naar contact

eLearning EXIN AI Essentials

Opportunities, challenges and risks: start now with Artificial Intelligence

The content of this eLearning EXIN AI Essentials is the same as the classroom training. Click here to go directly to our Learning Management System. Click here to check the agenda on YouTube.

This eLearning module consists of a series of movies (each approx. 10 minutes) and optional questions, hosted on our state of the art Learning Management System (LMS). You can study anywhere, anytime : we also offer an App for your mobile phone and tablet. You will receive a soft copy of the material (including links).

This EXIN AI Essentials training includes the Exin exam which, upon succesful completion, certifies you for the internationally recognized BCS AI Essentials Syllabus.

Artificial Intelligence (AI) is at the moment one of the most exciting and innovative developments. You are using AI daily, maybe without you knowing about it. AI and Machine Learning have the potential to improve our lives: do the dull and dangerous work for us, but it is also an improvement for healthcare (think of an App like SkinVision). AI is an disruptive innovation that can help in decision making, predicting the market or the behaviour of your customer. AI is already vital for Cybersecurity (anomaly detection).

However, AI can be a threat for privacy and employment, also think of lethal autonomous weapon systems like drones.

In this EXIN AI Essentials training you will learn how you to use AI and Machine Learning safely and responsibly. Are you prepared for the revolution in the relationship between human and machine? Why is now the time to start with AI and Machine Learning?

You will learn the basic techniques of Deep Learning (ANN, Artifical Neural Networks), chatbots (NLP, Natural Language processing) and techniques how to learn from data, discover patterns and make predictions using data (classification and regression). We will explain the basic principles of data (science). You will learn about the most popular (autoML) tools and algorithmes. How do you setup an AI project, what are the challenges, how can you mitigate the risks?

If you click on the picture below, you will see (on YouTube) a part from our eLearning with examples of AI and Machine Learning:

eLearning EXIN AI Essentials
eLearning EXIN AI Essentials : examples

Feedback participants

You can find feedback and experiences of participants of our courses on Spingest.

Price

The Web Infra Academy uses two price models: per student or per training. For more information or a quotation please contact us or use the form at the end of this page.

  • (virtual) Classroom:                 649,00 Euro per student (ex. VAT, including access to our eLearning)
    eLearning                                    395,00 Euro per student

Prerequisites

  • None

Target audience

Everybody who wants to understand AI and wants to start with AI and Machine Learning.

Course Agenda eLearning EXIN AI Essentials

  • What is AI and Machine Learning?
  • Examples of  AI and Machine Learning
  • History of AI and Machine Learning
  • Terminology AI and Machine Learning (Deep learning, General AI, Narrow AI, Singularity etc. etc.)
  • Why to start now: the 7 “key enablers”
  • Relationship Big Data, IoT and AI/Machine Learning
  • Basics of Data Science
  • The opportunities of AI and Machine Learning
  • Basic techniques of Machine Learning (supervised, unsupervised, reinforcement learning etc.)
  • Deep Learning, Artificial Neural Networks, classification, regression, Natural Language Processing (NLP)
  • What are the most popular algorithmes and how can you evaluate and tune them?
  • Which tools are available and what is autoML?
  • Challenges, risks and ethics of AI and Machine Learning
  • How can I implement Machine Learning (agile) in my organisation
  • Resources for learning

If you have any questions or are interested in this course, please contact us or use the form below:

    Your Name (required)

    Your Email (required)

    Your Telephone number (optional)

    Your Message

    [recaptcha]

    EXIN AI Essentials training

    Opportunities, challenges and risks: start now with Artificial Intelligence

    This EXIN AI Essentials training includes the Exin exam which, upon succesful completion, certifies you for the internationally recognized BCS AI Essentials Syllabus.  This classroom (or virtual) training includes 60 days access to our eLearning module. Click here to check the agenda on YouTube.

    Artificial Intelligence (AI) is at the moment one of the most exciting and innovative developments. You are using AI daily, maybe without you knowing about it. AI and Machine Learning have the potential to improve our lives: do the dull and dangerous work for us, but it is also an improvement for healthcare (think of an App like SkinVision). AI is an disruptive innovation that can help in decision making, predicting the market or the behaviour of your customer. AI is already vital for Cybersecurity (anomaly detection).

    However, AI can be a threat for privacy and employment, also think of lethal autonomous weapon systems like drones.

    In this EXIN AI Essentials training you will learn how you to use AI and Machine Learning safely and responsibly. Are you prepared for the revolution in the relationship between human and machine? Why is now the time to start with AI and Machine Learning?

    You will learn the basic techniques of Deep Learning (ANN, Artifical Neural Networks), chatbots (NLP, Natural Language processing) and techniques how to learn from data, discover patterns and make predictions using data (classification and regression). We will explain the basic principles of data (science). You will learn about the most popular (autoML) tools and algorithmes. How do you setup an AI project, what are the challenges, how can you mitigate the risks?

    If you click on the picture below, you will see (on YouTube) a part from our eLearning with examples of AI and Machine Learning:

    EXIN AI Essentials
    EXIN AI Essentials : examples

    Feedback participants

    You can find feedback and experiences of participants of our courses on Spingest.

    Course duration

    This EXIN AI Essentials training is offered in one day.

    Price

    The Web Infra Academy uses two price models: per student or per training. For more information or a quotation please contact us or use the form at the end of this page.

    • (virtual) Classroom:                 649,00 Euro per student (ex. VAT, including access to our eLearning)
      eLearning                                    395,00 Euro per student

    Course dates classroom training

    • 28-09-2022, classroom/virtual
    • 07-12-2022, classroom/virtual
    • 10-03-2023, classroom/virtual
    • 03-07-2023, classroom/virtual

    Prerequisites

    • None

    Target audience

    Everybody who wants to understand AI and wants to start with AI and Machine Learning.

    Course Agenda EXIN AI Essentials

    • What is AI and Machine Learning?
    • Examples of  AI and Machine Learning
    • History of AI and Machine Learning
    • Terminology AI and Machine Learning (Deep learning, General AI, Narrow AI, Singularity etc. etc.)
    • Why to start now: the 7 “key enablers”
    • Relationship Big Data, IoT and AI/Machine Learning
    • Basics of Data Science
    • The opportunities of AI and Machine Learning
    • Basic techniques of Machine Learning (supervised, unsupervised, reinforcement learning etc.)
    • Deep Learning, Artificial Neural Networks, classification, regression, Natural Language Processing (NLP)
    • What are the most popular algorithmes and how can you evaluate and tune them?
    • Which tools are available and what is autoML?
    • Challenges, risks and ethics of AI and Machine Learning
    • How can I implement Machine Learning (agile) in my organisation
    • Resources for learning

    If you have any questions or are interested in this course, please contact us or use the form below:

      Your Name (required)

      Your Email (required)

      Your Telephone number (optional)

      Your Message

      [recaptcha]

      eLearning CASB, SD-WAN and SASE

      The latest trends for (hybrid) Cloud security. Are you in control of the Cloud usage by your company?

      As more data moves to the cloud, new tools and methods are needed to control your data and comply to security regulations. This eLearning CASB, SD-WAN and SASE is based on the latest security trends as defined by Gartner, Forrester and the Cloud Security Alliance (CSA).

      You can find a detailed agenda at the end of this page or you can watch the short agenda on YouTube. This webinar is also part of our Masterclass Digital Transformation and is available through our partner Global Knowledge.

      This eLearning module consists of a series of movies and optional questions, hosted on our state of the art Learning Management System (LMS). You can study anywhere, anytime : we also offer an App for your mobile phone and tablet. You will receive a soft copy of the material (including links).

      Click here to go directly to our Learning Management System. Or watch a preview on YouTube here.

      Are you in control of your business data in the Cloud (think of Dropbox, social media, Gmail or Office365)? Security in the Cloud is a shared responsibility which leads to complexity and confusion.

      A CASB (Cloud Access Security Broker) is essential to mitigate and control the risks involved in the (unwanted) usage of the Cloud (Shadow IT for example)

      “Email is the #1 attack vector. Cloud Account Takeover is the #1 attack target. A CASB is the best way to protect against these threats – Cloud Security Alliance (CSA).

      Threats, hacks and zero days are unfortunately the order of the day. Even the most professional IT organizations are hit by malware, think of the recent Solarwinds hack. Are your data and applications safe in the hybrid Cloud?

      In this CASB, SD-WAN and SASE Training you get an overview of the latest security and networking technologies and you will learn: What is it? Why do I need it? How can I implement it? What are the major vendors?

      Digital business transformation requires anywhere, anytime access to applications and services — many of which are now located in the cloud (Source: Gartner, August 2019, The Future of Network Security Is in the Cloud)

      The term SASE (Secure Access Server Edge) was introduced in 2019 by Gartner. SASE is a new category of cloud-native networking and security solutions. The used technologies are not new as such, but the convergence of these solutions in one product offering a single pane of glass and single point of control is.

      Because SASE (but also CASB) is a combination of existing security and networking tools, in this training you will gain insight in the latest tools such as:

      eLearning CASB, SD-WAN and SASE
      eLearning CASB, SD-WAN and SASE

      Course delivery

      This training is also offered by our partner Global Knowledge.

      This eLearning CASB, SD-WAN and SASE is available in the following formats:

      • Webinar: Online classroom / virtual classroom: you are live connected to the trainer with Zoom (or Teams).
      • Classroom training (postponed until further notice)
      • eLearning, click here.

      Price

      The Web Infra Academy uses two price models: per student or per training. For an onsite classroom training and a quotation please contact us or use the form at the end of this page.

      • Webinar :            695,00 (ex. VAT) Euro per participant (with Skype of Zoom)
      • Classroom:         695,00 (ex. VAT) Euro per participant
      • E-learning:         125,00 (ex. VAT) Euro per participant

      Prerequisites

      Basic IT knowledge.

       Target Audience

      Anyone who wants to know about the latest trends in Cloud  security.

      Course dates webinar/remote/online

      • 08-03-2021 – Online, Zoom
      • 09-07-2021 – Online, Zoom

      Please register using the form at the end of this page.

      Agenda eLearning CASB, SD-WAN and SASE

      • What is a CASB?
      • Why do you need a CASB? What does a CASB offer, what are the advantages?
      • Architecture CASB, first-gen versus next-gen Multi-mode CASBs
      • Agentless CASB: AJAX-VM
      • The different implementations of CASB: log collection, packet capture, Cloud APIs, proxies and AJAX-VM
      • Recommendations and vendors
      • What is SD-WAN and Software Defined Networking
      • Challenges with the current WAN technology
      • Comparison MPLS and SD-WAN
      • Advantages SD-WAN: transport agnostic, tunnel bonding, intelligent routing
      • SD-WAN architecture and implementation
      • Recommendations and vendors
      • What is SASE
      • Het problem with Service chaining
      • Why SASE, what are the advantages
      • Architecture and implementation: SASE Cloud and SASE Points of Presence (PoP)
      • What are the essential components of Networking as a Service and Security as a service:
        • Software defined wide area network, SD-WAN
        • Software-defined perimeter (SDP) en Zero Trust network access (ZTNA)
        • Secure web gateway (SWG) versus Firewall as a service (FWaaS) versus Nextgen firewall (NGFW) versus Web Application firewall (WAF)
        • Next-generation antimalware (NGAM)
        • Intrusion Detection Systems (IDS) versus Intrusion prevention system (IPS)
        • Remote Browser Isolation (RBI)
      • The role of Deep Packet Inspection (DPI)
      • Recommendations and vendors

      If you have any questions or are interested in this course, please contact us or use the form below:

        Your Name (required)

        Your Email (required)

        Your Telephone number (optional)

        Your Message

        [recaptcha]

        eLearning IT Essentials (for non-IT professionals)

        Van hardware, virtualisatie, cloud tot software, API’s etc.: begrijp je IT, inclusief cybersecurity

        The content of this eLearning IT Essentials (for non-IT professionals) is the same as the classroom training. Click here to go directly to our Learning Management System. You can find a detailed agenda at the end of this page or you can watch the agenda on YouTube.

        In this day and age we can’t live without IT. IT is essential for a modern business and IT is of great influence on our lives. This IT Essentials training will give you control in IT decisions being made in your business, for example when acquiring software. You will gain the knowledge to participate in IT discussions and challenge IT professionals in design choices being made. After attending this eLearning IT Essentials (for non-IT professionals) you will gain insight into your IT costs.

        This is an eLearning module that consists of a series of movies and a series of optional questions, hosted on our state of the art Learning Management System (LMS). You can study anywhere, anytime : we also offer an App for your mobile phone and tablet. You will receive a soft copy of the material (including links).

        This eLearning IT Essentials (for non-IT professionals) is meant for those working closely with IT (product owners, managers, etc.) needing more technical knowledge.

        A shorter version of this training is also available, you can see an overview of the differences here.

        Threats of virusses and ransomware are increasing day by day. How many phishing mails do you receive? You will learn the essentials of cybersecurity and which countermeasures are essential. How can you prevent loosing your valuable data?

        eLearning IT Essentials (for non-IT professionals) : IT language
        eLearning IT Essentials (for non-IT professionals) : IT language

        IT professionals tend to speak their own language, which makes it very hard for outsiders to understand what they are talking about. This can be frustrating to say the least. In this eLearning IT Essentials (for non-IT professionals) you will learn the language and terminology used by IT professionals.

        This eLearning IT Essentials (for non-IT professionals) explains the basics of Information Technology: from raw data to information. Latest trends in IT like the Cloud, Big Data and IoT (Internet of Things) are explained.

        You can find a detailed agenda of this training at the end of this page.

        This training is an excellent preparation  for our Masterclass Digital Transformation about the latest trends in IT (Hybrid Cloud, AI & ML, Zero Trust etc.).

        During the training you will receive a soft copy of the slides, an IT glossary and PDF with best practices.

        eLearning IT Essentials (for non-IT professionals) duration

        This eLearning module consists of a series of movies of in total 14 hours and a series of optional questions.You will have access to our eLearning platform for 3 months.

        You will receive a soft copy of the material (including links). You can find a detailed agenda at the end of this page or you can watch the short agenda on YouTube.

        Price

        The Web Infra Academy uses two price models: per student or per training. For an on-site classroom training and a quotation please contact us or use the form at the end of this page.

        • E-learning                                   599,00 Euro (not-interactive)
        • Webinar:                                    1595.00 Euro per student (using Skype or Zoom)
        • Blended                                       679,00 Euro (E-learning plus 30 minutes Zoom)

        Our courses are also offered by our global partner Global Knowledge.

        Experiences & feedback students

        You can read the experiences and feedback from former students on the website of Springest, click here.

        Prerequisites

        • None

        Target audience

        Non IT professionals or those working closely with IT needing more technical knowledge. Business managers, SMEs, product owners, auditors etc.

        Course Agenda

        Session 1: Hardware, Virtualization, the Cloud, Scrum and DevOps

        In this first session basic IT terminology and principles are explained. What is IT, what is a computer or a server?  What is the difference between software and middleware? What is Open Source en what are the popular Open Source solutions?

        Almost all hardware is virtualized: hardware is assigned/used multiple times. You will learn about the impact of Virtualization on, for example, your IT costs and how it enabled a new IT business model: the Cloud. What are the advantages of Cloud computing? When NOT to choose for the Cloud?

        Agile/Scrum is a popular way of work in IT and replaces waterfall methods like Prince 2. The basic principles of Agile and Scrum are explained. What are the different roles (Product Owner etc.) and what is their responsibility? What is a backlog? What are the disadvantages of Scrum/Agile? What are the characteristics of DevOps? The basics of Continuous Delivery and Continuous Integration are explained.

        Session 2: Internet, Application development and integration. 

        The former CEO of Sun Microsystems said: “Privacy, privacy, there is no privacy, get over it!”. In this session the basics of the internet are explained (IP addresses and tracking cookies for example).

        The most popular applications being built today are web-based: accessible through a browser. By explaining in detail how a web application works you will learn the basics of networking as well as the infrastructure needed to offer a secure and resilient (high available) web application.

        The most popular programming languages are discussed, with special attention to Java©. The latest trends (for example Client-side development and Javascript) are discussed.

        The implementation of new software in an existing environment (communication and data exchange with existing software) is critical for a successful implementation and determines to a large extend the IT costs involved (now and in the future). Is the software using standard communication (HTTP, messaging or file transfer)?

        We will discuss the most important design decisions in software development. The advantages of using standards like WebServices (REST API’s, SOAP and microservices) and Service Oriented Architecture (SOA) are explained.

        Session 3: Resilience, High Availability, databases, operational management and encryption-SSL/TLS

        How can I create a resilient IT infrastructure? How can I prevent downtime and solve problems quickly? What is High Availability? Do I need Disaster Recovery (second data center) and how does that work? How do I prevent data loss? Why do I need a database like Oracle© or SQL Server©? Off course the answers to these questions have a high impact on your IT costs.

        An important part of High Availability is operational management: how is monitoring implemented? How do you organize service management (incident and change mangement)?

        As encryption (SSL/TLS) is vital for IT security it is discussed extensively in this session.

        eLearning IT Essentials (for non-IT professionals): Encryption
        eLearning IT Essentials (for non-IT professionals): Encryption

        Session 4: IT security essentials, the IoT, Big Data and Bitcoin (blockchain)

        Your IT security measures are for an important part determined by your data. What is the importance of the data for your business? The characteristics of the data (privacy sensitive?) determine what needs to be done to secure (backup) and protect your data: only the right people can read/change the data. Software is merely a tool to get to the data…

        eLearning IT Essentials (for non-IT professionals): IT Security
        eLearning IT Essentials (for non-IT professionals): Security

        Viruses and threats are almost part of everyday life. The biggest threats are discussed: virusses, DDOS attacks, Man in the Middle attacks, Zero Day exploits, APT (Advanced Persistent Threat), OWASP top ten etc.

        How do you determine which security measures are sufficient? Which tools do I have to use?

        The latest trends in IT are discussed. What is the “Internet of Things” and what are the possibilities for your business? What is “Big Data” and why is it important for AI and Machine Learning?

        What is Bitcoin? How secure is Bitcoin and how does the Block Chain enable you to transfer money safely without using a bank? How can you secure your Bitcoin wallet?


        If you have any questions or are interested in this course, please contact us or use the form below:

          Your Name (required)

          Your Email (required)

          Your Telephone number (optional)

          Your Message

          [recaptcha size:compact]

          eLearning Zero Trust Network Access (ZTNA), CARTA and SDP

          The latest trends in IT security: the best ways to combat advanced persistent threats

          In this eLearning Zero Trust Network Access (ZTNA), CARTA and SDP the concepts of Zero Trust and Carta are explained and the implementation with a Software Defined Perimeter (SDP) and Micro-segmentation clarified.

          This is an eLearning module that consists of a series of movies and a series of optional questions, hosted on our state of the art Learning Management System (LMS). You can study anywhere, anytime : we also offer an App for your mobile phone and tablet. You will receive a soft copy of the material (including links). You can find a detailed agenda at the end of this page or you can watch the short agenda on YouTube.

          Click here to go directly to our Learning Management System.

          This eLearning module is als offered as a webinar, live connected to the instructor with Zoom or Teams.

          The term Zero Trust model was coined by Forrester in 2009. As the name says, everywhere and anytime the highest form of security (authentication, authorization, encryption etc.) must be enforced.

          The current network model (perimeter model with a DMZ) does not offer sufficient protection against threats like APT’s (Advanced Persistent Threats) or DDOS attacks. Don’t you think it is strange that the most popular transport protocol is based on: connect first, then authenticate? The IP-address was never meant for authentication, it is very convenient for making a connection. With Zero trust the network is completely dark: unauthenticated you cannot see anything…

          Our current network design is based on an assumption that inside the datacenter traffic and applications are trusted. Traffic within a networkzone/VLAN is not filtered. First and second generation (static) firewalls cannot offer the protection we need. Zero Trust offers defence against the “trusted insider” and malware that has infiltrated our network (think of the Solarwinds hack). 80% of security breaches now originate internal to the network…

          Continuous adaptive Risk and Trust accessment (CARTA) dictates continuous authentication. Even more important: continous monitoring and assessment of users, devices and applications is pivotal for detecting a threat early. The average “Mean Time To Detect” in the US is 90 days!

          You can find the concepts of Zero Trust and CARTA in solutions like Software Defined Perimeter, Micro-segmentation but also CASB en SASE. In this Zero Trust Network Access (ZTNA), CARTA and SDP training you will learn the architecture of SDP and Micro-segmentation, how it works and how to implement it.

          eLearning Zero Trust Network Access (ZTNA), CARTA and SDP
          eLearning Zero Trust Network Access (ZTNA), CARTA and SDP

          Course delivery

          This Zero Trust Network Access (ZTNA), CARTA and SDP training is available in the following formats:

          • eLearning: study anywhere, anytime. Click here to go directly to our Learning Management System.
          • Webinar: Online classroom / virtual classroom: you are live connected to the trainer with Zoom (or Teams).
          • Classroom training (postponed until further notice)

          Course duration

          This eLearning module consists of a series of movies of in total 3 hours and a series of optional questions. You will receive a soft copy of the material (including links). You can find a detailed agenda at the end of this page or you can watch the short agenda on YouTube.

          Price

          The Web Infra Academy uses two price models: per student or per training. For an onsite classroom training and a quotation please contact us or use the form at the end of this page.

          • eLearning           125,00 (ex. VAT) Euro per participant
          • Webinar :            695,00 (ex. VAT) Euro per participant (with Skype of Zoom)
          • Classroom:         695,00 (ex. VAT) Euro per participant

          Prerequisites

          Basic IT security and networking knowledge. For NON IT professionals it is recommended to follow the IT Essentials training.

          Target Audience

          IT specialists, managers, Product Owners, solution architects and DevOps engineers.

          Agenda Zero Trust Network Access (ZTNA), CARTA and SDP training

          • What are the features of Zero Trust Network Access
          • Problems with the current network and security model
          • The changed environment: BYOD, working from home (or anywhere)
          • North-south opposed to east-west traffic
          • How to implement ZTNA
          • The future of the internet: Named Data Networking (NDN)
          • What is CARTA an why do I need it?
          • The features of CARTA: the 7 imperatives of CARTA
          • Relationship CARTA and UEBA (User and Entity Behavior Analytics)
          • AI/ML and IT security
          • What is SDP and how does it work?
          • SDP architecture
          • VPN versus SDP
          • Single Packet Authorization
          • Static and dynamic firewalls
          • The advantages of SDP
          • What is micro-segmentation and how does it work
          • Vendors SDP and micro-segmentation

          If you have any questions or are interested in this course, please contact us or use the form below:

            Your Name (required)

            Your Email (required)

            Your Telephone number (optional)

            Your Message

            [recaptcha]

            Hybrid Cloud, Distributed Cloud and Edge Computing training

            (Nederlands) The Distributed Cloud: we willen en moeten steeds meer uitvoeren dicht bij de gebruiker/device

            Some companies are reluctant to make the move to the Cloud. The benefits and the maturity of the CSPs (Cloud Service Providers) are increasing while the difficulties and dangers of maintaining your own IT are getting bigger. The move to the Cloud is not without risk, security in the Cloud is a shared responsibility. This Hybrid Cloud, Distributed Cloud and Edge Computing training will help you to migrate to the Cloud safely and explains the latest trends in Cloud Computing.

            This training is meant for Product Owners, (business) managers and IT engineers.

            You can find a detailed agenda at the end of this page. This webinar is also part of our Masterclass Digital Transformation. This training is also offered by our international partner Global Knowledge, click here.

            In comparison to a few years ago compliance to rules and regulations by the CSPs (like PCI/DSS or GDPR) has improved considerably. Some CSPs even encrypt all data in transport and rest within the Cloud. However, the move to the cloud remains a matter of confidence.

            But threats like fishing mails, DDOS attacks and advanced threats like the Solarwinds hack are the rule rather than the exception. It makes you wonder if you are not safer in the Cloud. When the right conditions are in place and you use the appropriate tools (like CASB and SASE) security can be more effective in the Cloud than in your own datacenter.

            Although many companies believe the move to the cloud is a cost deduction, you have to keep a tight control. Elasticity is one of the advantages of the Cloud but it can double your costs within a couple of days easily. It is not in the interest of your CSP to keep your costs as low as possible. In this training we will show you the tools to control your costs.

            Distributed cloud is the future of cloud” – Gartner Top Strategic Technology Trends for 2021

            It is now possible to reserve your own hardware in the public Cloud (if you pay of course!).  That’s where the Distributed Cloud comes in. Another thing: location is important, especially with the rise of IoT, edge AI (Artificial Intelligence) and everybody working from home. A trend in security is to move the check of an identity and it’s access rights (of a user or device) to the edge. All these factors increase the importance of performance at the edge to ensure user satisfaction. Latency (delay on the network) can be an issue when you move to the public Cloud.

            Edge Computing has been a trend for Telcos but will play an important role in Cloud Computing. It is important your CSP offers Points of Presence (PoP) as close as possible to the end-user. At first, this PoP might be exclusive for one customer/consumer. It means having your own hardware close to the user AND maintenance and service offerings by your CSP (depending on your CSP).

            Hybrid Cloud, Distributed Cloud and Edge Computing training
            Hybrid Cloud, Distributed Cloud and Edge Computing training: Points of presence

            Feedback participants

            You can find feedback and experiences of participants of our courses on Spingest.

            Course delivery

            This Hybrid Cloud, Distributed Cloud and Edge Computing training is available in the following formats:

            • Webinar: Online classroom / virtual classroom: you are live connected to the trainer with Zoom (or Teams).
            • Classroom training (postponed until further notice)

            An E-learning module (as available for our CASB, SD-WAN and SASE training) is under development.

            This training is also offered by our international partner Global Knowledge, click here.

            Course duration

            One session of a day, from 09:00 to 17:00

            Price

            The Web Infra Academy uses two price models: per student or per training. For an onsite classroom training and a quotation please contact us or use the form at the end of this page.

            • Webinar :            695,00 Euro per participant (with Skype of Zoom)
            • Classroom:         695,00 Euro per participant
            • E-learning:         under development

            Prerequisites

            Basic IT security and networking knowledge. For NON IT professionals it is recommended to follow the IT Essentials training.

            Target Audience

            IT specialists, managers, Product Owners, solution architects and DevOps engineers.

            Course dates classroom, remote/online

            • 23-09-2022 – classroom or online
            • 02-12-2022 – classroom or online
            • 08-03-2023 – classroom or online
            • 30-06-2023 – classroom or online

            Please register using the form at the end of this page.

            Agenda Hybrid Cloud, Distributed Cloud and Edge Computing training

            • Cloud characteristics according to NIST
            • The shift in responsibilities
            • Security: a shared responsibility
            • Support in the public Cloud
            • Complexity of the Hybrid Cloud
            • Limiting the Vendor Lock-in
            • Cloud and costmanagement
            • Cloud security and high availability
            • Shadow IT and CASB
            • Exit strategies
            • Cloud automation: Policy based automation
            • Infrastructure as Code, the Shift Left
            • Self healing and auto-scaling
            • Impact on your organization
            • What is the Distributed Cloud?
            • Why the Distributed Cloud
            • Substations
            • Advantages of the Distributed Cloud
            • What is Edge Computing
            • Cloud mythes

            If you have any questions or are interested in this course, please contact us or use the form below:

              Your Name (required)

              Your Email (required)

              Your Telephone number (optional)

              Your Message

              [recaptcha]

               

              Zero Trust Network Access (ZTNA), CARTA and SDP training

              (Nederlands) De laatste trends in (netwerk) security: De beste manier om geavanceerde hacks te weerstaan.

              In this Zero Trust Network Access (ZTNA), CARTA and SDP training the concepts of Zero Trust and Carta are explained and the implementation with a Software Defined Perimeter (SDP) and Micro-segmentation clarified.

              This classroom (or virtual) training includes 90 days access to our eLearning module.

              This webinar is also available as an eLearning module that consists of a series of movies and a series of optional questions, hosted on our state of the art Learning Management System (LMS). You can study anywhere, anytime : we also offer an App for your mobile phone and tablet. You will receive a soft copy of the material (including links). You can find a detailed agenda at the end of this page or you can watch the short agenda on YouTube. Click here to go directly to our Learning Management System.

              You can find a detailed agenda at the end of this page. This webinar is also part of our Masterclass Digital Transformation. This training is also offered by our international partner Global Knowledge, click here.

              The term Zero Trust model was coined by Forrester in 2009. As the name says, everywhere and anytime the highest form of security (authentication, authorization, encryption etc.) must be enforced.

              The current network model (perimeter model with a DMZ) does not offer sufficient protection against threats like APT’s (Advanced Persistent Threats) or DDOS attacks. Don’t you think it is strange that the most popular transport protocol is based on: connect first, then authenticate? The IP-address was never meant for authentication, it is very convenient for making a connection. With Zero trust the network is completely dark: unauthenticated you cannot see anything…

              Our current network design is based on an assumption that inside the datacenter traffic and applications are trusted. Traffic within a networkzone/VLAN is not filtered. First and second generation (static) firewalls cannot offer the protection we need. Zero Trust offers defence against the “trusted insider” and malware that has infiltrated our network (think of the Solarwinds hack). 80% of security breaches now originate internal to the network…

              Continuous adaptive Risk and Trust accessment (CARTA) dictates continuous authentication. Even more important: continous monitoring and assessment of users, devices and applications is pivotal for detecting a threat early. The average “Mean Time To Detect” in the US is 90 days!

              You can find the concepts of Zero Trust and CARTA in solutions like Software Defined Perimeter, Micro-segmentation but also CASB en SASE. In this Zero Trust Network Access (ZTNA), CARTA and SDP training you will learn the architecture of SDP and Micro-segmentation, how it works and how to implement it.

              Zero Trust Network Access (ZTNA), CARTA and SDP training
              Zero Trust Network Access (ZTNA), CARTA and SDP training

              Feedback participants

              You can find feedback and experiences of participants of our courses on Spingest.

              Course delivery

              This Zero Trust Network Access (ZTNA), CARTA and SDP training is available in the following formats:

              • Webinar: Online classroom / virtual classroom: you are live connected to the trainer with Zoom (or Teams).
              • Classroom training (postponed until further notice)
              • eLearning click here.

              This training is also offered by our international partner Global Knowledge, click here.

              Course duration

              One session of a day, from 09:00 to 17:00

              Price

              The Web Infra Academy uses two price models: per student or per training. For an onsite classroom training and a quotation please contact us or use the form at the end of this page.

              • Webinar :            695,00 (ex. VAT) Euro per participant (with Skype of Zoom, including eLearning)
              • Classroom:         695,00 (ex. VAT, including eLearning) Euro per participant
              • E-learning:         295,00 (ex. VAT) Euro per participant

              Prerequisites

              Basic IT  knowledge.

              Target Audience

              Anyone who wants to know about the latest trends in IT security.

              Course dates classroom / remote/online

              • 30-09-2022 – classroom or online
              • 09-12-2022 – classroom or online
              • 15-03-2023 – classroom or online
              • 05-07-2023 – classroom or online

              Please register using the form at the end of this page.

              Agenda Zero Trust Network Access (ZTNA), CARTA and SDP training

              • What are the features of Zero Trust Network Access
              • Problems with the current network and security model
              • The changed environment: BYOD, working from home (or anywhere)
              • North-south opposed to east-west traffic
              • How to implement ZTNA
              • The future of the internet: Named Data Networking (NDN)
              • What is CARTA an why do I need it?
              • The features of CARTA: the 7 imperatives of CARTA
              • Relationship CARTA and UEBA (User and Entity Behavior Analytics)
              • AI/ML and IT security
              • What is SDP and how does it work?
              • SDP architecture
              • VPN versus SDP
              • Single Packet Authorization
              • Static and dynamic firewalls
              • The advantages of SDP
              • What is micro-segmentation and how does it work
              • Vendors SDP and micro-segmentation

              If you have any questions or are interested in this course, please contact us or use the form below:

                Your Name (required)

                Your Email (required)

                Your Telephone number (optional)

                Your Message

                [recaptcha]

                APIs, Microservices, Cloud-native – Docker and Serverless training

                De laatste trends in applicatie design: APIs, Microservices, Service Mesh en Docker

                In IT everybody is talking about APIs and microservices. In this APIs, Microservices, Cloud-native – Docker and Serverless training you will learn the latest trends for application design. Development skills are not needed for this training.

                This training is meant for Product Owners, (business) managers and IT engineers.

                You can find a detailed agenda at the end of this page. This webinar is also part of our Masterclass Digital Transformation. This training is also offered by our international partner Global Knowledge, click here.

                If you develop your own software or outsource software development, the question remains: which design pattern to choose? What are the differences, the advantages and disadvantages?

                You will learn the best practices for software design, evolved from Service Oriented Architecture (SOA) and influenced by the Cloud. One of the concepts is a clear arrangement for the communication (interface) between applications, which has led to the RESTful APIs. An almost natural evolution is the step to Microservices, made necessary by continuous delivery and continuous integration.

                However, don’t underestimate the step to Microservices and APIs. Design for failure, a Dynamic Service Discovery, API Gateways and SRE (Site Reliability Engineering) are vital to prevent outages, avoid complexity and especially to gain changeability and flexibility (TTM Time to market). To be able to offer a new App, new functionality or new IoT/smart device before your competitor can be decisive for your company.

                Influenced by the Cloud we now have Cloud-native application deployment / installation methods like containers / Docker and an immutable (unchangeable) infrastructure (throw away and install again). This new WoW has impact on your application and development processes. But don’t think you can pick up your container and move it from your datacenter to the Cloud or from Azure to AWS without much effort: IT DEPENDS.

                Another form of a Cloud-native application is Service Mesh (with a sidecar). This is the concept which separates the management and development of non-functionals like connection logic (load balancing, routing, logging but also security) from your business logic/application and enables you to create platform teams.

                Finally, you can choose for Serverless, with management of infrastructure and middleware completely in control of the Cloud Service Provider (CSP): you only need to focus on the business logic. This is potentially very cost effective but can also mean a vendor lock-in. However, this is becoming more and more mature and is quickly embraced by the Open Source community. Serverless does NOT mean NoOps…

                APIs, Microservices, Cloud-native - Docker and Serverless training
                APIs, Microservices, Cloud-native – Docker and Serverless training

                Feedback participants

                You can find feedback and experiences of participants of our courses on Spingest.

                Course delivery

                This APIs, Microservices, Cloud-native – Docker and Serverless training is available in the following formats:

                • Webinar: Online classroom / virtual classroom: you are live connected to the trainer with Zoom (or Teams).
                • Classroom training (postponed until further notice)

                An E-learning module (as available for our IT Essentials for non-IT) is under development.

                This training is also offered by our international partner Global Knowledge, click here.

                Course duration

                One session of a day, from 09:00 to 17:00

                Price

                The Web Infra Academy uses two price models: per student or per training. For an onsite classroom training and a quotation please contact us or use the form at the end of this page.

                • Webinar :            695,00 Euro per participant (with Skype of Zoom)
                • Classroom:         695,00 Euro per participant
                • E-learning:         under development

                Prerequisites

                Basic IT knowledge.

                 Target Audience

                Anyone who wants to know about the latest trends in Software development.

                Course dates Classroom/remote/online

                • 10-02-2023 – Classroom (Nieuwegein), Online, Zoom
                • 06-03-2023 – Classroom (Nieuwegein), Online, Zoom
                • 05-05-2023 – Classroom (Nieuwegein), Online, Zoom
                • 28-06-2023 – Classroom (Nieuwegein), Online, Zoom

                Please register using the form at the end of this page.

                Agenda APIs, Microservices, Cloud-native – Docker and Serverless training

                • What are the main characteristics of SOA: loosely Coupling, the concept of a contract for your interface, reusability
                • What are the characteristics of a RESTful API?
                • What are the advantages and disadvantages of an API?
                • Why is a dynamic service discovery important?
                • API Gateways
                • What are differences between an API and a Microservice?
                • The problem with (long) API chains
                • The importance of SRE Observability, Tracing
                • What is an application container?
                • What are the requirements for an application to run in an application container
                • The 12-factor App
                • What is Docker and Kubernetes
                • The Microservices hierarchy of needs
                • Differences between Cloud Service Providers (CSP)
                • What is a Service Mesh?
                • Advantages and pitfalls of a Service Mesh
                • Wich Service Mesh tools are available: Istio, Envoy, Linkerd, Consul and Open Service Mesh (CNCF).
                • What is Serverless?
                • What is the difference between Function as a Service (FaaS) and Backend as a Service (BaaS)
                • What do the CSP’s offer: AWS Lambda, Azure Functions etc.
                • NoOps?

                If you have any questions or are interested in this course, please contact us or use the form below:

                  Your Name (required)

                  Your Email (required)

                  Your Telephone number (optional)

                  Your Message

                  [recaptcha]

                  CASB, SD-WAN and SASE Training

                  The latest trends for (hybrid) Cloud security. Are you in control of the Cloud usage by your company?

                  As more data moves to the cloud, new tools and methods are needed to control your data and comply to security regulations. This CASB, SD-WAN and SASE Training is based on the latest security trends as defined by Gartner, Forrester and the Cloud Security Alliance (CSA).

                  This classroom (or virtual) training includes 90 days access to our eLearning module.

                  You can find a detailed agenda at the end of this page or you can watch the short agenda on YouTube. This webinar is also part of our Masterclass Digital Transformation and is available through our international partner Global Knowledge, click here.

                  This webinar is also available as an eLearning module that consists of a series of movies and optional questions, hosted on our state of the art Learning Management System (LMS). You can study anywhere, anytime : we also offer an App for your mobile phone and tablet. You will receive a soft copy of the material (including links).

                  Click here to go directly to our Learning Management System. Or watch a preview on YouTube here.

                  Are you in control of your business data in the Cloud (think of Dropbox, social media, Gmail or Office365)? Security in the Cloud is a shared responsibility which leads to complexity and confusion.

                  A CASB (Cloud Access Security Broker) is essential to mitigate and control the risks involved in the (unwanted) usage of the Cloud (Shadow IT for example)

                  “Email is the #1 attack vector. Cloud Account Takeover is the #1 attack target. A CASB is the best way to protect against these threats – Cloud Security Alliance (CSA).

                  Threats, hacks and zero days are unfortunately the order of the day. Even the most professional IT organizations are hit by malware, think of the recent Solarwinds hack. Are your data and applications safe in the hybrid Cloud?

                  In this CASB, SD-WAN and SASE Training you get an overview of the latest security and networking technologies and you will learn: What is it? Why do I need it? How can I implement it? What are the major vendors?

                  Digital business transformation requires anywhere, anytime access to applications and services — many of which are now located in the cloud (Source: Gartner, August 2019, The Future of Network Security Is in the Cloud)

                  The term SASE (Secure Access Server Edge) was introduced in 2019 by Gartner. SASE is a new category of cloud-native networking and security solutions. The used technologies are not new as such, but the convergence of these solutions in one product offering a single pane of glass and single point of control is.

                  Because SASE (but also CASB) is a combination of existing security and networking tools, in this training you will gain insight in the latest tools such as:

                  CASB, SD-WAN and SASE Training
                  CASB, SD-WAN and SASE Training

                  Feedback participants

                  You can find feedback and experiences of participants of our courses on Spingest.

                  Course delivery

                  This training is also offered by our partner Global Knowledge.

                  This CASB, SD-WAN and SASE training is available in the following formats:

                  • Webinar: Online classroom / virtual classroom: you are live connected to the trainer with Zoom (or Teams).
                  • Classroom training (postponed until further notice)
                  • eLearning, click here.

                  Course duration

                  One session of a day, from 09:00 to 17:00

                  Price

                  The Web Infra Academy uses two price models: per student or per training. For an onsite classroom training and a quotation please contact us or use the form at the end of this page.

                  • Webinar :            695,00 (ex. VAT) Euro per participant (with Skype of Zoom)
                  • Classroom:         695,00 (ex. VAT) Euro per participant
                  • E-learning:         295,00 (ex. VAT) Euro per participant

                  Prerequisites

                  Basic IT knowledge.

                   Target Audience

                  Anyone who wants to know about the latest trends in Cloud  security.

                  Course dates webinar/remote/online

                  • 07-10-2022 – classroom or online
                  • 14-12-2022 – classroom or online
                  • 17-03-2023 – classroom or online
                  • 07-07-2023 – classroom or online

                  Please register using the form at the end of this page.

                  Agenda CASB, SD-WAN and SASE training

                  • What is a CASB?
                  • Why do you need a CASB? What does a CASB offer, what are the advantages?
                  • Architecture CASB, first-gen versus next-gen Multi-mode CASBs
                  • Agentless CASB: AJAX-VM
                  • The different implementations of CASB: log collection, packet capture, Cloud APIs, proxies and AJAX-VM
                  • Recommendations and vendors
                  • What is SD-WAN and Software Defined Networking
                  • Challenges with the current WAN technology
                  • Comparison MPLS and SD-WAN
                  • Advantages SD-WAN: transport agnostic, tunnel bonding, intelligent routing
                  • SD-WAN architecture and implementation
                  • Recommendations and vendors
                  • What is SASE
                  • Het problem with Service chaining
                  • Why SASE, what are the advantages
                  • Architecture and implementation: SASE Cloud and SASE Points of Presence (PoP)
                  • What are the essential components of Networking as a Service and Security as a service:
                    • Software defined wide area network, SD-WAN
                    • Software-defined perimeter (SDP) en Zero Trust network access (ZTNA)
                    • Secure web gateway (SWG) versus Firewall as a service (FWaaS) versus Nextgen firewall (NGFW) versus Web Application firewall (WAF)
                    • Next-generation antimalware (NGAM)
                    • Intrusion Detection Systems (IDS) versus Intrusion prevention system (IPS)
                    • Remote Browser Isolation (RBI)
                  • The role of Deep Packet Inspection (DPI)
                  • Recommendations and vendors

                  If you have any questions or are interested in this course, please contact us or use the form below:

                    Your Name (required)

                    Your Email (required)

                    Your Telephone number (optional)

                    Your Message

                    [recaptcha]

                    The team

                    Our regular team consists of three persons, each with a unique background and area of expertise.

                    Marcel Punselie

                    Marcel Punselie

                    I live in a beautiful small village, Oudendijk, in the Netherlands and am married with Annette. I am working in IT for more than 25 years.

                    I started out as a Cobol/Java developer. Later on, I specialized myself in Middleware and Infrastructure. For the last 10 years I am working as a Solution Architect. From 2005 I deliver courses, next to my consultancy activities. In the beginning mainly for the big vendors (IBM), but I quickly started to develop my own training material  providing a unique overview of different technologies, from different vendors.

                    In 2007 I started my own training company : the Web Infra Academy.

                    : https://www.linkedin.com/in/celtic/

                    Roland Mammen

                    Roland Mammen

                    I am working in IT for 20 years, in different technical roles.

                    The last 10 years I work as a Solution Architect for big international companies. I like to work at the interface where business and IT meet.

                    Daily I am confronted with with the latest trends: Public Cloud, Micro Services and Cyber Security. However, I also realize not everything is cutting edge or Open Source, legacy IT remains relevant.

                    Next to my consultancy activities I deliver courses.  Sharing my experiences in the field is an important aspect.

                    : https://www.linkedin.com/in/roland-mammen/

                    Martijn Cruyff

                    Martijn Cruyff

                    I live in Purmerend, The Netherlands, am married to Linda and have two beautiful daughters, Amber and Jade. My goal in life is; to learn as much as possible, realize beautiful things and share with others.

                    My interests are broad; from technology to philosophy and everything in between. I combine this knowledge with years of experience in IT, management and personal coaching to deliver training, coaching and consultancy services in different sectors. One of my main capabilities is to translate theory to the unique environment of the customer. In this way I help to make people happier and help to keep organizations viable.

                    : https://www.linkedin.com/in/martijncruyff/