
Opleidingen
58.398
resultaten
AI-geletterdheid - Basis (Virtueel)
Virtueel
ma 8 sep. 2025
en 2 andere data
Lesmethode :
Virtueel
Algemeen :
In de praktische eendaagse cursus AI-geletterdheid - basis leer je op een begrijpelijke manier wat kunstmatige intelligentie (AI) is. Je ontdekt hoe AI werkt, wat je ermee kunt en hoe het jouw werk makkelijker en beter kan maken. Denk aan bekende AI-tools zoals ChatGPT en Copilot. We laten je zien wat ze precies doen en hoe jij ze slim en veilig kunt inzetten.
Je hoeft geen technische kennis te hebben. We leggen alles stap voor stap uit. Je leert bijvoorbeeld:
- Hoe je effectieve vragen stelt aan een AI (zogenoemde prompts).
- Hoe je de antwoorden controleert op fouten of vooroordelen.
- Wat de regels zijn rondom AI, zoals de AI-wet (de AI Act).
We oefenen veel samen. Je krijgt duidelijke voorbeelden, handige checklists en middelen waarmee je meteen aan de slag kunt. Ook bespreken we herkenbare situaties uit de praktijk, zodat je leert hoe je AI op een verantwoorde manier kunt gebruiken in jouw eigen werk.
Doel :
Na deze cursus begrijp je wat AI wel en niet kan en weet je hoe je er op een slimme en veilige manier mee omgaat in je werk. Je ontwikkelt de basisvaardigheden om AI effectief in te zetten, herkent mogelijke risico’s zoals foutieve informatie of vooroordelen, en weet hoe je voldoet aan de geldende regels. Je gaat naar huis met de kennis en het zelfvertrouwen om AI bewust en professioneel toe te passen.
Doelgroep :
Deze cursus is voor iedereen die werkt met AI, of dat binnenkort gaat doen.
Voorkennis :
Je hebt geen voorkennis nodig.
Onderwerpen :
- Wat is AI en hoe werkt het in de praktijk?
- Hoe gebruik je AI-tools zoals ChatGPT en Copilot slim en veilig?
- Kansen eacute;n risico's van AI in werkprocessen
- AI Act: verplichtingen voor eindgebruikers vanaf 2025
- Wat is een goede prompt en hoe verbeter je output?
- Bias, hallucinatie, datarisico's en hoe je ze herkent
- Mini-audit: leer AI-output beoordelen en verbeteren
- Werken met hulpmiddelen: promptkaart, checklist en begrippenlijst
- Reflectie: wat neem je mee en hoe ga je morgen verder?

€795
Klassikaal
max 12
AI-geletterdheid - Basis
Nieuwegein
ma 8 sep. 2025
en 2 andere data
Lesmethode :
Klassikaal
Algemeen :
In de praktische eendaagse cursus AI-geletterdheid - basis leer je op een begrijpelijke manier wat kunstmatige intelligentie (AI) is. Je ontdekt hoe AI werkt, wat je ermee kunt en hoe het jouw werk makkelijker en beter kan maken. Denk aan bekende AI-tools zoals ChatGPT en Copilot. We laten je zien wat ze precies doen en hoe jij ze slim en veilig kunt inzetten.
Je hoeft geen technische kennis te hebben. We leggen alles stap voor stap uit. Je leert bijvoorbeeld:
- Hoe je effectieve vragen stelt aan een AI (zogenoemde prompts).
- Hoe je de antwoorden controleert op fouten of vooroordelen.
- Wat de regels zijn rondom AI, zoals de AI-wet (de AI Act).
We oefenen veel samen. Je krijgt duidelijke voorbeelden, handige checklists en middelen waarmee je meteen aan de slag kunt. Ook bespreken we herkenbare situaties uit de praktijk, zodat je leert hoe je AI op een verantwoorde manier kunt gebruiken in jouw eigen werk.
Doel :
Na deze cursus begrijp je wat AI wel en niet kan en weet je hoe je er op een slimme en veilige manier mee omgaat in je werk. Je ontwikkelt de basisvaardigheden om AI effectief in te zetten, herkent mogelijke risico’s zoals foutieve informatie of vooroordelen, en weet hoe je voldoet aan de geldende regels. Je gaat naar huis met de kennis en het zelfvertrouwen om AI bewust en professioneel toe te passen.
Doelgroep :
Deze cursus is voor iedereen die werkt met AI, of dat binnenkort gaat doen.
Voorkennis :
Je hebt geen voorkennis nodig.
Onderwerpen :
- Wat is AI en hoe werkt het in de praktijk?
- Hoe gebruik je AI-tools zoals ChatGPT en Copilot slim en veilig?
- Kansen eacute;n risico's van AI in werkprocessen
- AI Act: verplichtingen voor eindgebruikers vanaf 2025
- Wat is een goede prompt en hoe verbeter je output?
- Bias, hallucinatie, datarisico's en hoe je ze herkent
- Mini-audit: leer AI-output beoordelen en verbeteren
- Werken met hulpmiddelen: promptkaart, checklist en begrippenlijst
- Reflectie: wat neem je mee en hoe ga je morgen verder?

€795
Klassikaal
max 12
EC-Council Network Defense Essentials (NDE)
Who Should Attend
This course is aimed at IT administrators and specialists who want to implement and optimize network security measures.

€2.950
Klassikaal
max 20
Developing Generative AI Applications on AWS (DGAIA)
Prerequisites
We recommend that attendees of this course have:
Completed AWS Technical Essentials (AWSE)
Intermediate-level proficiency in Python
Who Should Attend
This course is intended for:
Software developers interested in using LLMs without fine-tuning
Gedetailleerde cursusinhoud
Day 1
Module 1: Introduction to Generative AI – Art of the Possible
Overview of ML
Basics of generative AI
Generative AI use cases
Generative AI in practice
Risks and benefits
Module 2: Planning a Generative AI Project
Generative AI fundamentals
Generative AI in practice
Generative AI context
Steps in planning a generative AI project
Risks and mitigation
Module 3: Getting Started with Amazon Bedrock
Introduction to Amazon Bedrock
Architecture and use cases
How to use Amazon Bedrock
Demonstration: Setting up Bedrock access and using playgrounds
Module 4: Foundations of Prompt Engineering
Basics of foundation models
Fundamentals of prompt engineering
Basic prompt techniques
Advanced prompt techniques
Model-specific prompt techniques
Demonstration: Fine-tuning a basic text prompt
Addressing prompt misuses
Mitigating bias
Demonstration: Image bias mitigation
Day 2
Module 5: Amazon Bedrock Application Components
Overview of generative AI application components
Foundation models and the FM interface
Working with datasets and embeddings
Demonstration: Word embeddings
Additional application components
Retrieval Augmented Generation (RAG)
Model fine-tuning
Securing generative AI applications
Generative AI application architecture
Module 6: Amazon Bedrock Foundation Models
Introduction to Amazon Bedrock foundation models
Using Amazon Bedrock FMs for inference
Amazon Bedrock methods
Data protection and auditability
Lab: Invoke Bedrock model for text generation using zero-shot prompt
Module 7: LangChain
Optimizing LLM performance
Integrating AWS and LangChain
Using models with LangChain
Constructing prompts
Structuring documents with indexes
Storing and retrieving data with memory
Using chains to sequence components
Managing external resources with LangChain agents
Module 8: Architecture Patterns
Introduction to architecture patterns
Text summarization
Lab: Using Amazon Titan Text Premier to summarize text of small files
Lab: Summarize long texts with Amazon Titan
Question answering
Lab: Using Amazon Bedrock for question answering
Chatbot
Lab: Build a chatbot
Code generation
Lab: Using Amazon Bedrock models for code generation
LangChain and agents for Amazon Bedrock
Lab: Building conversational applications with the Converse API

€1.795
Klassikaal
max 20
EC-Council Ethical Hacking Essentials (EHE)
Who Should Attend
This course is aimed at IT administrators and professionals who want to develop an understanding of hacking methods to better secure their systems.

€2.950
Klassikaal
max 20
Horizon Deploy and Manage (HDM) Online
Online Training
ma 18 aug. 2025
Course Content
Course Introduction
Introduction to Horizon
vSphere for Horizon
Create Windows Desktops
Create Linux Desktops
Creating and Managing Desktop Pools
Horizon Client Options
Creating and Managing Instant-Clone Desktops
Creating RDS Desktop and Application Pools
Monitoring Horizon
Horizon Connection Server
Horizon Protocols
Graphics in Horizon
Securing Connections: Network
Securing Connections: Authentication
Horizon Scalability
Horizon Cloud and Universal Broker
Omnissa Access and Virtual Application Management
Prerequisites
Before attending this course, you must have
the following skills:
Use vSphere Web Client
Create snapshots of virtual machines
Configure guest customization specifications
Modify virtual machine properties
Convert a virtual machine to a template
Microsoft Windows system administration experience:
Configure Active Directory services, including DNS, DHCP, and time synchronization
Restrict user activities by implementing Group Policy Objects
Configure Windows systems to enable Remote Desktop Connections
Who Should Attend
Tier 1 Operators, administrators, and architects, responsible for the creation, maintenance, and or delivery of remote and virtual desktop services
Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure.
Gedetailleerde cursusinhoud
1. Course Introduction
Introductions and course logistics
Course objectives
2. Introduction to Horizon
Recognize the features and benefits of Horizon
Describe the conceptual and logical architecture of Horizon
3. vSphere for Horizon
Explain basic virtualization concepts
Use vSphere Client™ to access your vCenter Server system and ESXi hosts
Create, provision, and remove a virtual machine
4. Create Windows Desktops
Outline the steps to install Horizon Agent on Windows virtual machines
Install Horizon Agent on a Windows virtual machine
Optimize and prepare Windows virtual machines to set up Horizon desktop VMs
5. Create Linux Desktops
Create a Linux VM for Horizon
Install Horizon Agent on a Linux virtual machine
Optimize and prepare Linux virtual machines to set up Horizon desktop VMs
6. Creating and Managing Desktop Pools
Identify the steps to set up a template for desktop pool deployment
List the steps to add desktops to the Horizon® Connection Server™ inventory
Compare dedicated-assignment and floating-assignment pools
Outline the steps to create an automated pool
Define user entitlement
Explain the hierarchy of global, pool-level, and user-level policies
7. Horizon Client Options
Describe the different clients and their benefits
Access Horizon desktop using various Horizon clients and HTML
Configure integrated printing, USB redirection, and the shared folders option
Configure session collaboration and media optimization for Microsoft Teams
8. Creating and Managing Instant-Clone Desktops
List the advantages of instant clones
Explain the provisioning technology used for instant clone desktop pools
Set up an automated pool of instant clones
Push updated images to instant clone desktop pools
9. Creating RDS Desktop and Application Pools
Explain the difference between an RDS desktop pool and an automated pool
Compare and contrast an RDS session host pool, a farm, and an application pool
Create an RDS desktop pool and an application pool
Access RDS desktops and applications from Horizon Client
Use the instant clone technology to automate the buildout of RDSH farms
Configure load-balancing for RDSHs on a farm
10. Monitoring Horizon
Monitor the status of the Horizon components using the Horizon Administrator console dashboard
Monitor desktop sessions using the HelpDesk tool
Monitor the performance of the remote desktop using the Horizon Performance Tracker
11. Horizon Connection Server
Recognize Horizon reference architecture
Identify the Horizon Connection Server supported features
Identify the recommended system requirements for Horizon Connection Server
Configure Horizon event database
Outline the steps for the initial configuration of Horizon Connection Server
Discuss the AD LDS database as a critical component of Horizon Connection Server installation
12. Horizon Protocols
Compare the remote display protocols that are available in Horizon
Describe BLAST
Summarize BLAST Codec options
List ideal applications for each BLAST codec
Describe BLAST and PCoIP ADMX GPO common configurations
13. Graphics in Horizon
Describe the 3D rendering options available in Horizon 8
Compare vSGA and vDGA
List the steps to configure graphics cards for use in a Horizon environment
14. Securing Connections: Network
Compare tunnels and direct connections for client access to desktops
Discuss the benefits of using Unified Access Gateway
List the Unified Access Gateway firewall rules
Configure TLS certificates in Horizon
15. Securing Connections: Authentication
Compare the authentication options that Horizon Connection Server supports
Restrict access to the Horizon remote desktops using restricted entitlements
Describe the smart card authentication methods that Horizon Connection Server supports
Explain the purpose of permissions, roles, and privileges in Horizon
Create custom roles
16. Horizon Scalability
Describe the purpose of a replica connection server
Explain how multiple Horizon Connection Server instances in a pod maintain synchronization
List the steps to configure graphics cards for use in a Horizon environment
Configure a load balancer for use in a Horizon environment
Explain Horizon Cloud Pod Architecture LDAP replication and VIPA
Explain Horizon Cloud Pod Architecture scalability options
17. Horizon Cloud and Universal Broker
Recognize the features and benefits of Horizon Cloud Service
Use Universal Broker to connect to a Horizon Cloud instance
Configure and pair the Horizon Cloud Connector appliance with Horizon Connection Server
18. Omnissa Access and Virtual Application Management
Recognize the features and benefits of Workspace ONE Access
Recognize the Workspace ONE Access console features
Explain identity management in Workspace ONE Access
Explain access management in Workspace ONE Access
Describe the Workspace ONE Access directory integration
Deploy virtual applications with Workspace services

€4.225
Klassikaal
max 20
VMware vSphere with Tanzu: Deploy, Configure, Manage [V8] (VSTDCM8)
Course Content
Course Introduction
Introductions and course logistics
Course objectives
Introduction to Containers and Kubernetes
Differentiate between containers and virtual machines
Identify the parts of a container system
List the steps in a basic Docker workflow
Explain the importance of Kubernetes
Identify the basic architecture of Kubernetes
Describe a basic Kubernetes workflow
Introducing vSphere with Tanzu
Describe vSphere with Tanzu
Describe Tanzu Kubernetes Grid
Describe VMware Tanzu® Mission Control
Describe VMware Tanzu® for Kubernetes Operations
Explain the purpose of vSphere with Tanzu
Identify the capabilities of vSphere with Tanzu
Describe the vSphere with Tanzu Supervisor
Identify the components of the vSphere with Tanzu Supervisor
Describe vSphere Namespaces
Describe the Supervisor Services
Describe the VM Service
Describe Tanzu Kubernetes Grid clusters
vSphere with Tanzu Infrastructure
Discuss storage concepts for vSphere with Tanzu
Describe storage policies
Describe content libraries
Explain the Container Storage Interface plug-in functionalities
Discuss storage for Tanzu Kubernetes Grid clusters
Describe the vSAN Direct datastore for vSphere with Tanzu
Identify the two network stacks available for vSphere with Tanzu deployments
List the VDS components that vSphere with Tanzu supports
List the NSX components that vSphere with Tanzu supports
Outline the supported load balancer solutions by vSphere with Tanzu
vSphere with Tanzu Architecture
Describe the Supervisor architecture
List the different options for deploying the Supervisor
Outline the requirements for deploying a Supervisor
Outline the licensing requirements for the Supervisor
Describe vSphere Namespaces
List vSphere Namespace resources and Kubernetes object limits
Define content libraries and VM images
Explain VM classes
Describe Kubernetes CLI Tools for vSphere
List the different types of authentication available in vSphere with Tanzu
Explain vSphere privileges
Explain roles and permissions in vSphere Namespaces
Explain Tanzu Kubernetes Grid RBAC
List the Tanzu Kubernetes Grid authentication methods
List the vSphere with Tanzu services and workloads
Identify the supportability for vSphere with Tanzu services and workloads based on the Supervisor deployment types
vSphere with Tanzu Workloads and Services
Describe the characteristics of vSphere Pods
Identify the capabilities of vSphere Pods
List the components of vSphere Pods
Explain the concept of Supervisor Services
Describe the Supervisor Services catalog and its available services
Discuss how to add Supervisor Services and manage their life cycle
Describe Tanzu Kubernetes Grid clusters
List the components of Tanzu Kubernetes Grid
List the options for deploying Tanzu Kubernetes Grid workload clusters
List the different types of Tanzu Kubernetes Grid workload clusters
Outline the requirements for deploying a Tanzu Kubernetes Grid workload cluster
Describe the VM Service
Explain the use cases of the VM Service
List the VM Service parameters
Outline the requirements for deploying a VM using the VM Service
Day 2 Operations
Explain how to view Kubernetes namespace events
List the ways to monitor vSphere Pod, Tanzu Kubernetes Grid cluster, and VM performance and utilization
Describe vSphere with Tanzu control plane certificate management
Describe load balancer certificate management
Describe the prerequisites and steps for updating vSphere with Tanzu
Describe the Supervisor updates
Describe the vSphere Namespace updates
Describe the update process of Tanzu Kubernetes Grid clusters
List the steps to back up the vSphere with Tanzu components
Explain how to back up a Supervisor
Define Velero Plugin for vSphere and standalone Velero
Identify the steps to install Velero on workload clusters
Explain how to back up and restore vSphere with Tanzu workloads with the Velero CLI
Describe the various vSphere with Tanzu logs
Explain how to generate a vSphere with Tanzu support bundle
Explain how to use SSH to connect to Supervisor control plane nodes
Prerequisites
Experience deploying and managing vSphere
Understanding of Kubernetes and the Kubernetes cluster architecture
Attending one of the following courses is recommended:
VMware vSphere: Install, Configure, Manage
Kubernetes Fundamentals and Cluster Operations
Who Should Attend
vSphere administrators and platform operators who are responsible for deploying and managing workloads and services in vSphere with Tanzu

€2.250
Klassikaal
max 20
VMware Aria Automation: Install, Configure, Manage [V8.17] (VAAICM817)
Course Content
Course Introduction
VMware Aria Automation Overview and Architecture
Installing VMware Aria Automation
Authentication and Authorization
Basic Initial Configuration
VMware Aria Automation Templates
Using VMware Aria Automation Tags
Configuring Storage in VMware Aria Automation
Integrating NSX With VMware Aria Automation
Integrating VMware Aria Automation with Cloud Systems
Using VMware Aria Automation Service Broker
VMware Aria Automation Extensibility
Integration with Kubernetes
Introduction to VMware Aria Automation Config
Troubleshooting and Integration with VMware Aria Suite
Prerequisites
This course requires the students to have strong knowledge on basic VMware vSphere® concepts.
Students should be able to perform the following tasks with no assistance or guidance before enrolling in this course:
Create VMware® vCenter® objects, such as data centers and folders
Create a virtual machine using a wizard or a template
Modify a virtual machine’s hardware
Navigate through the VMware vSphere Client
Who Should Attend
System administrators and system integrators responsible for designing, implementing, and managing VMware Aria Automation
Gedetailleerde cursusinhoud
1 Course Introduction
Introductions and course logistics
Course objectives
2 VMware Aria Automation Overview and Architecture
Describe the purpose and functionality of VMware Aria Automation
Identify the key services offered by VMware Aria Automation
Describe the VMware Aria Automation architecture
Describe the use of VMware Identity Manager
Describe the relationship between Kubernetes clusters, container, and VMware Aria Automation services
3 Installing VMware Aria Automation
List the different VMware Aria Automation deployment types
Describe the purpose of Easy Installer
Describe the VMware Aria Automation installation process
4 Authentication and Authorization
Identify the steps to integrating VMware Identity Manager with Active Directory
Describe the features of VMware Identity Manager
Describe the user roles available in VMware Aria Automation
Identify the key tasks performed by each user role
Define custom roles
Configure branding and multitenancy
5 Basic Initial Configuration
List the VMware Aria Automation basic configuration steps for creating and deploying a VMware Aria Automation template
Create a basic configuration with a cloud account, cloud zone, project, flavor mapping, and image mapping
6 VMware Aria Automation Templates
Configure and deploy a basic VMware Aria Automation template
Create a VMware Aria Automation template that can run on any cloud
Use cloudConfig and cloudbase-init to run commands, create users, and install software
Use YAML for inputs, variables, and conditional deployments
7 Using VMware Aria Automation Tags
Configure tags
Describe functions of tags
Manage tags
8 Configuring Storage in VMware Aria Automation
Configure storage profiles
Use tags and storage profiles
9 Integrating NSX With VMware Aria Automation
List the capabilities and use cases of NSX
Describe the NSX architecture and components
Integrate NSX with VMware Aria Automation
List the supported network profiles in VMware Aria Automation
Use the NSX components to design a multitier application with VMware Aria Automation Templates
Identify the network and security options available in design canvas
Create and manage on-demand networks and security groups
Configure NSX Day 2 actions
10 Integrating VMware Aria Automation with Cloud Systems
Configure and use VMware Cloud Foundation® accounts
Configure and use a VMware® Cloud Director™ account
Configure and use an AWS cloud account
Configure and use an Azure cloud account
Configure and use a Google Cloud Platform cloud account
11 Using VMware Aria Automation Service Broker
Release a VMware Aria Automation template
Define content source and content sharing
Define VMware Aria Automation policy enforcement
Use custom forms for catalog items
12 VMware Aria Automation Extensibility
Describe VMware Aria Automation extensibility
Use event topics
Create a subscription
Call a VMware Aria Automation Orchestrator workflow
Create ABX actions
13 Integration with Kubernetes
Explore Kubernetes integration
Describe a Tanzu Kubernetes cluster deployment
Connect to an existing Kubernetes cluster
Create a VMware Aria Automation template with Kubernetes components
14 Introduction to VMware Aria Automation Config
Describe VMware Aria Automation Config
Use VMware Aria Automation Config for software deployment
Use VMware Aria Automation Config for configuration management
Use VMware Aria Automation Config with event-driven orchestration
15 Troubleshooting and Integration with VMware Aria Suite
Demonstrate how to monitor deployment history
Demonstrate basic troubleshooting
Execute CLI commands
Explain how to collect logs
Describe integration with VMware® Aria Operations™ for Logs
Describe integration with VMware Aria Operations

€3.440
Klassikaal
max 20
EC-Council Certified Cloud Security Engineer (CCSE)
Prerequisites
To be eligible to challenge the EC-Council C|CSE certification examination, candidate should:
Should have knowledge in network security management
Understanding of cloud computing concepts
Knowledge of cybersecurity concepts
Career Progression to Cloud Security, you need to obtain following certifications:
EC-Council Certified Security Specialist
Certified Network Defender
Who Should Attend
Network Security Administrator
Network Security Engineer
Network Defender
Network Security Analyst
Cybersecurity Engineer
Cybersecurity Analyst
Cloud Administrator
Cloud Engineer
Cloud Analyst
Gedetailleerde cursusinhoud
Module 01: Introduction to Cloud Security
In this module, you will be presented with the core concepts of cloud computing, cloud service models, and cloud-based threats and vulnerabilities. The module highlights service provider components, such as evaluation and the shared security responsibility model, that are essential to configuring a secure cloud environment and protecting organizational resources.
Module 02: Platform and Infrastructure Security in the Cloud
This module explores the key components and technologies that form a cloud architecture and how to secure multi-tenant, virtualized, physical, and logical cloud components. This module demonstrates configurations and best practices for securing physical data centers and cloud infrastructures using the tools and techniques provided by Azure, AWS, and GCP.
Module 03: Application Security in the Cloud
The focus of this module is securing cloud applications and explaining secure software development lifecycle changes. It explains the multiple services and tools for application security in Azure, AWS, and GCP.
Module 04: Data Security in the Cloud
This module covers the basics of cloud data storage, its lifecycle, and various controls for protecting data at rest and data in transit in the cloud. It also addresses data storage features and the multiple services and tools used for securing data stored in Azure, AWS, and GCP.
Module 05: Operation Security in the Cloud
This module encompasses the security controls essential to building, implementing, operating, managing, and maintaining physical and logical infrastructures for cloud environments and the required services, features, and tools for operational security provided by AWS, Azure, and GCP.
Module 06: Penetration Testing in the Cloud
This module demonstrates how to implement comprehensive penetration testing to assess the security of an organization's cloud infrastructure and reviews the required services and tools used to perform penetration testing in AWS, Azure, and GCP
Module 07: Incident Detection and Response in the Cloud
This module focuses on incident response (IR). It covers the IR lifecycle and the tools and techniques used to identify and respond to incidents; provides training on using SOAR technologies; and explores the IR capabilities provided by AWS, Azure, and GCP.
Module 08: Forensics Investigation in the Cloud
This module covers the forensic investigation process in cloud computing, including various cloud forensic challenges and data collection methods. It also explains how to investigate security incidents using AWS, Azure, and GCP tools.
Module 09: Business Continuity and Disaster Recovery in the Cloud
This module highlights the importance of business continuity and disaster recovery planning in IR. It covers the backup and recovery tools, services, and features provided by AWS, Azure, and GCP to monitor business continuity issues.
Module 10: Governance, Risk Management, and Compliance in the Cloud
This module focuses on the various governance frameworks, models, and regulations (ISO/IEC 27017, HIPAA, and PCI DSS) and the design and implementation of governance frameworks in the cloud. It also addresses cloud compliance frameworks and elaborates on the AWS, Azure, and GCP governance modules.
Module 10: Governance, Risk Management, and Compliance in the Cloud
This module focuses on the various governance frameworks, models, and regulations (ISO/IEC 27017, HIPAA, and PCI DSS) and the design and implementation of governance frameworks in the cloud. It also addresses cloud compliance frameworks and elaborates on the AWS, Azure, and GCP governance modules.
Module 11: Standards, Policies, and Legal Issues in the Cloud
This module discusses standards, policies, and legal issues associated with the cloud. It also covers the features, services, and tools needed for compliance and auditing in AWS, Azure, and GCP.
Appendix (Self-Study): Private, Hybrid, and Multi-Tenant Cloud Security
The appendix covers the security of private, hybrid, and multi-tenant cloud models. It lists some of the best practices for securing VMWare Cloud, AWS, GCP, Azure hybrid cloud setups, and multi-tenant clouds.

€3.950
Klassikaal
max 20
EC-Council Certified Security Specialist (ECSS) Online
Online Training
ma 15 sep. 2025
Who Should Attend
ECSS is designed for anyone who want to enhance their skills and make career in information security, network security, and computer forensics fields.
Gedetailleerde cursusinhoud
Information Security Fundamentals
Networking Fundamentals
Secure Network Protocols
Information Security Threats and Attacks
Social Engineering
Hacking Cycle
Identification, Authentication, and Authorization
Cryptography
Firewalls
Intrusion Detection System
Data Backup
Virtual Private Network
Wireless Network Security
Web Security
Ethical Hacking and Pen Testing
Incident Response
Computer Forensics Fundamentals
Digital Evidence
Understanding File Systems
Windows Forensics
Network Forensics and Investigating Network Traffic
Steganography
Analyzing Logs
E-mail Crime and Computer Forensics
Writing Investigative Report

€2.950
Klassikaal
max 20