Search courses: specify one or multiple words, separated by spaces:

Security

You can enrol by clicking on a date.
Click on a course title for more information.
Coursedur.placeDecJanFebMarApr
Information Security Management Expert (post-HBO):
Information Security Management Expert (post-HBO) 15d Woerden 16
Certified Information Security Manager (CISM®) preparation course:
Certified Information Security Manager (CISM®) preparation course 5d Woerden 14 05
Certified Information Systems Security Professional (CISSP®):
Certified Information Systems Security Professional (CISSP®) 10d Woerden 14 05
Certified implementer of ISO27001:2013:
Certified implementer of ISO27001:2013 3d Woerden 15
Ethical hacking foundation:
Ethical hacking foundation 2d Woerden 22 17 01
Ethical hacking practitioner:
Ethical hacking practitioner 5d Woerden 16
Secure programming foundation:
Secure programming foundation 2d Woerden Later sessions
Application security testing:
Application security testing 2d Woerden Later sessions
iPad@Work - beveiliging:
iPad@Work - beveiliging 0.4d   Contact ABIS
Understanding RACF:
Understanding RACF 1d web based 24
RACF administration and auditing:
RACF administration and auditing 4d High Wycombe 20 06
4d web based 17
Db2 for z/OS: using RACF:
Db2 for z/OS: using RACF 1d web based 05
Securing your WebSphere applications:
Securing your WebSphere applications 3d High Wycombe 02
Information Security Management Expert (post-HBO):
Information Security Management Expert (post-HBO) 15d Woerden 16
Certified Information Security Manager (CISM®) preparation course:
Certified Information Security Manager (CISM®) preparation course 5d Woerden 14 05
Certified Information Systems Security Professional (CISSP®):
Certified Information Systems Security Professional (CISSP®) 10d Woerden 14 05
Certified implementer of ISO27001:2013:
Certified implementer of ISO27001:2013 3d Woerden 15
Ethical hacking foundation:
Ethical hacking foundation 2d Woerden 22 17 01
Ethical hacking practitioner:
Ethical hacking practitioner 5d Woerden 16
Secure programming foundation:
Secure programming foundation 2d Woerden Later sessions
Application security testing:
Application security testing 2d Woerden Later sessions
iPad@Work - beveiliging:
iPad@Work - beveiliging 0.4d   Contact ABIS
Understanding RACF:
Understanding RACF 1d web based 24
RACF administration and auditing:
RACF administration and auditing 4d High Wycombe 20 06
4d web based 17
Db2 for z/OS: using RACF:
Db2 for z/OS: using RACF 1d web based 05
Securing your WebSphere applications:
Securing your WebSphere applications 3d High Wycombe 02
Colour codes:
BelgiumNetherlandselsewhereweb based