All Architect courses

Course image
Udemy: Angular - The Complete Guide (2024 Edition)
Master Angular, formerly Angular 2, and build awesome, reactive web apps with the successor of Angular.js. Join the most comprehensive and bestselling Angular course on Udemy and learn all about this amazing framework from the ground up, in great depth! This course starts from scratch, you neither need to know Angular 1 nor Angular 2. This course will teach you all the fundamentals about modules, directives, components, databinding, routing, HTTP access and much more! We will take a lot of deep dives and each section is backed up with a real project. All examples showcase the features Angular offers and how to apply them correctly. 36 hours on-demand video. Apply for this course
 
Course image
Exam Prep: Enterprise Architecture Foundations 9.2 (LinkedIn Learning)
The Open Group Architecture Framework, or TOGAF, is a framework and methodology for developing enterprise-level software. TOGAF provides an approach for designing, planning, implementing, and governing enterprise IT architecture. This high-level, systematic approach is designed to reduce error, maintain timelines, keep the project on budget and align IT with business units. If you’re looking to get certified in TOGAF, join Shane Chagpar in this course, as he provides an overview of the TOGAF Foundation exam, taking you step-by-step through the learning objectives for the Level 1 exam. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Apply for this course
 
Course image
Learning Docker (LinkedIn Learning)
Applications working on one machine but not others is a common problem in software development. Configuration management tools and virtual machines are common solutions, but can be cumbersome and more complicated than necessary for developers who just want their code to run in other places safely. Docker, an open-source containerization platform, simplifies the deployment and management of your applications by packaging your apps into images that run in containers—standardized executable components combining application source code with the operating system libraries and dependencies required to run that code in any environment. In this course, software engineer Carlos Nunez introduces the basics of Docker, including its containers, Dockerfiles (or base images), and capabilities. Watch and learn how to build your own containers.Topics include: Define Docker and explain common use cases. Understand how containers functionally and operationally differ from virtual machines. Explore three key technologies that make Docker different: layered containers, the Dockerfile, and the Docker API. Learn how to create and manage containers using the Docker CLI. Understand how to create custom container images using Dockerfiles. Learn how to push Docker images to the Docker registry and manage them. Troubleshoot common container issues using Docker CLI commands. Understand common best practices and problems when working with Docker containers and images. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in.This course is in French only. If this is not a problem for you, by all means go ahead and apply.Apply for this course
 
Course image
Angular: Testing and Debugging (LinkedIn Learning)
Errors caused by missing dependencies, undefined variables, or poorly formatted data can cause your web application to stop working. In this course, learn how to track down and eliminate these types of errors in your Angular applications through the process of testing and debugging. Instructor Derek Peruo breaks down common error messages and goes over a variety of testing and debugging options. He also covers code linting, shares some tips and tricks for avoiding pitfalls during development, and goes into writing custom error handlers to make it easier to work with errors as your application grows.Topics include:Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in.This course is in French only. If this is not a problem for you, by all means go ahead and apply.Apply for this course
 
Course image
Building a Reactive App with Angular and Spring Boot 2 (LinkedIn Learning)
Angular is known for building rich, data-driven single page applications (SPAs), while Spring Boot is a popular and powerful framework for back-end development. In this course, Chris Anatalio shows how to take these two enterprise-scale worthy technologies and build a robust, secure full-stack application. Learn how to build an app that uses this reactive Spring stack to create a REST API on the back end, and an Angular front end that leverages that data. After highlighting the benefits of using reactive programming with Angular and Spring, Chris covers using, configuring, and implementing reactive Spring Data; building a reactive Spring Data client-side functionality with Angular; testing; and more. Topics include: Benefits of using reactive programming with Angular and Spring Bootstrapping your Spring Boot app Building a reactive Spring REST API Creating and testing a WebFlux GET endpoint Building a front-end app with Angular Using and configuring reactive Spring Data Using a REST API GET request Unit testing with Spring Boot and Angular Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course Recommended by Smals Experts //
 
Course image
DevOps Foundations: Infrastructure as Code (LinkedIn Learning)
Infrastructure automation—transitioning an organization's system administration from hardware into code—is one of the major DevOps practice areas. By automating configuration management, you can make your systems more reliable, processes more repeatable, and server provisioning more efficient. In this course, learn the basics of infrastructure as code, including how to keep your configuration in a source code repository and have it built and deployed just like an application. Discover how to approach converting your systems over to becoming fully automated—from server configuration to application installation to runtime orchestration. Join notable DevOps practitioners Ernest Mueller and James Wickett as they dive into key concepts, and use a wide variety of tools to illustrate those concepts, including Ansible, Terraform, Docker, Kubernetes, Serverless, and AWS Lambda. Check out this course to gain the knowledge you need to start implementing an infrastructure as code strategy. Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Course image
IT Security Foundations: Network Security (LinkedIn Learning)
Want to keep your interconnected systems and data safe? In this course, Lisa Bock covers network security and securing an organization's infrastructure. Lisa introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols. She also provides overviews of how to protect clients with antivirus software, encrypt folders and files, implement software restriction policies, and secure your cloud services. Finally, she looks at the often-overlooked topic of physical security, which includes securing a building's perimeter and the hardware within. Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Cybersecurity: Key Policies and Resources (LinkedIn Learning)
Cybersecurity can be daunting because of its technical complexity and the ever-changing threats to individuals and organizations. And more than ever, cybersecurity also is a core business function for organizations of all kinds. Just like other business issues—like finance, legal, or human resources—cybersecurity has its own set of external policies, laws, rules, established practices, and resources for getting help. Getting to know these policies and resources better across your organization—and not just within your IT department—can be hugely beneficial to your company. This course seeks to make key cybersecurity policies and resources clear and understandable—whether you work in IT, in business, or are just interested in how information security fits in with our public policies and laws. Join instructor Gregory Michaelidis to improve your personal or organizational cybersecurity with grounding in the latest regulations, governmental authorities, and resources available. Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Learning Confluence 2018 (LinkedIn Learning)
SCORE 4/5 by Smals Colleagues Confluence is content collaboration software that professionals can use to create, organize, and discuss work with their colleagues. In this course, instructor David Rivers shows how to work with this powerful tool as a team member, exploring how to configure and use Confluence to manage business and project information. David dives into creating pages and blogs in Confluence, setting page layouts, and adding content and navigation. He also shares how to collaborate on content and communicate with other team members. Topics include: What is Confluence? Customizing your home page Creating pages and blogs Creating a page for meeting notes Adding content and navigation Creating a table of contents Inviting people to your space Communicating and collaborating with others Restricting access to a page Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Performing a Technical Security Audit and Assessment (LinkedIn Learning)
This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course, you'll know how to determine if your network is secure. Topics include Cite the three phases of external security assessments. Explain the reasons for conducting a log review. Explain what network sniffing is and why it’s used. Describe when to use a file integrity checking tool. Differentiate between active network discovery and passive network discovery. Explain how to scan for vulnerabilities. Relate the three techniques useful for validating target vulnerabilities. Explain the four-stage methodology of conducting penetration tests. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
DevOps Foundations: DevSecOps (LinkedIn Learning)
Security is a major concern in the DevOps world. There is a constant push for companies to move more quickly, and security teams struggle to keep up with testing. This has led to the rise of a new field: DevSecOps. This course introduces the concept of DevSecOps and explains how an organization can build out a DevSecOps program that helps teams integrate security into the application development pipeline. Learn about the role of APIs, containers, and automation, and how a continuous integration and delivery framework can help your organization run security tests as often as developers want. Instructor Tim Chase also introduces some free tools and resources for starting your DevSecOps journey. Topics include: Identify the main goal of DevSecOps. Recognize the importance of security in the DevOps process. Explain the different steps in the continuous integration and delivery process. Determine the correct tools to integrate into the DevSecOps process. Assess reference materials for further DevSecOps learning. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Ethical Hacking: Social Engineering (LinkedIn Learning)
Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated. In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"—how hackers use charm, power, and influence to penetrate an organization—and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks. Note: This course maps to the Social Engineering competency of the Certified Ethical Hacker exam. You can review the exam objectives on the official EC-Council website. Topics include: Visualizing the victim Recognizing an attack Using charm, power, and influence Manipulating with social media Preventing insider attacks Stealing identities Pen testing with social engineering Taking countermeasures Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Docker for Developers (LinkedIn Learning)
Projects Build and deploy a Docker app. Discover how to leverage Docker for application development. Instructor Emmanuel Henri—an executive and full-stack developer with 20 years of experience in programming, technology, and design—walks you through deploying your first Docker app, from base application setup to deploying your app to the cloud. Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
La sécurité informatique et cybersécurité : Niveau avancé (LinkedIn Learning)
En tant que responsable de la sécurité ou DSI, vous devez mettre en place une politique de cybersécurité pour répondre aux menaces qui pèsent sur votre informatique. Pour cela, Pierre Cabantous vous propose de faire un tour de la cybersécurité en entreprise. Dans ce cours, vous étudierez la démarche d'un pirate, avant et après l'intrusion dans un système, à la suite de l'exploitation d'une vulnérabilité. Vous verrez comment gérer ces vulnérabilités par rapport à un niveau de risque que vous apprendrez à calculer. Vous aborderez aussi une des principales menaces encourues aujourd'hui par tout service accessible en ligne : les attaques par déni de service. Puis vous découvrirez comment protéger votre organisation aux niveaux technique et organisationnel, en suivant des bonnes pratiques, des process ainsi que des normes européennes comme le RGPD. Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Learning Cisco CLI Switch Configuration (LinkedIn Learning)
Learn how to configure a Cisco switch to connect and control resources on your network. Join Denise Allen-Hoyt in this course, as she explores the Cisco command-line interface using an out-of-band connection with a cable and terminal program. Denise shows how to access the switch's three modes—user EXEC, privileged EXEC, and global configuration—and use commands to configure essential settings. After addressing the switch and configuring a default gateway, Denise explains how to modify individual port modes, secure those ports, and create and manage virtual LANs (VLANs). In the final chapter, she shows how to verify your settings and reset the switch if necessary. Topics include: Accessing a switch Configuring the terminal program Configuring a switch hostname Saving and viewing configurations Securing access Encrypting passwords Assign an IP address to a switch Exploring port modes and security Creating VLANs Resetting a switch Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
L'essentiel de Power BI (LinkedIn Learning)
Dans cette formation, découvrez Power BI, la solution de Microsoft qui permet d'analyser, consulter et partager les données. André Meyer, consultant expert passionné par la transmission, aborde avec vous les principes, les composants et la configuration de Power BI à l'aide d'exemples concrets. Ensemble, vous verrez comment effectuer des requêtes de données vers Excel ou d'autres sources et préparer ces éléments. Vous apprendrez également à créer des tables, notamment de temps, des relations et à exploiter vos données sous forme de visuels. Puis, vous procéderez au filtrage et à l'exploitation des données aux formats PDF et Excel. Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Cisco Network Security: Cisco Firewall Technologies (LinkedIn Learning)
Are you looking to learn the basics of configuring a firewall to secure your Cisco network? In this course, security ambassador Lisa Bock focuses on the most essential Cisco firewall technologies. Explore the core concepts of a firewall, what it is, and how it works in a variety of distinct security contexts, as Lisa shows you how to configure a basic firewall, choosing the option that’s best for you. Learn about stateless, stateful, and application firewalls with best practices for deploying each. Discover the essentials of managing access control lists, implementing network address translations on Cisco ASA, and identifying when and how to leverage a zone-based firewall to monitor traffic between internal and external zones. In closing, Lisa takes a closer look at some of the key features available on the Cisco ASA, such as the basics of access management, the Cisco Modular Policy Framework, high availability technology, and the Hot Standby Router Protocol (HSRP). Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Introduction to Cloud Computing
Recommended by Smals Experts // Apply for this course
 
Course image
Docker Essential Training (LinkedIn Learning)
Docker is one of the most popular container storage solutions in the world. In this course, Carlos Nunez covers everything you need to know to get started with Docker. Join Carlos to learn how to build your first Dockerfile, along with other important topics like operating containers, Docker networking, Docker storage, the Docker Registry, and some advanced Docker operations. Apply for this course
 
Course image
Webinar ReUse, Putting IT on the map
Several experts from BOSA, IGN and Smals will present reusable services made available at federal level for Belgian addresses, as well as geocoding solutions.
 
Course image
I&S@Smals
Vous travaillez chez I&S, vous êtes nouveau ou vous travaillez parfois avec nous ? I&S@Smals est une zone avec du matériel didactique pour et à propos d'I&S. Vous pouvez y découvrir en plus sur notre organisation, nos séances d'information, notre business (eHealth, l'ONSS...), les équipes I&S, nos roadmaps, nos processus tel que notre IT Service Management, notre architecture de haute disponibilité, notre monitoring...  Werk je bij I&S, ben je er nieuw aangeworven of werk je soms samen met ons? I&S@Smals is een zone met leermateriaal voor en over I&S. Je ontdekt er meer over onze organisatie, onze infosessies, onze business (eHealth, RSZ...), de I&S teams, onze roadmaps, onze processen zoals IT Service Management, onze High Availability architectuur, onze monitoring... 
 
Course image
EAGlobal (OpenCourses)
In the framework of EAGlobal / Reuse Cross-Institutions, we invite you to the presentation of a solution under development for sharing libraries.This solution is based on Artifactory and allows to share libraries between institutions.
 
Course image
Udemy: Oauth2 in spring-boot applications
The New OAuth 2.0 Stack in Spring Security 5.What you'll learn in this course: OAuth 2.0 OAuth 2 Authorization Flows The New OAuth 2.0 stack in Spring Security 5 Use OAuth 2.0 in Spring Boot Applications Configure OAuth 2.0 Resource Server Keycloak Identity and Access Management Solution Resource Servers behind API Gateway New Spring Authorization Server OAuth 2.0 in MVC Web App OAuth 2 - Social Login OAuth2 + PKCE in JavaScript Application Register Resource Servers with Eureka Service Registry Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course Recommended by Smals Experts //
 
Course image
DevOps Foundations (LinkedIn Learning)
SCORE 4/5 by Smals Colleagues DevOps is not a framework or a workflow. It's a culture that is overtaking the business world. DevOps ensures collaboration and communication between software engineers (Dev) and IT operations (Ops). With DevOps, changes make it to production faster. Resources are easier to share. And large-scale systems are easier to manage and maintain. In this course, well-known DevOps practitioners Ernest Mueller and James Wickett provide an overview of the DevOps movement, focusing on the core value of CAMS (culture, automation, measurement, and sharing). They cover the various methodologies and tools an organization can adopt to transition into DevOps, looking at both agile and lean project management principles and how old-school principles like ITIL, ITSM, and SDLC fit within DevOps. The course concludes with a discussion of the three main tenants of DevOps—infrastructure automation, continuous delivery, and reliability engineering—as well as some additional resources and a brief look into what the future holds as organizations transition from the cloud to serverless architectures. Topics include: Distinguish between the DevOps practice levels, values, and principles. Analyze where best practices should be applied. Interpret how best to manage cultural issues within a team and an organization. Explain how lean is used as part of the DevOps building blocks. Apply different approaches for automating infrastructure. Articulate how continuous integration practices and quality assurance play a role in continuous delivery. Explain the different components of reliability for engineering’s design operations. Describe the available resources to learn or apply DevOps. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course Recommended by Smals Experts //
 
Course image
OpenShift v3
SMALS STANDARDS The first book help you to create your first jboss application with the Smals tooling on Openshift. This application use the IAM Smals libs (Common Build for JBOSS EAP6, warlock for JBOSS EAP 7). The second book help you to create your first Spring boot application on Openshift.  This second book is more generic (no dependency to the Smals tooling or to the Smals bases images).These e-learning contents are a complement to the OpenShift@Smals classroom course given by Pierre Herremans and for which registration is possible via the eHR catalogue. Do not hesitate to contact Pierre for any question. My first application- Smals tooling Book My first application G-cloud bootcamp Book Manual deployment on Openshift Page Add datasource Page Deploy integration with secret Page Add a web service call Page Readiness probe Page Command line Page Moose Page Delete your project Page PAAS Best practices Book Apply for this course
 
Course image
Passer de l'approche en cascade à la gestion de projet agile (LinkedIn Learning)
Si votre direction cherche à bénéficier des projets agiles en matière de délai, de qualité et de budget, cette formation est faite pour vous. Avec Kelley O'Connell, vous saisirez la différence entre la méthodologie de la cascade et l'approche agile. Vous aborderez les prérequis puis vous mettrez en place un projet pilote, dans lequel vous identifierez aussi bien les supporters que les détracteurs. Outre les notions de base à acquérir, vous devrez également définir une vision et constituer votre équipe et, enfin, grâce aux rétrospectives, vous identifierez ce qui favorise la poursuite de votre déploiement agile. Apply for this course
 
Course image
Passer de l'approche en cascade à la gestion de projet agile (LinkedIn Learning) copy 1
Si votre direction cherche à bénéficier des projets agiles en matière de délai, de qualité et de budget, cette formation est faite pour vous. Avec Kelley O'Connell, vous saisirez la différence entre la méthodologie de la cascade et l'approche agile. Vous aborderez les prérequis puis vous mettrez en place un projet pilote, dans lequel vous identifierez aussi bien les supporters que les détracteurs. Outre les notions de base à acquérir, vous devrez également définir une vision et constituer votre équipe et, enfin, grâce aux rétrospectives, vous identifierez ce qui favorise la poursuite de votre déploiement agile. Apply for this course
 
Course image
Software ReUse
ReUse in Software Development Project LifeCycle Smals et ses membres ont pour objectif de favoriser la réutilisation de composants logiciels existants et encouragent le développement de nouveaux composants réutilisables. Ce catalogue offre un aperçu des composants réutilisables existants.
 
Course image
Webinar ReUse, API Economy
We use APIs, or Application Programming Interfaces, every day as soon as we access the Internet. Not only do they make software easier and simpler to use, but they also provide modularity and flexibility, and help reduce costs. But what is an “API economy”? How can it be an asset and how will it evolve? Several experts will present the opportunities and challenges of an API economy in a public context.
 
Course image
Java Info sources
Java Information resources
 
Course image
Udemy: Oracle WebLogic 12c for Administrators
Learn how to install, deploy, manage, and troubleshooting Oracle WebLogic in an enterprise environment. In this course, you will learn to: ● Install WebLogic ● Configure WebLogic resources (JMS, JDBC) ● Deploy applications in a production environment ● Control server lifecycle using Node Manager ● Scale out WebLogic deployments using templates ● Create domains using manual and automated methods ● Understand high availability, failover, and load balancing using clusters ● Secure a WebLogic domain and applications ● Script common WebLogic tasks using WLST Apply for this course //
 
Course image
Udemy: Introduction to Cloud Computing
In this introduction to Cloud Computing, we answer the key question “What is the cloud?” With a solid, standards based approach and examples from the real word, we look at all the definitions that come together to mean cloud. In this course, you will learn to: ● Understand the fundamental elements of cloud computing ● Filter out the hype and focus on cloud value Apply for this course //
 
Course image
Udemy: Docker Mastery with Kubernetes and Swarm from a Docker Captain
Build, compose, deploy, and manage Docker containers from development to DevOps based Swarm clusters. In this course, you will learn:How to use Docker and Compose on your machine for better software building and testing. Skills to build advanced development environments with your code running in containers. Hand's-on with best practices for making Dockerfiles and Compose files like a Pro! Build and publish your own custom images. Build a fancy multi-node Swarm cluster for production deployments! Update and change your Swarm Services without downtime using rolling updates. Experience using multi-host logging and event monitoring for Docker Swarm. Understand the new Windows Containers, and try your hand at ARM Containers. Apply for this course
 
Course image
Udemy: Beginning Oracle WebLogic for Administrators
Introductory course to Oracle WebLogic 12c. Learn how to download, install, and create WebLogic domains. In this course, you will learn to:● Understand Basic WebLogic Concepts ● Create a WebLogic Domain ● Install WebLogic ● Access the WebLogic Admin Console Apply for this course //
 
Course image
Udemy: Build Security Incident Response for GDPR data protection
FREE GDPR and Incident Response Templates & Documentation - Practical GDPR and Incident Response Blueprint. In this course, you will learn to:● Understand what incident response is ● Will have a list of incident response tools and resources ● Will have a list of templates to use ● Will have a list of incident response playbooks Apply for this course //
 
Course image
Advanced Cisco Routing: RIP and EIGRP (LinkedIn Learning)
The decisions you make about routing determine how your information moves from place to place. And if you’re an IT administrator working with Cisco, you need to understand the various routing protocols that are available as well as how to effectively configure and manage them within your organization. In this course, instructor Jarrel Rivera gives you an in-depth overview of advanced routing in Cisco. Explore the basics of the Routing Information Protocol (RIP), before turning to the Enhanced Interior Gateway Routing Protocol (EIGRP), a more advanced distance-vector protocol for network route configuration. Along the way, Jarrel provides step-by-step demos using IPv4 and IPv6 addresses. By the end of this course, you’ll have the skills you need to leverage RIP and EIGRP so you can get the most out of your network topology. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Webinar ReUse, All that data (OpenCourses)
How do reusable services contribute to the management of large volumes of data? How do can they reduce the data volume? Or garantee its quality? And control storage and handling cost?
 
Course image
Learning Cryptography and Network Security (LinkedIn Learning)
Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and discusses practical ways to apply cryptography to ensure data security and integrity. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely. Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Découvrir l'écosystème d'Angular (LinkedIn Learning)
Si vous êtes un développeur formé à JavaScript ou TypeScript, suivez cette présentation de l'environnement de développement Angular. Vous aborderez les différents outils et vous découvrirez quel est le rôle et l'intérêt des serveurs et des bases de données. Vous verrez également les outils de développement pour appareils mobiles, ainsi que les techniques de test et de débogage, avant de passer à l'intégration continue et au déploiement. À la fin de cette formation, vous aurez les bases indispensables pour développer et également pour poursuivre votre formation avec Angular. Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Power BI : Visualisations avancées et notions clés du DAX (LinkedIn Learning)
Vous connaissez les bases de Power BI mais vous souhaitez passer à la vitesse supérieure ? Lancez-vous dans l'analyse de données avec les visualisations avancées et les notions indispensables du langage DAX. Dans ce cours, André Meyer, auteur sur Power BI et l'informatique décisionnelle, vous aide à aller plus loin dans le paramétrage des visuels. Vous intégrerez les éléments dynamiques et interactifs dans la requête et dans le tableau de bord. Puis vous aborderez l'écriture de formules en langage DAX conjuguée à la puissance de Power BI. Vous aurez une maîtrise complète de la création d'un tableau de bord, ainsi que les clés du langage DAX pour ouvrir les portes d'une nouvelle dimension de l'analyse. Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Power BI Top Skills (LinkedIn Learning)
You don’t need to have a team dedicated to analytics to unlock key insights in your data. All you need is Microsoft Power BI, the user-friendly, data analytics tool that can change your workflow and streamline it anew. In this course, instructor John David Ariansen teaches you the essential skills you need to know to analyze data correctly and effectively with Power BI. Learn about importing data, manipulating data, managing relationships, working with Data Analysis Expressions (DAX), and building visualizations and reports. Get tips and insights on how to get the most out of this powerful analytic tool. Upon completing this course, you’ll be ready to start using Power BI for all your business intelligence and reporting needs. This course was created by Madecraft. We are pleased to host this training in our library. Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Ethical Hacking: Introduction to Ethical Hacking (LinkedIn Learning)
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10. Topics include: Today's threat landscape Managing incidents Creating security policies Protecting data The COBIT framework Conducting penetration testing Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Ethical Hacking: Wireless Networks (LinkedIn Learning)
Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks using the latest tools and techniques—the subject of this course with cybersecurity expert Malcolm Shore. Malcolm covers everything from configuring basic security to understanding how hackers extract passwords, harvest connections at rogue access point, and attack networks via Bluetooth. He also explains how to select the right antennae for testing and introduces some sophisticated Windows and Linux tools to scan for vulnerabilities, including Acrylic, Ekahau, and Wireshark. By the end of the course, you should be able to shore up your wireless connections and gain confidence that your local network is safe to use. Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Topics include: Selecting an antenna Configuring security Extracting WEP and network passwords Testing passwords Harvesting connections from rogue access points Attacking networks via Bluetooth Capturing wireless packets with Acrylic Wi-Fi Heat mapping with Ekahau Wi-Fi sniffing with Wireshark Testing the Internet of Things Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Ethical Hacking: Mobile Devices and Platforms (LinkedIn Learning)
Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique set of vulnerabilities, which hackers are all too willing to exploit. Security professionals need to know how to close the gaps and protect devices, data, and users from attacks. Join cybersecurity expert Malcolm Shore as he explores the two dominant mobile operating systems, Android and iOS, and shows ways to protect devices through analysis and testing. Watch this course to review the basics of mobile OS models, the toolsets you need for testing, and the techniques for detecting and preventing the majority of security flaws. These methods are recognized by EC Council as integral part of those looking to earn their Certified Ethical Hacker certification. The complete CEH BOK can be found at https://www.eccouncil.org/Certification/certified-ethical-hacker/CEH-What-You-Will-Learn. Topics include: Statistic and dynamic analysis of mobile applications Testing on Android Analyzing Android applications Securing iOS applications Jailbreaking iOS for command-line access Analyzing iOS apps Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Power BI avancé : Requêtes de données avec Power Query (LinkedIn Learning)
Dans cette formation qui s'adresse aux analystes de données, vous apprendrez à tirer parti des fonctions avancées de l'éditeur de requêtes Power Query, notamment à l'aide du langage M. Avec Nicolas Georgeault, vous aborderez les enjeux de la multiplication des sources de données, puis vous ferez un tour d'horizon de Power BI. Ensuite, à l'aide de cas concrets, vous travaillerez avec les données, l'éditeur de requêtes Power Query et le langage M, puis vous finirez sur l'utilisation de modèles de données et les fonctionnalités avancées. À la fin de cette formation, vous serez à même de mettre en œuvre, de manière optimale, des requêtes de données Power Query. Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Power BI avancé : L'analyse de données avec DAX (LinkedIn Learning)
Grâce à la puissance et à la simplicité de Power BI, comprenez rapidement vos données et faites-les parler. Spécialiste en apprentissage automatisé, Nicolas Georgeault vous accompagne dans ce cours sur l'analyse de données avec le langage DAX. À partir de sources de données brutes, vous construirez les différents éléments qui permettent la réalisation d'un rapport Power BI avancé. Vous passerez en revue quelques concepts tels que la conception des modèles de données. Vous verrez aussi comment transformer des données selon leur format afin de constituer les mesures nécessaires à la création d'un tableau de bord. Une fois normalisées, filtrées et augmentées, vos données seront plus faciles à comprendre par les utilisateurs de vos rapports Power BI. Ils seront en mesure de prendre des décisions plus rapidement à la lumière des transformations que vous aurez effectuées. Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Software Architecture: Domain-Driven Design (LinkedIn Learning)
It's tough to be agile if you're working with a system that can't handle rapid change. Domain-driven design (DDD)—one of the most effective architectural approaches for both agile environments in general and microservices in particular—can help you build systems that can stand up to change. In this course, Allen Holub provides programmers, software architects, business analysts, and product managers/owners with an overview of this essential architectural process, demonstrating how to use DDD to develop a microservice or other domain-focused system. Alan goes over the basics of DDD (and how it fits with agile), microservices, and bounded contexts and entities. Plus, he compares reactive and declarative systems and details how to approach an event storming session. Topics include: How DDD differs from other architectural approaches How DDD fits with agile Advantages of microservices Bounded contexts and entities Reactive vs. declarative systems Using event storming to develop a DDD architecture Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Programming Foundations: Web Security (LinkedIn Learning)
Learn about the most important security concerns when developing websites, and what you can do to keep your servers, software, and data safe from harm. Instructor Kevin Skoglund explains what motivates hackers and their most common methods of attacks, and then details the techniques and mindset needed to craft solutions for these web security challenges. Learn the eight fundamental principles that underlie all security efforts, the importance of filtering input and controlling output, and how to defend against the most common types of attack. This course is essential for developers who want to secure their websites, and for anyone else who wants to learn more about web security. Topics include Threat models Least privilege Defense in depth Validating and sanitizing input Credential attacks SQL injection Cross-site scripting Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Power BI Quick Tips (LinkedIn Learning)
This collection of Microsoft Power BI quick tip videos is designed to demonstrate helpful tricks and quickly explain useful features. Discover quick ways to connect data, analyze data, and create visualizations in one place. Plus, explore how to connect and embed data, edit a group workspace, customize a dashboard for mobile phone viewing, and more. Topics include: Creating workspaces and sharing dashboards Uploading and publishing data Connecting to online services Creating and arranging tiles Asking questions and getting insights Bookmarks, favorites, and notifications Embedding, exporting, and printing data Creating apps and content packs Using the Office 365 files document library Accessing conversations in Office 365 Pin a report to a team channel Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
DevOps Foundations: Containers (LinkedIn Learning)
Containers are an amazingly versatile and powerful tool in the DevOps toolkit that can remove or smooth over a lot of the usual pain points in application development. Instructor Josh Samuelson goes over what containers are, where and when you can use them, and how to manage them well. Josh begins with a thorough explanation of what containers are, why you should use them, and how containers differ from VMs. He covers using containers in development, packaging, and production, with examples and factors to consider for each. Josh concludes with an in-depth look at how you can use Docker Swarm, Kubernetes, Mesos, and cloud container solutions to manage your containers effectively. Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
API Testing Foundations (LinkedIn Learning)
As software companies continue to shift towards cloud computing, mobile apps, and microservice architectures, the ability to quickly and effectively test APIs has become a critical skill for software testers. In this course, instructor Dave Westerveld covers the basics of API testing, sharing how to work with several robust tools for testing APIs at scale in an organization. After providing a primer on web services and important API terminology, Dave shows how to use Postman for some basic API exploration. He then goes over some basic approaches and methodologies used in testing GET, POST, PUT, and DELETE requests; shows how to approach performance testing using SoapUI, a popular automated API testing tool; and more. Topics include: Reviewing API terminology Mitigating risks related to testing APIs Mapping out the layout of an API API authorization and authentication Finding and using bearer tokens Testing GET, POST, PUT, and DELETE calls Using mocks, stubs, and fakes in API testing Testing microservices and the Internet of Things Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Ethical Hacking: System Hacking (LinkedIn Learning)
System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools. These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh. Topics include: Acquiring passwords Generating rainbow tables Understanding where passwords are stored Defending against privilege escalation Understanding spyware Protecting against keylogging Detecting steganography How hackers cover their tracks Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Ethical Hacking: Hacking IoT Devices (LinkedIn Learning)
The number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge challenge. In this course, Luciano Ferrari discusses how IoT devices work, including the architectures and protocols used. He covers the main attack surfaces used by hackers and security professionals against IoT devices, how to assess IoT security threats and vulnerabilities, and how to properly secure the devices by following industry best practices and implementing countermeasures. Topics include: How IoT devices work IoT technologies and protocols IoT communication models Common OWASP vulnerabilities Overcoming inherent IoT challenges Attacks occurring on IoT devices Methodologies used for hacking Securing IoT devices Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Power BI : L'analyse de données avec R (LinkedIn Learning)
Si vous êtes analyste et que vous souhaitez aller plus loin dans la visualisation des données dans Power BI, suivez cette formation consacrée à l'utilisation conjointe du langage de programmation R avec le service d'analyse et de décision de Microsoft. Après vous avoir présenté le langage R, Nicolas Georgeault vous accompagnera dans son installation ainsi que celle de ses dépendances. Puis, vous aborderez les différents moyens de visualisation statique et dynamique. À la fin de cette formation, vous aurez toutes les bases pour tirer parti du langage R au sein de Power BI. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Apply for this course
 
Course image
Drupal 8 Essential Training 2: Building Out Your Website (LinkedIn Learning)
Your Drupal site is built. Now what? Web design doesn't stop once the website is launched. Learn how to build out your Drupal site to better fit your visitors' needs. In these tutorials, Tom Geller helps new Drupal designers change the layout and design elements of their sites, control visitor interactions (including comments), arrange content in user-friendly "views," and expand the site's capabilities beyond what's available in core Drupal with Drupal modules. In all the steps you'll learn best practices to ensure your sites remain streamlined, secure, and up to date.If you want to start from the beginning and create your Drupal site from scratch, check out. Topics include Grouping content into categories Managing comments Adding discussion groups Customizing fields and image styles Adjusting menus and navigation to help users Adding new features with Drupal modules Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply.
 
Course image
Drupal 8 Essential Training 1: The Basics (LinkedIn Learning)
Drupal 8 Essentials is designed to help anyone create a simple website using Drupal, the free web design software that powers personal blogs as well as the sites of some of the world's largest corporations. Topics include Comparing Drupal to other software Getting help with Drupal Installing Acquia Dev Desktop on Mac and Windows Installing the Drupal database, modules, and themes Creating basic content Establishing your site's look and feel Adjusting security settings Adding images and metadata Adding a sidebar Moving your Drupal website to a server Backing up a Drupal site Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. This course is in French only. If this is not a problem for you, by all means go ahead and apply.
 
Course image
Building a trusted partnership with clients
Created by Smals Academy, this clickable image leads to a series of domain-specific soft skills courses.
 
Course image
REST API Design
SMALS STANDARDS. REST has become the industry standard for developing APIs on the web and is the de facto standard to communicate between a browser/mobile application and a backend server. In this training you will learn about the RESTful design approach and apply this methodology for modeling your business data and functionality into a REST API. Our REST APIs will also be compliant to the G-Cloud REST style guide. This training is developed by Willem Salembier of the ICC team. If you have any questions related to this course, please send an email to icc-training@smals.be. If you have any questions about REST standards, please send a mail to rest-styleguide@gcloud.belgium.be or raise an issue via GitHub. The topics included in this training are: * Introduction * Uniform interface * Collection resources * Document resources * Controller resources * Hypermedia * Methods * Representations * OpenAPI Schema * OpenAPI * Error handling * Documentation * Governance * LinksApply for this course //
 
Course image
OpenRefine
Support du cours sur l'outil OpenRefine : "A free, open source, powerful tool for working with messy data"
 
Course image
REST Development (JAX-RS)
SMALS STANDARDS. REST has become the industry standard for developing APIs on the web and is the de facto standard to communicate between a browser/mobile application and a backend server. In this training you will learn to develop a REST API using the contract-first approach. We'll generate JAX-RS interface classes and Jackson model classes from an OpenAPI specification. These classes will be our starting point to create a REST application that we'll deploy on a standard JBoss EAP 7.3.6 application server. This training is developed by Willem Salembier of the ICC team. If you have any questions related to this course, please send an email to icc-training@smals.be. The topics included in this training are: * JAX-RS * Contract first * Method matching * Injection * Filters * Exception handling * Validation * Content negotiation * HATEOAS * CORS * Client API * Spring injection * MultipartApply for this course //
 
Course image
Service Orientation & API Management
SMALS STANDARDS Smals adopted a service oriented approach to integrate IT systems and external service providers. All communication between these systems uses open standards and is web service based (REST or SOAP). Modern web and mobile applications leverage these APIs to build interactive frontend applications. Reuse is a key aspect. Inside this module you will learn the principles of service oriented design and governing a large catalog of business APIs. This training is developed by Willem Salembier of the ICC team. If you have any questions related to this course, please send an email to icc-training@smals.be. The training is oriented towards Business and Functional analysts, Architects, Developers and Project Leaders. Some design principles are more technical in nature and are optional material. The topics include: * Introduction * Terminology & Concepts * Strategic Goals & Challenges * Service platforms * Microservices * Service Oriented Design Principles * Governance Apply for this course
 
Course image
Udemy: Conversation on Cryptography: A Total Course with Mike Meyers
Diving into cryptography with The Alpha Geek and Total Seminars team. Learn cyber security and ethical hacking. In this course, you will learn to: ● Define cryptography and the key role it plays in protecting our digital data ● Find out how Web sites use certificates to make sure our usernames, passwords, credit card numbers, and other personal data stay secure ● Understand ciphers, binary, hashing, symmetric and asymmetric cryptosystems, digital signatures and certificates, and public key infrastructure ● Learn how hashing helps us to be certain the data we receive or download is legitimate ● Prepare for the CompTIA Security+ exam by better understanding cryptography and PKI, one of the six exam domains Apply for this course //
 
Course image
Udemy: Real-World Ethical Hacking: Hands-on Cybersecurity
In this course, you will learn to: ● Secure your computer, your network, and your data from 99% of all attacks on the Internet ● Find and fix weaknesses and harden your computer's security ● Keep yourself safe online, at home, at school, or at work ● Test for security vulnerabilities using the tricks the bad guys use ● Avoid phishing, viruses, ransomware, and online scams Apply for this course //
 
Course image
Learning path Architect I&S
Soft skills for architects. Accessible internally following a selection interview.
 
Course image
Udemy: Docker - Introducing Docker Essentials, Containers, and more
Create and run Docker containers, and build multi-container applications. Compose, Networks, Swarm, Cloud, & more!. In this course, you will learn: Use Docker compose to create multi-container applications. Build your own custom Docker images. Understand best practices of Dockerfiles and Image building. Create a cluster with Docker Swarm. Set up continuous integration workflows with automatic testing on Docker Cloud and Github. Create and run Docker containers. Run Docker Commands on the command line. Understand Docker Cloud and Docker swarm. Publish and host Docker images on Docker Cloud. And more! Apply for this course
 
Course image
Udemy: Docker for Java Developers
Learn how you can use Docker to supercharge your enterprise Java Development! In this course, you will learn: How you can run Docker Containers Publish Docker Images to Docker Hub Use Docker Swarm for Cloud Scale Computing How to use Docker Containers for Integration Tests How you can leverage Docker Containers for Integration tests from CI Builds How you can create and run your own Docker Images Learn how to use Docker Compose to Run Multiple Docker Containers Use Maven to Create Docker Images Run multiple Docker containers with Docker Compose Create your own Docker Swarm Cluster Apply for this course
 
Course image
Learning path Architect & senior dev. TO&P
Soft skills for architects. Accessible internally following a selection interview.
 
Course image
Legale aspecten van privacy & security van informatiesystemen
Deze cursus geeft een overzicht van de verschillende regelgevingen in het domein van de privacy & security aspecten van informatie systemen; zowel algemeen als specifiek voor de Sociale Zekerheid & Gezondheid (SZ&G). De grote hoeveelheid regelgevingen op verschillende niveaus (Europees, Federaal, Gewestelijk) en de verschillende betrokken organisaties maken het een complex gegeven. Bovendien is privacy & security een domein in volle ontwikkeling. Deze cursus is dan ook niet bedoeld als een naslagwerk, die volledigheid nastreeft. Het is bedoeld als vertrekpunt voor verdere studie door de geïnteresseerde en is nuttig bij het in de praktijk brengen van het principe ‘data protection by design & by default’. Zie hiervoor meer in de presentatie rond ‘data protection by design & by default’. De cursus zelf is, naast een introductie, gestructureerd in 7 sessies, die welbepaalde domeinen van privacy & security bestrijken.