Learnit Training
« Back to all themes

Network and System Administration Training Courses

Below you will find an overview of our training courses on network and system administration. Whether it is about different parts of Oracle, ITIL or learning to manage Windows Server: Learnit offers all these training courses tailor-made and both individually and for large groups (also in-company).

Classroom

Course nameDuration





























E-Learning

Course nameDuration


























link]

The main differences between Linux and Windows

Since time immemorial, there has been rivalry between two or more parties, and this is also true in the field of technology. The proliferation of systems, software and other features is increasing by the day, as knowledge about computer technology continues to grow and everyone wants to provide the best service. Similarly, there is a battle between operating systems Linux and Windows, but what are the features and benefits of both? In this blog we will tell you more about the differences between these two operating systems.

What is Linux?

Lunix is a free operating system that is not linked to any particular person or company. It is not necessary to have a licence to use its services. Linux is equipped with a command interface and a graphical interface. Because the software is free, everyone can customise it to their liking. One of the most powerful features of Linux is the separation of the user and the central part of the operating system (the kernel), which encourages the system to convert commands into understandable information and instructions.

What is Windows?

Windows is one of the largest operating systems in the world and has been launched in 137 languages. It is not only responsible for computers, but also for smartphones, tablets and other devices. Windows is from Microsoft and has different versions available for the target group. Unlike Linux, it has a paid licence, but can also be obtained free of charge.

Differences between Linux and Windows

Linux and Windows have a number of differences. The most important differences are listed below.

  • Windows is in part more advanced than Linux because it offers many different features such as Cortana Digital Assistant, Microsoft Window Edge and Microsoft 3D Lab;
  • Linux is free and Windows in most cases has a paid license. Unless you upgrade to a new version of Windows within 12 months of launch, you have to pay money, which can vary between €145 and €259. If you upgrade within 12 months you can often do so for free;
  • In contrast to Linux, Windows can be secured. Linux is an open source software, but in itself has a good security. With Windows, it is immediately recommended to install an antivirus programme;
  • Linux leaves the software free to change as desired, unlike Windows. With this option, every aspect of the operating system can be changed to suit your own taste;
  • Linux is especially interesting for people who know how to program or who like open software, because everything can be modified;
  • Linux can be much faster than Windows, allowing you to breathe new life into an old PC. This is because Linux generally needs fewer system resources so it feels faster;
  • Installing and updating systems remotely is easier with Linux than with Windows and at desktop level Linux has become very user-friendly.

Of course, Linux and Windows also have a lot in common. For example, they are both operating systems and can run multiple applications at the same time. They are compatible with any network and can develop both applications. However, despite their similarities, the differences are important and make them work slightly differently and are suitable for different issues.

Windows training

Would you like to refresh your knowledge of Windows? During our 2-day training Windows Basics you will learn the basic principles of Windows and you will be able to start working with the operating system! Click here for more information about the training or to register now.

link]

What are the advantages of SharePoint?

The decision whether or not to use SharePoint can be a difficult one for organisations. Especially if you are not completely familiar with the programme. The possibilities with SharePoint seem endless and the applications are fairly diverse. In order to make the right choice, it is important to look at the needs of the users. Learnit has listed a number of SharePoint advantages for you, which may make the choice whether or not to use SharePoint easier for you!

  • Intranet in the cloud. The fact that SharePoint is available in the cloud is one of its greatest advantages. Regardless of your location, the intranet can be accessed via desktop, tablet, smartphone or laptop. This makes the programme attractive and simple now that working from different locations is the new norm. In addition, SharePoint is always up-to-date, which means less time and cost spent on maintenance and updates.
  • Smart collaboration. Sharing documents is easy because SharePoint is a social platform. You can create different team sites where people from the same team can create and share documents. This makes collaboration effective and efficient.
  • One integral platform. SharePoint is integrated with Microsoft Teams, the Microsoft Office Suite and back-office systems. As a result, all necessary information is accessible via one portal, making information management a lot easier.
  • Work safely. Business information, personal data and sensitive documents need the best security. SharePoint has taken various safety measures to prevent data leaks, for example. In addition, documents can be safely shared with external parties such as clients or partners.
  • Personalisation without a developer. With SharePoint, the Intranet can be set up entirely according to your own wishes and needs, without the help of a developer. In addition, you no longer have to enter data manually, which means you avoid incorrect and duplicate data.
  • Smart search function. In large, complex intranet sites, it can be difficult to find the right, specific information. SharePoint has an extensive search function that immediately shows documents or intranet pages that match the search query.
  • Intelligent workplace. SharePoint has interesting features through the use of Artificial Intelligence, such as the chatbot to which employees can put questions. The functionalities offered by AI are being developed further and further as more data is available and there are more users.

Training or E-learning SharePoint

Did you know that Learnit offers both trainings and an E-learning in SharePoint? During our training SharePoint Basic you will get to work with the possibilities for end users as well as setting up and designing a site yourself. The core of the training SharePoint Advanced The core of the training is setting up and managing more complex sites. Would you rather work with SharePoint at your own pace? Then take a look at our E-learning SharePoint. link]

Cybersecurity: much needed tips and tools

Companies selling on privacy-sensitive information, security leaks and increasing cybercrime: never before has digital security and privacy been such a hot topic. Network and system administrators and programmers have a tough job with security, because in the year 2018, it takes more than just a good password to protect data. Also, the 'traditional' e-mail with a hyperlink or infected attachment is no longer the only risk for companies and individuals and there are now new techniques to penetrate uninvited computers or databases. It was therefore high time to map out how we can improve our online security!

Campaign

Two thirds of the Dutch population think that the chance of becoming a victim of Internet crime is increasing, but only a small proportion of them actually take measures to protect themselves better. Reason enough for the Ministry of Security and Justice to launch a campaign. This campaign is aimed at better arming the Dutch against online threats. After all, a number of simple actions make it more difficult for criminals to access the desired information.

Larger fish

However, more and more cybercriminals are now targeting the bigger fish in the digital pond. By way of illustration: almost 30 percent of companies in the financial and energy sectors had to deal with external attacks, according to figures from the CBS. In the case of banks, this resulted in failed systems. For energy companies, data was often destroyed, mutilated or stolen. In both cases, the damage was considerable. Cybercrime costs companies, don't be alarmed, around 10 billion euros annually.

Cyber incidents

Attacks do not always come from outside. A lack of knowledge on the subject may cause staff to click on the wrong links or share confidential information with the wrong people. ICT malfunctions or leaks are also a culprit. According to the CBS (Statistics Netherlands), 43 percent of companies have had to deal with this type of 'cyber incident' at some time. These incidents lead to costs just as often as an external attack, while solutions are often within reach. These include information and training for staff, which will help to overcome the problems of knowledge and action.

Notifications

It is clear that it is important to have your own cyber security in place. The police are still in the process of recruiting expertise in the area of cybercrime. They recognise that the knowledge and skills are not yet sufficiently present everywhere. It is noteworthy that 4 out of 5 victims of cybercrime fail to report it, which makes it more difficult for the police to recognise patterns, measure the extent and solve cases.

Useful tools

In one way or another we all come into contact with cybercrime. It could be an email encouraging you to enter your bank details. It could also be that your password turned up in a list published in March that exposed more than 3.3 million passwords. Fortunately, there are useful websites that can help you secure your account with a few simple tips, such as the Don't Let Yourself Get Hacked website. Another useful tool to tackle your security at the basis is the website Test Your Password. Using a point system, you can see exactly how hack-proof a password is when you type it in. Finally, perhaps the most original tool we came across on the web: Alert Online. This website offers a game that gives you insight in your online security and your knowledge of it. During this question game you will find out if your knowledge is up to standard or if you have to take some measures.

Trainings

Trying to avoid getting into such a situation seems to be the best solution in any case. Online tools are useful, but to further minimise the chance of you or your organisation becoming a victim of cybercrime, Learnit offers many training courses in the field of ICT security. These are accessible for both individuals and companies. Take a look at the overview of in-depth courses in this category and see which tailor-made training course suits you best!

link]

Save visitor passwords safely with PHP? Use Hashing!

You regularly read in the newspaper or on the Internet that passwords of Internet users are on the street, and that while website creators can easily prevent this. Find out how you can prevent password theft by reading this blog!

What is the danger?

Unlike computers, people are not very good at remembering. Yet you have to remember passwords for everything. As a result, many people use one password for several websites. This brings a big security risk. If a password is leaked, all accounts where this password is reused are immediately accessible.

How do you prevent theft of visitor passwords?

The best solution to prevent passwords from being stolen is simply not to store them! Instead, we are going to store the hash of the password. A hash function makes a password unrecognisable. Based on the hash, it is impossible to retrieve the input. A hash function always gives the same result for the same input. A strong hash function also ensures that two different texts do not result in the same hash (if this does happen there is a collision). Even if hackers succeed in obtaining a database with hashes, they still do not have any passwords.

How do you use PHP's hash functions?

Since PHP 5.5, it has become very easy to hash out passwords using the function password_hash(). This function has one mandatory argument: the password. In addition, the second argument can be used to specify which hashing algorithm should be used. If this is not specified, the strong BCrypt algorithm is used by default. In addition to hashing, this function also adds a Salt which protects against Rainbow Tables. The hash generation is as follows:

 
  $password = 'Secret Password
  $hash = password_hash($password, PASSWORD_BCRYPT);
  echo $hash;

The generated hash is a string of 60 characters and can look like this: $2y$10$Se3mLsHueAYTM3G4Wd9hTuyfzPCRYtafImcOSO2U0H4290jPU.SGO. From this hash, it is impossible to retrieve the password. So you can safely store this hash in your database.

To check if someone has entered a correct password we use the function password_verify(). We give it two arguments, the password entered at login and the hash we stored.


  $hash = '$2y$10$Se3mLsHueAYTM3G4Wd9hTuyfzPCRYtafImcOSO2U0H4290jPU.SGO';
  $wachtwoord = 'Onzin';

  if (password_verify( $wachtwoord, $hash)){
      echo 'Correct wachtwoord';
  } else {
    echo 'Incorrect wachtwoord';
  }

In this case, the user password will produce a different hash to the one stored in our database. This way we can check if the entered password is correct, without having to save the original password. Even if a hacker gains access to our database, there is no password to be found.

Trainings PHP

Did you know that Learnit offers various trainings in PHP? During our training PHP Programming Basics helps you a lot in the world of PHP with practical examples. In the training PHP Programming Continuation we bring your PHP programming skills to a higher level, giving you a professional programming style and teaching you all the techniques needed for a mature web application. Click here for the complete overview of Learnit's PHP training courses.