cloud technologiesBetween six months to a year of work experience as a business analyst in an IT environment with some exposure to cloud technologies Onderdelen Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Hiermee kun je indien gewenst thuis extra oefenen.  Characteristics of Cloud Services from a Business Perspecitive       Understand common terms and definitions of cloud computing and provide examples. Describe the relationship between cloud computing and virtualization. Name early examples of cloud computing. Understand several common definitions of cloud computing and their commonalities/differences. Recognize what types organizations might benefit from cloud computing. Recognize what types organizations might not benefit from cloud computing. Distinguish between the different types of clouds, including XaaS, IaaS and PaaS, and give examples of them. Cloud Computing and Business Value    Recognize the similarities and differences between cloud computing and outsourcing. Understand the following characteristics of clouds and cloud services from a business perspective: Scalability Security Hardware independence Variable costs Time to market Distribution over the Internet Demonstrate how the characteristics of cloud computing enhance business value. Technical Perspectives/Cloud Types       Understand the difference between private and public types of clouds from a technical perspective and provide examples. Understand at a high level the following important techniques and methods for cloud computing deployment: Networking Automation and self-service Federation The role of standardization Explain technical challenges and risks for cloud computing and methods to mitigate them for: Cloud storage Application performance Data integration Security Describe the impact of cloud computing on application architecture and the application development process. Steps to Successful Adoption of Cloud Computing             Explain typical steps that lead to a successful adoption of cloud computing services: Understand selection criteria for a pilot Relate SaaS, PaaS and IaaS deployment to organizational goals Understand the roles and capabilities of cloud computing vendors and dependencies on the vendors. Understand the following organizational capabilities that are relevant for realizing cloud benefits: Skills that are required in an organization that is adopting cloud computing Critical success factors Describe multiple approaches for migrating applications. Impact and Changes of Cloud Computing on IT Service Management    Understand the impact and changes of cloud computing on IT service management in a typical organization: Service strategy Service design Service operation Service transition Use a structured approach based on ITIL to explore the potential impact of cloud computing in an organization. Risks and Consequences of Cloud Computing     Explain and identify the issues associated with integrating cloud computing into an organization’s existing compliance risk and regulatory framework: Security, legal, compliance and privacy risks Explain the implications for direct cost and cost allocations. Understand how to maintain strategic flexibility. Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Hiermee kun je indien gewenst thuis extra oefenen.  Characteristics of Cloud Services from a Business Perspecitive       Understand common terms and definitions of cloud computing and provide examples. Describe the relationship between cloud computing and virtualization. Name early examples of cloud computing. Understand several common definitions of cloud computing and their commonalities/differences. Recognize what types organizations might benefit from cloud computing. Recognize what types organizations might not benefit from cloud computing. Distinguish between the different types of clouds, including XaaS, IaaS and PaaS, and give examples of them. Cloud Computing and Business Value    Recognize the similarities and differences between cloud computing and outsourcing. Understand the following characteristics of clouds and cloud services from a business perspective: Scalability Security Hardware independence Variable costs Time to market Distribution over the Internet Demonstrate how the characteristics of cloud computing enhance business value. Technical Perspectives/Cloud Types       Understand the difference between private and public types of clouds from a technical perspective and provide examples. Understand at a high level the following important techniques and methods for cloud computing deployment: Networking Automation and self-service Federation The role of standardization Explain technical challenges and risks for cloud computing and methods to mitigate them for: Cloud storage Application performance Data integration Security Describe the impact of cloud computing on application architecture and the application development process. Steps to Successful Adoption of Cloud Computing             Explain typical steps that lead to a successful adoption of cloud computing services: Understand selection criteria for a pilot Relate SaaS, PaaS and IaaS deployment to organizational goals Understand the roles and capabilities of cloud computing vendors and dependencies on the vendors. Understand the following organizational capabilities that are relevant for realizing cloud benefits: Skills that are required in an organization that is adopting cloud computing Critical success factors Describe multiple approaches for migrating applications. Impact and Changes of Cloud Computing on IT Service Management    Understand the impact and changes of cloud computing on IT service management in a typical organization: Service strategy Service design Service operation Service transition Use a structured approach based on ITIL to explore the potential impact of cloud computing in an organization. Risks and Consequences of Cloud Computing     Explain and identify the issues associated with integrating cloud computing into an organization’s existing compliance risk and regulatory framework: Security, legal, compliance and privacy risks Explain the implications for direct cost and cost allocations. Understand how to maintain strategic flexibility.
€690
E-Learning
max 9
0 dagen

CompTIA-C CompTIA Cloud+ (CV0-003) Active Learning (English)

Nieuwegein ma 7 jul. 2025 en 9 andere data
Tijdens de CompTIA Cloud + training bekijk je cloudgebaseerde infrastructuurdiensten in de context van bredere IT-systeemactiviteiten, ongeacht het platform. Jij leert vaardigheden die nodig zijn voor het implementeren en automatiseren van veilige cloudomgevingen die de hoge beschikbaarheid van bedrijfssystemen en gegevens ondersteunen. Na afronding van deze training kun je onder andere: Beveiligen van een netwerk in een cloud omgeving Maatregelen implementeren om aan de security eisen te voldoen Uitrollen van cloud networking solutions Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels). CompTIA Cloud+ validates the skills needed to deploy and automate secure cloud environments that support the high availability of business systems and data. CompTIA Cloud+ views cloud-based infrastructure services in the context of broader IT systems operations regardless of the platform. Migrating to the cloud presents opportunities to deploy, optimize, and protect mission critical applications and data storage. CompTIA Cloud+ validates the technical skills needed to secure these valuable assets. The reality of operating multicloud environments poses new challenges. CompTIA Cloud+ is ideal for cloud engineers who need to have expertise across multiple products and systems. CompTIA Cloud+ now features flexible training options including self-paced learning, live online training, custom training and labs to advance the career development of IT professionals in server administration. Lesmethode Bij Master IT train je met onze unieke lesmethode Active Learning, hiermee leer je aantoonbaar effectiever! Wij zjn er namelijk van overtuigd dat je slimmer en met meer plezier leert als je actief met je lesstof omgaat. Onze klassen zijn gevuld met maximaal 8 cursisten. Hierbij luister je niet passief naar een trainer, maar ga je interactief en 1-op-1 met de trainer aan de slag om ervoor te zorgen dat jouw leerdoelen behaald worden. De theorie maak je je zoveel mogelijk zelf eigen, de nadruk van de begeleiding ligt op het begrijpen en toepassen van die theorie in de praktijk. Zo leer je alleen datgene wat je echt nodig hebt. Je bepaalt zelf je leertempo. De trainer coacht je bij het definiëren van jouw leertraject. Je onthoudt en begrijpt je nieuwe kennis beter. Alles draait om toepassing van de stof in jouw praktijk. Om alle beschikbare trainingsdata in te zien, bekijk dan onze eigen website Doelgroep Jobs That Use Cloud+: Sr. Systems Administrator Cloud Engineer Systems Engineer Sr. Network Administrator Sr. Network Engineer Cloud Specialist Cloud Project Manager  Jobs That Use Cloud+: Sr. Systems Administrator Cloud Engineer Systems Engineer Sr. Network Administrator Sr. Network Engineer Cloud Specialist Cloud Project Manager   Voorkennis CompTIA Network+ and Server+ and 2-3 years of experience in systems administration or networking.CompTIA Network+ and Server+ and 2-3 years of experience in systems administration or networking. Onderdelen Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.  Cloud Architecture and Design 13%Compare and contrast the different types of cloud models. Deployment models Service models Advanced cloud services Shared responsibility model Explain the factors that contribute to capacity planning. Requirements Standard templates Licensing User density System load Trend analysis Performance capacity planning Explain the importance of high availability and scaling in cloud environments. Hypervisors Oversubscription Regions and zones Applications Containers Clusters High availability of network functions Avoid single points of failure Scalability Given a scenario, analyze the solution design in support of the business requirements. Requirement analysis Environments Testing techniques Security 20%Given a scenario, configure identity and access management. Identification and authorization Directory services Federation Certificate management Multifactor authentication (MFA) Single sign-on (SSO) Public key infrastructure (PKI) Secret management Key management Given a scenario, secure a network in a cloud environment. Network segmentation Protocols Network services Log and event monitoring Network flows Hardening and configuration changes Given a scenario, apply the appropriate OS and application security controls. Policies User permissions Antivirus/anti-malware/endpoint  detection and response (EDR) Host-based IDS (HIDS)/Host-based IPS (HIPS) Hardened baselines File integrity Log and event monitoring Configuration management Builds Operating system (OS) upgrades Encryption Mandatory access control Software firewall Given a scenario, apply data security and compliance controls in cloud environments. Encryption Integrity Classification Segmentation Access control Impact of laws and regulations Records management Data loss prevention (DLP) Cloud access security broker (CASB) Given a scenario, implement measures to meet security requirements. Tools Vulnerability assessment Security patches Risk register Prioritization of patch application Deactivate default accounts Impacts of security tools on systems and services Effects of cloud service models on security implementation Explain the importance of incident response procedures. Preparation Incident response procedures Deployment 23%Given a scenario, integrate components into a cloud solution. Subscription services Provisioning resources Application Deploying virtual machines (VMs) and custom images Templates Identity management Containers Auto-scaling Post-deployment validation Given a scenario, provision storage in cloud environments. Types Tiers Input/output operations per second (IOPS) and read/write Protocols Redundant array of inexpensive disks (RAID) Storage system features User quotas Hyperconverged Software-defined storage (SDS) Given a scenario, deploy cloud networking solutions. Services Virtual private networks (VPNs) Virtual routing Network appliances Virtual private cloud (VPC) VLAN/VXLAN/GENEVE Single root input/output virtualization (SR-IOV) Software-defined network (SDN) Given a scenario, configure the appropriate compute sizing for a deployment. Virtualization Central processing unit (CPU)/ virtual CPU (vCPU) Graphics processing unit (GPU) Clock speed/Instructions per cycle (IPC) Hyperconverged Memory Given a scenario, perform cloud migrations. Physical to virtual (P2V) Virtual to virtual (V2V) Cloud-to-cloud migrations Storage migrations Database migrations Operations and Support 22%Given a scenario, configure logging, monitoring, and alerting to maintain operational status. Logging Monitoring Alerting Given a scenario, maintain efficient operation of a cloud environment. Confirm completion of backups Life-cycle management Change management Asset management Patching Impacts of process improvements on systems Upgrade methods Dashboard and reporting Given a scenario, optimize cloud environments. Right-sizing Compute Storage Network Placement Device drivers and firmware Given a scenario, apply proper automation and orchestration techniques. Infrastructure as code Continuous integration/continuous deployment (CI/CD) Version control Configuration management Containers Automation activities Secure scripting Orchestration sequencing Given a scenario, perform appropriate backup and restore operations. Backup types Backup objects Backup targets Backup and restore policies Restoration methods Given a scenario, perform disaster recovery tasks. Failovers Failback Restore backups Replication Network configurations On-premises and cloud sites Requirements Documentation Geographical datacenter requirements Troubleshooting 22%Given a scenario, use the troubleshooting methodology to resolve cloud-related issues. Always consider corporate policies, procedures, and impacts before implementing changes. Identify the problem Establish a theory of probable Test the theory to determine cause Establish a plan of action to resolve the problem and implement the solution Verify full system functionality and, if applicable, implement preventive measures Document the findings, actions, and outcomes throughout the process. Given a scenario, troubleshoot security issues. Privilege Authentication Authorization Security groups Keys and certificates Misconfigured or misapplied policies Data security issues Exposed endpoints Misconfigured or failed security appliances Unsupported protocols External/internal attacks Given a scenario, troubleshoot deployment issues. Connectivity issues Performance degradation Configurations Applications in containers Misconfigured templates Missing or incorrect tags Insufficient capacity Licensing issues Vendor-related issues Given a scenario, troubleshoot connectivity issues. Network security group misconfigurations Common networking configuration issues Network troubleshooting tools Given a scenario, troubleshoot common performance issues. Resource utilization Application Incorrectly configured or failed load balancing Given a scenario, troubleshoot automation or orchestration issues. Account mismatches Change management failures Server name changes IP address changes Location changes Version/feature mismatch Automation tool incompatibility Job validation issue Patching failure Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.  Cloud Architecture and Design 13%Compare and contrast the different types of cloud models. Deployment models Service models Advanced cloud services Shared responsibility model Explain the factors that contribute to capacity planning. Requirements Standard templates Licensing User density System load Trend analysis Performance capacity planning Explain the importance of high availability and scaling in cloud environments. Hypervisors Oversubscription Regions and zones Applications Containers Clusters High availability of network functions Avoid single points of failure Scalability Given a scenario, analyze the solution design in support of the business requirements. Requirement analysis Environments Testing techniques Security 20%Given a scenario, configure identity and access management. Identification and authorization Directory services Federation Certificate management Multifactor authentication (MFA) Single sign-on (SSO) Public key infrastructure (PKI) Secret management Key management Given a scenario, secure a network in a cloud environment. Network segmentation Protocols Network services Log and event monitoring Network flows Hardening and configuration changes Given a scenario, apply the appropriate OS and application security controls. Policies User permissions Antivirus/anti-malware/endpoint  detection and response (EDR) Host-based IDS (HIDS)/Host-based IPS (HIPS) Hardened baselines File integrity Log and event monitoring Configuration management Builds Operating system (OS) upgrades Encryption Mandatory access control Software firewall Given a scenario, apply data security and compliance controls in cloud environments. Encryption Integrity Classification Segmentation Access control Impact of laws and regulations Records management Data loss prevention (DLP) Cloud access security broker (CASB) Given a scenario, implement measures to meet security requirements. Tools Vulnerability assessment Security patches Risk register Prioritization of patch application Deactivate default accounts Impacts of security tools on systems and services Effects of cloud service models on security implementation Explain the importance of incident response procedures. Preparation Incident response procedures Deployment 23%Given a scenario, integrate components into a cloud solution. Subscription services Provisioning resources Application Deploying virtual machines (VMs) and custom images Templates Identity management Containers Auto-scaling Post-deployment validation Given a scenario, provision storage in cloud environments. Types Tiers Input/output operations per second (IOPS) and read/write Protocols Redundant array of inexpensive disks (RAID) Storage system features User quotas Hyperconverged Software-defined storage (SDS) Given a scenario, deploy cloud networking solutions. Services Virtual private networks (VPNs) Virtual routing Network appliances Virtual private cloud (VPC) VLAN/VXLAN/GENEVE Single root input/output virtualization (SR-IOV) Software-defined network (SDN) Given a scenario, configure the appropriate compute sizing for a deployment. Virtualization Central processing unit (CPU)/ virtual CPU (vCPU) Graphics processing unit (GPU) Clock speed/Instructions per cycle (IPC) Hyperconverged Memory Given a scenario, perform cloud migrations. Physical to virtual (P2V) Virtual to virtual (V2V) Cloud-to-cloud migrations Storage migrations Database migrations Operations and Support 22%Given a scenario, configure logging, monitoring, and alerting to maintain operational status. Logging Monitoring Alerting Given a scenario, maintain efficient operation of a cloud environment. Confirm completion of backups Life-cycle management Change management Asset management Patching Impacts of process improvements on systems Upgrade methods Dashboard and reporting Given a scenario, optimize cloud environments. Right-sizing Compute Storage Network Placement Device drivers and firmware Given a scenario, apply proper automation and orchestration techniques. Infrastructure as code Continuous integration/continuous deployment (CI/CD) Version control Configuration management Containers Automation activities Secure scripting Orchestration sequencing Given a scenario, perform appropriate backup and restore operations. Backup types Backup objects Backup targets Backup and restore policies Restoration methods Given a scenario, perform disaster recovery tasks. Failovers Failback Restore backups Replication Network configurations On-premises and cloud sites Requirements Documentation Geographical datacenter requirements Troubleshooting 22%Given a scenario, use the troubleshooting methodology to resolve cloud-related issues. Always consider corporate policies, procedures, and impacts before implementing changes. Identify the problem Establish a theory of probable Test the theory to determine cause Establish a plan of action to resolve the problem and implement the solution Verify full system functionality and, if applicable, implement preventive measures Document the findings, actions, and outcomes throughout the process. Given a scenario, troubleshoot security issues. Privilege Authentication Authorization Security groups Keys and certificates Misconfigured or misapplied policies Data security issues Exposed endpoints Misconfigured or failed security appliances Unsupported protocols External/internal attacks Given a scenario, troubleshoot deployment issues. Connectivity issues Performance degradation Configurations Applications in containers Misconfigured templates Missing or incorrect tags Insufficient capacity Licensing issues Vendor-related issues Given a scenario, troubleshoot connectivity issues. Network security group misconfigurations Common networking configuration issues Network troubleshooting tools Given a scenario, troubleshoot common performance issues. Resource utilization Application Incorrectly configured or failed load balancing Given a scenario, troubleshoot automation or orchestration issues. Account mismatches Change management failures Server name changes IP address changes Location changes Version/feature mismatch Automation tool incompatibility Job validation issue Patching failure
€2.395
Klassikaal
max 9
5 dagen

CompTIA-C CompTIA Cloud+ (CV0-003) E-Learning (English)

Tijdens de CompTIA Cloud + training bekijk je cloudgebaseerde infrastructuurdiensten in de context van bredere IT-systeemactiviteiten, ongeacht het platform. Jij leert vaardigheden die nodig zijn voor het implementeren en automatiseren van veilige cloudomgevingen die de hoge beschikbaarheid van bedrijfssystemen en gegevens ondersteunen. Na afronding van deze training kun je onder andere: Beveiligen van een netwerk in een cloud omgeving Maatregelen implementeren om aan de security eisen te voldoen Uitrollen van cloud networking solutions CompTIA Cloud+ validates the skills needed to deploy and automate secure cloud environments that support the high availability of business systems and data. CompTIA Cloud+ views cloud-based infrastructure services in the context of broader IT systems operations regardless of the platform. Migrating to the cloud presents opportunities to deploy, optimize, and protect mission critical applications and data storage. CompTIA Cloud+ validates the technical skills needed to secure these valuable assets. The reality of operating multicloud environments poses new challenges. CompTIA Cloud+ is ideal for cloud engineers who need to have expertise across multiple products and systems. CompTIA Cloud+ now features flexible training options including self-paced learning, live online training, custom training and labs to advance the career development of IT professionals in server administration. Lesmethode Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet. Doelgroep Jobs That Use Cloud+: Sr. Systems Administrator Cloud Engineer Systems Engineer Sr. Network Administrator Sr. Network Engineer Cloud Specialist Cloud Project Manager  Jobs That Use Cloud+: Sr. Systems Administrator Cloud Engineer Systems Engineer Sr. Network Administrator Sr. Network Engineer Cloud Specialist Cloud Project Manager   Voorkennis CompTIA Network+ and Server+ and 2-3 years of experience in systems administration or networking.CompTIA Network+ and Server+ and 2-3 years of experience in systems administration or networking. Onderdelen Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.  Cloud Architecture and Design 13%Compare and contrast the different types of cloud models. Deployment models Service models Advanced cloud services Shared responsibility model Explain the factors that contribute to capacity planning. Requirements Standard templates Licensing User density System load Trend analysis Performance capacity planning Explain the importance of high availability and scaling in cloud environments. Hypervisors Oversubscription Regions and zones Applications Containers Clusters High availability of network functions Avoid single points of failure Scalability Given a scenario, analyze the solution design in support of the business requirements. Requirement analysis Environments Testing techniques Security 20%Given a scenario, configure identity and access management. Identification and authorization Directory services Federation Certificate management Multifactor authentication (MFA) Single sign-on (SSO) Public key infrastructure (PKI) Secret management Key management Given a scenario, secure a network in a cloud environment. Network segmentation Protocols Network services Log and event monitoring Network flows Hardening and configuration changes Given a scenario, apply the appropriate OS and application security controls. Policies User permissions Antivirus/anti-malware/endpoint  detection and response (EDR) Host-based IDS (HIDS)/Host-based IPS (HIPS) Hardened baselines File integrity Log and event monitoring Configuration management Builds Operating system (OS) upgrades Encryption Mandatory access control Software firewall Given a scenario, apply data security and compliance controls in cloud environments. Encryption Integrity Classification Segmentation Access control Impact of laws and regulations Records management Data loss prevention (DLP) Cloud access security broker (CASB) Given a scenario, implement measures to meet security requirements. Tools Vulnerability assessment Security patches Risk register Prioritization of patch application Deactivate default accounts Impacts of security tools on systems and services Effects of cloud service models on security implementation Explain the importance of incident response procedures. Preparation Incident response procedures Deployment 23%Given a scenario, integrate components into a cloud solution. Subscription services Provisioning resources Application Deploying virtual machines (VMs) and custom images Templates Identity management Containers Auto-scaling Post-deployment validation Given a scenario, provision storage in cloud environments. Types Tiers Input/output operations per second (IOPS) and read/write Protocols Redundant array of inexpensive disks (RAID) Storage system features User quotas Hyperconverged Software-defined storage (SDS) Given a scenario, deploy cloud networking solutions. Services Virtual private networks (VPNs) Virtual routing Network appliances Virtual private cloud (VPC) VLAN/VXLAN/GENEVE Single root input/output virtualization (SR-IOV) Software-defined network (SDN) Given a scenario, configure the appropriate compute sizing for a deployment. Virtualization Central processing unit (CPU)/ virtual CPU (vCPU) Graphics processing unit (GPU) Clock speed/Instructions per cycle (IPC) Hyperconverged Memory Given a scenario, perform cloud migrations. Physical to virtual (P2V) Virtual to virtual (V2V) Cloud-to-cloud migrations Storage migrations Database migrations Operations and Support 22%Given a scenario, configure logging, monitoring, and alerting to maintain operational status. Logging Monitoring Alerting Given a scenario, maintain efficient operation of a cloud environment. Confirm completion of backups Life-cycle management Change management Asset management Patching Impacts of process improvements on systems Upgrade methods Dashboard and reporting Given a scenario, optimize cloud environments. Right-sizing Compute Storage Network Placement Device drivers and firmware Given a scenario, apply proper automation and orchestration techniques. Infrastructure as code Continuous integration/continuous deployment (CI/CD) Version control Configuration management Containers Automation activities Secure scripting Orchestration sequencing Given a scenario, perform appropriate backup and restore operations. Backup types Backup objects Backup targets Backup and restore policies Restoration methods Given a scenario, perform disaster recovery tasks. Failovers Failback Restore backups Replication Network configurations On-premises and cloud sites Requirements Documentation Geographical datacenter requirements Troubleshooting 22%Given a scenario, use the troubleshooting methodology to resolve cloud-related issues. Always consider corporate policies, procedures, and impacts before implementing changes. Identify the problem Establish a theory of probable Test the theory to determine cause Establish a plan of action to resolve the problem and implement the solution Verify full system functionality and, if applicable, implement preventive measures Document the findings, actions, and outcomes throughout the process. Given a scenario, troubleshoot security issues. Privilege Authentication Authorization Security groups Keys and certificates Misconfigured or misapplied policies Data security issues Exposed endpoints Misconfigured or failed security appliances Unsupported protocols External/internal attacks Given a scenario, troubleshoot deployment issues. Connectivity issues Performance degradation Configurations Applications in containers Misconfigured templates Missing or incorrect tags Insufficient capacity Licensing issues Vendor-related issues Given a scenario, troubleshoot connectivity issues. Network security group misconfigurations Common networking configuration issues Network troubleshooting tools Given a scenario, troubleshoot common performance issues. Resource utilization Application Incorrectly configured or failed load balancing Given a scenario, troubleshoot automation or orchestration issues. Account mismatches Change management failures Server name changes IP address changes Location changes Version/feature mismatch Automation tool incompatibility Job validation issue Patching failure Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.  Cloud Architecture and Design 13%Compare and contrast the different types of cloud models. Deployment models Service models Advanced cloud services Shared responsibility model Explain the factors that contribute to capacity planning. Requirements Standard templates Licensing User density System load Trend analysis Performance capacity planning Explain the importance of high availability and scaling in cloud environments. Hypervisors Oversubscription Regions and zones Applications Containers Clusters High availability of network functions Avoid single points of failure Scalability Given a scenario, analyze the solution design in support of the business requirements. Requirement analysis Environments Testing techniques Security 20%Given a scenario, configure identity and access management. Identification and authorization Directory services Federation Certificate management Multifactor authentication (MFA) Single sign-on (SSO) Public key infrastructure (PKI) Secret management Key management Given a scenario, secure a network in a cloud environment. Network segmentation Protocols Network services Log and event monitoring Network flows Hardening and configuration changes Given a scenario, apply the appropriate OS and application security controls. Policies User permissions Antivirus/anti-malware/endpoint  detection and response (EDR) Host-based IDS (HIDS)/Host-based IPS (HIPS) Hardened baselines File integrity Log and event monitoring Configuration management Builds Operating system (OS) upgrades Encryption Mandatory access control Software firewall Given a scenario, apply data security and compliance controls in cloud environments. Encryption Integrity Classification Segmentation Access control Impact of laws and regulations Records management Data loss prevention (DLP) Cloud access security broker (CASB) Given a scenario, implement measures to meet security requirements. Tools Vulnerability assessment Security patches Risk register Prioritization of patch application Deactivate default accounts Impacts of security tools on systems and services Effects of cloud service models on security implementation Explain the importance of incident response procedures. Preparation Incident response procedures Deployment 23%Given a scenario, integrate components into a cloud solution. Subscription services Provisioning resources Application Deploying virtual machines (VMs) and custom images Templates Identity management Containers Auto-scaling Post-deployment validation Given a scenario, provision storage in cloud environments. Types Tiers Input/output operations per second (IOPS) and read/write Protocols Redundant array of inexpensive disks (RAID) Storage system features User quotas Hyperconverged Software-defined storage (SDS) Given a scenario, deploy cloud networking solutions. Services Virtual private networks (VPNs) Virtual routing Network appliances Virtual private cloud (VPC) VLAN/VXLAN/GENEVE Single root input/output virtualization (SR-IOV) Software-defined network (SDN) Given a scenario, configure the appropriate compute sizing for a deployment. Virtualization Central processing unit (CPU)/ virtual CPU (vCPU) Graphics processing unit (GPU) Clock speed/Instructions per cycle (IPC) Hyperconverged Memory Given a scenario, perform cloud migrations. Physical to virtual (P2V) Virtual to virtual (V2V) Cloud-to-cloud migrations Storage migrations Database migrations Operations and Support 22%Given a scenario, configure logging, monitoring, and alerting to maintain operational status. Logging Monitoring Alerting Given a scenario, maintain efficient operation of a cloud environment. Confirm completion of backups Life-cycle management Change management Asset management Patching Impacts of process improvements on systems Upgrade methods Dashboard and reporting Given a scenario, optimize cloud environments. Right-sizing Compute Storage Network Placement Device drivers and firmware Given a scenario, apply proper automation and orchestration techniques. Infrastructure as code Continuous integration/continuous deployment (CI/CD) Version control Configuration management Containers Automation activities Secure scripting Orchestration sequencing Given a scenario, perform appropriate backup and restore operations. Backup types Backup objects Backup targets Backup and restore policies Restoration methods Given a scenario, perform disaster recovery tasks. Failovers Failback Restore backups Replication Network configurations On-premises and cloud sites Requirements Documentation Geographical datacenter requirements Troubleshooting 22%Given a scenario, use the troubleshooting methodology to resolve cloud-related issues. Always consider corporate policies, procedures, and impacts before implementing changes. Identify the problem Establish a theory of probable Test the theory to determine cause Establish a plan of action to resolve the problem and implement the solution Verify full system functionality and, if applicable, implement preventive measures Document the findings, actions, and outcomes throughout the process. Given a scenario, troubleshoot security issues. Privilege Authentication Authorization Security groups Keys and certificates Misconfigured or misapplied policies Data security issues Exposed endpoints Misconfigured or failed security appliances Unsupported protocols External/internal attacks Given a scenario, troubleshoot deployment issues. Connectivity issues Performance degradation Configurations Applications in containers Misconfigured templates Missing or incorrect tags Insufficient capacity Licensing issues Vendor-related issues Given a scenario, troubleshoot connectivity issues. Network security group misconfigurations Common networking configuration issues Network troubleshooting tools Given a scenario, troubleshoot common performance issues. Resource utilization Application Incorrectly configured or failed load balancing Given a scenario, troubleshoot automation or orchestration issues. Account mismatches Change management failures Server name changes IP address changes Location changes Version/feature mismatch Automation tool incompatibility Job validation issue Patching failure
€690
E-Learning
max 9
0 dagen

CompTIA-ITF CompTIA IT Fundamentals (ITF+) (FC0-U61) Active Learning (English)

Nieuwegein ma 7 jul. 2025 en 9 andere data
Volg de training CompTIA IT Fundamentals en kom erachter of de IT wereld iets voor je is! ITF+ is de enige certificering die alle gebieden van IT dekt, waardoor je een breder begrip van IT krijgt. Hierdoor is deze training ideaal voor niet-technische professionals. Na afronding van deze training kun je onder andere: Een draadloos netwerk instellen en beveiligen Verschillende categorieën programmeertalen onderscheiden en herkennen Databaseconcepten en -structuren uitleggen Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels). CompTIA ITF+ helps professionals to decide if a career in IT is right for them or to develop a broader understanding of IT. ITF+ is the only pre-career certification that helps students or career changers determine if they have a competency for information technology and if it is the right career path for them. ITF+ is the only single certification that covers all areas of IT foundations, creating a broader understanding of IT making it ideal for non-technical professionals. ITF+ establishes an IT education framework for students in secondary and post-secondary settings. Lesmethode Bij Master IT train je met onze unieke lesmethode Active Learning, hiermee leer je aantoonbaar effectiever! Wij zjn er namelijk van overtuigd dat je slimmer en met meer plezier leert als je actief met je lesstof omgaat. Onze klassen zijn gevuld met maximaal 8 cursisten. Hierbij luister je niet passief naar een trainer, maar ga je interactief en 1-op-1 met de trainer aan de slag om ervoor te zorgen dat jouw leerdoelen behaald worden. De theorie maak je je zoveel mogelijk zelf eigen, de nadruk van de begeleiding ligt op het begrijpen en toepassen van die theorie in de praktijk. Zo leer je alleen datgene wat je echt nodig hebt. Je bepaalt zelf je leertempo. De trainer coacht je bij het definiëren van jouw leertraject. Je onthoudt en begrijpt je nieuwe kennis beter. Alles draait om toepassing van de stof in jouw praktijk. Om alle beschikbare trainingsdata in te zien, bekijk dan onze eigen website Doelgroep Students considering a career in IT. Professionals working in fields that require a broad understanding of IT. Marketing, sales and operations staff in IT-based organizations. Students considering a career in IT. Professionals working in fields that require a broad understanding of IT. Marketing, sales and operations staff in IT-based organizations. Voorkennis No prior experience necessaryNo prior experience necessary Onderdelen Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.1 Core Hardware Components2 Peripherals and Connectors3 Computing Devices and the Internet of Things4 Operating Systems5 Software Applications6 Software Development7 Database Fundamentals8 Networking Concepts and Technologies9 Security Concepts and Threats10 Security Best Practices11 Business Continuity and Customer SupportHet lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.1 Core Hardware Components2 Peripherals and Connectors3 Computing Devices and the Internet of Things4 Operating Systems5 Software Applications6 Software Development7 Database Fundamentals8 Networking Concepts and Technologies9 Security Concepts and Threats10 Security Best Practices11 Business Continuity and Customer Support
€2.195
Klassikaal
max 9
4 dagen

CompTIA-ITF CompTIA IT Fundamentals (ITF+) (FC0-U61) E-Learning (English)

Volg de training CompTIA IT Fundamentals en kom erachter of de IT wereld iets voor je is! ITF+ is de enige certificering die alle gebieden van IT dekt, waardoor je een breder begrip van IT krijgt. Hierdoor is deze training ideaal voor niet-technische professionals. Na afronding van deze training kun je onder andere: Een draadloos netwerk instellen en beveiligen Verschillende categorieën programmeertalen onderscheiden en herkennen Databaseconcepten en -structuren uitleggen CompTIA ITF+ helps professionals to decide if a career in IT is right for them or to develop a broader understanding of IT. ITF+ is the only pre-career certification that helps students or career changers determine if they have a competency for information technology and if it is the right career path for them. ITF+ is the only single certification that covers all areas of IT foundations, creating a broader understanding of IT making it ideal for non-technical professionals. ITF+ establishes an IT education framework for students in secondary and post-secondary settings. Lesmethode Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet. Doelgroep Students considering a career in IT. Professionals working in fields that require a broad understanding of IT. Marketing, sales and operations staff in IT-based organizations. Students considering a career in IT. Professionals working in fields that require a broad understanding of IT. Marketing, sales and operations staff in IT-based organizations. Voorkennis No prior experience necessaryNo prior experience necessary Onderdelen Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.1 Core Hardware Components2 Peripherals and Connectors3 Computing Devices and the Internet of Things4 Operating Systems5 Software Applications6 Software Development7 Database Fundamentals8 Networking Concepts and Technologies9 Security Concepts and Threats10 Security Best Practices11 Business Continuity and Customer SupportHet lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.1 Core Hardware Components2 Peripherals and Connectors3 Computing Devices and the Internet of Things4 Operating Systems5 Software Applications6 Software Development7 Database Fundamentals8 Networking Concepts and Technologies9 Security Concepts and Threats10 Security Best Practices11 Business Continuity and Customer Support
€690
E-Learning
max 9
0 dagen

CompTIA-L CompTIA Linux+ E-learning (XK0-005) (English)

Volg de CompTIA Linux+ E-learning bij Master IT! De nieuwe CompTIA Linux+ is voor de IT-professional die Linux zal gebruiken om alles te beheren, van auto's en smartphones tot servers en supercomputers, aangezien een groot aantal ondernemingen Linux gebruiken in cloud-, cyberbeveiligings-, mobiele en webbeheertoepassingen. Na afronding van deze training kun je onder andere: Configureer systemen met of zonder externe randapparatuur zoals toetsenborden Commandos geven aan de bootloader en opties aan de kernel tijdens het opstarten Processen op de juiste manier beëindigen The new CompTIA Linux+ is for the IT pro who will use Linux to manage everything from cars and smartphones to servers and supercomputers, as a vast number of enterprises use Linux in cloud, cybersecurity, mobile and web administration applications.In the new CompTIA Linux+, candidates are only required to pass one exam for certification. However, the new certification is no longer eligible for the LPI 2-for-1 offer. CompTIA Linux+ is the only job-focused Linux certification covering the latest foundational skills demanded by hiring managers. Unlike other certifications, the new exam includes performance-based and multiple-choice questions to identify the employees who can do the job. The exam covers tasks associated with all major distributions of Linux, setting the foundation for advanced vendor/distro-specific knowledge. CompTIA Linux+ covers common tasks in major distributions of Linux, including the Linux command line, basic maintenance, installing and configuring workstations, and networking. Lesmethode Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet. Doelgroep Jobs that use CompTIA Linux+: Linux Administrator Network Administrator Technical Support Specialist Web Administrator Systems Administrator Jobs that use CompTIA Linux+: Linux Administrator Network Administrator Technical Support Specialist Web Administrator Systems Administrator Voorkennis CompTIA A+, CompTIA Network+ and 12 months of Linux admin experienceCompTIA A+, CompTIA Network+ and 12 months of Linux admin experience Onderdelen Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.  System Architecture 14%Determine and configure hardware settings. Enable and disable integrated peripherals Configure systems with or without external peripherals such as keyboards Differentiate between the various types of mass storage devices Know the differences between coldplug and hotplug devices Determine hardware resources for devices Tools and utilities to list various hardware information (e.g., Isusb, lspci) ools and utilities to manipulate USB devices Conceptual understanding of sysfs, udev, dbus Boot the system Provide common commands to the boot loader and options to the kernel at boot time Demonstrate knowledge of the boot sequence from BIOS to boot completion Understanding of SysVinit and systemd Awareness of Upstart Check boot events in the log file Change runlevels/boot targets and shutdown or reboot system. Set the default runlevel or boot target Change between runlevels/boot targets including single user mode Shutdown and reboot from the command line Alert users before switching runlevels/ boot targets or other major system events Properly terminate processes Linux Installation and Package Management 18%Design hard disk layout. Allocate filesystems and swap space to separate partitions or disks Tailor the design to the intended use of the system Ensure the /boot partition conforms to the hardware architecture requirements for booting Knowledge of basic features of LVM Install a boot manager. Providing alternative boot locations and backup boot options Install and configure a boot loader such as GRUB Legacy Perform basic configuration changes for GRUB 2 Interact with the boot loader Manage shared libraries. Identify shared libraries Identify the typical locations of system libraries Load shared libraries Use Debian package management. Install, upgrade and uninstall Debian binary packages Find packages containing specific files or libraries that may or may not be installed Obtain package information such as version, content, dependencies, package integrity and installation status (whether or not the package is installed) Use RPM and YUM package management. Install, re-install, upgrade and remove packages using RPM and YUM Obtain information on RPM packages such as version, status, dependencies, integrity and signatures Determine what files a package provides, as well as find which package a specific file comes from GNU and Unix Commands 43%Work on the command line. Use single shell commands and one line command sequences to perform basic tasks on the command line Use and modify the shell environment including defining, referencing and exporting environment variables Use and edit command history Invoke commands inside and outside the defined path Process text streams using filters. Send text files and output streams through text utility filters to modify the output using standard UNIX commands found in the GNU textutils package Perform basic file management. Copy, move and remove files and directories individually Copy multiple files and directories recursively Remove files and directories recursively Use simple and advanced wildcard specifications in commands Use find to locate and act on files based on type, size or time Usage of tar, cpio and dd Use streams, pipes and redirects. Redirecting standard input, standard output and standard error Pipe the output of one command to the input of another command Use the output of one command as arguments to another command Send output to both stdout and a file Create, monitor and kill processes. Run jobs in the foreground and background Signal a program to continue running after logout Monitor active processes Select and sort processes for display Send signals to processes Modify process execution priorities. Know the default priority of a job that is created Run a program with higher or lower priority than the default Change the priority of a running process Search text files using regular expressions. Create simple regular expressions containing several notational elements Use regular expression tools to perform searches through a filesystem or file content Perform basic file editing operations using vi. Navigate a document using vi Use basic vi modes Insert, edit, delete, copy and find text Devices, Linux Filesystems and Filesystem Hierarchy Standard 25%Create partitions and filesystems. Manage MBR partition tables Use various mkfs commands to create various filesystems such as: ext2/ext3/ext4 XFS VFAT Awareness of ReiserFS and Btrfs Basic knowledge of gdisk and parted with GPT Maintain the integrity of filesystems. Verify the integrity of filesystems Monitor free space and inodes Repair simple filesystem problems Control mounting and unmounting of filesystems. Manually mount and unmount filesystems Configure filesystem mounting on bootup Configure user mountable removeable filesystems Manage disk quotas. Set up a disk quota for a filesystem Edit, check and generate user quota reports Manage file permissions and ownership. Manage access permissions on regular and special files as well as directories Use access modes such as suid, sgid and the sticky bit to maintain security Know how to change the file creation mask Use the group field to grant file access to group members Create and change hard and symbolic links. Create links Identify hard and/or soft links Copying versus linking files Use links to support system administration tasks Find system files and place files in the correct location. Understand the correct locations of files under the FHS Find files and commands on a Linux system Know the location and propose of important file and directories as defined in the FHS Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.  System Architecture 14%Determine and configure hardware settings. Enable and disable integrated peripherals Configure systems with or without external peripherals such as keyboards Differentiate between the various types of mass storage devices Know the differences between coldplug and hotplug devices Determine hardware resources for devices Tools and utilities to list various hardware information (e.g., Isusb, lspci) ools and utilities to manipulate USB devices Conceptual understanding of sysfs, udev, dbus Boot the system Provide common commands to the boot loader and options to the kernel at boot time Demonstrate knowledge of the boot sequence from BIOS to boot completion Understanding of SysVinit and systemd Awareness of Upstart Check boot events in the log file Change runlevels/boot targets and shutdown or reboot system. Set the default runlevel or boot target Change between runlevels/boot targets including single user mode Shutdown and reboot from the command line Alert users before switching runlevels/ boot targets or other major system events Properly terminate processes Linux Installation and Package Management 18%Design hard disk layout. Allocate filesystems and swap space to separate partitions or disks Tailor the design to the intended use of the system Ensure the /boot partition conforms to the hardware architecture requirements for booting Knowledge of basic features of LVM Install a boot manager. Providing alternative boot locations and backup boot options Install and configure a boot loader such as GRUB Legacy Perform basic configuration changes for GRUB 2 Interact with the boot loader Manage shared libraries. Identify shared libraries Identify the typical locations of system libraries Load shared libraries Use Debian package management. Install, upgrade and uninstall Debian binary packages Find packages containing specific files or libraries that may or may not be installed Obtain package information such as version, content, dependencies, package integrity and installation status (whether or not the package is installed) Use RPM and YUM package management. Install, re-install, upgrade and remove packages using RPM and YUM Obtain information on RPM packages such as version, status, dependencies, integrity and signatures Determine what files a package provides, as well as find which package a specific file comes from GNU and Unix Commands 43%Work on the command line. Use single shell commands and one line command sequences to perform basic tasks on the command line Use and modify the shell environment including defining, referencing and exporting environment variables Use and edit command history Invoke commands inside and outside the defined path Process text streams using filters. Send text files and output streams through text utility filters to modify the output using standard UNIX commands found in the GNU textutils package Perform basic file management. Copy, move and remove files and directories individually Copy multiple files and directories recursively Remove files and directories recursively Use simple and advanced wildcard specifications in commands Use find to locate and act on files based on type, size or time Usage of tar, cpio and dd Use streams, pipes and redirects. Redirecting standard input, standard output and standard error Pipe the output of one command to the input of another command Use the output of one command as arguments to another command Send output to both stdout and a file Create, monitor and kill processes. Run jobs in the foreground and background Signal a program to continue running after logout Monitor active processes Select and sort processes for display Send signals to processes Modify process execution priorities. Know the default priority of a job that is created Run a program with higher or lower priority than the default Change the priority of a running process Search text files using regular expressions. Create simple regular expressions containing several notational elements Use regular expression tools to perform searches through a filesystem or file content Perform basic file editing operations using vi. Navigate a document using vi Use basic vi modes Insert, edit, delete, copy and find text Devices, Linux Filesystems and Filesystem Hierarchy Standard 25%Create partitions and filesystems. Manage MBR partition tables Use various mkfs commands to create various filesystems such as: ext2/ext3/ext4 XFS VFAT Awareness of ReiserFS and Btrfs Basic knowledge of gdisk and parted with GPT Maintain the integrity of filesystems. Verify the integrity of filesystems Monitor free space and inodes Repair simple filesystem problems Control mounting and unmounting of filesystems. Manually mount and unmount filesystems Configure filesystem mounting on bootup Configure user mountable removeable filesystems Manage disk quotas. Set up a disk quota for a filesystem Edit, check and generate user quota reports Manage file permissions and ownership. Manage access permissions on regular and special files as well as directories Use access modes such as suid, sgid and the sticky bit to maintain security Know how to change the file creation mask Use the group field to grant file access to group members Create and change hard and symbolic links. Create links Identify hard and/or soft links Copying versus linking files Use links to support system administration tasks Find system files and place files in the correct location. Understand the correct locations of files under the FHS Find files and commands on a Linux system Know the location and propose of important file and directories as defined in the FHS
€690
E-Learning
max 9
0 dagen

CompTIA-N CompTIA Network+ (N10-009) Active Learning (English)

Nieuwegein ma 7 jul. 2025 en 9 andere data
Volg de CompTIA Network+ training en leer de fundamentele principes van het instelleren, configureren en troubleshooten van netwerk technologieën Na afronding van deze training kun je onder andere: De features van verschillende netwerk protocollen en producten voor LANs, WANs en draadloze netwerken beschrijven Netwerk bedreigingen en toepasselijke tegenmaatregelen identificeren Netwerken managen, monitoren en troubleshooten Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels). Deze training is ontworpen voor cursisten die de CompTIA Network+ certificering willen behalen. Deze certificering is op foundation-level en bedoeld voor IT professionals met ongeveer 1 jaar werkervaring met netwerkbeheer. Dit examen bevestigd dat de cursist over de kennis en vaardigheden beschikt die vereist zijn om veelvoorkomende netwerk apparaten te troubleshooten, configureren en managen; netwerk connectiviteit tot stand te brengen; netwerk documentatie begrijpen en onderhouden; en netwerk security, standaarden en protocollen te implementeren. De cursist zal bedrijfstechnologieën leren begrijpen op basisniveau, waaronder cloud en virtualisatie technologieën. Deze training leert je de fundamentele principes van het instelleren, configureren en troubleshooten van netwerk technologieën en helpt je verder te komen in je carrière als netwerkbeheerder. Het bereid je voor op het CompTIA Network+ N10-007 examen door 100% van de doelstellingen en content voorbeelden die in de syllabus staan te behandelen. Het deelnemen aan de training kan ook helpen voorbereiden op vendor-specific technical support kwalificaties en basis fungeren voor de meer geavanceerde trainingen. Na het afronden van de training kun je: De features van verschillende netwerk protocollen en producten voor LANs, WANs en draadloze netwerken beschrijven. De features en functies van TCP/IP adressing en protocollen begrijpen. Netwerk bedreigingen en toepasselijke tegenmaatregelen identificeren. Netwerk bekabeling en toepassingen installeren en configureren. Netwerken managen, monitoren en troubleshooten. Lesmethode Bij Master IT train je met onze unieke lesmethode Active Learning, hiermee leer je aantoonbaar effectiever! Wij zjn er namelijk van overtuigd dat je slimmer en met meer plezier leert als je actief met je lesstof omgaat. Onze klassen zijn gevuld met maximaal 8 cursisten. Hierbij luister je niet passief naar een trainer, maar ga je interactief en 1-op-1 met de trainer aan de slag om ervoor te zorgen dat jouw leerdoelen behaald worden. De theorie maak je je zoveel mogelijk zelf eigen, de nadruk van de begeleiding ligt op het begrijpen en toepassen van die theorie in de praktijk. Zo leer je alleen datgene wat je echt nodig hebt. Je bepaalt zelf je leertempo. De trainer coacht je bij het definiëren van jouw leertraject. Je onthoudt en begrijpt je nieuwe kennis beter. Alles draait om toepassing van de stof in jouw praktijk. Om alle beschikbare trainingsdata in te zien, bekijk dan onze eigen website Doelgroep CompTIA Network+ is de eerste certificering die IT professionals gespecialiseerd in netwerkbeheer en support zouden moeten behalen. Network+ is gericht op IT professionals met als functie netwerkbeheerder, netwerk techneuten, mensen verantwoordelijk voor het installeren van een netwerk, help desk techneuten en mensen belast met het installeren van IT kabels.CompTIA Network+ is de eerste certificering die IT professionals gespecialiseerd in netwerkbeheer en support zouden moeten behalen. Network+ is gericht op IT professionals met als functie netwerkbeheerder, netwerk techneuten, mensen verantwoordelijk voor het installeren van een netwerk, help desk techneuten en mensen belast met het installeren van IT kabels. Voorkennis Voor het volgen van deze training dien je te beschikken over een behaalde A+ certificering en/of 9 tot 12 maanden ervaring met IT beheer. Het is niet nodig om de A+ certificering te behalen voor je deze training gaat volgen, maar het wordt wel aangeraden. Het wordt vooral aangeraden dat je voor het volgen van deze training beschikt over: Kennis van het configureren en supporten van PCs, laptops, mobiele apparaten (smartphones/tablets) en printers. Kennis hebben van basis netwerk terminologieën en functies (zoals Ethernet, TCP/IP, switches en routers). Vaardigheden in het configureren en managen van gebruikers, groepen en gedeelde resources in een simpel SOHO netwerk. De werking van basic access control mesures begrijpen, zoals authenticatie, security policy, encryptie en firewalls. Voor het volgen van deze training dien je te beschikken over een behaalde A+ certificering en/of 9 tot 12 maanden ervaring met IT beheer. Het is niet nodig om de A+ certificering te behalen voor je deze training gaat volgen, maar het wordt wel aangeraden. Het wordt vooral aangeraden dat je voor het volgen van deze training beschikt over: Kennis van het configureren en supporten van PCs, laptops, mobiele apparaten (smartphones/tablets) en printers. Kennis hebben van basis netwerk terminologieën en functies (zoals Ethernet, TCP/IP, switches en routers). Vaardigheden in het configureren en managen van gebruikers, groepen en gedeelde resources in een simpel SOHO netwerk. De werking van basic access control mesures begrijpen, zoals authenticatie, security policy, encryptie en firewalls. Onderdelen Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kan voorbereiden op het examen.  Lesson 1: Introduction to NetworksLesson 2: The Open Systems Interconnection (OSI) Reference ModelLesson 3: Networking Connectors and Wiring StandardsLesson 4: The Current Ethernet SpecificationsLesson 5: Networking Devices Lesson 6: Introduction to the Internet ProtocolLesson 7: IP AddressingLesson 8: IP Subnetting, Troubleshooting IP, and introduction to NATLesson 9: Introduction to IP RoutingLesson 10: Routing Protocols Lesson 11: Switching and Virtual LANsLesson 12: Wireless NetworkingLesson 13: Remote Network AccesLesson 14: Using Statistics and Sensors to Ensure Network AvailabilityLesson 15: Organizational Documents and PoliciesLesson 16: High Availability and Disaster Recovery Lesson 17: Data Center Architecture and Cloud ConceptsLesson 18: Network Troubleshooting MethodologyLesson 19: Network Software Tools and CommandsLesson 20: Network Security Concepts Lesson 21: Common Types of AttackHet lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kan voorbereiden op het examen.  Lesson 1: Introduction to NetworksLesson 2: The Open Systems Interconnection (OSI) Reference ModelLesson 3: Networking Connectors and Wiring StandardsLesson 4: The Current Ethernet SpecificationsLesson 5: Networking Devices Lesson 6: Introduction to the Internet ProtocolLesson 7: IP AddressingLesson 8: IP Subnetting, Troubleshooting IP, and introduction to NATLesson 9: Introduction to IP RoutingLesson 10: Routing Protocols Lesson 11: Switching and Virtual LANsLesson 12: Wireless NetworkingLesson 13: Remote Network AccesLesson 14: Using Statistics and Sensors to Ensure Network AvailabilityLesson 15: Organizational Documents and PoliciesLesson 16: High Availability and Disaster Recovery Lesson 17: Data Center Architecture and Cloud ConceptsLesson 18: Network Troubleshooting MethodologyLesson 19: Network Software Tools and CommandsLesson 20: Network Security Concepts Lesson 21: Common Types of Attack
€2.395
Klassikaal
max 9
5 dagen

CompTIA-N CompTIA Network+ (N10-009) E-Learning (English)

Volg de CompTIA Network+ training en leer de fundamentele principes van het instelleren, configureren en troubleshooten van netwerk technologieën Na afronding van deze training kun je onder andere: De features van verschillende netwerk protocollen en producten voor LANs, WANs en draadloze netwerken beschrijven Netwerk bedreigingen en toepasselijke tegenmaatregelen identificeren Netwerken managen, monitoren en troubleshooten Deze training is ontworpen voor cursisten die de CompTIA Network+ certificering willen behalen. Deze certificering is op foundation-level en bedoeld voor IT professionals met ongeveer 1 jaar werkervaring met netwerkbeheer. Dit examen bevestigd dat de cursist over de kennis en vaardigheden beschikt die vereist zijn om veelvoorkomende netwerk apparaten te troubleshooten, configureren en managen; netwerk connectiviteit tot stand te brengen; netwerk documentatie begrijpen en onderhouden; en netwerk security, standaarden en protocollen te implementeren. De cursist zal bedrijfstechnologieën leren begrijpen op basisniveau, waaronder cloud en virtualisatie technologieën. Deze training leert je de fundamentele principes van het instelleren, configureren en troubleshooten van netwerk technologieën en helpt je verder te komen in je carrière als netwerkbeheerder. Het bereid je voor op het CompTIA Network+ N10-007 examen door 100% van de doelstellingen en content voorbeelden die in de syllabus staan te behandelen. Het deelnemen aan de training kan ook helpen voorbereiden op vendor-specific technical support kwalificaties en basis fungeren voor de meer geavanceerde trainingen. Na het afronden van de training kun je: De features van verschillende netwerk protocollen en producten voor LANs, WANs en draadloze netwerken beschrijven. De features en functies van TCP/IP adressing en protocollen begrijpen. Netwerk bedreigingen en toepasselijke tegenmaatregelen identificeren. Netwerk bekabeling en toepassingen installeren en configureren. Netwerken managen, monitoren en troubleshooten. Lesmethode Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet. Doelgroep CompTIA Network+ is de eerste certificering die IT professionals gespecialiseerd in netwerkbeheer en support zouden moeten behalen. Network+ is gericht op IT professionals met als functie netwerkbeheerder, netwerk techneuten, mensen verantwoordelijk voor het installeren van een netwerk, help desk techneuten en mensen belast met het installeren van IT kabels.CompTIA Network+ is de eerste certificering die IT professionals gespecialiseerd in netwerkbeheer en support zouden moeten behalen. Network+ is gericht op IT professionals met als functie netwerkbeheerder, netwerk techneuten, mensen verantwoordelijk voor het installeren van een netwerk, help desk techneuten en mensen belast met het installeren van IT kabels. Voorkennis Voor het volgen van deze training dien je te beschikken over een behaalde A+ certificering en/of 9 tot 12 maanden ervaring met IT beheer. Het is niet nodig om de A+ certificering te behalen voor je deze training gaat volgen, maar het wordt wel aangeraden. Het wordt vooral aangeraden dat je voor het volgen van deze training beschikt over: Kennis van het configureren en supporten van PCs, laptops, mobiele apparaten (smartphones/tablets) en printers. Kennis hebben van basis netwerk terminologieën en functies (zoals Ethernet, TCP/IP, switches en routers). Vaardigheden in het configureren en managen van gebruikers, groepen en gedeelde resources in een simpel SOHO netwerk. De werking van basic access control mesures begrijpen, zoals authenticatie, security policy, encryptie en firewalls. Voor het volgen van deze training dien je te beschikken over een behaalde A+ certificering en/of 9 tot 12 maanden ervaring met IT beheer. Het is niet nodig om de A+ certificering te behalen voor je deze training gaat volgen, maar het wordt wel aangeraden. Het wordt vooral aangeraden dat je voor het volgen van deze training beschikt over: Kennis van het configureren en supporten van PCs, laptops, mobiele apparaten (smartphones/tablets) en printers. Kennis hebben van basis netwerk terminologieën en functies (zoals Ethernet, TCP/IP, switches en routers). Vaardigheden in het configureren en managen van gebruikers, groepen en gedeelde resources in een simpel SOHO netwerk. De werking van basic access control mesures begrijpen, zoals authenticatie, security policy, encryptie en firewalls. Onderdelen Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kan voorbereiden op het examen.  Lesson 1: Introduction to NetworksLesson 2: The Open Systems Interconnection (OSI) Reference ModelLesson 3: Networking Connectors and Wiring StandardsLesson 4: The Current Ethernet SpecificationsLesson 5: Networking Devices Lesson 6: Introduction to the Internet ProtocolLesson 7: IP AddressingLesson 8: IP Subnetting, Troubleshooting IP, and introduction to NATLesson 9: Introduction to IP RoutingLesson 10: Routing Protocols Lesson 11: Switching and Virtual LANsLesson 12: Wireless NetworkingLesson 13: Remote Network AccesLesson 14: Using Statistics and Sensors to Ensure Network AvailabilityLesson 15: Organizational Documents and PoliciesLesson 16: High Availability and Disaster Recovery Lesson 17: Data Center Architecture and Cloud ConceptsLesson 18: Network Troubleshooting MethodologyLesson 19: Network Software Tools and CommandsLesson 20: Network Security Concepts Lesson 21: Common Types of AttackHet lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kan voorbereiden op het examen.  Lesson 1: Introduction to NetworksLesson 2: The Open Systems Interconnection (OSI) Reference ModelLesson 3: Networking Connectors and Wiring StandardsLesson 4: The Current Ethernet SpecificationsLesson 5: Networking Devices Lesson 6: Introduction to the Internet ProtocolLesson 7: IP AddressingLesson 8: IP Subnetting, Troubleshooting IP, and introduction to NATLesson 9: Introduction to IP RoutingLesson 10: Routing Protocols Lesson 11: Switching and Virtual LANsLesson 12: Wireless NetworkingLesson 13: Remote Network AccesLesson 14: Using Statistics and Sensors to Ensure Network AvailabilityLesson 15: Organizational Documents and PoliciesLesson 16: High Availability and Disaster Recovery Lesson 17: Data Center Architecture and Cloud ConceptsLesson 18: Network Troubleshooting MethodologyLesson 19: Network Software Tools and CommandsLesson 20: Network Security Concepts Lesson 21: Common Types of Attack
€690
E-Learning
max 9
0 dagen

CompTIA-PT CompTIA PenTest+ E-Learning (PT0-002) (English)

Volg de CompTIA PenTest+ E-learning bij Master IT! De CompTIA PenTest+ E-learning leert je de nieuwste mogelijkheden omtrent penetratietesten, kwetsbaarheidsbeoordeling en managementvaardigheden die essentieel zijn om systemen tegen aanvallen te beschermen. Na afronding van deze training kun je onder andere: Uitleggen van key aspects van compliance-based assessments Uitvoeren van een kwetsbaarheid scan Analyseren van de resultaten van de kwetsbaarheidscan De CompTIA PenTest+ E-learning leert je de nieuwste mogelijkheden omtrent penetratietesten, kwetsbaarheidsbeoordeling en managementvaardigheden die essentieel zijn om systemen tegen aanvallen te beschermen.Jouw CompTIA PenTest+ E-learning bevat: officieel lesmateriaal, Quizzes, een lab waarin je kan oefenen, Assessments, proefexamenvragen en videolessen.De PenTest+ e-learning training omvat alle doelstellingen van het CompTIA PenTest+ PT0-001-examen en leert je de basis van het penetratietesten. Je gaat onder andere in op planning, rapportage en scoping van een penetratietestbeoordeling, het begrijpen van wettelijke en nalevingsvereisten, het uitvoeren van penetratietesten en het scannen van kwetsbaarheden, het interpreteren van gegevens en het adequaat rapporteren van de resultaten. Lesmethode Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet. Doelgroep Iedereen die geavanceerde kennis op wil doen in informatiebeveiliging. Carrierekansen na deze training zijn: Penetration Tester Vulnerability Tester Network Security Operations Application Security Vulnerability Vulnerability Assessment Analyst Iedereen die geavanceerde kennis op wil doen in informatiebeveiliging. Carrierekansen na deze training zijn: Penetration Tester Vulnerability Tester Network Security Operations Application Security Vulnerability Vulnerability Assessment Analyst Voorkennis Voor deze training heb je: Network+, Security+ of gelijkwaardige kennis. Minimaal 3-4 jaar hands-on informatiebeveiliging of aanverwante ervaring. Voor deze training heb je: Network+, Security+ of gelijkwaardige kennis. Minimaal 3-4 jaar hands-on informatiebeveiliging of aanverwante ervaring. Onderdelen Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.  Planning and Scoping - 15%SExplain the importance of planning for an engagement.     Understanding the target audience Rules of engagement Communication escalation path Resources and requirements Budget Impact analysis and remediation timelines Disclaimers Technical constraints Support resources Explain key legal concepts.         Contracts Environmental differences Written authorization Explain the importance of scoping an engagement properly.            Types of assessment Special scoping considerations Target selection Strategy Risk acceptance Tolerance to impact Scheduling Scope creep Threat actors Explain the key aspects of compliance-based assessments.     Compliance-based assessments, limitations and caveats Clearly defined objectives based on regulations Information Gathering and Vulnerability Identification - 22%Given a scenario, conduct information gathering using appropriate techniques.              Scanning Enumeration Packet crafting Packet inspection Fingerprinting Cryptography Eavesdropping Decompilation Debugging Open Source Intelligence Gathering Given a scenario, perform a vulnerability scan. Credentialed vs. non-credentialed Types of scans Container securit Application scan Considerations of vulnerability scanning Given a scenario, analyze vulnerability scan results.             Asset categorization Adjudication Prioritization of vulnerabilities Common themes Explain the process of leveraging information to prepare for exploitation.            Map vulnerabilities to potential exploits Prioritize activities in preparation for penetration test Describe common techniques to complete attack Explain weaknesses related to specialized systems.             ICS SCADA Mobile IoT Embedded Point-of-sale system Biometrics Application containers RTOS Attacks and Exploits - 30%Compare and contrast social engineering attacks.             Phishing Elicitation Interrogation Impersonation Shoulder surfing USB key drop Motivation techniques Pass the hash Man-in-the-middle DoS/stress test NAC bypass VLAN hopping Given a scenario, exploit wireless and RF-based vulnerabilities.  Evil twin Deauthentication attacks Fragmentation attacks Credential harvesting WPS implementation weakness Bluejacking Bluesnarfing RFID cloning Jamming Repeating Given a scenario, exploit application-based vulnerabilities.  Injections Authentication Authorization Cross-site scripting (XSS) Cross-site request forgery (CSRF/XSRF) Clickjacking Security misconfiguration File inclusion Unsecure code practices Given a scenario, exploit local host vulnerabilities.             OS vulnerabilities Unsecure service and protocol configurations Privilege escalation Default account settings Sandbox escape Physical device security Summarize physical security attacks related to facilities.            Piggybacking/tailgating Fence jumping Dumpster diving Lock picking Lock bypass Egress sensor Badge cloning Given a scenario, perform post-exploitation techniques.        Lateral movement Persistence Covering your tracks Penetration Testing Tools - 17%Given a scenario, use Nmap to conduct information gathering exercises.       SYN scan (-sS) vs. full connect scan (-sT) Port selection (-p) Service identification (-sV) OS fingerprinting (-O) Disabling ping (-Pn) Target input file (-iL) Timing (-T) Output parameters Compare and contrast various use cases of tools.             Use cases Tools Given a scenario, analyze tool output or data related to a penetration test.    Password cracking Pass the hash Setting up a bind shell Getting a reverse shell Proxying a connection Uploading a web shell Injections Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell).    Logic I/O Substitutions Variables Common operations Error handling Arrays Encoding/decoding Reporting and Communication - 16%Given a scenario, use report writing and handling best practices.           Normalization of data Written report of findings and remediation Risk appetite Storage time for report Secure handling and disposition of reports Explain post-report delivery activities.   Post-engagement cleanup Client acceptance Lessons learned Follow-up actions/retest Attestation of findings Given a scenario, recommend mitigation strategies for discovered vulnerabilities.    Solutions Findings Remediation Explain the importance of communication during the penetration testing process.       Communication path Communication triggers Reasons for communication Goal reprioritization Het lesmateriaal van deze CompTIA training is zeer uitgebreid en aangevuld met extra materiaal, zoals een pre-assesment, flashcards en oefenexamens. Dit betekent dat je niet al het materiaal tijdens je lesdagen zult behandelen. Wil je je goed voorbereiden op het examen, dan is er veel extra materiaal beschikbaar zodat je je thuis optimaal kunt klaarmaken voor het examen.  Planning and Scoping - 15%SExplain the importance of planning for an engagement.     Understanding the target audience Rules of engagement Communication escalation path Resources and requirements Budget Impact analysis and remediation timelines Disclaimers Technical constraints Support resources Explain key legal concepts.         Contracts Environmental differences Written authorization Explain the importance of scoping an engagement properly.            Types of assessment Special scoping considerations Target selection Strategy Risk acceptance Tolerance to impact Scheduling Scope creep Threat actors Explain the key aspects of compliance-based assessments.     Compliance-based assessments, limitations and caveats Clearly defined objectives based on regulations Information Gathering and Vulnerability Identification - 22%Given a scenario, conduct information gathering using appropriate techniques.              Scanning Enumeration Packet crafting Packet inspection Fingerprinting Cryptography Eavesdropping Decompilation Debugging Open Source Intelligence Gathering Given a scenario, perform a vulnerability scan. Credentialed vs. non-credentialed Types of scans Container securit Application scan Considerations of vulnerability scanning Given a scenario, analyze vulnerability scan results.             Asset categorization Adjudication Prioritization of vulnerabilities Common themes Explain the process of leveraging information to prepare for exploitation.            Map vulnerabilities to potential exploits Prioritize activities in preparation for penetration test Describe common techniques to complete attack Explain weaknesses related to specialized systems.             ICS SCADA Mobile IoT Embedded Point-of-sale system Biometrics Application containers RTOS Attacks and Exploits - 30%Compare and contrast social engineering attacks.             Phishing Elicitation Interrogation Impersonation Shoulder surfing USB key drop Motivation techniques Pass the hash Man-in-the-middle DoS/stress test NAC bypass VLAN hopping Given a scenario, exploit wireless and RF-based vulnerabilities.  Evil twin Deauthentication attacks Fragmentation attacks Credential harvesting WPS implementation weakness Bluejacking Bluesnarfing RFID cloning Jamming Repeating Given a scenario, exploit application-based vulnerabilities.  Injections Authentication Authorization Cross-site scripting (XSS) Cross-site request forgery (CSRF/XSRF) Clickjacking Security misconfiguration File inclusion Unsecure code practices Given a scenario, exploit local host vulnerabilities.             OS vulnerabilities Unsecure service and protocol configurations Privilege escalation Default account settings Sandbox escape Physical device security Summarize physical security attacks related to facilities.            Piggybacking/tailgating Fence jumping Dumpster diving Lock picking Lock bypass Egress sensor Badge cloning Given a scenario, perform post-exploitation techniques.        Lateral movement Persistence Covering your tracks Penetration Testing Tools - 17%Given a scenario, use Nmap to conduct information gathering exercises.       SYN scan (-sS) vs. full connect scan (-sT) Port selection (-p) Service identification (-sV) OS fingerprinting (-O) Disabling ping (-Pn) Target input file (-iL) Timing (-T) Output parameters Compare and contrast various use cases of tools.             Use cases Tools Given a scenario, analyze tool output or data related to a penetration test.    Password cracking Pass the hash Setting up a bind shell Getting a reverse shell Proxying a connection Uploading a web shell Injections Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell).    Logic I/O Substitutions Variables Common operations Error handling Arrays Encoding/decoding Reporting and Communication - 16%Given a scenario, use report writing and handling best practices.           Normalization of data Written report of findings and remediation Risk appetite Storage time for report Secure handling and disposition of reports Explain post-report delivery activities.   Post-engagement cleanup Client acceptance Lessons learned Follow-up actions/retest Attestation of findings Given a scenario, recommend mitigation strategies for discovered vulnerabilities.    Solutions Findings Remediation Explain the importance of communication during the penetration testing process.       Communication path Communication triggers Reasons for communication Goal reprioritization
€690
E-Learning
max 9
0 dagen