Find a training: specify one or multiple words, separated by spaces:

Security

You can enrol by clicking on a date.
Click on a course title for more information.
Coursedur.placeMarAprMayJunJul
Information security foundation:
Information security foundation 2d Woerden 07, 18 17 21
2d web based 07, 18 17 21
IT-Security Practitioner:
IT-Security Practitioner 5d Woerden 09
5d web based 09
IT security foundation:
IT security foundation 2d Woerden 19 27
2d web based 19 27
IT security foundation - E-learning:
IT security foundation - E-learning   Contact ABIS
Information Security Practitioner:
Information Security Practitioner 6d Woerden 30
6d web based 30
Information Security Management Expert (post-HBO):
Information Security Management Expert (post-HBO) 6d Woerden Later sessions
6d web based Later sessions
Certified Information Security Manager (CISM®) - preparation course:
Certified Information Security Manager (CISM®) - preparation course 5d Woerden 09, 26
5d web based 09, 26
Certified Information Systems Security Professional (CISSP®) - voorbereidingscursus:
Certified Information Systems Security Professional (CISSP®) - voorbereidingscursus 10d Woerden 14
10d web based 14
Certified implementer of ISO27001:2017:
Certified implementer of ISO27001:2017 3d Woerden 12 19
3d web based 12 19
Certified Implementer of ISO 22301:
Certified Implementer of ISO 22301 3d   Contact ABIS
Ethical Hacking Foundation:
Ethical Hacking Foundation 2d Woerden 05 15 08, 26
2d web based 05 15 08, 26
Ethical hacking practitioner:
Ethical hacking practitioner 5d   Contact ABIS
Secure programming foundation:
Secure programming foundation 2d Woerden 03
2d web based 03
Application security testing:
Application security testing 2d   Contact ABIS
Secure Software Selectie:
Secure Software Selectie 1d Woerden 02
1d web based 02
Dark Web Foundation:
Dark Web Foundation 2d   Contact ABIS
Understanding RACF:
Understanding RACF 1d web based 11 22 13
RACF administration and auditing:
RACF administration and auditing 4d web based 24 12
Db2 for z/OS: using RACF:
Db2 for z/OS: using RACF 1d web based 02
Securing your WebSphere applications:
Securing your WebSphere applications 3d   Contact ABIS
Business Continuity Foundation:
Business Continuity Foundation 2d Woerden 30
2d web based 30
Business Continuity Practitioner:
Business Continuity Practitioner 6d   Contact ABIS
Crisis Management Foundation:
Crisis Management Foundation 2d   Contact ABIS
Crisis Management Practitioner:
Crisis Management Practitioner 5d   Contact ABIS
Crisis Management Expert:
Crisis Management Expert 15d   Contact ABIS
Privacy & Data Protection Foundation:
Privacy & Data Protection Foundation 2d Woerden 16
2d web based 16
Privacy & Data Protection Practitioner:
Privacy & Data Protection Practitioner 5d   Contact ABIS
Encryptie & PKI Practitioner:
Encryptie & PKI Practitioner 3d Woerden 12
3d web based 12
Identity & Access Management:
Identity & Access Management 3d   Contact ABIS
IPv6 Secure Implementation:
IPv6 Secure Implementation 1d   Contact ABIS
SOC Threat Analyst:
SOC Threat Analyst 5d web based 31
Associate SOC Analyst:
Associate SOC Analyst 3d   Contact ABIS
Security Awareness Officer:
Security Awareness Officer 3d Woerden 08
3d web based 08
Social Engineering Foundation:
Social Engineering Foundation 2d Woerden 08
2d web based 08
Security Essentials voor Management en Staf:
Security Essentials voor Management en Staf 2d Woerden 04
2d web based 04
Colour codes:
BelgiumNetherlandselsewhereweb based