Learnit Training
« Back to all themes

Network and Systems Management training

Below you can find an overview of our training on network and Systems management. Whether it's different parts of Oracle, ITIL Or Learning to manage Windows Server: Learnit offers all these trainings tailor-made and both individually and for large groups (also Incompany).

Classical

Course nameDuration





























E-Learning

Course nameDuration





























Link

Cyber security: much-needed tips and tools

Companies reselling privacy-sensitive information, security leaks and increasing cybercrime: never before has digital security and privacy been such a much-discussed topic as it is today. Network and system administrators and programmers have a huge security problem, because in 2018 it will take more than just a good password to protect data. Also, the 'traditional' e-mail with a hyperlink or infected attachment has long since ceased to be the only risk for companies and private individuals, and there are now new techniques to penetrate computers or databases unsolicited. It was therefore high time to map out how we could improve our online security!

Campaign

Two thirds of the Dutch think that the chance of becoming a victim of internet crime is increasing, but only a small part of them actually take measures to protect themselves better. Reason enough for the Ministry of Security and Justice to launch a campaign. This campaign aims to better arm the Dutch against online threats. After all, a number of simple actions make it less easy for criminals to access the desired information.

Larger fish

However, more and more cyber criminals are now focusing on the larger fish in the digital pond. To illustrate: Almost 30% of companies in the financial and energy sectors were dealing with external attacks, as evidenced by statistics from CBS. In banks this made for outstanding systems. In energy companies it was often about data that were destroyed, mutilated or stolen. In both cases, the damage ran considerably in the paper. Cybercrime costs companies annually, not afraid, some 10 billion euros.

Cyber incidents

Attacks do not always come from outside. A lack of knowledge on this subject can help the staff to ensure that the wrong links are clicked or confidential information is shared with the people. Failures or leaks in the ICT field are also a culprit. According to CBS, 43% of companies have had to deal with this kind of ' cyber incidents '. These incidents often lead to cost as an outside attack, while solutions are often at your fingertips. You can think of information and training of the staff, which will help to eliminate the problems of knowledge and handling.

Notifications

It is clear that it is important to have your own cyber security well for each other. The police are still in the process of attracting expertise in the field of cyber crime. They recognize that knowledge and skills are not yet always and everywhere sufficiently present. Noteworthy is that 4 out of 5 victims of cybercrime fail to report this, which makes it more difficult for the police to recognize patterns, measure the size and solve cases.

Useful tools

Somehow we all come into contact with cybercrime. This could be via an e-mail urging you to fill in your bank details. It may also be that your password has surfaced in a list published in March, which revealed more than 3.3 million passwords on the street. Fortunately, there are some useful websites that can help you with some simple tips to better secure your account, such as the website of Don't Let Your Hack Make. Another useful tool to get to the basics of security is the Test Your Password website. Using a points system, you can see exactly how hack-proof your password is when you type it in. Finally, perhaps the most original tool we came across on the web: Alert Online. This website gives you insight into your online safety and your knowledge of it by means of a game. During this question game you will find out whether your knowledge meets the standard or whether you may still need to take a number of measures.

Training

Trying to avoid getting into such a situation seems to be the best solution in any case. Online tools are useful, but to further minimize the risk of you or your organization becoming a victim of cybercrime, we atj Learnit offer many training courses in the field of ICT security. These are accessible for both individuals and companies. Take a look at the overview of in-depth courses in this category and see which training course suits you!

Link

Save visitor passwords securely with PHP? Use Hashing!

Regelmatig lees je in de krant of op het internet dat wachtwoorden van internet gebruikers op straat liggen, en dat terwijl makers van website dit op een eenvoudige manier kunnen voorkomen. Kom erachter hoe je diefstal van wachtwoorden kan voorkomen door deze blog te lezen!

What is the danger?

Unlike computers, people are not really good at memorizing them. However, you have to remember passwords everywhere. As a result, many people use a single password for multiple websites. This entails a major security risk. If a password is leaked, all accounts can be accessed where this password has been reused.

How do you prevent visitor password theft?

The best solution to not steal passwords is simply not to keep them! Instead, we'll save the hash of the password. A hash function makes a password unrecognizable. Based on the hash, it is impossible to trace the input. A hash function always produces the same result with the same input. A strong hash function also ensures that two different texts do not result in the same hash (if this happens there is a collision). Even if the hackers manage to get a database with hashes, they don't have passwords in their hands yet.

How do you use the hash functions of PHP?

Since PHP 5.5 It has become very easy to hash passwords by using the function password_hash(). This function has one mandatory argument: the password. The second argument allows you to specify which hashing algorithm to use. If you do not specify this, the strong BCrypt algorithm is used by default. In addition to hashing, this function also adds a Salt which protects against Rainbow Tables. Generating the hash goes as follows:

 
  $wachtwoord = ' secret password ';
  $hash = Password_hash ($wachtwoord, PASSWORD_BCRYPT);
  Echo $hash;

The generated hash is a string of 60 characters and can look like this: $2y $10 $ Se3mLsHueAYTM3G4Wd9hTuyfzPCRYtafImcOSO2U0H4290jPU. SUA. From this hash it is impossible to retrieve the password. This hash can be stored securely in your database.

To check if someone has entered a correct password we use the function password_verify(). We give these two arguments, the password that was entered in the login and the hash that we had saved.


  $hash = '$2y$10$Se3mLsHueAYTM3G4Wd9hTuyfzPCRYtafImcOSO2U0H4290jPU.SGO';
  $wachtwoord = 'Onzin';

  if (password_verify( $wachtwoord, $hash)){
      echo 'Correct wachtwoord';
  } else {
    echo 'Incorrect wachtwoord';
  }

In this case, the user password will generate a different hash than was stored in our database. This allows us to verify that the password you entered is correct, without having to save the original password. Even if a hacker gains access to our database there is no password to find.