Contact Jobs
Language
English
Make an appointment
Make an appointment
Menu
Sluiten
Menu
Sluiten
Menu
Sluiten
Language
English
Training

Training contributes to digital security

Our awareness and technology training sessions enhance your organization’s digital resilience and agility. Discover here how we can increase the knowledge of your employees.

Why training? 

We value the development of your employees. We do this, on the one hand, with our interactive awareness training, tailored to your organization. On the other hand, we support your administrators with specific technology training courses, allowing the (new) solution to be used optimally. In our training courses, we always work according to a predefined format that is designed to suit the different learning styles of participants.

PHOTO-2021-12-01-17-07-06

Awareness training

Our awareness training consists of several statements and case studies derived from your own organization, approached from a people, process and technology perspective. This creates a highly interactive program and a high level of participant involvement.

Target group

Managers and application owners. 

Duration

One-day in-company training.

Description

Our awareness training empowers employees to actively contribute to the digital security of the organization. We prepare the training session by an alignment meeting and interviews with some of the participants. This allows us to respond well to the expectations and knowledge level of the target group. Based on these preparations, we develop organization-specific statements and cases that will be addressed during the training session.

Group size

A maximum of 25 participants with two trainers.

Investment

Upon request.  

Objectives
  • Participants will have insight into the domain of Digital Identity.
  • Participants acknowledge the importance of digital safety and understand that everyone will have to contribute to it.
  • Participants know how they can contribute from their own positions.
  • Participants will receive a 'toolkit' to educate employees on the importance of digital security.
kadaster-logo
"Highly interactive program. Good balance between theory and practice. The training was, in collaboration with the Kadaster, well tailored to the organization."
CyberArk training-1

CyberArk training

PAM Administration, Defender (Level 2)

In this training course, the Core Privileged Access Security (PAS) module of the CyberArk suite is addressed. Your CyberArk administrators, or 'Vault Admins', gain practical experience in configuring and managing the Core PAS solution in this training course.

Target Group

Administrators of the PAM solution. We assume that you have a basic knowledge of networks and Windows administration.

Duration

A four-day training course in Dutch or English.

Description

This training course will provide participants with the knowledge and skills required to manage, secure and solve problems regarding an existing PAM implementation. The course includes presentations about PAM architecture, password management, session management and detection of threats and risks, in addition to software concepts, such as monitoring and troubleshooting.

Group size

A maximum of 8 persons per trainer. If there are more than 8 participants, two trainers will be present (in-company is possible).

Certification

CyberArk Defender Level 2.

Investment

€ 2750,00 per person.

Objectives
  • Participants can describe system architectures and flows.
  • Participants will know how to onboard accounts using Automatic Accounts Discovery and the password upload utility in the CyberArk solution.
  • Participants can configure isolation and monitoring of PSM sessions.
  • Participants will know how to change settings for main policies.
  • Participants know how to perform general administrative tasks.
Paulina

Our participants really appreciate that we provide the link between theory and practice. We offer insights into how (other) organizations use CyberArk and why you choose or don’t choose certain settings.

Paulina Eijgelaar
Trainer
ronald-zierikzee

One Identity training

Identity Manager Foundation Training (#IM-IB)

This training course will give you an overview of what can be achieved with One Identity Manager. The focus of this course is on how the product works and what has been pre-configured. But also on what you need to do to deliver value to the organization and jointly get "in control". At the end of this course, you will have sufficient knowledge of the product and know how to achieve a successful implementation together.

 

Target group

Functional administrators and professionals responsible for role management, configuration of appropriate access and request, and approval processes.

Duration and materials

Five-day course in Dutch or English, using the official English training materials.

Description

This training course offers participants the knowledge and skills required to set up One Identity Manager and carry out daily management activities in an efficient manner. Using both practical examples and exercises, participants will learn how to gain complete control over identities with One Identity. This course focuses less on the technical components. 

Group size

A maximum of 8 persons, with a minimum of 4 persons (in-company is possible).

Certificering

Participation in this training course will be recorded in a Certificate of Participation. 

Dates

Please contact us for a suitable offer.  

Investment

Upon request

Objectives
  • Participants will understand the global functions of a connector to a source and target system.
  • Participants will understand the meaning of terms such as Business Roles, System Roles and Entitlements.
  • Participants will know how to use the IT web portal.
  • Participants will be able to configure roles.
  • Participants will be able to carry out request/approval processes, segregation of duties (SoD) and various workflows.
  • Participants will be able to carry out control processes.
Training-Ronald

One Identity training

Identity Manager Implementation Certification (#IM-IC)

This in-depth, technical training, which can be followed without the #IM-B course, focuses on synchronizing and adapting joiner, mover, leaver processes to your organizationAt the end of this training course, participants will have technical knowledge of One Identity Manager and will be able to achieve a successful implementation.  

Target group

Technical administrators and professionals responsible for connecting source and target systems and configuration work. 

Duration and materials

Five-day course in Dutch or English, using the official English training materials.  

Description

This in-depth, technical training offers participants more knowledge and skills, so they will be able to further configure One Identity Manager, including connecting and synchronizing applications and adjusting joiner, mover, leaver workflows. Using both practical examples and excercises, participants will learn how to gain complete control over identities. This training will tell you a lot about standard connectors, the synchronization module and the configuration of the technical components but will also focus on how your organization can be assisted and what is required to achieve this.

Group size 

A maximum of 8 persons, with a minimum of 4 persons (in-company is possible).

Certification 

Participation in this training course will be recorded in a Certificate of Participation.

This course will prepare you for the ‘Certified Identity Manager Implementation Professional’ exam.

Investment

Upon request.

Objectives
  • Participants will understand how applications can be connected to the system.
  • Participants will gain insight into how scripts and other programming options can help the system perform optimally in their own organization.
  • Participants will know how the security, authentication and permissions work that are part of the suite/package.
  • Participants will be able to configure Business Roles, System Roles and Entitlements.
  • Participants will be able to configure and carry out request/approval processes, segregation of duties (SoD) and various workflows.
  • Participants will be able to create technical workflows.
  • Participants will be able to create monitoring processes (attestations, reports, data quality overviews and risk models).

Would you like to know more about our training programs?

Feel free to contact Carmin

Grabowsky-Consultant

Do you want to boost your agility and resilience?

We would like to help you reach your goal by using the right Digital Identity strategy and suitable Identity & Access Management solutions for your employees, partners, suppliers and customers.