Learnit Training
« Back to all themes

Network and Systems Management training

Below you can find an overview of our training on network and Systems management. Whether it's different parts of Oracle, ITIL Or Learning to manage Windows Server: Learnit offers all these trainings tailor-made and both individually and for large groups (also Incompany).


Course nameDuration


Course nameDuration


Cyber security: much-needed tips and tools

Companies reselling privacy-sensitive information, security leaks and increasing cybercrime: never before has digital security and privacy been such a much-discussed topic as it is today. Network and system administrators and programmers have a huge security problem, because in 2018 it will take more than just a good password to protect data. Also, the 'traditional' e-mail with a hyperlink or infected attachment has long since ceased to be the only risk for companies and private individuals, and there are now new techniques to penetrate computers or databases unsolicited. It was therefore high time to map out how we could improve our online security!


Two thirds of the Dutch think that the chance of becoming a victim of internet crime is increasing, but only a small part of them actually take measures to protect themselves better. Reason enough for the Ministry of Security and Justice to launch a campaign. This campaign aims to better arm the Dutch against online threats. After all, a number of simple actions make it less easy for criminals to access the desired information.

Larger fish

However, more and more cyber criminals are now focusing on the larger fish in the digital pond. To illustrate: Almost 30% of companies in the financial and energy sectors were dealing with external attacks, as evidenced by statistics from CBS. In banks this made for outstanding systems. In energy companies it was often about data that were destroyed, mutilated or stolen. In both cases, the damage ran considerably in the paper. Cybercrime costs companies annually, not afraid, some 10 billion euros.

Cyber incidents

Attacks do not always come from outside. A lack of knowledge on this subject can help the staff to ensure that the wrong links are clicked or confidential information is shared with the people. Failures or leaks in the ICT field are also a culprit. According to CBS, 43% of companies have had to deal with this kind of ' cyber incidents '. These incidents often lead to cost as an outside attack, while solutions are often at your fingertips. You can think of information and training of the staff, which will help to eliminate the problems of knowledge and handling.


It is clear that it is important to have your own cyber security well for each other. The police are still in the process of attracting expertise in the field of cyber crime. They recognize that knowledge and skills are not yet always and everywhere sufficiently present. Noteworthy is that 4 out of 5 victims of cybercrime fail to report this, which makes it more difficult for the police to recognize patterns, measure the size and solve cases.

Useful tools

Somehow we all come into contact with cybercrime. This could be via an e-mail urging you to fill in your bank details. It may also be that your password has surfaced in a list published in March, which revealed more than 3.3 million passwords on the street. Fortunately, there are some useful websites that can help you with some simple tips to better secure your account, such as the website of Don't Let Your Hack Make. Another useful tool to get to the basics of security is the Test Your Password website. Using a points system, you can see exactly how hack-proof your password is when you type it in. Finally, perhaps the most original tool we came across on the web: Alert Online. This website gives you insight into your online safety and your knowledge of it by means of a game. During this question game you will find out whether your knowledge meets the standard or whether you may still need to take a number of measures.


Trying to avoid getting into such a situation seems to be the best solution in any case. Online tools are useful, but to further minimize the risk of you or your organization becoming a victim of cybercrime, we atj Learnit offer many training courses in the field of ICT security. These are accessible for both individuals and companies. Take a look at the overview of in-depth courses in this category and see which training course suits you!


The 8 most convenient Office 2016 features

Microsoft Office, for many known as Word, Excel, PowerPoint, Access and Outlook, has been completely revamped for the 2016 edition. As in every new version, a lot of changes have been made, and we like to put the 8 most convenient of these on a row.

1. Real-time co-authorship

Collaborating efficiently is one of the main objectives of Microsoft Office 2016. It will not surprise you that from this version you can work with different people simultaneously on the same document. While you are already reading the first paragraph in your Word document, your colleague can continue to write to the following paragraphs, without your work being overwritten by the other. The same goes for PowerPoint, but Word has a unique perk: Here you can even see each other in real-time typing.

2. Send larger files

Send your PowerPoint presentation of 300mb by mail? This is no longer a problem in the new Outlook. As soon as you add an Office 2016 product as an attachment to an email, it will be converted into a link where the recipient can easily download the file. The only condition for this is that the file is already synchronized with a OneDrive account or a SharePoint folder.

3. Smart Lookup

The Smart Lookup function ensures that you don't have to leave Word, Excel or PowerPoint when you want to look up the meaning of a word in your document. Simply select the word in question, right click and then select the option "Smart Lookup". The results you receive are generated by Bing and will be displayed in an "Insights" tab within your document.

4. One-click Forecasting

Excel-Ninjas will undoubtedly count this feature up to their favorites. In the chart section of Excel, you can now conjure up predictions with a simple mouse click. To this end, Microsoft uses the standard "Exponential Smoothing algorithm (ETS) to show effective reliable forecasts.

5. Skype Integration

As mentioned earlier, working together efficiently is very important in Office 2016 and that also proves the Skype integration in the various desktop apps. This allows you to start a Skype call within Word, Excel or PowerPoint, both with Instant messaging, voice calls and video calls. But you can also without leaving the document, share your screen via Skype.

6. Office groups in Outlook

This is perhaps the least discussed novelty of Office 2016, but therefore certainly not the least useful. Thanks to Office groups, it has been done once and for all with traditional distribution lists or cluttered mail conversations. You can now bring together the colleagues you collaborate with in one group, which has a shared Inbox, Calendar, File store, and even integrated OneNote notes.

7. New graphs

For those who are looking forward to the standard charts in Microsoft Office, there is good news. In fact, new chart types have been added that help you to visualize financial or hierarchical data better.

8. Better cross-device support

Finally Office 2016 also puts a big step forward in cross-device support of various programs. Create your Word document on your smartphone, update it on your tablet and add the finishing touch to your PC, all can be done easier than before.


Save visitor passwords securely with PHP? Use Hashing!

Again this week the weather was quite touching: The passwords of millions of internet users are on the street. While the creator of the website could have avoided this easily.

What is the danger?

Unlike computers, people are not really good at memorizing them. However, you have to remember passwords everywhere. As a result, many people use a single password for multiple websites. This entails a major security risk. If a password is leaked, all accounts can be accessed where this password has been reused.

How do you prevent visitor password theft?

The best solution to not steal passwords is simply not to keep them! Instead, we'll save the hash of the password. A hash function makes a password unrecognizable. Based on the hash, it is impossible to trace the input. A hash function always produces the same result with the same input. A strong hash function also ensures that two different texts do not result in the same hash (if this happens there is a collision). Even if the hackers manage to get a database with hashes, they don't have passwords in their hands yet.

How do you use the hash functions of PHP?

Since PHP 5.5 It has become very easy to hash passwords by using the function password_hash(). This function has one mandatory argument: the password. The second argument allows you to specify which hashing algorithm to use. If you do not specify this, the strong BCrypt algorithm is used by default. In addition to hashing, this function also adds a Salt which protects against Rainbow Tables. Generating the hash goes as follows:

  $wachtwoord = ' secret password ';
  $hash = Password_hash ($wachtwoord, PASSWORD_BCRYPT);
  Echo $hash;

The generated hash is a string of 60 characters and can look like this: $2y $10 $ Se3mLsHueAYTM3G4Wd9hTuyfzPCRYtafImcOSO2U0H4290jPU. SUA. From this hash it is impossible to retrieve the password. This hash can be stored securely in your database.

To check if someone has entered a correct password we use the function password_verify(). We give these two arguments, the password that was entered in the login and the hash that we had saved.

  $hash = '$2y$10$Se3mLsHueAYTM3G4Wd9hTuyfzPCRYtafImcOSO2U0H4290jPU.SGO';
  $wachtwoord = 'Onzin';

  if (password_verify( $wachtwoord, $hash)){
      echo 'Correct wachtwoord';
  } else {
    echo 'Incorrect wachtwoord';

In this case, the user password will generate a different hash than was stored in our database. This allows us to verify that the password you entered is correct, without having to save the original password. Even if a hacker gains access to our database there is no password to find.


Save with open source software

Green Links believes that the government can save billions with open source software. That says GL-MP Arjan El Fassed in an interview with nu.nl. But that applies not only to the government, but also to companies and organizations that make a lot of use of computers can save huge amount by using open source.

What is open source software?

Open source software is not developed by one large company such as Microsoft Office, but is often developed in a public and common way. Different programmers and companies work together to develop the software and it is completely free of charge. Characteristic of this computer software is that the source code is released. This allows users to independently study, modify and possibly improve the software. The supply of open source software is large. For example, there are entire operating systems that can replace Windows, such as Ubuntu and Debian. There are also open source CMS systems, such as Drupal, Wordpress and Joomla, which make it relatively easy to build a professional website. Then there are the OpenOffice.org software packages. This is the free counterpart of Microsoft's Office package and contains programs like Writer to type in, Calc to create spreadsheets and Draw to draw with.


Back to politics. In The interview, El Fassed indicates that various studies have been carried out into possible savings in the ICT field. The General Court of Auditors believes that 88 million euros can be saved on an annual basis with the open source software. The internal estimates of domestic affairs are even more favourable: they believe that EUR 3 to 4 billion per year can be saved. No childish figures. Savings are also possible in your organisation. Except that it can be very advantageous to switch to open source software, there is another advantage. The use of open source software would be safer than the usual systems. A comparison made is this: someone takes no medication without having read the package leaflet, which is too unreliable. This also applies to the computer software. Because the source code is known, you know how the program is put together. Another advantage is that many viruses are only harmful to Windows. These viruses cannot cause damage to open source software.


Learnit closely follows developments in open source and makes clever use of the software itself. For example, our own employees have been using the Ubuntu operating system for some time now and documents are created with the free LibreOffice. Learnit also offers various open source training courses, such as our Office training courses. It is also possible to have a training Wordpress to follow at Learnit. Interested or questions? Feel free to contact us on 020-6369179 or send an email to info@learnit.nl.


7 Tips for Safer internet

Internetcriminelen stelen jouw gegevens op gratis wifi netwerken in restaurants, hotels en zelfs op kantoren.

Great, all those networks that you can access on the Internet without typing a password. Unfortunately, this is not always without danger. Hackers can steal passwords, keys commands and files in a fairly simple way. So be warned and try to follow the following simple tips:

  1. Be wary and ask in the restaurant if they have a secure network. Also check the name (SSID) and password of the network. It is because hackers set up their own WiFi network, which makes them easy to access your data. Often it is attractive to log in to this network because there is no password on it, but only with it.
  2. If you visit a site where you need to enter a password, please make sure that the URL starts with ' https://'. If not, do not type a password. Others can see this.
  3. Do not go internet banking, pay by credit card or send and receive mail via Outlook, Thunderbird etc. Webmail is safer provided you use an HTTPS connection.
  4. Make sure you have a good firewall on your computer, iPad or phone.
  5. Encrypt data on your device, use TrueCript or AxCrypt or even better both.
  6. Make sure your folders and files are not shared with others. If you do, do so with password.
  7. Use a VPN connection. If you set up a VPN connection, others can no longer see what you are doing. All traffic is then encrypted. Google at home once quiet to find out how you can do this.

If all this is too technical, we would be happy to help you during one of our courses, for example computer skills: Working with Windows 10 and Office 2016.