IT Essentials (for non-IT professionals)

Type product
Niveau
Logo van Web Infra Academy (EN)

Tip: meer info over het programma, prijs, en inschrijven? Download de brochure!

Beschrijving

In this day and age we can’t live without IT. IT is essential for a modern business and IT is of great influence on our lives. This IT Essentials training will give you control in IT decisions being made in your business, for example when acquiring software. You will gain the knowledge to participate in IT discussions and challenge IT professionals in design choices being made. After attending this training you will gain control of your IT costs.

IT professionals tend to speak their own language, which makes it very hard for outsiders to understand what they are talking about. This can be frustrating to say the least. In this IT Essentials training you will learn the language and terminolog…

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen.  

In this day and age we can’t live without IT. IT is essential for a modern business and IT is of great influence on our lives. This IT Essentials training will give you control in IT decisions being made in your business, for example when acquiring software. You will gain the knowledge to participate in IT discussions and challenge IT professionals in design choices being made. After attending this training you will gain control of your IT costs.

IT professionals tend to speak their own language, which makes it very hard for outsiders to understand what they are talking about. This can be frustrating to say the least. In this IT Essentials training you will learn the language and terminology used by IT professionals.

This IT Essentials training explains the basics of Information Technology: from raw data to information. Latest trends in IT like the Cloud, Big Data and IoT (Internet of Things) are explained.

Prerequisites

  • None

Target audience

Non IT professionals. Business Managers, auditors or anybody who must understand IT.

Course Agenda

Session 1: Hardware, Virtualization and the Cloud

In this first session basic IT terminology and principles are explained. Almost all hardware is virtualized: hardware is assigned/used multiple times. You will learn about the impact of Virtualization on for example your IT costs and how it enabled a new IT business model: the Cloud. What are the advantages of Cloud computing? When NOT to choose for the Cloud?

Session 2: Internet and Encryption

In this session the basics of the internet are explained. The most popular applications being built today are web-based: accessible through a browser. You will learn what is needed to develop, install and manage your software.

By explaining in detail how a web application works you will learn the basics of networking as well as the infrastructure needed to offer a secure and resilient (high available) web application. As encryption (SSL/TLS) is vital for the security of the internet it is discussed extensively in this session.

Session 3: Application development and integration

The most popular programming languages are discussed, with special attention to Java©. The latest trends (for example Client-side development and Javascript) are discussed.

The implementation of new software in an existing environment (communication and data exchange with existing software) is critical for a successful implementation and determines to a large extend the IT costs involved (now and in the future). Is the software using standard communication (HTTP, messaging or file transfer)?

We will discuss the most important design decisions in software development. The advantages of using standards like WebServices (Web API’s and SOAP) and Service Oriented Architecture (SOA) are explained.

Session 4: IT security, High Availability and Operational management

It is all about the data! What is the importance of the data for your business? The characteristics of the data (privacy sensitive?) determine what needs to be done to secure (backup) and protect your data: only the right people can read/change the data. Software is merely a tool to get to the data…

Viruses and threats are almost part of everyday life. The biggest threats are discussed: virusses, DDOS attacks, Man in the Middle attacks, Zero Day exploits, APT (Advanced Persistent Threat), OWASP top ten etc.

How do you determine which security measures are sufficient? Which tools do I have to use? What is High Availability? Do I need Disaster Recovery (second data center) and how does that work? Off course the answers to these questions have a high impact on your IT costs.

An important part of High Availability is operational management: how is monitoring implemented? How do you organize service management (incident and change mangement)?

Blijf op de hoogte van nieuwe ervaringen

Er zijn nog geen ervaringen.

Deel je ervaring

Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.

Er zijn nog geen veelgestelde vragen.  

Download gratis en vrijblijvend de informatiebrochure

Aanhef
(optioneel)
(optioneel)
(optioneel)
(optioneel)
infoEr is een telefoonnummer vereist om deze informatieaanvraag in behandeling te nemen. (optioneel)

Heeft u nog vragen?

(optioneel)
We slaan je gegevens op om je via e-mail en evt. telefoon verder te helpen.
Meer info vind je in ons privacybeleid.