10 IT Security Opleidingen in Rotterdam
Bekijk ook: Ethical Hacking, IT Management & Strategie, Cyber Security, Penetration testing, PKI, Certified Information Privacy Manager (CIPM), Security Engineer en Identity Management & Access Control [IAM].
Bekijk ook: Ethical Hacking, IT Management & Strategie en Cyber Security.
Information Security Foundation (ISFS)

De training Information Security Foundation (ISFS) is bestemd voor degenen die te maken krijgt met informatiebeveiliging en basiskennis hie…
Security Awareness (AVG/GDPR)

Ontwikkelingen, zoals het ingaan van de Algemene Verordening Gegevensbescherming (AVG) / General Data Protection Regulation (GDPR) en steed…
Information Security Management Expert (ISMES)

De training Information Security Management Expert (ISMES) voorziet in specialistische kennis, inzicht en vaardigheden op het gebied van he…
Information Security Management Professional (ISMAS)

Tijdens de training Information Security Management Professional, voorheen Information Security Management Advanced (ISMAS) verkrijgt de de…
Microsoft 365 Security Administrator

This course is the bundle of the following four courses who prepare for exam MS-500: MS-500T01: Managing Microsoft 365 Identity and Access …
Microsoft 365 Security Administrator

This course is the bundle of the following four courses who prepare for exam MS-500: MS-500T01: Managing Microsoft 365 Identity and Access …
Microsoft Azure Security Technologies

In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identi…
Microsoft 365 Mobility and Security

This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 com…
Microsoft 365 Mobility and Security

This course is the bundle of the following three courses who prepare for exam MS-101: MS-101T01: Microsoft 365 Security Management MS-101T0…
Microsoft Azure Security Technologies

In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identi…