Opleidingen
65.438
resultaten
Examentraining PRINCE2 Foundation
Deze examentraining kan alleen worden geboekt in combinatie met het herexamen PRINCE2 Foundation. De examentraining zal in overleg online, via Teams, plaatsvinden en duurt een halve dag. Er wordt gekeken naar wat er mis is gegaan en je krijgt extra hulp en uitleg, zodat je het examen deze keer wel kunt halen.
Deze examentraining kan alleen worden geboekt in combinatie met het herexamen PRINCE2 Foundation. De examentraining zal in overleg online, via Teams, plaatsvinden en duurt een halve dag. Er wordt gekeken naar wat er mis is gegaan en je krijgt extra hulp en uitleg, zodat je het examen deze keer wel kunt halen.
Deze examentraining kan alleen worden geboekt in combinatie met het herexamen PRINCE2 Foundation. De examentraining zal in overleg online, via Teams, plaatsvinden en duurt een halve dag. Er wordt gekeken naar wat er mis is gegaan en je krijgt extra hulp en uitleg, zodat je het examen deze keer wel kunt halen.
€750
Klassikaal
max 2
Herexamen PRINCE2 Foundation
Herexamen PRINCE2 Foundation.
Dit examen kan alleen worden afgenomen nadat er bij ons een training aan vooraf is gegaan en het examen hiervan helaas niet is behaald.
We kunnen hierbij tevens een examentraining aanbieden. Deze wordt dan in overleg ingepland en zal plaatsvinden via MS-Teams. Dit is een op een met de trainer.
Herexamen PRINCE2 Foundation.
Dit examen kan alleen worden afgenomen nadat er bij ons een training aan vooraf is gegaan en het examen hiervan helaas niet is behaald.
We kunnen hierbij tevens een examentraining aanbieden. Deze wordt dan in overleg ingepland en zal plaatsvinden via MS-Teams. Dit is een op een met de trainer.
Herexamen PRINCE2 Foundation.
Dit examen kan alleen worden afgenomen nadat er bij ons een training aan vooraf is gegaan en het examen hiervan helaas niet is behaald.
We kunnen hierbij tevens een examentraining aanbieden. Deze wordt dan in overleg ingepland en zal plaatsvinden via MS-Teams. Dit is een op een met de trainer.
€530
Klassikaal
max 2
Securing Email with Cisco Email Security Appliance (SESA)
The Securing Email with Cisco Email Security Appliance (SESA) v3.1 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phis...
The Securing Email with Cisco Email Security Appliance (SESA) v3.1 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention.
This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA), which leads to CCNP® Security and the Certified Specialist - Email Content Security certifications.
After taking this course, you should be able to:
- Describe and administer the Cisco Email Security Appliance (ESA)
- Control sender and recipient domains
- Control spam with Talos SenderBase and anti-spam
- Use anti-virus and outbreak filters
- Use mail policies
- Use content filters
- Use message filters to enforce email policies
- Prevent data loss
- Perform LDAP queries
- Authenticate Simple Mail Transfer Protocol (SMTP) sessions
- Authenticate email
- Encrypt email
- Use system quarant...
- Security engineers
- Security administrators
- Security architects
- Operations engineers
- Network engineers
- Network administrators
- Network or security technicians
- Network managers
- System designers
- Cisco integrators and partners
Describing the Cisco Email Security Appliance
- Cisco Email Security Appliance Overview
- Technology Use Case
- Cisco Email Security Appliance Data Sheet
- SMTP Overview
- Email Pipeline Overview
- Installation Scenarios
- Initial Cisco Email Security Appliance Configuration
- Centralizing Services on a Cisco Content Security Management Appliance (SMA)
- Release Notes for AsyncOS 11.x
Administering the Cisco Email Security Appliance
- Distributing Administrative Tasks
- System Administr...
€2.595
Klassikaal
4 dagen
Juniper Networks Design Fundamentals (JNDF)
Juniper Networks Design Fundamentals (JNDF)
This three-day course is designed to cover best practices, theory, and design principles for overall network design and will serve as the prerequisite course for other design subject areas — data center, security, and WAN.
After successfully completing this course, you should be able to:
- Provide an overview of network design needs and common business requirements.
- Describe key product groups related to campus, WAN, data center, and security including both Juniper Networks product groups and some key competing solutions.
- Analyze and interpret common RFP requirements.
- Scope a network design by gathering data and working with key stakeholders.
- Organize the data that has been collected from the custome...
This course is targeted for Juniper Networks system engineers, partner sales engineers (including Champions), and services partners. However, the course is also applicable to a general audience of Juniper customers with a desire to learn more about network design.
Day 1
Chapter 1: Course Introduction
Chapter 2: Network Design Fundamentals
- A Need for Design
- Knowledge is King
- A Proposed Design Methodology
- A Reference Network
Chapter 3: Understanding Customer Requirements
- RFP Requirements
- Scoping the Design Project
- Analyzing the Data
- Understanding Customer Requirements Lab
Day 2
Chapter 4: Organizing the Data
- Analyze the Data
- Understanding Boundaries
Chapter 5: Securing the Network
- Why Secure the Network?
- Where to S...
€0
Klassikaal
3 dagen
Korn and Bash Shell Programming (AN202G)
Korn and Bash Shell Programming (AN202G)
This course will teach you how to use shell scripts and utilities for practical system administration of AIX (or other UNIX) operating systems.
This course is for support staff for AIX on POWER systems
- Basic shell concepts
- Flow control in a shell Script
- Functions and typeset
- Shell features such as arithmetic and string handling
- Using regular expressions
- Using sed, awk and other AIX utilities
€0
Klassikaal
5 dagen
IPv6 Fundamentals, Design & Deployment (IP6FD)
IPv6 Fundamentals, Design & Deployment (IP6FD)
The IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 course is an instructor-led course that is presented by Cisco Learning Partners to their end-user customers. This five-day course aims at providing network engineers and technicians that are working in the enterprise sector with the knowledge and skills that are needed to study and configure Cisco IOS Software IPv6 features. The course also provides an overview of IPv6 technologies, covers IPv6 design and implementation, describes IPv6 operations, addressing, routing, services, transition, and deployment of IPv6 in enterprise as well as in service provider networks, and includes case studies useful for deployment scenarios. The course also includes remote labs.
- Course Introduction
- Introduction to IPv6
- IPv6 Operations
- IPv6 Services
- IPv6-Enabled Routing Protocols
- IPv6 Multicast Services
- IPv6 Transition Mechanisms
- IPv6 Security
- Deploying IPv6
- IPv6 and Service Providers
- IPv6 Case Studies
Upon completing this course, the learner will be able to meet these overall objectives:
- Describe the factors that led to the development of IPv6 and possible uses of this new IP structure
- Describe the structure of the IPv6 address format, how IPv6 interacts with data link layer technologies, and how IPv6 is supported in Cisco IOS Software
- Implement IPv6 services and applications
- Understand the updates to IPv4 routing protocols needed to support IPv6 topologies
- Understand multicast...
The primary audience for this course is as follows:
Network engineers and technicians that are working in the enterprise sector.
€0
Klassikaal
5 dagen
Red Hat OpenShift Administration II: Configuring a Production Cluster (DO280)
Configure and manage OpenShift clusters to maintain security and reliability across multiple applications and development teams.
Red Hat OpenShift Administration II: Configuring a Production Clust...
- Deploying packaged applications using manifests, templates, kustomize, and helm.
- Configuring authentication and authorization for users and applications.
- Protecting network traffic with network policies and exposing applications with proper network access.
- Deploying and managing applications using resources manifests.
- Enabling developer self-service of application projects.
- Managing OpenShift cluster updates and Kubernetes operator updates.
Impact on the organization
This course is intended to develop the skills needed to manage Red Hat OpenShift clusters and support containerized applications that are highly available, resilient, and scalable. Red Hat OpenShift is an enterprise-hardened application platform based on Kubernetes that provides a common set of APIs and abstractions that enable application portability across cloud providers and traditional data centers. Red Hat OpenShift adds consistency and portability of operatio...
- Platform Administrators, System Administrators, Cloud Administrators, and other infrastructure-related IT roles who are responsible for managing and maintaining infrastructure for applications
- Enterprise Architects, Site Reliability Engineers, DevOps Engineers, and other application-related IT roles who are responsible for designing infrastructure for applications
Declarative Resource Management
Deploy and update applications from resource manifests that are parameterized for different target environments.
Deploy Packaged Applications
Deploy and update applications from resource manifests that are packaged for sharing and distribution.
Authentication and Authorization
Configure authentication with the HTPasswd identity provider and assign roles to users and groups.
Network Security
Protect network traffic between applications inside and outside...
€3.740
Klassikaal
5 dagen
Administering BIG-IP (TRG-BIG-OP-ADMIN)
Houten
ma 13 apr. 2026
en 4 andere data
Administering BIG-IP (TRG-BIG-OP-ADMIN)
This course gives network administrators network operators and network engineers a functional understanding of the BIG-IP v11 system as it is commonly deployed in an application delivery network. The course introduces students to the BIG-IP system its configuration objects how it processes traffic and how typical administrative and operational activities are performed. The course includes lecture hands-on labs interactive demonstrations and discussions.
This course is intended for network administrators operators and engineers responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network. This course presents the prerequisite knowledge for many other of F5s BIG-IP instructor-led training courses.
- Setting Up the BIG-IP System
- Traffic Processing with Local Traffic Manager (LTM)
- Using NATs and SNATs
- Using the Traffic Management Shell (TMSH)
- Monitoring Application Health
- Modifying Traffic Behavior with Profiles
- Modifying Traffic Behavior with Persistence
- Deploying Application Services with iApps
- Troubleshooting the BIG-IP System
- Administering the BIG-IP System
- Customizing Application Delivery with iRules
€1.900
Klassikaal
2 dagen
Configuring BIG-IP APM: Access Policy Manager (TRG-BIG-EGW-APM)
Diegem
ma 11 mei 2026
en 3 andere data
Configuring BIG-IP APM: Access Policy Manager (TRG-BIG-EGW-APM)
This course gives network administrators network operators and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager its configuration objects how it commonly deployed and how typical administrative and operational activities are performed. The course includes lecture hands-on labs interactive demonstrations and discussions.
By the end of this course the student should be able to perform an initial configuration using the Setup Utility and build many common configurations using the Graphical User Interface (browser-based). In addition the student should be able to monitor and manage common tasks concerning traffic processed through the BIG-IP APM system.
This course is intended for system and network administrators responsible for installation setup configuration and administration of the BIG-IP Access Policy Manager.
- Getting started with the BIG-IP system
- APM Traffic Processing and APM Configuration Wizards
- APM Access Policies Access Profiles
- Visual Policy Editor Branches and Endings
- APM Portal Access and Rewrite Profiles
- Single Sign-On and Credential Caching
- APM Network Access and BIG-IP Edge Client
- Layer 4 and Layer 7 Access Control Lists
- APM Application Access and Webtop Types
- Remote Desktop Optimized Tunnels and Webtop Links
- LTM Concepts including Virtual Servers Pools Monitors a...
€2.850
Klassikaal
3 dagen
Developing iRules for BIG-IP (TRG-BIG-IRULE-CFG)
Houten
ma 28 sep. 2026
Developing iRules for BIG-IP (TRG-BIG-IRULE-CFG)
No description available
After completing this course, you should be able to :
- Setting Up the BIG-IP System
- Getting Started with iRules
- Exploring iRule Elements
- Developing and Troubleshooting iRules
- Optimizing iRule Execution
- Securing Web Applications with iRules
- Working with Numbers and Strings
- Processing the HTTP Payload
- Working with iFiles and Data Groups
- Using iRules with Universal Persistence, Stream, and Statistics Profiles
- Incorporating Advanced Variables
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system.
Chapter 1: Setting Up the BIG-IP System
- Introducing the BIG-IP System
- Initially Setting Up the BIG-IP System
- Archiving the BIG-IP System Configuration
- Leveraging F5 Support Resources and Tools
Chapter 2: Getting Started with iRules
- Customizing Application Delivery with iRules
- Triggering an iRule
- Leveraging the DevCentral Ecosystem
- Creating and Deploying iRules
Chapter 3: Exploring iRule Elements
- Introducing iRule Constructs
- Understanding iRule Events and Event Contex...
€2.850
Klassikaal
3 dagen