In deze sectie

Deel deze pagina

Security Trainingen

securiry header website 569x233

Dat (cyber)security belangrijk is voor iedere organisatie is wel duidelijk. Er worden enorme hoeveelheden data met elkaar gedeeld via tal van interfaces en apparaten. Deze grenzeloosheid van de 21ste eeuw heeft vele voordelen, maar is veel minder veilig dan 25 jaar geleden.

Doordat organisaties hun IT steeds meer open stellen voor een breed scala aan toepassingen via alle denkbare (mobiele) apparaten is de databeveiliging mede afhankelijk van andere organisaties. Bovendien is IT grotendeels verantwoordelijk voor de continuïteit van de bedrijfs-kernprocessen. Een verstoring ervan kan dan ook een grote impact hebben op de beschikbaarheid van diensten en de continuïteit van het bedrijf. Veiligheidsmaatregelen zijn daarom een must om verstoringen of incidenten in welke vorm dan ook te voorkomen en risico’s als identiteitsdiefstal, ransomware, phishing en andere schadelijke cyber-aanvallen tot een minimum te beperken.

Als toonaangevende opleider in Europa op het gebied van security ondersteunt Global Knowledge organisaties bij het creëren en onderhouden van een veilige IT-infrastructuur, organisatie en databeveiliging door werknemers te trainen en op te leiden. Global Knowledge levert trainingen en opleidingen in alle disciplines en niveaus van beveiliging. Of het nu gaat om cybersecurity, security beleid, het opzetten en imple-menteren van veilige netwerken, risico analyse, monitoring, troubleshooting of het creëren van werknemersbewustzijn met betrekking tot veiligheid, bij ons vindt u de security training die bij u past.

De drie aandachtgebieden voor een optimale security

Een goede beveiliging bestaat uit meer dan alleen technologie - goed gedefinieerd IT Security beleid en het stimuleren van een cultuur waarin iedere werknemer zich bewust is van zijn of haar verantwoordelijkheden - zijn minstens zo belangrijk. Global Knowledge heeft deze drie aandachtsgebieden in kaart gebracht voor een optimale beveiliging.

Verberg alle resultaten

Trainingsmethode

Amazon Web Services

Security
Security Operations on AWS (GK3338)

Applications Development

Security
Source Control with TFS (GK5260)

Check Point

Security
Check Point Security Administrator (CCSA R80) (T-VPN-01)
Check Point Security Engineering (CCSE R77) (T-VPN-02)
Checkpoint Security Master (CCSM R77) (T-VPN-03)

Cisco

Security
Implementing Cisco Secure Access Control System (ACS)
CCIE Security part 2 - Lab Preparation (CCIESEC)
Implementing Cisco Network Security (IINS)
Cisco Identity Services Engine Update Training (ISE2)
Network Admission Control (NAC)
Cisco NGFW Technical Workshop (NGFWTW)
Securing Email with Cisco Email Security Appliance - Channel Partners (PASESA)
Cisco ASA Express Security (SAEXS)
Implementing Advanced Cisco ASA Security (SASAA)
Implementing Core Cisco ASA Security (SASAC)
Implementing Cisco Bring Your Own Device Solutions (SBYOD)
Securing Cisco Networks with Threat Detection and Analysis (SCYBER)
Understanding Cisco Cybersecurity Fundamentals (SECFND)
Implementing Cisco Cybersecurity Operations (SECOPS)
Implementing Cisco Edge Network Security Solutions (SENSS)
Securing Email with Cisco Email Security Appliance (SESA)
Implementing Cisco Secure Mobility (SIMOS)
Implementing Cisco Secure Access Solutions (SISAS)
Implementing and Configuring Cisco Identity Services Engine (SISE)
Implementing Cisco Threat Control Systems (SITCS)
Managing Enterprise Security with Cisco Security Manager (SSECMGT)
Implementing Cisco Identity Services Engine for Wireless Engineers (SWISE)
Securing the Web with Cisco Web Security Appliance (SWSA)

Cisco Advanced Services (HTDLS)

Security
Securing Networks with Firepower Threat Defense NGFW (FIREPOWER200)
Implementing an Integrated Threat Defebse Solution (SECUR201)
Securing Cisco Networks with Sourcefire FireAMP Endpoints 4.0 (SSFAMP)
Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS)
Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES)
Securing Cisco Networks with Open Source Snort (SSFSNORT)

Citrix

Security
Securing Citrix Virtualisation Solutions (CTX-272)
Virtualisation
Securing Citrix Virtualisation Solutions (CTX-272)
Citrix Enterprise Security Solutions (CTX-270)
Securing Citrix Networking and Mobility Solutions (CTX-271)

CompTIA

Networking

Security
A+ Certification Accelerated (G004)

EC-Council

Security
Certified Chief Information Security Officer (CCISO)
Certified Ethical Hacker + Examen (CEH)
Certified Ethical Hacker + Examen (Blended) (CEH-B)
Computer Hacking Forensic Investigator + Examen (CHFI)
EC-Council Certified Network Defender + Examen (CND)
EC-council Certified Encryption Specialist (ECES)
EC-Council Certified Incident Handler (ECIH)
EC-Council Security Analyst v9 + Examen (ECSA-LPT)
EC-Council Certified Secure Programmer.net + Examen (ECSP)
EC Council Certified Voice Professional (ECVP)
EC Council Disaster Recovery Professional v3 (EDRP)

Hewlett Packard

Security
Configuring and Deploying HP VPN Firewalls (H3K71S)

IAPP

Security
Certified Information Privacy Manager + Examen (CIPM)
Certified Information Privacy Professional Europe (CIPP/EU) + Examen (CIPPE)
Certified Information Privacy Professional and Manager prep course + Examen (CIPPE-CIPM)
Certified Information Privacy Professional and Technologist prep course + Examen (CIPPE-CIPT)
Certified Information Privacy Technologist + Examen (CIPT-IAPP)

IBM

Cloud & Smarter Infrastructure
IBM Monitoring 8.1.1 Implementation and Administration (TM065G)
Application Performance Management 8.1.1 - APM and Application Diagnostics Fundamentals (TM670G)
Info Mgmt
IBM Network Protection Advanced Topics (IS680G)
IBM Security zSecure UNIX System Services (USS) Security Overview (TK223G)
IBM Security zSecure RACF Management Workshop (TK253G)
IBM AppScan Enterprise Foundations (TK301G)
IBM Access Manager Federated Single Sign-on (TW066G)
IBM Security Directory Suite Foundations (TW070G)
IBM Identity Manager Foundations (TW254G)
Security Systems
IBM Security QRadar SIEM Foundations (BQ102G)
IBM Security QRadar SIEM Advanced Topics (BQ132G)
IBM Security QRadar SIEM Administration (BQ150G)
IBM Security QRadar Incident Forensics Configuration and Usage (BQ161G)
Security Intelligence Fundamentals (BQ600G)
IBM Security SiteProtector System: Basic Implementation and Administration (IS604G)
IBM Security Network Protection Administration and Configuration (IS671G)
IBM BigFix Platform Foundations (IS720G)
IBM BigFix Content Development (IS730G)
IBM Security zSecure RACF and SMF Auditing (TK243G)
IBM Security zSecure Admin Basic Administration and Reporting (TK263G)
IBM Security zSecure Audit Rule-based Compliance Evaluation and Customization (TK273G)
IBM Security AppScan Standard Fundamentals (TK401G)
IBM Security Directory Server 6.3.1 System Administration (TW084G)
IBM Security Directory Integrator Administration and Deployment (TW093G)
IBM Tivoli Directory Server Advanced Deployment (TW233G)
IBM Identity Governance and Intelligence Foundations (TW400G)
System Storage
IBM Security zSecure CARLa Auditing and Reporting language (TK232G)
Websphere
Accelerate, Secure, and Integrate with IBM DataPower V7 (WE701G)
XML and Web Services Solutions with IBM DataPower Gateway v7 (WE702G)
REST and Oauth Solutions with IBM DataPower Gateway v7 (WE703G)
Accelerate, Secure and Integrate with IBM DataPower v7.1 (WE711G)
JWS and JWE Support in IBM DataPower V7.2 (WE712G)
Administration of IBM WebSphere DataPower Gateway V7 (WE720G)
IBM Guardium Foundations (8G100G)
IBM QRadar SIEM Foundations (BQ103G)
IBM Directory Server 6.4 Fundamentals (TW085G)
IBM Access Manager Platform Foundations (TW107G)

ISACA

Security
CISA, Certified Information Systems Auditor (CISAU)
CISM, Certified Information Security Manager (CISM)
Certified in Risk and Information Systems Control (CRISC)

ISC2

Security
Certified Cloud Security Professional Certification Preparation (CCSP)
CISSP-ISSAP Certification Preparation (CISSP-ISSAP)
CISSP-ISSEP Certification Preparation (CISSP-ISSEP)
CISSP-ISSMP Certification Preparation (CISSP-ISSMP)
CISSP Certification Preparation Bootcamp (GK9840)
SSCP, Systems Security Certified Practitioner (SSCP)

ITIL & Service Management

Security
Information Security Management Professional based on ISO27001 (inclusief examen) (ISO27002A)
ISO 27002 Foundation (inclusief examen ISF based on ISO27001) (ISO27002F)

Juniper

Security
Advanced Junos Security (AJSEC)
Advanced Juniper Networks IPSec VPN Implementations (AJVI)
Attack Prevention with Juniper Networks Firewalls (APJF)
Configuring Juniper Networks Firewall/IPsec VPN Products (CJFV)
Integrating Juniper Networks Firewall/IPSec VPN Products into High-Performance Networks (IFVH)
Implementing Juniper Networks Secure Analytics (IJSA)
JNCIE-SEC Bootcamp (JNCIE-SEC)
Junos Security (JSEC)
Junos Space-Security Director (JS-SD)
Network and Security Manager Fundamentals (NSMF)

Microsoft

Windows 10
Implementing and Managing Windows 10 (M20697-1)
Deploying and Managing Windows 10 Using Enterprise Services (M20697-2)
Windows Server 2008
Security Fundamentals (M40367)
Windows Server 2016
Identity with Windows Server 2016 - Blended (M20742-B)
Securing Windows Server 2016 (M20744)
Performance Tuning and Optimizing SQL Databases (M10987)
Configuring and Deploying a Private Cloud (M20247)

NETAPP

Security
ONTAP 9.0 Data Protection Administration (DATAPROT9)
SnapProtect Solution Administration (SPSA)

Palo Alto Networks

Security
FIREWALL 8.0 Essentials: Configuration and Management (EDU-210) (PAN-EDU-210)
Panorama 8.0: Manage Multiple Firewalls (EDU-221) (PAN-EDU-221)
TRAPS 3.4: Install, Configure and Manage (EDU-281) (PAN-EDU-281)
FIREWALL 8.0: Debug and Troubleshoot (EDU-311) (PAN-EDU-311)

Security

Security
360 Penetration Testing Course (360PTC)
Cybersecurity Foundations (9701)
Masterclass Administering and Configuring Active Directory Federation Services and Claims (ADF)
Masterclass: Managing Active Directory Federation Services for Multiple Organizations (ADS)
Masterclass Internet Information Services Management (AIISM)
Masterclass: Advanced Threat Analytics - Implementing and Managing (ATA)
Baseline Informatiebeveiliging Gemeenten (BIG) (BIG)
System Forensics and Incident Handling (FOR)
Masterclass: Hacking and Securing SQL Server (HSS)
Masterclass: Hacking and Securing Windows Infrastructure (HSW)
Workshop: Useful Hacking Techniques for Administrators (HTA)
Information Security Management voor Gemeenten (ISMG)
Lead Auditor training (IRCA certified) (ISO27001LA)
Masterclass ISO 27001 implementation (ISMS) (ISO27001MI)
Masterclass Baseline Informatiebeveiliging Rijksoverheid (MBIR)
Mobile Security (MOBSEC)
Masterclass Public Key Infrastructure Management (PKI)
Masterclass Secure Coding Techniques (SCT)
Security Awareness Workshop - Bewust zijn van Beveiliging (SECAW)
Masterclass Cloud Security (SECCS)
Comptia Security+ (SY0-401) (SEC-PLUS)
Risk Analysis Made Easy (SECRA)
Secure Programming (SECSP)
Securing SQL Server (SSS)
Masterclass Troubleshooting, Monitoring and Tracing Windows Infrastructure (TTW)
Workshop Information Security Management (WISM)
Masterclass: Windows Security and Infrastructure Management (WSI)

Symantec Training

Symantec

Security
Symantec Data Loss Prevention 12.5: Administration (IR0996)
Symantec Messaging Gateway 10.5: Administration (SC1426)
Symantec Endpoint Protection 12.X: Maintain and Troubleshoot (SC1433)
Security
Symantec Client Management Suite 7.5: Administration (AT2998)
Symantec Deployment Solution 7.5: Administration (AT5997)
Symantec Endpoint Protection 14.x: Configure and Protect (SC1412)
Symantec Security Information Manager 4.7 (SC1437)
Symantec Endpoint Protection 12.X: Administration (SC1439)
Symantec Network Access Control 11. (SC1440)
Symantec Ghost Solution Suite 2.5 (SC1479)
Symantec Messaging Gateway 9.X Administration (SC2998)
Symantec App Center 4.1.x Administration (SM0999)
Symantec App Center 4.1.x Installation and Administration (SM1000)
PGP Universal Server 3.2 and PGP Desktop 10.2: Administration (US3000)

Veritas

Security
NetBackup 7.7: Advanced Administration (DP0135)
Symantec NetBackup 7.5: Maintain and Troubleshoot (DP0153)