Onderwerp
Automatisering & ICT/IT
Communicatie
Financieel
HR
Inkoop & logistiek
Management
Secretarieel & Administratief
Marketing
Opleiding & Onderwijs
Persoonlijke Effectiviteit
Productie, techniek & bouw
Kwaliteit- & Projectmanagement
Sales
Vitaliteit & Gezondheid
Taalcursus
Zorg & Verzorging
Juridisch
Internet & Media
Arbo & Veiligheid
Hobby & Vrije Tijd
Vastgoed & Makelaardij
Abonnementen
Locatie
Niveau
Type
Keurmerk

Opleidingen

58.398 resultaten

AI-geletterdheid - Basis (Virtueel)

Virtueel ma 8 sep. 2025 en 2 andere data
Lesmethode : Virtueel Algemeen : In de praktische eendaagse cursus AI-geletterdheid - basis leer je op een begrijpelijke manier wat kunstmatige intelligentie (AI) is. Je ontdekt hoe AI werkt, wat je ermee kunt en hoe het jouw werk makkelijker en beter kan maken. Denk aan bekende AI-tools zoals ChatGPT en Copilot. We laten je zien wat ze precies doen en hoe jij ze slim en veilig kunt inzetten. Je hoeft geen technische kennis te hebben. We leggen alles stap voor stap uit. Je leert bijvoorbeeld: - Hoe je effectieve vragen stelt aan een AI (zogenoemde prompts). - Hoe je de antwoorden controleert op fouten of vooroordelen. - Wat de regels zijn rondom AI, zoals de AI-wet (de AI Act). We oefenen veel samen. Je krijgt duidelijke voorbeelden, handige checklists en middelen waarmee je meteen aan de slag kunt. Ook bespreken we herkenbare situaties uit de praktijk, zodat je leert hoe je AI op een verantwoorde manier kunt gebruiken in jouw eigen werk. Doel : Na deze cursus begrijp je wat AI wel en niet kan en weet je hoe je er op een slimme en veilige manier mee omgaat in je werk. Je ontwikkelt de basisvaardigheden om AI effectief in te zetten, herkent mogelijke risico’s zoals foutieve informatie of vooroordelen, en weet hoe je voldoet aan de geldende regels. Je gaat naar huis met de kennis en het zelfvertrouwen om AI bewust en professioneel toe te passen. Doelgroep : Deze cursus is voor iedereen die werkt met AI, of dat binnenkort gaat doen. Voorkennis : Je hebt geen voorkennis nodig. Onderwerpen : - Wat is AI en hoe werkt het in de praktijk? - Hoe gebruik je AI-tools zoals ChatGPT en Copilot slim en veilig? - Kansen eacute;n risico's van AI in werkprocessen - AI Act: verplichtingen voor eindgebruikers vanaf 2025 - Wat is een goede prompt en hoe verbeter je output? - Bias, hallucinatie, datarisico's en hoe je ze herkent - Mini-audit: leer AI-output beoordelen en verbeteren - Werken met hulpmiddelen: promptkaart, checklist en begrippenlijst - Reflectie: wat neem je mee en hoe ga je morgen verder?
€795
Klassikaal
max 12

AI-geletterdheid - Basis

Nieuwegein ma 8 sep. 2025 en 2 andere data
Lesmethode : Klassikaal Algemeen : In de praktische eendaagse cursus AI-geletterdheid - basis leer je op een begrijpelijke manier wat kunstmatige intelligentie (AI) is. Je ontdekt hoe AI werkt, wat je ermee kunt en hoe het jouw werk makkelijker en beter kan maken. Denk aan bekende AI-tools zoals ChatGPT en Copilot. We laten je zien wat ze precies doen en hoe jij ze slim en veilig kunt inzetten. Je hoeft geen technische kennis te hebben. We leggen alles stap voor stap uit. Je leert bijvoorbeeld: - Hoe je effectieve vragen stelt aan een AI (zogenoemde prompts). - Hoe je de antwoorden controleert op fouten of vooroordelen. - Wat de regels zijn rondom AI, zoals de AI-wet (de AI Act). We oefenen veel samen. Je krijgt duidelijke voorbeelden, handige checklists en middelen waarmee je meteen aan de slag kunt. Ook bespreken we herkenbare situaties uit de praktijk, zodat je leert hoe je AI op een verantwoorde manier kunt gebruiken in jouw eigen werk. Doel : Na deze cursus begrijp je wat AI wel en niet kan en weet je hoe je er op een slimme en veilige manier mee omgaat in je werk. Je ontwikkelt de basisvaardigheden om AI effectief in te zetten, herkent mogelijke risico’s zoals foutieve informatie of vooroordelen, en weet hoe je voldoet aan de geldende regels. Je gaat naar huis met de kennis en het zelfvertrouwen om AI bewust en professioneel toe te passen. Doelgroep : Deze cursus is voor iedereen die werkt met AI, of dat binnenkort gaat doen. Voorkennis : Je hebt geen voorkennis nodig. Onderwerpen : - Wat is AI en hoe werkt het in de praktijk? - Hoe gebruik je AI-tools zoals ChatGPT en Copilot slim en veilig? - Kansen eacute;n risico's van AI in werkprocessen - AI Act: verplichtingen voor eindgebruikers vanaf 2025 - Wat is een goede prompt en hoe verbeter je output? - Bias, hallucinatie, datarisico's en hoe je ze herkent - Mini-audit: leer AI-output beoordelen en verbeteren - Werken met hulpmiddelen: promptkaart, checklist en begrippenlijst - Reflectie: wat neem je mee en hoe ga je morgen verder?
€795
Klassikaal
max 12

EC-Council Network Defense Essentials (NDE)

Who Should Attend This course is aimed at IT administrators and specialists who want to implement and optimize network security measures.
€2.950
Klassikaal
max 20

Developing Generative AI Applications on AWS (DGAIA)

Prerequisites We recommend that attendees of this course have: Completed AWS Technical Essentials (AWSE) Intermediate-level proficiency in Python Who Should Attend This course is intended for: Software developers interested in using LLMs without fine-tuning Gedetailleerde cursusinhoud Day 1 Module 1: Introduction to Generative AI – Art of the Possible Overview of ML Basics of generative AI Generative AI use cases Generative AI in practice Risks and benefits Module 2: Planning a Generative AI Project Generative AI fundamentals Generative AI in practice Generative AI context Steps in planning a generative AI project Risks and mitigation Module 3: Getting Started with Amazon Bedrock Introduction to Amazon Bedrock Architecture and use cases How to use Amazon Bedrock Demonstration: Setting up Bedrock access and using playgrounds Module 4: Foundations of Prompt Engineering Basics of foundation models Fundamentals of prompt engineering Basic prompt techniques Advanced prompt techniques Model-specific prompt techniques Demonstration: Fine-tuning a basic text prompt Addressing prompt misuses Mitigating bias Demonstration: Image bias mitigation Day 2 Module 5: Amazon Bedrock Application Components Overview of generative AI application components Foundation models and the FM interface Working with datasets and embeddings Demonstration: Word embeddings Additional application components Retrieval Augmented Generation (RAG) Model fine-tuning Securing generative AI applications Generative AI application architecture Module 6: Amazon Bedrock Foundation Models Introduction to Amazon Bedrock foundation models Using Amazon Bedrock FMs for inference Amazon Bedrock methods Data protection and auditability Lab: Invoke Bedrock model for text generation using zero-shot prompt Module 7: LangChain Optimizing LLM performance Integrating AWS and LangChain Using models with LangChain Constructing prompts Structuring documents with indexes Storing and retrieving data with memory Using chains to sequence components Managing external resources with LangChain agents Module 8: Architecture Patterns Introduction to architecture patterns Text summarization Lab: Using Amazon Titan Text Premier to summarize text of small files Lab: Summarize long texts with Amazon Titan Question answering Lab: Using Amazon Bedrock for question answering Chatbot Lab: Build a chatbot Code generation Lab: Using Amazon Bedrock models for code generation LangChain and agents for Amazon Bedrock Lab: Building conversational applications with the Converse API
€1.795
Klassikaal
max 20

EC-Council Ethical Hacking Essentials (EHE)

Who Should Attend This course is aimed at IT administrators and professionals who want to develop an understanding of hacking methods to better secure their systems.
€2.950
Klassikaal
max 20

Horizon Deploy and Manage (HDM) Online

Online Training ma 18 aug. 2025
Course Content Course Introduction Introduction to Horizon vSphere for Horizon Create Windows Desktops Create Linux Desktops Creating and Managing Desktop Pools Horizon Client Options Creating and Managing Instant-Clone Desktops Creating RDS Desktop and Application Pools Monitoring Horizon Horizon Connection Server Horizon Protocols Graphics in Horizon Securing Connections: Network Securing Connections: Authentication Horizon Scalability Horizon Cloud and Universal Broker Omnissa Access and Virtual Application Management Prerequisites Before attending this course, you must have the following skills: Use vSphere Web Client Create snapshots of virtual machines Configure guest customization specifications Modify virtual machine properties Convert a virtual machine to a template Microsoft Windows system administration experience: Configure Active Directory services, including DNS, DHCP, and time synchronization Restrict user activities by implementing Group Policy Objects Configure Windows systems to enable Remote Desktop Connections Who Should Attend Tier 1 Operators, administrators, and architects, responsible for the creation, maintenance, and or delivery of remote and virtual desktop services Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure. Gedetailleerde cursusinhoud 1. Course Introduction Introductions and course logistics Course objectives 2. Introduction to Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of Horizon 3. vSphere for Horizon Explain basic virtualization concepts Use vSphere Client™ to access your vCenter Server system and ESXi hosts Create, provision, and remove a virtual machine 4. Create Windows Desktops Outline the steps to install Horizon Agent on Windows virtual machines Install Horizon Agent on a Windows virtual machine Optimize and prepare Windows virtual machines to set up Horizon desktop VMs 5. Create Linux Desktops Create a Linux VM for Horizon Install Horizon Agent on a Linux virtual machine Optimize and prepare Linux virtual machines to set up Horizon desktop VMs 6. Creating and Managing Desktop Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the Horizon® Connection Server™ inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies 7. Horizon Client Options Describe the different clients and their benefits Access Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams 8. Creating and Managing Instant-Clone Desktops List the advantages of instant clones Explain the provisioning technology used for instant clone desktop pools Set up an automated pool of instant clones Push updated images to instant clone desktop pools 9. Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and applications from Horizon Client Use the instant clone technology to automate the buildout of RDSH farms Configure load-balancing for RDSHs on a farm 10. Monitoring Horizon Monitor the status of the Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Monitor the performance of the remote desktop using the Horizon Performance Tracker 11. Horizon Connection Server Recognize Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the AD LDS database as a critical component of Horizon Connection Server installation 12. Horizon Protocols Compare the remote display protocols that are available in Horizon Describe BLAST Summarize BLAST Codec options List ideal applications for each BLAST codec Describe BLAST and PCoIP ADMX GPO common configurations 13. Graphics in Horizon Describe the 3D rendering options available in Horizon 8 Compare vSGA and vDGA List the steps to configure graphics cards for use in a Horizon environment 14. Securing Connections: Network Compare tunnels and direct connections for client access to desktops Discuss the benefits of using Unified Access Gateway List the Unified Access Gateway firewall rules Configure TLS certificates in Horizon 15. Securing Connections: Authentication Compare the authentication options that Horizon Connection Server supports Restrict access to the Horizon remote desktops using restricted entitlements Describe the smart card authentication methods that Horizon Connection Server supports Explain the purpose of permissions, roles, and privileges in Horizon Create custom roles 16. Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization List the steps to configure graphics cards for use in a Horizon environment Configure a load balancer for use in a Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication and VIPA Explain Horizon Cloud Pod Architecture scalability options 17. Horizon Cloud and Universal Broker Recognize the features and benefits of Horizon Cloud Service Use Universal Broker to connect to a Horizon Cloud instance Configure and pair the Horizon Cloud Connector appliance with Horizon Connection Server 18. Omnissa Access and Virtual Application Management Recognize the features and benefits of Workspace ONE Access Recognize the Workspace ONE Access console features Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services
€4.225
Klassikaal
max 20

VMware vSphere with Tanzu: Deploy, Configure, Manage [V8] (VSTDCM8)

Course Content Course Introduction Introductions and course logistics Course objectives Introduction to Containers and Kubernetes Differentiate between containers and virtual machines Identify the parts of a container system List the steps in a basic Docker workflow Explain the importance of Kubernetes Identify the basic architecture of Kubernetes Describe a basic Kubernetes workflow Introducing vSphere with Tanzu Describe vSphere with Tanzu Describe Tanzu Kubernetes Grid Describe VMware Tanzu® Mission Control Describe VMware Tanzu® for Kubernetes Operations Explain the purpose of vSphere with Tanzu Identify the capabilities of vSphere with Tanzu Describe the vSphere with Tanzu Supervisor Identify the components of the vSphere with Tanzu Supervisor Describe vSphere Namespaces Describe the Supervisor Services Describe the VM Service Describe Tanzu Kubernetes Grid clusters vSphere with Tanzu Infrastructure Discuss storage concepts for vSphere with Tanzu Describe storage policies Describe content libraries Explain the Container Storage Interface plug-in functionalities Discuss storage for Tanzu Kubernetes Grid clusters Describe the vSAN Direct datastore for vSphere with Tanzu Identify the two network stacks available for vSphere with Tanzu deployments List the VDS components that vSphere with Tanzu supports List the NSX components that vSphere with Tanzu supports Outline the supported load balancer solutions by vSphere with Tanzu vSphere with Tanzu Architecture Describe the Supervisor architecture List the different options for deploying the Supervisor Outline the requirements for deploying a Supervisor Outline the licensing requirements for the Supervisor Describe vSphere Namespaces List vSphere Namespace resources and Kubernetes object limits Define content libraries and VM images Explain VM classes Describe Kubernetes CLI Tools for vSphere List the different types of authentication available in vSphere with Tanzu Explain vSphere privileges Explain roles and permissions in vSphere Namespaces Explain Tanzu Kubernetes Grid RBAC List the Tanzu Kubernetes Grid authentication methods List the vSphere with Tanzu services and workloads Identify the supportability for vSphere with Tanzu services and workloads based on the Supervisor deployment types vSphere with Tanzu Workloads and Services Describe the characteristics of vSphere Pods Identify the capabilities of vSphere Pods List the components of vSphere Pods Explain the concept of Supervisor Services Describe the Supervisor Services catalog and its available services Discuss how to add Supervisor Services and manage their life cycle Describe Tanzu Kubernetes Grid clusters List the components of Tanzu Kubernetes Grid List the options for deploying Tanzu Kubernetes Grid workload clusters List the different types of Tanzu Kubernetes Grid workload clusters Outline the requirements for deploying a Tanzu Kubernetes Grid workload cluster Describe the VM Service Explain the use cases of the VM Service List the VM Service parameters Outline the requirements for deploying a VM using the VM Service Day 2 Operations Explain how to view Kubernetes namespace events List the ways to monitor vSphere Pod, Tanzu Kubernetes Grid cluster, and VM performance and utilization Describe vSphere with Tanzu control plane certificate management Describe load balancer certificate management Describe the prerequisites and steps for updating vSphere with Tanzu Describe the Supervisor updates Describe the vSphere Namespace updates Describe the update process of Tanzu Kubernetes Grid clusters List the steps to back up the vSphere with Tanzu components Explain how to back up a Supervisor Define Velero Plugin for vSphere and standalone Velero Identify the steps to install Velero on workload clusters Explain how to back up and restore vSphere with Tanzu workloads with the Velero CLI Describe the various vSphere with Tanzu logs Explain how to generate a vSphere with Tanzu support bundle Explain how to use SSH to connect to Supervisor control plane nodes Prerequisites Experience deploying and managing vSphere Understanding of Kubernetes and the Kubernetes cluster architecture Attending one of the following courses is recommended: VMware vSphere: Install, Configure, Manage Kubernetes Fundamentals and Cluster Operations Who Should Attend vSphere administrators and platform operators who are responsible for deploying and managing workloads and services in vSphere with Tanzu
€2.250
Klassikaal
max 20

VMware Aria Automation: Install, Configure, Manage [V8.17] (VAAICM817)

Course Content Course Introduction VMware Aria Automation Overview and Architecture Installing VMware Aria Automation Authentication and Authorization Basic Initial Configuration VMware Aria Automation Templates Using VMware Aria Automation Tags Configuring Storage in VMware Aria Automation Integrating NSX With VMware Aria Automation Integrating VMware Aria Automation with Cloud Systems Using VMware Aria Automation Service Broker VMware Aria Automation Extensibility Integration with Kubernetes Introduction to VMware Aria Automation Config Troubleshooting and Integration with VMware Aria Suite Prerequisites This course requires the students to have strong knowledge on basic VMware vSphere® concepts. Students should be able to perform the following tasks with no assistance or guidance before enrolling in this course: Create VMware® vCenter® objects, such as data centers and folders Create a virtual machine using a wizard or a template Modify a virtual machine’s hardware Navigate through the VMware vSphere Client Who Should Attend System administrators and system integrators responsible for designing, implementing, and managing VMware Aria Automation Gedetailleerde cursusinhoud 1 Course Introduction Introductions and course logistics Course objectives 2 VMware Aria Automation Overview and Architecture Describe the purpose and functionality of VMware Aria Automation Identify the key services offered by VMware Aria Automation Describe the VMware Aria Automation architecture Describe the use of VMware Identity Manager Describe the relationship between Kubernetes clusters, container, and VMware Aria Automation services 3 Installing VMware Aria Automation List the different VMware Aria Automation deployment types Describe the purpose of Easy Installer Describe the VMware Aria Automation installation process 4 Authentication and Authorization Identify the steps to integrating VMware Identity Manager with Active Directory Describe the features of VMware Identity Manager Describe the user roles available in VMware Aria Automation Identify the key tasks performed by each user role Define custom roles Configure branding and multitenancy 5 Basic Initial Configuration List the VMware Aria Automation basic configuration steps for creating and deploying a VMware Aria Automation template Create a basic configuration with a cloud account, cloud zone, project, flavor mapping, and image mapping 6 VMware Aria Automation Templates Configure and deploy a basic VMware Aria Automation template Create a VMware Aria Automation template that can run on any cloud Use cloudConfig and cloudbase-init to run commands, create users, and install software Use YAML for inputs, variables, and conditional deployments 7 Using VMware Aria Automation Tags Configure tags Describe functions of tags Manage tags 8 Configuring Storage in VMware Aria Automation Configure storage profiles Use tags and storage profiles 9 Integrating NSX With VMware Aria Automation List the capabilities and use cases of NSX Describe the NSX architecture and components Integrate NSX with VMware Aria Automation List the supported network profiles in VMware Aria Automation Use the NSX components to design a multitier application with VMware Aria Automation Templates Identify the network and security options available in design canvas Create and manage on-demand networks and security groups Configure NSX Day 2 actions 10 Integrating VMware Aria Automation with Cloud Systems Configure and use VMware Cloud Foundation® accounts Configure and use a VMware® Cloud Director™ account Configure and use an AWS cloud account Configure and use an Azure cloud account Configure and use a Google Cloud Platform cloud account 11 Using VMware Aria Automation Service Broker Release a VMware Aria Automation template Define content source and content sharing Define VMware Aria Automation policy enforcement Use custom forms for catalog items 12 VMware Aria Automation Extensibility Describe VMware Aria Automation extensibility Use event topics Create a subscription Call a VMware Aria Automation Orchestrator workflow Create ABX actions 13 Integration with Kubernetes Explore Kubernetes integration Describe a Tanzu Kubernetes cluster deployment Connect to an existing Kubernetes cluster Create a VMware Aria Automation template with Kubernetes components 14 Introduction to VMware Aria Automation Config Describe VMware Aria Automation Config Use VMware Aria Automation Config for software deployment Use VMware Aria Automation Config for configuration management Use VMware Aria Automation Config with event-driven orchestration 15 Troubleshooting and Integration with VMware Aria Suite Demonstrate how to monitor deployment history Demonstrate basic troubleshooting Execute CLI commands Explain how to collect logs Describe integration with VMware® Aria Operations™ for Logs Describe integration with VMware Aria Operations
€3.440
Klassikaal
max 20

EC-Council Certified Cloud Security Engineer (CCSE)

Prerequisites To be eligible to challenge the EC-Council C|CSE certification examination, candidate should: Should have knowledge in network security management Understanding of cloud computing concepts Knowledge of cybersecurity concepts Career Progression to Cloud Security, you need to obtain following certifications: EC-Council Certified Security Specialist Certified Network Defender Who Should Attend Network Security Administrator Network Security Engineer Network Defender Network Security Analyst Cybersecurity Engineer Cybersecurity Analyst Cloud Administrator Cloud Engineer Cloud Analyst Gedetailleerde cursusinhoud Module 01: Introduction to Cloud Security In this module, you will be presented with the core concepts of cloud computing, cloud service models, and cloud-based threats and vulnerabilities. The module highlights service provider components, such as evaluation and the shared security responsibility model, that are essential to configuring a secure cloud environment and protecting organizational resources. Module 02: Platform and Infrastructure Security in the Cloud This module explores the key components and technologies that form a cloud architecture and how to secure multi-tenant, virtualized, physical, and logical cloud components. This module demonstrates configurations and best practices for securing physical data centers and cloud infrastructures using the tools and techniques provided by Azure, AWS, and GCP. Module 03: Application Security in the Cloud The focus of this module is securing cloud applications and explaining secure software development lifecycle changes. It explains the multiple services and tools for application security in Azure, AWS, and GCP. Module 04: Data Security in the Cloud This module covers the basics of cloud data storage, its lifecycle, and various controls for protecting data at rest and data in transit in the cloud. It also addresses data storage features and the multiple services and tools used for securing data stored in Azure, AWS, and GCP. Module 05: Operation Security in the Cloud This module encompasses the security controls essential to building, implementing, operating, managing, and maintaining physical and logical infrastructures for cloud environments and the required services, features, and tools for operational security provided by AWS, Azure, and GCP. Module 06: Penetration Testing in the Cloud This module demonstrates how to implement comprehensive penetration testing to assess the security of an organization's cloud infrastructure and reviews the required services and tools used to perform penetration testing in AWS, Azure, and GCP Module 07: Incident Detection and Response in the Cloud This module focuses on incident response (IR). It covers the IR lifecycle and the tools and techniques used to identify and respond to incidents; provides training on using SOAR technologies; and explores the IR capabilities provided by AWS, Azure, and GCP. Module 08: Forensics Investigation in the Cloud This module covers the forensic investigation process in cloud computing, including various cloud forensic challenges and data collection methods. It also explains how to investigate security incidents using AWS, Azure, and GCP tools. Module 09: Business Continuity and Disaster Recovery in the Cloud This module highlights the importance of business continuity and disaster recovery planning in IR. It covers the backup and recovery tools, services, and features provided by AWS, Azure, and GCP to monitor business continuity issues. Module 10: Governance, Risk Management, and Compliance in the Cloud This module focuses on the various governance frameworks, models, and regulations (ISO/IEC 27017, HIPAA, and PCI DSS) and the design and implementation of governance frameworks in the cloud. It also addresses cloud compliance frameworks and elaborates on the AWS, Azure, and GCP governance modules. Module 10: Governance, Risk Management, and Compliance in the Cloud This module focuses on the various governance frameworks, models, and regulations (ISO/IEC 27017, HIPAA, and PCI DSS) and the design and implementation of governance frameworks in the cloud. It also addresses cloud compliance frameworks and elaborates on the AWS, Azure, and GCP governance modules. Module 11: Standards, Policies, and Legal Issues in the Cloud This module discusses standards, policies, and legal issues associated with the cloud. It also covers the features, services, and tools needed for compliance and auditing in AWS, Azure, and GCP. Appendix (Self-Study): Private, Hybrid, and Multi-Tenant Cloud Security The appendix covers the security of private, hybrid, and multi-tenant cloud models. It lists some of the best practices for securing VMWare Cloud, AWS, GCP, Azure hybrid cloud setups, and multi-tenant clouds.
€3.950
Klassikaal
max 20

EC-Council Certified Security Specialist (ECSS) Online

Online Training ma 15 sep. 2025
Who Should Attend ECSS is designed for anyone who want to enhance their skills and make career in information security, network security, and computer forensics fields. Gedetailleerde cursusinhoud Information Security Fundamentals Networking Fundamentals Secure Network Protocols Information Security Threats and Attacks Social Engineering Hacking Cycle Identification, Authentication, and Authorization Cryptography Firewalls Intrusion Detection System Data Backup Virtual Private Network Wireless Network Security Web Security Ethical Hacking and Pen Testing Incident Response Computer Forensics Fundamentals Digital Evidence Understanding File Systems Windows Forensics Network Forensics and Investigating Network Traffic Steganography Analyzing Logs E-mail Crime and Computer Forensics Writing Investigative Report
€2.950
Klassikaal
max 20