Cyber Security Training Landscape
Bedrijven - Opleidingen - Certificaten - Events - Training Sites - Security Tools
Opleidingen
| Naam | Onderwerpen | Niveau | Bedrijf | Locatie |
|---|---|---|---|---|
| Cybersecurity Operations | ? | Bachelor | Odisee | Brussel |
| Secure Enterprise Networks | network management | Bachelor | Odisee | Brussel |
| Network Security | CCNA Security | Bachelor | Erasmushogeschool Brussel | Brussel |
| Software Security | Bachelor | Erasmushogeschool Brussel | Brussel | |
| Software security & Testing | Bachelor | Artesis Plantijn Hogeschool | Antwerpen | |
| Cybersecurity | penetration testing | Bachelor | Karel de Grote-Hogeschool | Antwerpen |
| Security | systeem- en netwerkbeveiliging, crypto | Bachelor | Karel de Grote-Hogeschool | Antwerpen |
| Cloud & Cyber Security | Bachelor | Thomas More | Geel | |
| Cyber Security Expert | Bachelor | Thomas More | Mechelen | |
| Security, Systems & Services | Bachelor | Thomas More | Sint-Katelijne-Waver | |
| Beveiliging | risk, encryptieprimitieven, tools | Bachelor | UCLL | |
| Security Essentials | network security | Bachelor | PXL | Hasselt |
| Security Advanced | application security | Bachelor | PXL | Hasselt |
| Networks & Security | Bachelor | Vives | ||
| Security Awareness Training | phishing, firewalls, virus scanners | Professional | Vives | Brugge |
| Ethical hacking en ICT-infrastructuur-beveiliging | Professional | Vives | Brugge | |
| Cisco Academy: CCNA Cybersecurity Operations | Professional | Vives | Brugge | |
| Security management, threat and risk assessment | Bachelor | Hogeschool West-Vlaanderen | Kortrijk | |
| Web pentesting | Bachelor | Hogeschool West-Vlaanderen | Kortrijk | |
| Cybercrime | Bachelor | Hogeschool West-Vlaanderen | Kortrijk | |
| Practical reverse engineering and malware analysis | Bachelor | Hogeschool West-Vlaanderen | Kortrijk | |
| Network and systems pentesting | Bachelor | Hogeschool West-Vlaanderen | Kortrijk | |
| Network and CCNA security | Bachelor | Hogeschool West-Vlaanderen | Kortrijk | |
| Emergent Security Techniques | Bachelor | Hogeschool West-Vlaanderen | Kortrijk | |
| Windows and Linux Server Security | Bachelor | Hogeschool West-Vlaanderen | Kortrijk | |
| Cybersecurity | Bachelor | Hogeschool Gent | Gent | |
| Executive Master in Information Risk & CyberSecurity | information security | Professional | Solvay Business School | Brussel |
| Information Security & Cybersecurity | information security | Professional | Solvay Business School | Brussel |
| Executive Programme in Information Security Management | information security | Professional | Solvay Business School | Brussel |
| Master Cybersecurity | crypto, system and network security, security management, secure software engineering, legal | Master | ULB | Brussel |
| Veilige software – ICT Security | Master | KU Leuven | Leuven | |
| Cryptography and Network Security | Master | KU Leuven | Leuven | |
| Privacy Technologies | Master | KU Leuven | Leuven | |
| e-Security | Master | KU Leuven | Leuven | |
| Security of Network and Computer Infrastructure | Master | KU Leuven | Leuven | |
| Gevorderde methoden in cryptografie | Master | KU Leuven | Leuven | |
| Privacy and Big Data | Master | KU Leuven | Leuven | |
| Computer and network security | Master | Universiteit Antwerpen | Antwerpen | |
| IT Beveiliging | Master | Universiteit Gent | Gent | |
| Beveiliging van netwerken en computers | Master | Universiteit Gent | Gent | |
| Information security | Master | Universiteit Gent | Gent | |
| Cloudbeveiliging | Master | Universiteit Gent | Gent | |
| Getaltheorie en cryptografie | Master | Universiteit Hasselt | Hasselt | |
| Codeertechnieken en cryptologie | Master | Universiteit Hasselt | Hasselt | |
| Security en computernetwerken | Master | Universiteit Hasselt | Hasselt | |
| Getaltheorie en cryptografie | Master | Vrije Universiteit Brussel | Brussel | |
| Cryptography | Master | Vrije Universiteit Brussel | Brussel | |
| Operating Systems and Security | Master | Vrije Universiteit Brussel | Brussel | |
| Software Security | Bachelor | Artesis Plantijn Hogeschool Antwerpen | Antwerpen | |
| Information security | Bachelor | Artesis Plantijn Hogeschool Antwerpen | Antwerpen | |
| Information Security Management | Bachelor | Antwerp Management School | Antwerpen | |
| Cybercrime and Crime Control in a Digitising World | Master | KU Leuven | Leuven | |
| Opleiding Cyber Security | pen testing, network security, crypto, secure software, SDLC | Professional | NHA | online |
| Programme in European Data Protection | gdpr | Professional | Solvay Business School | Brussel |
| IT security beheerder | system and network security | Professional | VDAB | Antwerpen & Geel |
| Digital Skills Training: Online security | Amateur | Intec | Brussel | |
| Cybercriminaliteits- en beveiligingsexpert | forensics, pen testing, emergency response, risk management, crypto | Professional | Syntra | Sint-Michiels |
| ICT netwerken-, server en internet security specialist | network security, ethical hacking, crypto | Professional | Intec | Brussel |
| Cybersecurity met ethical hacking | forensics, pen testing, cybercrime, law | Professional | cvo focus | Sint-Niklaas, Lokeren, Temse, Dendermonde, Hamme |
| Beveilig je PC in de praktijk | network security, crypto, basisbegrippen, system security | Professional | cvo focus | Sint-Niklaas, Lokeren, Temse, Dendermonde, Hamme |
| Beveilig je netwerk in de praktijk | network security | Professional | cvo focus | Sint-Niklaas, Lokeren, Temse, Dendermonde, Hamme |
| Cyber Security | forensics, network security, incident management, crypto, threats and risks | Professional | IMF Academy | online |
| Certified Ethical Hacker v10 | Professional | sbm | Kortrijk, Zwijnaarde, Berchem | |
| Cybersecurity: managing risk in the information age | law, threats and risks | Professional | Harvard | online |
| Cybersecurity awareness | Amateur | Stark Security | online | |
| Computer and Cyber Crime Professional | Bachelor | Hogeschool West-Vlaanderen | online | |
| Cyber crime specialist | forensics, vulnerabilities, law, malware | Professional | Centrum voor Avondonderwijs | onine |
| Digitaal rechercheur | privacy, forensics, law | Professional | Laudius | online |
| Certified Chief Information Security Officer (C/CISO) | Professional | IMF Academy | Eindhoven | |
| Certified Cloud Security Professional (CCSP) | Professional | IMF Academy | Eindhoven | |
| Certified Ethical Hacker (CEH) | Professional | IMF Academy | Eindhoven | |
| Certified Secure Software Lifecycle Professional (CSSLP) | Professional | IMF Academy | Eindhoven | |
| Cloud Security (CCSK) | Professional | IMF Academy | Eindhoven | |
| CISSP Compact Training | network security, application security, risk, security operations, security engineering | Professional | IMF Academy | Eindhoven |
| ISO 27001 Informatiebeveiliging | Professional | IMF Academy | Eindhoven | |
| Information Security Management | Professional | IMF Academy | Eindhoven | |
| Certified Information Systems Auditor | Professional | IMF Academy | Eindhoven | |
| Certified Information Security Manager | Professional | IMF Academy | Eindhoven | |
| Security Analyst & Licensed Penetration Tester (ECSA/LPT) | Professional | IMF Academy | Eindhoven | |
| Identity Management & Access Control | Professional | IMF Academy | Eindhoven | |
| Privacy & Security | Professional | IMF Academy | Eindhoven | |
| Risk Manager | Professional | IMF Academy | Eindhoven | |
| Data Protection Officer | privacy, governance, law | Professional | Deloitte | Brussel |
| Security Awareness | phishing, fraud, crypto lockers | Amateur | VanRoey | Brussel, Antwerpen, Kempen |
| Security Awareness Training | phishing, ransomware | Amateur | KnowBe4 | online |
| CCNA | network security | Professional | Multimedi | Heverlee |
| GDPR | gdpr | Professional | Multimedi | Heverlee |
| Network Security Advanced | vulnerabilities, malware, botnets | Professional | FOD Beleid en Ondersteuning | Vlaanderen |
| Cybersecurity online | phishing, virussen, paswoorden, social engineering | Amateur | FOD Beleid en Ondersteuning | online |
| Web Application Security Testing for QA | web security | Professional | Toreon | Antwerpen |
| EC-Council Certified SOC Analyst (CSA) | incident response, security operations, security management | Professional | Global Knowledge | online |
| Windows Security and Infrastructure Management | forensics, system security | Professional | Global Knowledge | Mechelen |
| Understanding Cisco Cybersecurity Fundamentals | network security | Professional | Global Knowledge | online |
| Training for Future Data Protection Officers | gdpr, privacy | Professional | Global Knowledge | Brussel |
| Certified Information Privacy Technologist/Professional/Manager | privacy | Professional | Global Knowledge | Mechelen |
| Hacking and Securing Windows Infrastructure | hacking, system security | Professional | Global Knowledge | Mechelen |
| 360 Penetration Testing Course | pen testing, web security | Professional | Global Knowledge | Mechelen |
| Certified Ethical Hacker V10 | network security, hacking, vulnerabilities, system security | Professional | Global Knowledge | Mechelen |
| EC-Council Certified Incident Handler | forensics, incident response, threats, risks | Professional | Global Knowledge | Mechelen |
| System Forensics and Incident Handling | forensics, incident response, threats, risks | Professional | Global Knowledge | Mechelen |
| Computer Hacking Forensics Investigator | forensics | Professional | Global Knowledge | online |
| Certified in Risk and Information Systems Control | risk, mitigations | Professional | Global Knowledge | Mechelen |
| Certified Information Security Manager | incident response, risk, security governance | Professional | Global Knowledge | Mechelen |
| Systems Security Certified Practitioner | network security, incident response, risk, security operations, crypto, malware, access control | Professional | Global Knowledge | Mechelen, online |
| CISSP Certification Preparation Training Course | privacy, network security, incident response, threats, vulnerabilities, crypto, security governance, policies, security testing | Professional | Global Knowledge | Mechelen |
| Certified Application Security Engineer (CASE) . Net | application security, threats, vulnerabilities, crypto | Professional | Global Knowledge | online |
| Certified Secure Software Lifecycle Professional (csslp) | application security, threats | Professional | ZIONSECURITY | onsite |
| Information Security Foundation/Practitioner/Management Expert | compliance, threats, law, risks | Professional | Security Academy | Antwerpen |
| IT-Security Foundation | network security, vulnerabilities, software security | Professional | Security Academy | Antwerpen |
| Privacy & Data Protection | gdpr | Professional | Security Academy | Antwerpen |
| Ethical hacking | pen testing, network security, vulnerabilities, web security | Professional | Security Academy | Antwerpen |
| Secure Programming | crypto, authorization, secure engineering | Professional | Security Academy | Antwerpen |
| CISSP® Preparation | network security, governance, compliance, identity management, risk, vulnerabilities, software security, security operations, crypto, security testing | Professional | Security Academy | Antwerpen |
| CCSP | application security, law, data security, infrastructure security | Professional | Security Academy | Antwerpen |
| CISM | governance, incident response, compliance, risk | Professional | Security Academy | Antwerpen |
| CRISC | incident response, risk, mitigations | Professional | Security Academy | Antwerpen |
| Cybersecurity - Hoe de NIS-wet implementeren in uw bedrijf? | gdpr, law | Professional | Lexalert | online |
| Privacy op de werkvloer | gdpr | Professional | Lexalert | online |
| Security Awareness | gdpr, phishing, risks | Amateur | Sectricity | Gent, online, onsite |
| Ethical Hacking | hacking, vulnerabilities, crypto, malware | Professional | Sectricity | Gent, online, onsite |
| Incident Response | incident response | Professional | Sectricity | Gent, online, onsite |
| Web Security | web security | Professional | Sectricity | Gent, online, onsite |
| GDPR Analysis | gdpr | Professional | Sectricity | Gent, online, onsite |
| 360 GDRP Training | gdpr | Professional | Sectricity | Gent, online, onsite |
| Network Security Expert | network security, threats | Professional | Fortinet | Antwerpen, Gent, online |
| Introduction to Cyber Security | network security, crypto, system security, malware | Professional | SANS | Brussel |
| Web App Penetration Testing and Ethical Hacking | authentication, web security | Professional | SANS | Brussel |
| Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses | network security, vulnerabilities, malware | Professional | SANS | Brussel, online |
| Wireless Penetration Testing and Ethical Hacking | network security | Professional | SANS | Brussel, online |
| Advanced Incident Response, Threat Hunting, and Digital Forensics | forensics, incident response, threats | Professional | SANS | Brussel |
| Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response | forensics, network security, incident response, threats | Professional | SANS | Brussel |
| Mobile Device Security and Ethical Hacking | hacking, vulnerabilities | Professional | SANS | online |
| Intrusion Detection In-Depth | network security | Professional | SANS | online |
| Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques | web security | Professional | SANS | online |
| Hacker Tools, Techniques, Exploits, and Incident Handling | hacking, incident response, vulnerabilities | Professional | SANS | online |
| Law of Data Security and Investigations | law | Professional | SANS | online |
| SANS Training Program for CISSP® Certification | network security, application security, risk, security operations, security engineering | Professional | SANS | online |
| Security Essentials Bootcamp Style | Professional | SANS | online | |
| Critical Security Controls: Planning, Implementing, and Auditing | Professional | SANS | online | |
| Blue Team Fundamentals: Security Operations and Analysis | Professional | SANS | online | |
| Enterprise Threat and Vulnerability Assessment | vulnerabilities, risks | Professional | SANS | online |
| Advanced Security Essentials - Enterprise Defender | Professional | SANS | online | |
| Securing Windows and PowerShell Automation | system security | Professional | SANS | online |
| Securing Linux/Unix | system security | Professional | SANS | online |
| Continuous Monitoring and Security Operations | Professional | SANS | online | |
| Defensible Security Architecture and Engineering | software security | Professional | SANS | online |
| Secure DevOps: A Practical Introduction | Professional | SANS | online | |
| Cloud Security and DevOps Automation | Professional | SANS | online | |
| Cloud Security Architecture and Operations | Professional | SANS | online | |
| Network Penetration Testing and Ethical Hacking | pen testing, network security | Professional | SANS | online |
| Implementing and Auditing the Critical Security Controls - In-Depth | Professional | SANS | online | |
| Automating Information Security with Python | Professional | SANS | online | |
| Metasploit Kung Fu for Enterprise Pen Testing | vulnerabilities | Professional | SANS | online |
| Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | pen testing, vulnerabilities | Professional | SANS | online |
| Battlefield Forensics & Data Acquisition | forensics | Professional | SANS | online |
| Windows Forensic Analysis | forensics | Professional | SANS | online |
| Mac and iOS Forensic Analysis and Incident Response | forensics, incident response | Professional | SANS | online |
| Advanced Memory Forensics & Threat Detection | forensics, threats | Professional | SANS | online |
| Cyber Threat Intelligence | Professional | SANS | online | |
| Smartphone Forensic Analysis In-Depth | forensics | Professional | SANS | online |
| Reverse-Engineering Malware: Malware Analysis Tools and Techniques | vulnerabilities, malware | Professional | SANS | online |
| Security Leadership Essentials For Managers | Professional | SANS | online | |
| Security Strategic Planning, Policy, and Leadership | Professional | SANS | online | |
| Defending Web Applications Security Essentials | web security | Professional | SANS | online |
| Secure Coding in Java/JEE: Developing Defensible Applications | application security | Professional | SANS | online |
| Secure Coding in .NET: Developing Defensible Applications | application security | Professional | SANS | online |
| Auditing & Monitoring Networks, Perimeters & Systems | network security | Professional | SANS | online |
| ICS/SCADA Security Essentials | Professional | SANS | online | |
| ICS Active Defense and Incident Response | Professional | SANS | online | |
| Secure coding skills | application security | Professional | Secure Code Warrior | online |
| Advanced Web Attacks and Exploitation | web security | Professional | Offensive Security | online |
| Penetration Testing Training with Kali Linux | pen testing, vulnerabilities | Professional | Offensive Security | online |
| Cracking the Perimeter | pen testing, system security | Professional | Offensive Security | online |
| Offensive Security Wireless Attacks | network security, vulnerabilities | Professional | Offensive Security | online |
| Official (ISC)² CBK Training Seminars for the CISSP | network security, application security, risk, security operations, security engineering | Professional | (ISC)2 | online |
| Official (ISC)² CBK Training Seminars for the SSCP | network security, application security, incident response, risk, crypto, system security, access control | Professional | (ISC)2 | online |
| Official (ISC)² CBK Training Seminars for the CAP | risk, authorization | Professional | (ISC)2 | online |
| Official (ISC)² CBK Training Seminars for the CSSLP | application security, SDLC, security testing | Professional | (ISC)2 | online |
| Official (ISC)² CBK Training Seminars for the CCSP | cloud security, security operations, legal | Professional | (ISC)2 | online |
| MTA Security Fundamentals | network security, authentication, policies | Professional | Firebrand | Sint-Michielsgestel |
| (ISC)2 Certified Cloud Security Professional (CCSP) | cloud security, security operations, legal | Professional | Firebrand | Sint-Michielsgestel |
| (ISC)2 CISSP Boot Camp | network security, application security, risk, security operations, security engineering | Professional | Firebrand | Sint-Michielsgestel |
| Certified Secure Software Lifecycle Professional | software security, security testing, secure engineering | Professional | Firebrand | Sint-Michielsgestel |
| (ISC)2 SSCP - Systems Security Certified Practitioner | network security, application security, incident response, risk, crypto, system security, access control | Professional | Firebrand | Sint-Michielsgestel |
| CCNA Security (IINS) | network security, crypto | Professional | Firebrand | Sint-Michielsgestel |
| CCNP Security | network security, crypto | Professional | Firebrand | Sint-Michielsgestel |
| Cybersecurity Analyst (CySA+) | incident response, vulnerabilities, security operations, SDLC | Professional | Firebrand | Sint-Michielsgestel |
| Security+ Certificering | secure architecture, threats, risk, vulnerabilities, crypto, access control | Professional | Firebrand | Sint-Michielsgestel |
| Certified Data Protection Officer - GDPR Compliance | gdpr | Professional | Firebrand | Sint-Michielsgestel |
| Certified Chief Information Security Officer (CCISO) | application security, governance, incident response, threats, risk, system security | Professional | Firebrand | Sint-Michielsgestel |
| Certified Ethical Hacker (CEH) | hacking, vulnerabilities, crypto, malware | Professional | Firebrand | Sint-Michielsgestel |
| Certified Incident Handler (ECIH) | incident response | Professional | Firebrand | Sint-Michielsgestel |
| Certified Network Defender (CND) | network security, incident response, vulnerabilities | Professional | Firebrand | Sint-Michielsgestel |
| Certified Security Analyst (ECSA) | pen testing | Professional | Firebrand | Sint-Michielsgestel |
| Computer Hacking Forensics Investigator (CHFI) | law, foresics | Professional | Firebrand | Sint-Michielsgestel |
| Information Security Manager (EISM) | risk, legal | Professional | Firebrand | Sint-Michielsgestel |
| Global Industrial Cyber Security Professional (GICSP) | incident response, threats, system security, access control | Professional | Firebrand | Sint-Michielsgestel |
| Security Essentials (GSEC) | network security, risk, crypto, web security, access control | Professional | Firebrand | Sint-Michielsgestel |
| Certified Information Privacy Manager (CIPM) | privacy, incident response, legal | Professional | Firebrand | Sint-Michielsgestel |
| Certified Information Privacy Professional - Europe | gdpr, privacy | Professional | Firebrand | Sint-Michielsgestel |
| Certified Information Privacy Technologist (CIPT) | privacy, legal | Professional | Firebrand | Sint-Michielsgestel |
| Certified Cybersecurity Practitioner CSX | incident response, threats, vulnerabilities, legal, system security, malware | Professional | Firebrand | Sint-Michielsgestel |
| Introduction to modern cryptographic methods | authentication, crypto | Professional | EITCA | Brussel |
| Electronic economy information security | network security, crypto | Professional | EITCA | Brussel |
| Cryptography fundamentals | biometrics, crypto | Professional | EITCA | Brussel |
| Information security and cryptography fundamentals | authentication, biometrics, crypto, auditing | Professional | EITCA | Brussel |
| Advanced computer networks security | network security | Professional | EITCA | Brussel |
| Practical aspects of information security | security tools, threats, malware | Professional | EITCA | Brussel |
| Quantum cryptography fundamentals | crypto | Professional | EITCA | Brussel |
| Operating systems security | authentication, crypto, system security | Professional | EITCA | Brussel |
| Security management in Microsoft operating systems | network security, system security | Professional | EITCA | Brussel |
| Certified DPO (GDPR): Functionaris gegevensbescherming (AVG) | gdpr | Professional | V-ICT-OR | Zwijnaarde |
| International Course on Cyber Security and Cryptography | biometrics, crypto | Professional | COSIC | Leuven |
| SecAppDev | privacy, identity management, crypto, web security | Professional | SecAppDev.org | Leuven |
| Internet of Things: Security | network security, vulnerabilities, crypto, system security | Master | Universiteit Antwerpen / DistriNet | Leuven |
| Privacy Management | gdpr, privacy | Professional | Cranium Campus | Zaventem |
| Privacy for Techies | gdpr, privacy | Professional | Cranium Campus | Zaventem |
| Information Security for non-techies | awareness | Amateur | Cranium Campus | Zaventem |
| Expert Update | privacy, biometrics | Professional | Cranium Campus | Zaventem |
| Training for Future Data Protection Officers | gdpr, privacy | Professional | Cranium Campus | Zaventem |
| Web Application Security | web security | Professional | Approach | Antwerpen, onsite |
| Introduction to cryptography, PKI and SSL/TLS for developers and architects | crypto | Professional | Approach | Antwerpen, onsite |
| Web Application Firewalls | web security | Professional | Approach | Antwerpen, onsite |
| Application Servers security | network security | Professional | Approach | Antwerpen, onsite |
| ISO27001 / Lead Implementer | threats, risks, information security management | Professional | Approach | Antwerpen, onsite |
| ISO27001 / Lead Auditor | threats, risks, information security management | Professional | Approach | Antwerpen, onsite |
| ISO27001 / Foundation | threats, risks, information security management | Professional | Approach | Antwerpen, onsite |
| Real-Time Cyber Threat Detection and Mitigation | network security, threats | Professional | Coursera | online |
| Enterprise and Infrastructure Security | network security | Professional | Coursera | online |
| Cybersecurity and the Internet of Things | network security, iot security, system security | Professional | Coursera | online |
| IT Security: Defense against the digital dark arts | authentication, crypto, authorization | Professional | Coursera | online |
| Cyber Threats and Attack Vectors | network security, threats, vulnerabilities | Professional | Coursera | online |
| Design and Analyze Secure Networked Systems | network security | Professional | Coursera | online |
| Detecting and Mitigating Cyber Threats and Attacks | network security | Professional | Coursera | online |
| Classical Cryptosystems and Core Concepts | crypto | Professional | Coursera | online |
| Cyber Attack Countermeasures | crypto | Professional | Coursera | online |
| Cryptography | crypto | Professional | Coursera | online |
| Cybersecurity Risk Management | incident response, threats, risk | Professional | edX | online |
| Cybersecurity Fundamentals | network security, crypto | Professional | edX | online |
| Introduction to Cyber Security | network security, crypto | Professional | FutureLearn | online |
| Cybersecurity Capstone | forensics, network security | Professional | edX | online |
| Cyber Security in the Software Development Life Cycle | application security, SDLC, system security | Professional | FutureLearn | online |
| Cyber Security for Small and Medium Enterprises: Identifying Threats and Preventing Attacks | awareness | Amateur | FutureLearn | online |
| Cyber Security: Safety at Home, Online, in Life | awareness | Amateur | FutureLearn | online |
| Internet Security for Beginners | awareness | Amateur | openHPI | online |
| Advanced Cybersecurity for Mobile Platforms | network security, mobile security, system security | Professional | Canvas net | online |
| Advanced Penetration Testing | pen testing, network security | Professional | Cybrary | online |
| Post-Exploitation Hacking | hacking | Professional | Cybrary | online |
| Computer and Hacking Forensics | hacking, vulnerabilities, foresics | Professional | Cybrary | online |
| Penetration Testing and Ethical Hacking | pen testing, hacking | Professional | Cybrary | online |
| CompTIA Security+ | network security, application security, threats, risk, crypto, law | Professional | Cybrary | online |
| Cryptography | crypto | Professional | Cybrary | online |
| Enterprise Security Fundamentals | system security | Professional | edX | online |
| Network Security | network security | Professional | edX | online |
| Computer Forensics | forensics | Professional | edX | online |
| Cybersecurity: The CISO's View | governance, incident response, policies | Professional | edX | online |
| Building a Cybersecurity Toolkit | hacking, security tools | Professional | edX | online |
| Web Security Fundamentals | web security | Professional | edX | online |
| CompTIA Seuciryt+ | secure architecture, threats, access management, identity management, risk, crypto | Professional | Pluralsight | online |
| Security Fundamentals | access management, identity management, crypto, risks, theats | Professional | Pluralsight | online |
| Security for Hackers and Developers | application security, vulnerabilities, SDLC, malware, security testing, reverse engineering | Professional | Pluralsight | online |
| Web Application Security | web security | Professional | Pluralsight | online |
| Certified Information Security Manager (CISM) | governance, incident response, threats, risk | Professional | Pluralsight | online |
| Security Assessment Security Testing Security Operations Software Development Security (CISSP) | network security, application security, risk, security testing | Professional | Pluralsight | online |
| Systems Security Certified Practitioner (SSCP) | network security, application security, incident response, risk, crypto, system security, access control | Professional | Pluralsight | online |
| Advanced ICS/SCADA Hacking | hacking, vulnerabilities, ics, scada | Professional | Security Academy | Den Haag |
| ICS/SCADA Cyber Security Essentials | cyber security, ics, scada | Professional | Security Academy | Den Haag |
| IT-Security Expert / SOC | network security, incident response, risk management, security analysis | Professional | Security Academy | Antwerpen, Woerden |
| Lead auditor ISO 27001 | audit, risk management, security analysis, strategy | Professional | Security Academy | Antwerpen, Woerden |
| Normkennis ISO 27001 | audit, risk management, security analysis, strategy | Professional | Security Academy | Antwerpen, Woerden |