CLS Computertrainingen: 88 products
Advanced in AI Security Management (AAISM)
ISACA’s new certification is designed to supplement certified security managers with the ability to identify, assess, monitor and mitigate …
BIM Coördinator
BIM is een methode om de werkzaamheden in de bouwsector op een centraal punt samen te voegen in een driedimensionaal, digitaal model. Hierd…
Configuring Windows Server Hybrid Advanced Services | AZ-801
Microsoft Azure is a set of cloud computing services that constantly continues to grow. Azure helps your organization solve all kinds of bu…
Linux Server Professional | LPIC 1-102
Linux is an Operating System that is really on the rise. After being the domain of programmers and engineers for years, we now find Linux m…
MoP Portfoliomanagement Fasttrack (inclusief examens)
Is uw organisatie op zoek naar een methodiek om lijn te krijgen in een veelheid van projecten en programma's? Dan is portfoliomanagement ee…
Understanding Networking Fundamentals
leLearn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and route…
Implementing CISCO Enterprise Wireless Networks
Cisco Systems is an American company that mainly specializes in network equipment such as routers, switches, firewalls and servers. Cisco h…
Information Security Administrator | SC-401
Met de cursus Information Security Administrator | SC-401 verkrijg je de kennis en vaardigheden om informatiebeveiliging effectief te plann…
Designing and Implementing Microsoft DevOps solutions | AZ-400
Microsoft Azure is a set of cloud computing services that constantly continues to grow. Azure helps your organization solve all kinds of bu…
Implementing and Operating Cisco Enterprise Network Core Technologies | ENCOR 350-401
Cisco Systems is an American company that mainly specializes in network equipment such as routers, switches, firewalls and servers. Cisco h…
EC-Council Certified Ethical Hacker | CEH (inclusief examen)
By obtaining the Certified Ethical Hacker (CEH) certification you will learn to 'think like a hacker' and understand the dangers of a malic…
EC-Council Computer Hacking Forensic Investigator | CHFI (inclusief examen)
EC-Council Computer Hacking Forensic Investigation (CHFI) is the method of detecting cyber-attacks and systematically extracting evidence t…
Microsoft Power Automate RPA Developer | PL-500
Microsoft Power BI Desktop is designed for analysts. Advanced interactive visualizations are combined with industry-leading built-in data q…
Microsoft Azure Security Technologies | AZ-500
Microsoft Azure is a set of cloud computing services that constantly continues to grow. Azure helps your organization solve all kinds of bu…
Microsoft Fabric Analytics Engineer | DP-600
Microsoft Azure is a set of cloud computing services that constantly continues to grow. Azure helps your organization solve all kinds of bu…