Cybersecurity Foundations [9701]

Tijdsduur
Locatie
Op locatie, Online
Startdatum en plaats

Cybersecurity Foundations [9701]

Global Knowledge Network Netherlands B.V.
Logo van Global Knowledge Network Netherlands B.V.
Opleiderscore: starstarstarstar_halfstar_border 7,5 Global Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van 7,5 (uit 185 ervaringen)

Tip: meer info over het programma, prijs, en inschrijven? Download de brochure!

Startdata en plaatsen
computer Online: VIRTUAL TRAINING CENTER
2 mrt. 2026 tot 6 mrt. 2026
Toon rooster
event 2 maart 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253418.1
event 3 maart 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253418.2
event 4 maart 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253418.3
event 5 maart 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253418.4
event 6 maart 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253418.5
computer Online: VIRTUAL TRAINING CENTRE
20 apr. 2026 tot 24 apr. 2026
Toon rooster
event 20 april 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253411V.1
event 21 april 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253411V.2
event 22 april 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253411V.3
event 23 april 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253411V.4
event 24 april 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253411V.5
placeZoetermeer (Kinderen v Versteegplein 18)
20 apr. 2026 tot 24 apr. 2026
Toon rooster
event 20 april 2026, 09:00-17:00, Zoetermeer (Kinderen v Versteegplein 18), NL253411.1
event 21 april 2026, 09:00-17:00, Zoetermeer (Kinderen v Versteegplein 18), NL253411.2
event 22 april 2026, 09:00-17:00, Zoetermeer (Kinderen v Versteegplein 18), NL253411.3
event 23 april 2026, 09:00-17:00, Zoetermeer (Kinderen v Versteegplein 18), NL253411.4
event 24 april 2026, 09:00-17:00, Zoetermeer (Kinderen v Versteegplein 18), NL253411.5
computer Online: VIRTUAL TRAINING CENTER
18 mei. 2026 tot 22 mei. 2026
Toon rooster
event 18 mei 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL253422.1
event 19 mei 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL253422.2
event 20 mei 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL253422.3
event 21 mei 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL253422.4
event 22 mei 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL253422.5
computer Online: VIRTUAL TRAINING CENTER
27 jul. 2026 tot 31 jul. 2026
Toon rooster
event 27 juli 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253419.1
event 28 juli 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253419.2
event 29 juli 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253419.3
event 30 juli 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253419.4
event 31 juli 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253419.5
placeEindhoven (Evoluon Noord Brabantlaan 1)
17 aug. 2026 tot 21 aug. 2026
Toon rooster
event 17 augustus 2026, 09:00-17:00, Eindhoven (Evoluon Noord Brabantlaan 1), NL253412.1
event 18 augustus 2026, 09:00-17:00, Eindhoven (Evoluon Noord Brabantlaan 1), NL253412.2
event 19 augustus 2026, 09:00-17:00, Eindhoven (Evoluon Noord Brabantlaan 1), NL253412.3
event 20 augustus 2026, 09:00-17:00, Eindhoven (Evoluon Noord Brabantlaan 1), NL253412.4
event 21 augustus 2026, 09:00-17:00, Eindhoven (Evoluon Noord Brabantlaan 1), NL253412.5
computer Online: VIRTUAL TRAINING CENTRE
17 aug. 2026 tot 21 aug. 2026
Toon rooster
event 17 augustus 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253412V.1
event 18 augustus 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253412V.2
event 19 augustus 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253412V.3
event 20 augustus 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253412V.4
event 21 augustus 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253412V.5
computer Online: VIRTUAL TRAINING CENTER
14 sep. 2026 tot 18 sep. 2026
Toon rooster
event 14 september 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL253423.1
event 15 september 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL253423.2
event 16 september 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL253423.3
event 17 september 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL253423.4
event 18 september 2026, 09:00-17:00, VIRTUAL TRAINING CENTER, NL253423.5
computer Online: VIRTUAL TRAINING CENTER
9 nov. 2026 tot 13 nov. 2026
Toon rooster
event 9 november 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253420.1
event 10 november 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253420.2
event 11 november 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253420.3
event 12 november 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253420.4
event 13 november 2026, 10:00-18:00, VIRTUAL TRAINING CENTER, NL253420.5
placeAmsterdam ARISTO (Teleportboulevard 100)
14 dec. 2026 tot 18 dec. 2026
Toon rooster
event 14 december 2026, 09:00-17:00, Amsterdam ARISTO (Teleportboulevard 100), NL253416.1
event 15 december 2026, 09:00-17:00, Amsterdam ARISTO (Teleportboulevard 100), NL253416.2
event 16 december 2026, 09:00-17:00, Amsterdam ARISTO (Teleportboulevard 100), NL253416.3
event 17 december 2026, 09:00-17:00, Amsterdam ARISTO (Teleportboulevard 100), NL253416.4
event 18 december 2026, 09:00-17:00, Amsterdam ARISTO (Teleportboulevard 100), NL253416.5
computer Online: VIRTUAL TRAINING CENTRE
14 dec. 2026 tot 18 dec. 2026
Toon rooster
event 14 december 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253416V.1
event 15 december 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253416V.2
event 16 december 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253416V.3
event 17 december 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253416V.4
event 18 december 2026, 09:00-17:00, VIRTUAL TRAINING CENTRE, NL253416V.5
Beschrijving

Ontdek de verschillende trainingsmogelijkheden bij Global Knowledge

Online of op locatie er is altijd een vorm die bij je past.

Kies op welke manier jij of je team graag een training wilt volgen. Global Knowledge bied je verschillende trainingsmogelijkheden. Je kunt kiezen uit o.a. klassikaal, Virtueel Klassikaal (online), e-Learning en maatwerk. Met onze Blended oplossing kun je de verschillende trainingsvormen combineren.

OVERVIEW

Exclusive - Investigate cybersecurity threats and master techniques needed to protect your network.

In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botne…

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Ontdek de verschillende trainingsmogelijkheden bij Global Knowledge

Online of op locatie er is altijd een vorm die bij je past.

Kies op welke manier jij of je team graag een training wilt volgen. Global Knowledge bied je verschillende trainingsmogelijkheden. Je kunt kiezen uit o.a. klassikaal, Virtueel Klassikaal (online), e-Learning en maatwerk. Met onze Blended oplossing kun je de verschillende trainingsvormen combineren.

OVERVIEW

Exclusive - Investigate cybersecurity threats and master techniques needed to protect your network.

In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.

OBJECTIVES

  • Increase your awareness of security
  • Interpret/analyze tool output for network mapping/footprinting
  • Reduce attack surface of systems
  • Review networking as it applies to security controls
  • Explore different data protection principles
  • Examine the role of PKI/certificates in building trusted relationships between devices in a network
  • Implement login security and other identity management solutions
  • Reduce attack surface of network devices
  • Explore current malware threats and anti-malware solutions
  • Explore social engineering threats, methods, and techniques
  • Examine software vulnerabilities and security solutions for reducing the risk of exploitation
  • Explain monitoring capabilities and requirements and how those may raise privacy concerns
  • Identify physical security controls and the relationship between physical and IT security
  • Explain incident response capabilities
  • Identify legal considerations and investigative techniques when it comes to cybersecurity
  • Research trends in cybersecurity

AUDIENCE

  • Network professionals looking to advance their knowledge and explore cybersecurity as a career path
  • Executives and managers looking to increase their ability to communicate with security professionals and implement a robust security solution at the organizational level
  • Individuals wants to improve their understanding of cybersecurity fundamentals, including threats, mitigating controls, and organizational responsibilities

NEXT STEP

The following courses are recommended for further study:

Technical track (certifications)

  • CND - Certified Network Defender
  • CEH - Certifed Ethical Hacker

Management track (certifications)

  • Comptia+ Security
  • CISM - Certified Information Security Manager
  • CISA - Certified Information Security Auditor

CONTENT

1. Cybersecurity Awareness

  • What is security?
  • Confidentiality, integrity, and availability
  • Security baselining
  • Security concerns: Humans
  • Types of threats
  • Security controls
  • What is hacking?
  • Risk management
  • Data in motion vs. data at rest
  • Module review

2. Network Discovery

  • Networking review
  • Discovery, footprinting, and scanning
  • Common vulnerabilities and exposures
  • Security policies
  • Vulnerabilities
  • Module review

3. Systems Hardening

  • What is hardening?
  • Types of systems that can be hardened
  • Security baselines
  • How to harden systems
  • Hardening systems by role
  • Mobile devices
  • Hardening on the network
  • Analysis tools
  • Authentication, authorization, and accounting
  • Physical security
  • Module review

4. Security Architecture

  • Security architecture
  • Network devices
  • Network zones
  • Network segmentation
  • Network Address Translation
  • Network Access Control
  • Module review

5. Data Security

  • Cryptography
  • Principles of permissions
  • Steganography
  • Module review

6. Public Key Infrastructure

  • Public key infrastructure
  • Certification authorities
  • Enabling trust
  • Certificates
  • CA management
  • Module review

7. Identity Management

  • What is identity management?
  • Personally identifiable information
  • Authentication factors
  • Directory services
  • Kerberos
  • Windows NT LAN Manager
  • Password policies
  • Cracking passwords
  • Password assessment tools
  • Password managers
  • Group accounts
  • Service accounts
  • Federated identities
  • Identity as a Service
  • Module review

8. Network Hardening

  • Limiting remote admin access
  • AAA: Administrative access
  • Simple Network Management Protocol
  • Network segmentation
  • Limiting physical access
  • Establishing secure access
  • Network devices
  • Fundamental device protection summary
  • Traffic filtering best practices
  • Module review

9. Malware

  • What is malware?
  • Infection methods
  • Types of malware
  • Backdoors
  • Countermeasures
  • Protection tools
  • Module review

10. Social Engineering

  • What is social engineering?
  • Social engineering targets
  • Social engineering attacks
  • Statistical data
  • Information harvesting
  • Preventing social engineering
  • Cyber awareness: Policies and procedures
  • Social media
  • Module review

11. Software Security

  • Software engineering
  • Security guidelines
  • Software vulnerabilities
  • Module review

12. Environment Monitoring

  • Monitoring
  • Monitoring vs. logging
  • Monitoring/logging benefits
  • Logging
  • Metrics
  • Module review

13. Physical Security

  • What is physical security?
  • Defense in depth
  • Types of physical security controls
  • Device security
  • Human security
  • Security policies
  • Equipment tracking
  • Module review

14. Incident Response

  • Disaster types
  • Incident investigation tips
  • Business continuity planning
  • Disaster recovery plan
  • Forensic incident response
  • Module review

15. Legal Considerations

  • Regulatory compliance
  • Cybercrime
  • Module review

16. Trends in Cybersecurity

  • Cybersecurity design constraints
  • Cyber driving forces
  • How connected are you?
  • How reliant on connectivity are you?
  • Identity management
  • Cybersecurity standards
  • Cybersecurity training

17. Course Look Around

  • Looking back
  • Looking forward
  • Planning your journey

Lab 1: Explore HR Security
Lab 2: Interpret Scanning Results
Lab 3: Harden Servers and Workstations
Lab:4 Security Architecture
Lab 5: Protect Data
Lab 6: Configure a PKI
Lab 7: Manage Passwords
Lab 8: Explore Hardening Recommendations and Known Vulnerabilities
Lab 9: Detect Malware
Lab 10: Social Engineering
Lab 11: Privilege Escalation
Lab 12: Monitor a System
Lab 13: Implement Physical Security
Lab 14: Incident Response
Lab 15: Review Legal Considerations

Blijf op de hoogte van nieuwe ervaringen
Er zijn nog geen ervaringen.
Deel je ervaring
Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Download gratis en vrijblijvend de informatiebrochure

(optioneel)
(optioneel)
(optioneel)
infoEr is een telefoonnummer vereist om deze informatieaanvraag in behandeling te nemen. (optioneel)
(optioneel)
(optioneel)
(optioneel)

Heb je nog vragen?

(optioneel)
We slaan je gegevens op om je via e-mail en evt. telefoon verder te helpen.
Meer info vind je in ons privacybeleid.