Academy
Expand your cybersecurity knowledge with training for both beginners and advanced professionals
Nowadays, the question is not whether your organization will be hacked, but rather when. As a security professional, you want to get a grip on the various cyber threats that your organization faces daily. Regardless of whether they are of a technical nature or aimed at the people in your organization.
Why Fox Academy?
- Practical training that teaches your employees how to deal with today’s threats.
- Taught by experienced specialists that work within their area of expertise every day.
- Extensive portfolio, from basic cybersecurity to CISSP certification in collaboration with Security Academy.
Call us before you need us
Our experts are here to help you
What does a training look like?
Approach
Below you will find an overview of our current training courses. These are provided in collaboration with Security Academy. See which training suits you best and sign up! Before registering, check our training terms and conditions.
Execution
Fox-IT Academy provides all training courses at our partner Security Academy’s venue in Woerden. On the day of the training, you are warmly welcomed in Woerden. Security Academy also takes care of the registration and invoicing of your training.
Why Fox-IT
Fox-IT has been at the Dutch forefront of cybersecurity for 25 years. With Forensic investigators, Incident Response Team and Intelligence specialists, as well as teams of ethical hackers, advisors and Academy, Fox-IT offers a unique combination in the field of both offensive and defensive cyber resilience, advisory, incident response and intelligence services. Knowledge about vulnerabilities, cyber threats, criminal groups, and the nature and impact of malicious software is constantly shared among the various teams.
To provide your employees with correct, up-to-date and relevant information, Fox-IT’s Academy’s approach is characterized by a practice-oriented design. All our simulations, training courses and games are provided by our experts, who combine the work they do for the Academy with their daily operations. As a result, your employees are always partial to the most up-to-date, real-world cybersecurity content.
Our training offers
Fox-IT Academy offers the following training courses in collaboration with the Security Academy:
Duration: 2 days
Cost: € 1.700,- excl. VAT
Taught by: Fox-IT
Learn to understand and use the internet better!
Do you do a lot of open source research on the internet and do you want to get better at it? Do you regularly search for people or organizations online, but to disappointing results? If you use the internet for tasks such as these on a daily basis, it is good to know exactly how it works and which techniques are best to use in your searches.
People leave traces when visiting websites and sending e-mail. Using publicly available resources such as Facebook, Twitter and LinkedIn leaves traces. With the right knowledge and skillset, we can find information and digital traces and link them to companies and individuals. This training takes you through all aspects of internet research step by step. We pay special attention to practical exercises.
Covered subjects
The internet: internet networks and servers;
Internet research: browsers, search engines and traces;
Social media: well-known and lesser-known social media;
Search strategies.
After completing this training
You will know what the possibilities and techniques underlying the internet are. You can search in the best places with the right tools. You will learn to create profiles of people and companies based on social media information.
Who is this training aimed at?
This training is for beginning professionals who want to use the internet and web for research.
Required prior knowledge
No specific requirements.
Training dates & Registration for this training
Pressing the above button takes you to our partner Security Academy’s website. Fox-IT and Security Academy work together to offer training in the field of cyber security. As such, Security Academy takes care of further registration and administration.
Duration: 10 days
Cost: € 5.950,- excl. VAT
Taught by: Security Academy
The CISSP® Certification is part of the top 3 most coveted international information security certifications.
Now updated in line with the fifth edition of the official CISSP CBK.
During this CISSP® (Certified Information Systems Security Professional) Preparation Course, you are trained as a broadly grounded specialist in the field of information security. After completing the training, you will have a thorough knowledge of the 8 CISSP® domains and will be able to apply them in practice, upon which you will be fully prepared for the new international adaptive testing CISSP® exam.
On 1 May 2021, the CISSP® curriculum was revised by (ISC)2 resulting in various improvements being made and the 8 domains updated according to latest developments in the cybersecurity field. The CBK and the exam have been adjusted accordingly. Of course, Security Academy makes use of the latest study materials, allowing you to confidently prepare for the exam.
Many providers offer preparations for the CISSP® exam. These courses mainly focus on training for the exam. From experience we know the CISSP® exam should not be underestimated. Just cramming exam questions and studying the theory is not enough to actually understand and being able to apply the material.
In addition to the focus on passing the Computerized Adaptive Testing-based exam, this CISSP® course distinguishes itself by the attention that is paid to understanding and being able to apply the teaching material in practice.
The CISSP® course consists of ten classroom course days in which theory revision is alternated with practical cases and practice questions. Each domain is discussed in detail, so that you have enough time to familiarize yourself with the material. On the last day of class, you will receive an extensive CISSP® mock exam that will, of course, be evaluated, with specific attention also paid to the Dutch situation.
Covered subjects
- Security and Risk Management
- Asset Security
- Security Engineering
- Communication and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
Course materials
Next to presentation hand-outs you receive the follwing books on the first day of classes:
• CISSP® Official Study Guide 9th Edition van Sybex
Who is this training aimed at?
This training is intended for, for example, Information Security Consultants, Security Managers or IT Auditors with an interest in information security, who want to gain a thorough basic knowledge and intent to pass the official CISSP® exam.
Required prior knowledge
No prior knowledge is required.
After following this training
You are well-prepared for the official CISSP® exam.
Training dates & Registration for this training
Pressing the above button takes you to our partner Security Academy’s website. Fox-IT and Security Academy work together to offer training in the field of cyber security. As such, Security Academy takes care of further registration and administration.rdere registratie en administratie.
Duration: 4 days
Cost: € 3.400,- excl. VAT
Taught by: Fox-IT
Follow the training on the attack techniques that we see in practice every day.
This training has been re-developed from the ground up by the Red and Blue Team experts at Fox-IT.
If you are an IT professional with technical knowledge, but without a cyber security background, you will learn how attackers work and what techniques they use. You will also learn how to recognize and detect attacks. Completely up-to-date and supplemented with stories from daily operational practice.
Covered subjects
- An introduction to information security
- The method and mindset of hackers
- The most common attack techniques
- Places where attackers (can) leave traces
- The Cybercrime industry and associated actors
After following this training
You will be able to recognize a hack faster, with which you can save your organization a lot of trouble. But you are also more aware of the risks that your organization runs, thanks to which you can prevent (possible) attacks.
Who is this training aimed at?
This training is intended for IT professionals, system administrators and IT Managers, who want to know more about how cybercrime works in practice.
Required prior knowledge
- Basic knowledge of cybersecurity
- Basic knowledge of IT, Windows, Linux and networking
- Basic knowledge of the technology behind the internet
- Experience using the command line
Training dates & Registration for this training
Pressing the above button takes you to our partner Security Academy’s website. Fox-IT and Security Academy work together to offer training in the field of cyber security. As such, Security Academy takes care of further registration and administration.
Duration: 1 dag
Cost: € 850,- excl. VAT
Taught by: Fox-IT
Follow the one-day training that explains what needs to be done when an incident is at hand and what the basic principles of a forensic analysis are.
Every organization employs trained emergency response officers, who ensure orderly processing in the event of a fire or medical emergency. A First Responder is the digital equivalent. A role in which adequate action is taken if there is an indication of a cyber incident.
In this training, we train you or your employees to become a First Responder and enable you to limit damage, continue or repair the operation and ensure preservation and integrity of evidence. In addition, you will learn to make sound decisions regarding whether to call in professional help and how to prepare for them as well as possible in the event that you do.
We offer you a one-day training that explains what needs to be done at the time of an incident and what the basic principles of incident response are. With this knowledge, effects of an incident on your organization will be minimized as much as possible, allowing everyone to return to 'business as usual' as soon as possible.
Covered subjects
- Threat landscape;
- What is digital forensics;
- What is incident response;
- Incident Response life-cycle
- Basic triage activities;
- Forensic data collection;
- The next steps in the investigation
After this training
You will be able to take the first basic steps after an incident, and you will avoid the most common mistakes.
Who is this training aimed at?
- Administrators
- Service desk employees
- SOC analysts
Required prior knowledge
- Basic knowledge of IT and Operating Systems.
- Basic knowledge of common hardware.
- Basic knowledge of working with the command line.
Training dates & Registration for this training
Pressing the above button takes you to our partner Security Academy’s website. Fox-IT and Security Academy work together to offer training in the field of cyber security. As such, Security Academy takes care of further registration and administration.
Duration: 1 day
Cost: On request
Taught by: Fox-IT
Follow the one-day training that helps you to increase the level of awareness within your organization.
Last year, research showed that 83% of companies consider their employees to be the weakest link within their organization. Hackers employ various social engineering techniques to hack companies.
This training is aimed at people who want to raise the cyber security awareness level within their organization.
Covered subjects
- Defining risks within the organization
- Human factor as the weakest link; employee behavior and how hackers take advantage of it
- Involving the entire organization in security awareness
- Determining security awareness in the organization based on the
- Security Awareness Maturity Model
- Different ways to enrich your security awareness program:
- Training
- E-learning
- Events
- Newsletters
- Hack demo
- Measuring security awareness within the organization
After this training
You have gained a working understanding of the risks within the organization, know how to draw attention to them and have gained tools with which the risks can be mitigated through security awareness.
Who is this training aimed at?
This training is aimed at employees who are responsible for the security awareness (CISO, Security Officer) of your organization or who will be responsible for it in the future.
Required prior knowledge
No specific prior knowledge is required.
This training is provided on request only. Click on the button below for more information.
More information about Security Awareness Officer
Duration: 1 day
Cost: € 850,- excl. VAT
Taught by: Fox-IT & Berenschot
Follow the one-day training course that teaches you the digital crisis do's and don'ts.
This training is a unique collaboration between the crisis management experts of Berenschot and the cybersecurity experts of Fox-IT.
Your organization's most sensitive information is stored in digital systems. Therefore, failure of such systems can have major consequences for the continuity of your organization. So, you want to do everything you can to prevent falling victim to cybercrime and ensure that your organization knows how to act, should a cyber incident occur.
During the one-day training 'Cyber Crisis Management' you will be introduced to the technical aspects of a cyber crisis and learn general crisis management skills. In collaboration with our partner Berenschot, you will receive a professional explanation of both aspects from your own experience. For example, how to make the right decisions during a cyber crisis, who should be at the table and what pitfalls you should avoid. Furthermore, you will gain insight into the do's and don'ts of a digital crisis and the crisis response process on the back of practical examples. This way, your crisis team is better enabled to respond quickly and professionally during a cyber crisis!
Covered subjects
The program is split in two main parts: cybersecurity and crisis management. You will receive an explanation of the most important concepts, and you will practice a simulated crisis meeting.
Cybersecurity
- Basic terminology of cybersecurity and awareness.
- The kill chain and the threat landscape.
- The crisis response process.
Crisis Management
- Crisis decision-making system (BOB).
- Roles and tasks within a crisis team.
- Simulation crisis meeting.
After this training
- you will know the most important terminology in cybercrime
- you know the kill chain and how it is built up
- you will know the various and most current types of cybercrime
- you will know what kind of hostile actors there are, with corresponding motives for each
- you will know to what extent these threats apply to your own organization
- you will know the characteristics of a crisis
- you will know how to optimally prepare your organization for a crisis
- you will know how to prioritize during a crisis
- you know the PDO system and know how to apply it in a crisis meeting
- you will understand what roles a crisis team has and how they relate to each other
- you know what it feels like to participate in a crisis meeting
- you will know the importance of structure and role stability in a crisis meeting.
Who is this training aimed at?
This training is intended for C-suite and managerial employees as well as IT professionals who want to increase their knowledge of cybersecurity and crisis decision-making.
Required prior knowledge
No special prior knowledge is required.
Training dates & Registration for this training
Pressing the above button takes you to our partner Security Academy’s website. Fox-IT and Security Academy work together to offer training in the field of cyber security. As such, Security Academy takes care of further registration and administration.
Duration: 5 days
Cost: € 3.750,- excl. VAT
Taught by: Security Academy
Is your organization in the process of transitioning to cloud? During our cloud security training you will learn how to integrate this in a responsible way. The CCSP training is a security training that highlights all security aspects of a move to cloud.
Organizations struggle with aspects of cloud-based operations, such as which agreements and processes in the field of information security to lay down in advance in relation to, for example, laws and regulations. Or what risk mitigation measures should be taken to protect the confidentiality, integrity and availability of critical information.
Practice and theory of the CCSP® training
The content of the Fox-IT Cloud Security training is based on the book (ISC2 CCSP® CBK) and can serve as preparation for the ISC2 CCSP® exam. If you pass this exam, you will have gained a cloud security certification. A great proof that you are able to take the IT security of your company to a higher level. You will receive the book ICS2 CCSP® CBK at the start of the CCSP training. During the training you will have enough time to ask questions and share practical experiences. By linking theory with practice, we achieve an optimal learning effect.
Covered subjects
During our cloud security training, the following topics are covered:
- Cloud architectures
- Cloud data security
- Cloud platform en infrastructure security
- Cloud application security
- Cloud operations security
- Legal & compliance issues
Benefits
After the CCSP training, you will have familiarized yourself with the following Cloud security aspects:
- Architectural concepts & design requirements
- Cloud Computing Concepts
- Cloud Reference Architecture
- Security Concepts Relevant to Cloud Computing
- Design Principles of Secure Cloud Computing
- Cloud Data Security
- Cloud Data Lifecycle
- Cloud Data Storage Architectures
- Data Security Strategies
- Data Discovery and Classification Technologies
- Relevant Jurisdictional Data Protections for Personally
- Identifiable Information (PII)
- Data Rights Management
- Data Retention, Deletion, and Archiving Policies
- Auditability, Traceability and Accountability of Data Events
- Cloud Platform & Infrastructure Security
- Cloud Infrastructure Components
- Risks Associated to Cloud Infrastructure
- Security Controls
- Disaster Recovery and Business Continuity Management
- Cloud Application Security
- Training and Awareness in Application Security
- Cloud Software Assurance and Validation
- Verified Secure Software
- Software Development Life-Cycle (SDLC)
- Specifics of Cloud Application Architecture
- Identity and Access Management (IAM) Solutions
- Operations
- Planning Process for the Data Center Design
- Physical Infrastructure for Cloud Environment
- Logical Infrastructure for Cloud Environment
- Compliance with Regulations and Controls (e.g., ITIL, ISO/IEC 20000-1)
- Risk Assessment to Logical and Physical Infrastructure
- Collection, Acquisition and Preservation of Digital Evidence
- Communication with Relevant Parties
- Legal & Compliance
- Legal Requirements and Unique Risks within the Cloud Environment
- Privacy Issues, Including Jurisdictional Variation
- Audit Process, Methodologies, and Required Adaptions for a Cloud Environment
- Implications of Cloud to Enterprise Risk Management
- Outsourcing and Cloud Contract Design
After the CCSP® training, you will be able to:
- Assess cloud risks for your organization
- Guide a cloud security roadmap
- Suggest possible control measure
Who is the cloud security training suitable for?
- Security Managers
- Security Consultants
- Security Engineers
- System Architects
- Enterprise Architects
- Security Administrators
- System Engineers
- Security Architects
Required prior knowledge
Basic knowledge of IT
Training dates & Registration for this training
Pressing the above button takes you to our partner Security Academy’s website. Fox-IT and Security Academy work together to offer training in the field of cyber security. As such, Security Academy takes care of further registration and administration.
Duration: 5 dagen
Cost: € 3.750,- excl. VAT
Taught by: Security Academy
During the CISA® (Certified Information Systems Auditor) course, you are trained to become a broadly versed IT auditor. After completing the course, you will have a thorough knowledge of the 5 CISA® modules so that you can apply them in practice and you will be well prepared for the international CISA® exam. With the CISA® certification in your pocket, you will be internationally recognized as an IT Auditor, increasing both your own market value as your company’s.
Currently, there are many providers that offer preparatory courses for CISA®. These mainly focus on training for the exam. In our experience, the CISA® exam should not be underestimated. Merely practicing exam questions and studying the theory is not enough to deeply understand and apply the material. In addition to the focus on passing the exam, this CISA® course distinguishes itself by the attention paid to understanding and being able to apply the teaching material in practice.
The CISA® Preparation Course consists of five classroom course days in which theory is alternated with practical cases and practice questions. Each domain is discussed in detail, so that you have enough time to master the material. On the last day of classes, you will receive an extensive CISA® mock exam that will, of course, be evaluated. In addition, specific attention is paid to the Dutch situation.
Target audience
This CISA® course is intended for participants who are or will be working as IT auditors. Think of operational auditors, security officers, all types of accountants and financial professionals.
Prior knowledge
Although the CISA® exam is not very technical, it is assumed that the student has a basic knowledge of security and technology. The IT-Security Foundation course provides the basic knowledge that is necessary for the CISA® exam. This course is optional and is not included in the CISA® training as standard. The level of this course is mbo/hbo (vocational/BSc applied).
Course material
You will receive the course material via our portal at the start of the course. The course material is in English, with the language of instruction during the course being Dutch.
The course includes the following:
- The official ISACA® CISA® Review Manual (ePub)
- 12-month Online Subscription to the official ISACA® CISA®
- Review Questions, Answers & Explanations Database
- Additional course material (ISACA® course slides, practice questions)
- Mock exam
- A delicious lunch, if taken in classroom
Pass guarantee
In the unlikely event that you do not pass the CISA® exam, you can retake the course (or parts of it) with us free of charge. You can continue to participate in the exam training and lessons free of charge if there are places available.
Training dates & Registration for this training
Pressing the above button takes you to our partner Security Academy’s website. Fox-IT and Security Academy work together to offer training in the field of cyber security. As such, Security Academy takes care of further registration and administration.
Duration: 5 dagen
Cost: € 3.750,- excl. VAT
Taught by: Security Academy
- You want to prepare yourself for the CISM® international exam in a practical way
- You perform the task of information security officer, security officer or manager in your organization and you want to profile yourself as an accredited professional
- You don't just want to learn the theory, you want to understand the material
Introduction
During the CISM® (Certified Information Security Manager) Preparation Course, you are trained to become a broadly grounded specialist in the field of security management. After completing the course, you will have a thorough knowledge of the 4 CISM® domains to be able to apply them in practice and you will be fully prepared for the international CISM® exam.
Currently, there are many providers that offer preparatory courses for CISM®. These courses mainly focus on training for the exam. In our experience, the CISM® exam should not be underestimated. Merely practicing exam questions and studying the theory is not enough to deeply understand and apply the material. In addition to the focus on passing the exam, this CISM® course distinguishes itself by the attention to understanding and being able to apply the teaching material in practice.
The CISM® course consists of five classroom course days in which theory is alternated with practical cases and practice questions. Each domain is discussed in detail, so that you have enough time to familiarize yourself with the material. On the last day of classes, you will receive an extensive CISM® mock exam that will, of course, be evaluated. Attention is also paid to the Dutch situation.
Target audience
The CISM® Preparation Course is intended for professionals who are tasked with implementing and embedding security management in the organization.
- Information Security Consultants
- Security managers who are involved in the organization at a tactical level
- Information Security Coordinators
- IT-auditors
Required prior knowledge
Basic knowledge of information security is recommended. If you do not yet have this, we recommend that you follow the Information Security Foundation course prior to this course. The level of this course is mbo/hbo (vocational / BSc applied). Are you unsure about your knowledge levels?
In addition, it is desirable to have basic knowledge of security and technology. The IT-Security Foundation course has been specially developed so that you also acquire the right technical knowledge.
The Information Security Foundation serves as a springboard for mastering the management side of CISM®. In addition, the IT-Security Foundation course has been specially developed to obtain the necessary technical knowledge. These courses are optional and are not part of the CISM® course.
Course material
You will receive the course material via our portal at the start of the course. The course material is in English and the language of instruction during the course is Dutch.
If you prefer to book the book instead of the ePub (surcharge €50 excl. VAT), or would you like to receive both the book and the ePub (additional costs €275 excl. VAT)? In the confirmation email that you will receive after registration you will find a link where you can make your choice known.
The course includes the following:
- De officiële ISACA® CISM® Review Manual (ePub)
- 12-month Online Subscription to the official ISACA® CISM®
- Review Questions, Answers & Explanations Database
- Additional course material (ISACA® course slides, practice questions)
- Mock exam
- A delicious lunch, if taken in classroom
Pass guarantee
In the unlikely event that you do not pass the CISM® exam, you can retake the training (or parts of it) with us free of charge. You can continue to participate in the exam training and lessons free of charge if there are places available.
Training dates & Registration for this training
Pressing the above button takes you to our partner Security Academy’s website. Fox-IT and Security Academy work together to offer training in the field of cyber security. As such, Security Academy takes care of further registration and administration.
Duration: 7 dagen
Cost: € 4.250,- excl. VAT
Taught by: Security Academy
The CISSP® Certification is part of the top 3 most coveted international information security certifications. Do you want to pass this certification in a short time? Fox-IT and Security Academy prepare you in a CISSP® BOOTCAMP.
Now updated in line with the fifth edition of the official CISSP CBK.
During this CISSP® (Certified Information Systems Security Professional) Preparation Course, you are trained as a broadly grounded specialist in the field of information security. After completing the training, you will have a thorough knowledge of the 8 CISSP® domains and will be able to apply them in practice, upon which you will be fully prepared for the new international adaptive testing CISSP® exam.
On 1 May 2021, the CISSP® curriculum was revised by (ISC)2 resulting in various improvements being made and the 8 domains updated according to latest developments in the cybersecurity field. The CBK and the exam have been adjusted accordingly. Of course, Security Academy makes use of the latest study materials, allowing you to confidently prepare for the exam.
Many providers offer preparations for the CISSP® exam. These courses mainly focus on training for the exam. From experience we know the CISSP® exam should not be underestimated. Just cramming exam questions and studying the theory is not enough to actually understand and being able to apply the material.
In addition to the focus on passing the Computerized Adaptive Testing-based exam, this CISSP® course distinguishes itself by the attention that is paid to understanding and being able to apply the teaching material in practice.
The CISSP® course consists of ten classroom course days in which theory revision is alternated with practical cases and practice questions. Each domain is discussed in detail, so that you have enough time to familiarize yourself with the material. On the last day of class, you will receive an extensive CISSP® mock exam that will, of course, be evaluated, with specific attention also paid to the Dutch situation.
Covered subjects
- Security and Risk Management
- Asset Security
- Security Engineering
- Communication and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
Course materials
In addition to handouts of the presentations, you will also receive the following books during the first day of classes:
CISSP® Official Study Guide 9th Edition by Sybex
Who is this training aimed at?
This training is intended for, for example, Information Security Consultants, Security Managers or IT Auditors with an interest in information security and who want to gain a thorough basic knowledge and have the intention to pass the official CISSP® exam.
Required prior knowledge
No prior knowledge required.
After this training
You will be perfectly prepared for the official CISSP® exam.
Training dates & Registration for this training
Pressing the above button takes you to our partner Security Academy’s website. Fox-IT and Security Academy work together to offer training in the field of cyber security. As such, Security Academy takes care of further registration and administration.
Duration: 3 days
Cost: € 2.250,- excl. VAT
Taught by: Security Academy
- You want to delve into encryption and public key infrastructure (PKI)
- You are tasked with implementing cryptography, key management, or certificate management within your organization, and you would like to learn more about these techniques
- You are tasked with drafting policies, designing architecture or making strategic choices about the use of cryptography
Introduction
Encryption, digital signatures and certificates are widely used to ensure confidentiality and authenticity in IT environments. This course discusses the various basic techniques of cryptography and their practical use.
Over the course of three days, this course delves into clear explanations of what cryptography is, without diving too deep into technology and mathematics. The focus is on its practical applications; in which situations and under what circumstances the various techniques can be used. With various exercises you will immediately get a feel for the practical aspects.
In particular, the technical and organizational aspects of a public key infrastructure (PKI) are examined. The different roles – such as CA and RA – and the points of attention for their processes are discussed. The technical operation of certificates and their use in TLS is also discussed in detail.
After following this course, you will be able to talk to the security specialists and give well-considered advice on the choices made in the policy and implementation of cryptography.
Target audience
The Encryption and PKI Practitioner course is designed for anyone who encounters cryptography or digital certificates in their work. For example:
- System, network, or certificate administrators
- Application Developers
- Security Consultants / Officers / Architects
- Managers or project leaders of a cryptography team
Required prior knowledge
No special prior knowledge is required for this course. However, some basic knowledge of IT Security is recommended. If you do not yet have one, we recommend that you first follow the IT-Security Foundation course. The level of this course is MBO/HBO (vocational / BSc Applied).
Course material
You will receive the course material via our portal at the start of the course. The course material is in Dutch and the language of instruction during the course is Dutch.
There is no exam for this course. You will receive a certificate of participation from the Security Academy after completing the course.
The course includes the following:
- Course material
- A delicious lunch
Training dates & Registration for this training
Pressing the above button takes you to our partner Security Academy’s website. Fox-IT and Security Academy work together to offer training in the field of cyber security. As such, Security Academy takes care of further registration and administration.
Duration: 3 days
Cost: € 2.250,- excl. VAT
Taught by: Security Academy
- You would like to gain more knowledge in the field of identity and access management
- In your profession, you deal with identity and access management
- You are tasked with implementing identity and access management within your organization and are looking for tools
Introduction
Introduction
Identity & access management covers a very broad domain. This course aims to provide an overview of identity and access management and the techniques, services and other resources that are part of it. In addition, a lot of attention is paid to the process-related and organizational aspects of identity & access management.
In three days, you will be taken into the fascinating world of identity & access management. You will learn the key concepts, techniques and services that make up the domain of identity and access management. The latest developments are also covered during the training, such as blockchain identity, consumer identity & access management (CIAM) and IoT identity & access management.
After this course, you will not only have a good overview of identity & access management, but you will also know how to apply it in practice.
Target audience
In addition to providing an overview of IAM, the course also has a practical approach and is intended for anyone who is involved in identity & access management from his or her profession. The training is particularly relevant for information managers, security professionals and data protection officers.
Required prior knowledge
For this training, prior knowledge is recommended at the level of the Information Security Foundation course. The level of this course is MBO/HBO (vocational / BSc Applied).
Course material
You will receive the course material via our portal at the start of the course. The course material is in Dutch and the language of instruction during the course is Dutch. However, many concepts from the domain of identity and access management are in English, but all these concepts are explained in detail.
There is no exam for this course. You will receive a certificate of participation from the Security Academy after completing the course.
The course includes the following:
- Course material
- A delicious lunch
Training dates & Registration for this training
Pressing the above button takes you to our partner Security Academy’s website. Fox-IT and Security Academy work together to offer training in the field of cyber security. As such, Security Academy takes care of further registration and administration.
Duration: 2 days
Cost: € 1.495,- excl. VAT
Taught by: Security Academy
- You are taking your first steps into the world of IT security and would like to gain more knowledge
- You perform the role of information security officer and you would like to master the IT jargon
- You fulfill the role of your organization’s point of contact in the field of IT security
Introduction
Information security rests on three pillars: people, processes and technology. None of those three can do without the others. But for people with a non-technical background, the technical pillar can be quite difficult. The IT world uses its own specific tools and the associated jargon, which can make a conversation with people from that world sometimes seem like a contest of Babylonian confusion of tongues to the uninitiated.
This course introduces you to the most important technical tools that the information security officer has at their disposal in an accessible way. It tells you what is in the toolbox and what each tool does (the concepts are explained), without you being overwhelmed with all kinds of details about the exact technical operation.
Target audience
This course is suitable for officials who have a limited technical background, but who need to be able to talk to technical people in their work. For example:
- Prospective information security professionals
- IT Risk Officers
- IT Governance officers
- Auditors whose field of work also includes or will include IT
- Line managers
- Service Management officers
- Helpdesk employees
Required prior knowledge
During the IT-Security Foundation course, the basics of IT security are covered. It is recommended that you are broadly familiar with some basic IT concepts, such as IP address or network. Furthermore, no prior knowledge is required to participate in this course at foundation level. The level of this course is MBO+ (vocational+).
Course material
You will receive the official course material from SECO-Institute via our portal at the start of the course. The course material is in English and the language of instruction during the course is Dutch. If a book is included in the course material, you will receive it on the first day of class.
The course includes the following:
- The SECO-Institute official course material
- A free "S-ITSF" digital badge to apply for at SECO-Institute when you pass the exam
- A delicious lunch
- Het SECO-Institute online IT-Security Foundation exam
Training dates & Registration for this training
Pressing the above button takes you to our partner Security Academy’s website. Fox-IT and Security Academy work together to offer training in the field of cyber security. As such, Security Academy takes care of further registration and administration.
Duration: 5 days
Cost: € 3.750,- excl. VAT
Taught by: Security Academy
- You have mastered the basics and you want to delve deeper into IT security
- You want to learn how to guard your organization's systems and networks from external attacks
- You fulfill the role of your organization’s point of contact in the field of IT security
Introduction
This is the follow-up course of the IT Security Foundation. Where the foundation course was mainly about the basic concepts, this training will go much more in-depth. You will learn which IT security components are important and how you can apply them within your own IT environment so that external attacks, such as ransomware or hacks, are fended off.
Target audience
This course is suitable for officials who have some technical knowledge in the field of ICT and the security of computer systems. These include:
- Officials who must deal with the technical aspects of the security of an IT environment in their work
- Junior and medior technical administrators of networks, systems or applications
- Junior and medior functional application managers who want to master the language of their fellow technical administrators
- Officers who deal with incident management
Required prior knowledge
Basic knowledge of IT security is recommended. If you do not yet have this, we recommend that you first follow the IT-Security Foundation course. The level of this course is MBO/HBO (vocational / BSc Applied).
Course material
You will receive the official course material from SECO-Institute via our portal at the start of the course. The course material is in English and the language of instruction during the course is Dutch. If a book is included in the course material, you will receive it on the first day of class.
The course includes the following:
- The SECO-Institute course material
- The SECO-Institute online IT-Security Practitioner exam
- A delicious lunch
When you book this training course in combination with the IT-Security Foundation preparatory course, you will receive a 10% discount on the total amount. If you want to take advantage of this discount, please enter the following code in the discount field: "AR-Combi"
Training dates & Registration for this training
Pressing the above button takes you to our partner Security Academy’s website. Fox-IT and Security Academy work together to offer training in the field of cyber security. As such, Security Academy takes care of further registration and administration.
Duration: 2 days
Cost: € 1.395,- excl. VAT
Taught by: Security Academy
- You are taking your first steps into the world of social engineering and would like to gain more knowledge
- You want to gain insight into the dangers of Social Engineering, the working method of a social engineer and the preventative measures
- You want to be able to determine the level of your organization's resilience to social engineering
Introduction
Social engineering is a collection of techniques that computer criminals can employ towards financial gain, or to cause damage by cracking the weakest link in computer security, being humans. After completing this course, you will have a solid basic knowledge of social engineering and a better understanding of the basic psychological principles and process steps that a social engineer follows.
During this course, you will learn to recognize social engineering (earlier) and gain insight into ways in which you can protect yourself and your own organization against this type of attack. The course has many practical exercises, so that you also gain the basic skills to be an aspiring ethical social engineer yourself.
During the course, we look at how social engineering works in a practical way. Not only will you be offered knowledge, but you will also experience how social engineering works and how easily someone (including yourself) can fall victim to this way of hacking.
Target audience
The Social Engineering Foundation course is intended for anyone who wants to gain insight into the dangers of social engineering, the working methods of social engineers and the possible preventative measures that help your organization arm itself against this effective way of hacking. This course is also intended for those who want to be able to determine the resilience of their own organization against social engineering. Think of:
- Security coordinators
- Facility managers
- Security managers
- Members of management teams
- Members of Incident Response Teams
- Helpdesk employees
- Press officers
- Aspiring Ethical Social Engineers
- In short, everyone who communicates with external parties benefits from what this course has to offer.
Required prior knowledge
During the Social Engineering Foundation course, the basics of social engineering are covered. No prior knowledge is necessary to participate in this course. The level of this course is MBO/HBO (vocational / BSc Applied).
Course material
You will receive the course material via our portal at the start of the course. The course material is in Dutch and the language of instruction during the course is Dutch. If a book is included in the course material, you will receive it on the first day of class.
There is no exam for this course. You will receive a certificate of participation from the Security Academy after completing the course.
The course includes the following:
- The course material
- A delicious lunch
Training dates & Registration for this training
Pressing the above button takes you to our partner Security Academy’s website. Fox-IT and Security Academy work together to offer training in the field of cyber security. As such, Security Academy takes care of further registration and administration.
Increasingly, enterprises are moving their operations to the cloud, such as AWS, Azure, or Google Cloud Platform. How can you ensure your cloud environment is secure?
This course is designed for security consultants and cloud architects who want to understand the principal elements of their cloud-based environment. Learn the techniques and tools necessary to perform a thorough security review, while increasing your understanding of the major risks and security best practices.
You should take this course if:
NCC Group’s cloud security training is for security consultants and cloud architects interested in learning how to assess the main elements of a cloud environment.
Cloud security awareness is improving, but its application to real-life scenarios is trailing. The goal of this course is to bridge this gap by integrating the latest technologies with Cloud solutions. The course describes these attacks and explains how to detect and mitigate against future attacks. Attendees will learn how security vectors in these ecosystems present opportunities for abuse through applied exercises.
You should take this course if:
NCC Group’s Offensive Cloud Security training is for pentesters who have some experience with the Cloud and want to improve their ability to assess and improve the security of cloud hosted applications and infrastructures.
Containers and orchestration platforms such as Kubernetes are on the rise throughout the IT world, but how do they work and how can they be secured?
This course takes a deep dive into the world of Linux-based containers, covering fundamental technologies and practical approaches to attacking and defending Docker and Kubernetes container-based systems.
This course focuses on Kubernetes as it emerges as the dominant core of cloud-native systems while examining the wider ecosystem.
You should take this course if:
NCC Group’s Mastering Container Security training is well suited for offensive or defensive security professionals seeking hands-on experience with setting up, defending, and attacking containerized environments.
Do you develop bespoke or off-the-shelf software? Does it put your customers at risk of a security breach? Do you choose components for your enterprise architecture while fully considering the security implications?
This course will help you in planning and developing a secure software development lifecycle.
You should take this course if:
NCC Group’s Security in Software Development Lifecycle training is for software developers, QA engineers, software architects, technical/project/program managers, business analysts, and team leaders seeking information on how to satisfy expectations around security and privacy for software and hardware they are responsible/liable for.
Secure coding is fundamental to the development of secure web applications. Secure Coding for Web Developers provides developers with practical guidance for developing secure web applications using JavaScript and other popular web technologies.
Participants will learn how to secure web applications and avoid, prevent, and mitigate the OWASP top ten most critical web application security risks.
You should take this course if:
NCC Group’s Secure Coding for Web Developers training is for Web developers who would like to build websites free from the OWASP top ten most critical web application and related security risks.
Blurb:
This course teaches methods for understanding native code including static analysis using disassemblers and a dynamic analysis using debuggers. It also covers some common classes of security vulnerability and methods to detect them.
You should take this course if:
NCC Group’s Processor, OS and Computer Foundations training is suitable for consultants, code reviewers, reverse engineers and exploit developers who want to understand how native programs work and assess their security without access to source code.
This course teaches exploitation methods from simple stack overflows to type confusion bugs in C++ code using various techniques including return-oriented programming and engineering read/write primitives.
This course is led by experienced instructors from NCC Group’s Exploit Development Group (EDG), who develop bespoke exploits and tools for use on client engagements.
The EDG has developed exploits against popular software such as Internet Explorer, Firefox, Flash, Adobe Reader, Windows Kernel, Xen, and Java. They provide extensive knowledge and experience in reverse engineering and low-level debugging.
You should take this course if:
NCC Group’s Exploit Development is training for consultants, code reviewers, reverse engineers, and exploit developers who want to understand how to exploit vulnerabilities in native code.
This course shows how to attack the Windows kernel. The course will teach you about the Windows kernel internals with labs that will provide you real-world experience in how to exploit kernel vulnerabilities.
This class focuses on exploiting CVE-2018- 8611 on Windows 10 x64 1809 (RS5), a fairly complex race condition that leads to a use-after-free on the non-paged kernel pool. The vulnerability is in the Kernel Transaction Manager (KTM) driver (tm. sys), a kernel component that has not received much public scrutiny.
You should take this course if:
NCC Group’s Windows Kernel Exploitation training is for reverse engineers, exploit developers, and bug hunters who wish to learn a structured and reusable approach to attacking an unknown component in the Windows kernel.
Fox Academy Services
Awareness Programs:
Measure and structurally improve the whole organization’s awareness level, focusing on those subjects that require the most attention.
Exercises & Demonstrations:
Discover how hacking works in a live setting or simulate a crisis within your team and practice the required skillset.
Training Programs:
Elevate the knowledge and skills of your teams, within the specific context of your organization.