Grootste online IT opleider

Beste klantenservice

Veel e-learning in prijs verlaagd

Na betaling, direct starten

Training: Beveiligingsrisico's beperken

€ 279,00
€ 337,59 Incl. BTW

Bestellen namens een bedrijf?

Duur: 20 uur |

Taal: Engels (US) |

Online toegang: 90 dagen |

In Onbeperkt Leren


In deze online training leer je hoe je tal van beveiligingsrisico's kunt beperken. Je gaat van start met het beheer van beveiligingsrisico’s van netwerken en infrastructuur. Vervolgens ontdek je hoe je beveiligingsrisico’s, inbreuken op cyber beveiliging en social engineering aanvallen kan voorkomen en welke tegenmaatregelen je kunt implementeren. Verder verdiep je je in het beheer van risico’s met betrekking tot informatie, cloud en gegevens. Daarnaast komen verschillende natuurlijke bedreigingen, zoals natuurrampen, aan bod en leer je wat je hieraan kan doen. Tot slot maak je kennis met de beveiligingsuitdagingen van een hybride werkplek.
Naast het beperken van bovenstaande beveiligingsrisico's leer je een gedegen en robuuste informatiebeveiliging governance strategie in je organisatie te implementeren en leer je hoe je incidenten kan beheren. Tot slot leer je hoe je methoden van business continuity planning kan toepassen voor, tijdens en na een beveiligingsramp.


Na succesvolle afronding van deze training ben je in staat om beveiligingsrisico’s te voorkomen en weet je welke tegenmaatregelen je tegen risico’s kan inzetten. Daarnaast kun je een informatiebeveiliging governance strategie in je organisatie implementeren en kun je methoden van business continuity planning toepassen voor, tijdens en na een beveiligingsramp.


Je hebt een goede IT basiskennis.


Systeembeheerder, Securityspecialist


Beveiligingsrisico's beperken

20 uur

Mitigating Security Risks: Managing Network & Infrastructure Security Risks

  • To mitigate cyber, data, cloud, and information security risks, you need solid knowledge of the complete network security process, from network design to continuous monitoring and logging.
  • In this course, you'll explore some vital network security concepts and standard techniques for mitigating security risks.
  • You'll start by examining the potential vulnerabilities in a network and how these turn into threats. You'll then explore the decisions you need to make to secure the network infrastructure.
  • Next, you'll investigate different network zones and tools used for monitoring, detection, and logging.
  • You'll finish by outlining a secure network design's characteristics and the recommended guidelines and best practices for network security.
  • On completion of this course, you'll be able to plan for network and infrastructure-related security risks using recommended tools, methods, and best practices.

Mitigating Security Risks: Managing Physical Security Risks

  • Physical security is an important but potentially overlooked consideration when implementing network security. In this course, you'll explore what's meant by physical security, how you can implement physical security risk countermeasures, and what the motivations are for doing so.
  • You'll start by defining physical security. You'll then investigate the critical decisions you must make when planning for physical security. Next, you'll delve into various types of physical security risks, such as tailgating, and the methods to handle these.
  • Moving on, you'll outline the layers of security controls that can be added to increase physical security and recognize the challenges security personnel face in ensuring physical safety.
  • Lastly, you'll study how the security principles examined in this course can be used in facility and site design, including internal and perimeter security controls.

Mitigating Security Risks: Cyber Security Risks

  • Effective cybersecurity risk management requires intricate knowledge of day-to-day IT security risks, network vulnerabilities, and cyber attacks. In this course, you'll detail several cybersecurity breaches and how best to prevent each one.
  • You'll start with a general overview of what comprises security risks before categorizing different types into information, cloud, and data-related risks.
  • Next, you'll explore cybercrime methods, the motivations behind them, and the security gaps that invite them in. You'll then use real-life examples to detail some commonplace cyberattacks and crimes.
  • Moving on, you'll investigate what's meant by malware and outline best practices to manage worms, viruses, logic bombs, trojans, and rootkits.
  • You'll also learn how to safeguard against malware, spyware, ransomware, adware, phishing, zero-day vulnerabilities, DoS, and backdoor attacks.
  • By the end of the course, you'll be able to outline guidelines and best practices for securing against the most prevalent types of cybercrimes.

Mitigating Security Risks: Managing Social Engineering Risks

  • Social engineering is a security attack method that takes advantage of the social aspect of human nature, which includes trust and interactivity. All members of an organization need to recognize how these subtle and manipulative techniques work and what they can do to avoid falling prey to them.
  • In this course, you'll explore what's meant by social engineering, examining standard social engineering techniques, the basic principles of these kinds of attacks, their intended outcomes, who and what they target, and the risks they pose for your organization.
  • Moving along, you'll investigate how social engineering is used to launch a cyberattack, study different types of spoofing attacks, and specify best practices to safeguard against social engineering.
  • At the end of the course, you'll recognize the objectives of social engineering attacks, how they're carried out, and how to implement security measures to prevent them.

Mitigating Security Risks: Information, Cloud, & Data Security Risk Considerations

  • To keep your organization's data secure, you need to know why your data is at risk and how to protect it using established principles and standards. In this course, you'll explore commonly used techniques to compromise data and how international best practices can help protect against these breaches.
  • You'll start by examining three fundamental information security principles, which define information security policy and help identify risks. You'll then outline data breach methods and identify the targets of these threats.
  • Next, you'll investigate what's meant by 'the human factor' and why it's key to any attack. You'll then study how technologies to secure data and information work under the hood.
  • Moving on, you'll outline primary worldwide information security regulations and governance frameworks. Lastly, you'll examine why the ISO 27017 cloud security principles need to be considered when formulating a cloud security risk management plan.

Mitigating Security Risks: Handling Natural Threats

  • Natural disasters pose serious security threats. Effective planning and management are required to minimize the damage and loss they could cause.
  • In this course, you'll explore various types of natural threats, their impact on assets and data, and what you can do about them.
  • You'll examine what the procedure is for preparing for natural disasters as well as dealing with the aftermath. You'll also learn how to do this with human-made disasters, such as terrorism.
  • You'll finish the course by diving deeper into how to create an effective emergency action plan for natural disaster risk mitigation.

Mitigating Security Risks: Managing Risks from Internal Stakeholders

  • Effective risk management involves managing risks from external

  • as well as internal sources. Because security risks can be
  • introduced through internal stakeholder decisions, working with
  • them to build awareness of the broad spectrum of security risks and
  • their role in mitigating these is essential. In this course, you'll
  • explore the internal stakeholder's role in the security landscape
  • context. You'll then investigate how to effectively communicate
  • with stakeholders regarding their role in preventing security risks
  • from being introduced. You'll build on these concepts by examining
  • best practices for continual stakeholder engagement using workplace
  • example scenarios. You'll then outline various methods of effective
  • security health reporting. At the end of this course, you'll be
  • able to plan for effective stakeholder communication and
  • engagement.

Mitigating Security Risks: Managing Security in a Hybrid Workplace

  • Hybrid workplaces are an attractive working style for many organizations. However, a functioning and secure hybrid workplace can take some strategic planning and management to achieve.
  • By their nature, hybrid workplaces pose various security risks. Security leaders need to educate themselves and their employees on what these risks are and how best to avoid them.
  • In this course, you'll explore what a hybrid workplace entails and the resulting security risks. You'll then outline tips and guidelines to secure a hybrid workplace.
  • You'll also learn about the security risks of the 'work from home' (WFH) working methodology and guidelines for securing it.
  • Upon completing this course, you'll be able to classify the security challenges of a hybrid workplace and WFM situation, outline how to communicate these risks to employees to aid in risk prevention, and recognize the critical decisions when planning for a secure hybrid workplace.

Mitigating Security Risks: Information Security Governance

  • Adequate risk management requires the policies, procedures,

  • standards, and guidelines that encompass effective information
  • security governance are in place. This course shows you how to
  • incorporate security governance as part of a robust security
  • strategy. Examine the many security governance elements. Outline
  • how to design, implement, and continually evaluate your strategy
  • based on best practices. Define how security governance relates to
  • the CIA Triad and distinguish between security governance and
  • security management. Furthermore, investigate IT governance
  • frameworks and compare centralized, decentralized, and hybrid
  • structures. After taking this course, you'll recognize what's
  • needed to implement a sound and robust information security
  • governance strategy at your organization.

Mitigating Security Risks: Managing the Incidents

  • Security breach incidents need to be handled effectively to prevent further occurrences. An incident management process based on best practices greatly helps deal with and thoroughly learn from incidents.
  • Use this course to recognize the steps involved in the incident management process, the dependencies this process has on other processes, and who's involved in incident management.
  • Examine the use of incident handling forms and incident prevention measures. Furthermore, study the signs employees should look out for and escalate that indicate a security breach event is occurring.
  • After completing this course, you'll recognize how to use the incident management process to identify, manage, and prevent security breach incidents.

Mitigating Security Risks: Maintaining Business Continuity

  • Business continuity planning (BCP) ensures an organization

  • functions smoothly during an unplanned incident or disaster. In
  • this course, you'll explore what comprises BCP and how you can
  • employ its methods before, during, and after a disaster. You'll
  • learn about the importance of a business continuity plan and what's
  • needed to create an effective one. You'll differentiate a business
  • continuity plan from disaster recovery and emergency action plans.
  • You'll then investigate some of the individual BCP steps in more
  • detail, including the business impact analysis (BIA), risk
  • management plan, and incident response plan phases. Moving on,
  • you'll study what's involved in post-disaster recovery planning.
  • Finally, you'll explore how to achieve business resiliency and
  • excellence in the face of a disaster and during a pandemic,
  • examining not only how to get back to normal but also how to
  • exploit new opportunities and grow.

Mitigating Security Risks: Maintaining a Secure Workplace

  • Securing a workplace is a collaborative effort and requires contribution from everyone, including employees at all levels. It's a leader's role to educate and encourage everyone to build a security mindset into their daily practices. In this course, you'll learn how to foster a secure workplace.
  • You'll start by exploring what comprises a secure workplace before examining best practices for achieving this state. You'll then outline best practices for developing a security policy.
  • Next, you'll study how to conduct security awareness training, cultivate an organization-wide security mindset, and encourage employees to take ownership of the security processes.
  • Finally, you'll learn about the role of security certifications, specifically the Cyber Maturity Model certification. You'll recognize what it comprises and how it applies to a secure workplace.

Opties bij cursus

Wij bieden, naast de training, in sommige gevallen ook diverse extra leermiddelen aan. Wanneer u zich gaat voorbereiden op een officieel examen dan raden wij aan om ook de extra leermiddelen te gebruiken die beschikbaar zijn bij deze training. Het kan voorkomen dat bij sommige cursussen alleen een examentraining en/of LiveLab beschikbaar is.

Examentraining (proefexamens)

In aanvulling op deze training kunt u een speciale examentraining aanschaffen. De examentraining bevat verschillende proefexamens die het echte examen dicht benaderen. Zowel qua vorm als qua inhoud. Dit is de ultieme manier om te testen of u klaar bent voor het examen. 


Als extra mogelijkheid bij deze training kunt u een LiveLab toevoegen. U voert de opdrachten uit op de echte hardware en/of software die van toepassing zijn op uw Lab. De LiveLabs worden volledig door ons gehost in de cloud. U heeft zelf dus alleen een browser nodig om gebruik te maken van de LiveLabs. In de LiveLab omgeving vindt u de opdrachten waarmee u direct kunt starten. De labomgevingen bestaan uit complete netwerken met bijvoorbeeld clients, servers, routers etc. Dit is de ultieme manier om uitgebreide praktijkervaring op te doen.


Via ons opleidingsconcept bespaar je tot 80% op trainingen

Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo

Spar met medecursisten en profileer je als autoriteit in je vakgebied.

Ontvang na succesvolle afronding van je cursus het certificaat van deelname van

Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers

Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten


Zodra wij uw order en betaling hebben verwerkt, zetten wij uw trainingen klaar en kunt u aan de slag. Heeft u toch nog vragen over ons orderproces kunt u onderstaande button raadplegen.

lees meer over het orderproces

hoe werkt aanvragen met STAP

Wat is inbegrepen?

Certificaat van deelname ja
Voortgangsbewaking ja
Award Winning E-learning ja
Geschikt voor mobiel ja
Kennis delen Onbeperkte toegang tot onze community met IT professionals
Studieadvies Onze consultants zijn beschikbaar om je te voorzien van studieadvies
Studiemateriaal Gecertificeerde docenten met uitgebreide kennis over de onderwerpen
Service Service via chat, telefoon, e-mail (razendsnel)


Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

Life Long Learning

Meerdere cursussen volgen? Misschien is ons Life Long Learning concept wel wat voor u

lees meer

Neem contact op

Studieadvies nodig? Neem contact op!