-
All
-
Online
-
Filters
-
Location
-
Online
-
Type of studies
-
+ Filters
Security risk management courses
- Vocational qualification
- Online
- Different dates available
... Management, the Cloud Architectural Framework and Business Continuity/Disaster Recovery.The course is of particular interest to: IT infrastructure managers who need to understand and plan for Cloud adoption. IT professionals who need to better understand Cloud technologies. IT systems engineers who... Learn about: Business Continuity, Risk Management, Data security...
- Course
- Online
- Beginner
- Different dates available
... domains that make up the “Body of Knowledge” for the CISM exam. It will also provide knowledge about the tools to build your technical skills to manage, design, oversee and assess an enterprise’s information security. Throughout the course, you will learn about effective information security governance... Learn about: IT risk, Strategy Development, Time Objectives...
- Course
- Online
- Beginner
- Different dates available
... component of a business and its information technology security projects. A C)SLO will be able to better manage IT projects in a secure manner by possessing the essential, up-to-date knowledge and skills required to supervise the security component of any information technology project... Learn about: Risk Management, Access Control, Security Management...
- Vocational qualification
- Derby
- 1 Day
...Suitable for: for those who work, or want to work, as: Security Guards and and Public Area Personnel. Customer Service Positions. Bailiffs. Door Supervisors. Event and Entertainment Personnel...
- Course
- Online
- 5 Days
...Outline. Module 1: Security Management Practices. Module 2: Access Control. Module 3: Cryptography. Module 4: Physical Security. Module 5: Security Architecture and Models. Module 6: Law, Investigation and Ethics. Module 7: Telecommunications and Network. Module 8: Business Continuity Objectives...
- Course
- Llanelli
- 1 Day
...Suitable for: Every workplace has the risk of conflict management. The Health and Safety at Work Act 1974 requires employers to assess any risks in the workplace the resources and training to reduce the risk...
- Course
- Southampton
- 1 Day
... reducing the risk of physical assault and harm. Suitable for: Members of staff or individuals who deal directly with others in pressure environments and who may be required to deal with difficult people on a regular basis. The workshop would benefit anyone who, by virtue of their employment, has to...
- Bachelor's degree
- Islington
...-9pm Friday: 9am-5pm Saturday: 9am-5pm The second block is delivered 6 weeks after the first block. This module is taken from the MSc in Management of Information Security and Risk. Course Information Start DateStart TimeDurationCostCourse CodeApply Thursday 12 February 2015 Thursday 17:00-21:00... Learn about: IT Security, IT Management, IT risk...
- Course
- Rochester
- 1 Day
...Suitable for: Management, consultants and staff wishing to understand why an ISMS is important and how it can benefit their businesses...
- Training
- Slough
- 2 Days
...COURSE OUTLINEThis course aims to equip delegates to deal with people who because of the risks posed to either themselves or others...
- Vocational qualification
- Online
- Different dates available
... understanding of various security- and networking-related matters. Get the Security+ certification to show that you have the skills to secure a network and deter hackers and you're ready for the job. After completing this course, you will learn the skills and knowledge required to work effectively... Learn about: IT Security, IT Systems, Data security...
- Course
- Online
- Different dates available
...This resource provides the tools you need to perform practical security audits on the entire spectrum of a company's IT platforms-from the mainframe to the individual PC-as well as the networks that connect them to each other and to the global marketplace... Learn about: PC training, IT Security, IT Auditing...
- Course
- Online
- Advanced
- Different dates available
...This Certified Information Systems Auditor (CISA) Course will provide you with the knowledge and proficiency to prepare for the globally recognized CISA certification exam. The CISA certification has become very popular since it originated in 1978, and is a benchmark for IS audit, security, control... Learn about: Information Systems, IT Auditing, Mobile Computing...
- Vocational qualification
- Derby
- 3 Days
...Suitable for: those who work, or want to work as Trainers of: Security Guards and Public Area Personnel. Customer Service Positions. Bailiffs. Door Supervisors. Event and Entertainment Personnel...
- Training
- Stoke-on-Trent
- 1 Day
... for the use of physical Intervention? Conflict Management Awareness course. 1 day Communication Avoiding Conflict and Reducing Personal Risk Defusing Conflict...
- Training
- Cardiff
- Beginner
- 6 Days
... and Employee legal responsibilities Identify where staff feel ‘vulnerable’ as lone workers Session 2 The importance of understanding and undertaking risk... Learn about: Self Defence, Personal safety, Dangerous Dogs...
- Postgraduate
- West Ham
- 18 Months
... - Software Engineering and Security Architecture Module MSIRM101 - Information Risk Management Module MSIRM118 - Scientific Writing & Research Methodology...
- Vocational qualification
- Online
- Different dates available
...CompTIA Advanced Security Practitioner (CASP) is CompTIA's first mastery-level certification for enterprise technical security leads. CASP certification is an international, vendor-neutral certification that designates IT professionals with advanced-level security skills and knowledge... Learn about: Data Protection, Computer Science, Network Engineering...
- Bachelor's degree
- Islington
... and resilience in operation to these socio-technical systems. The module will be delivered in block mode consisting of two blocks: Thursday: 5pm - 9pm Friday: 9am-5pm Saturday: 9am-5pm The second block is delivered 6 weeks after the first block. This module is taken from the MSc in Management of Information... Learn about: IT Security, IT Management, IT risk...
- Course
- Online
- Advanced
- Different dates available
... the CompTIA Network+Certification provides in-depth information related to networking while the CompTIA Security+ section shows you how to secure your confidential data. Next, CompTIA Healthcare IT deals with the application of IT in the medical industry to provide excellent service to the patients while... Learn about: IT risk, Communication Training, Network Training...
- Course
- (Wembley Park)
- 3 Days
...They will have the skills and knowledge of the core competencies required of a world class information security professional whether planning to sit for the examination or not, they will have gained this in a structured learning environment. They will have gained the knowledge required...
-
The accomodation was excellent,the food was excellent,the trainers were highly professional and motivated. The other students were a great bunch of lads and Ive made a few friends for life through the courses I choose. I will recommend NSC to anyone who shows an interest in a career in Close Protection. The value for money is second to none.
← | →
-
I would highly recommend this course so you get up to date or learn the real profession as a HE close protection operator. An excellent service and training establishment with outstanding courses from the NSC with the full value for money factor. It's the real thing not just talk, if you don't make NSC's grade which is second to none, you fail... there's no if's or buts', it's as simple as that! It's not only just what you've been trained it's how and by whom you've been trained which counts for you and recognized, respected prospective future employers who know that what I've learnt I will use.
← | →
-
Excellent course that challenges you mentally and physically. If you pass the course there is a tremendous sense of achievement and you are left in no doubt as to the attributes that will be required of you as a PSD operator in a hostile environment.
← | →
- Course
- Inhouse (in Wimborne)
- 60h
... management. This includes candidates managing conflict by applying a practical approach to risk, the importance of self-awareness, acting proactively, teamwork strategies, methods to resolve conflict and learning from conflict. Contact drills, on foot and vehicle borne, IED's, hostile environment. Suitable...
... management. This includes candidates managing conflict by applying a practical approach to risk, the importance of self-awareness, acting proactively, teamwork strategies, methods to resolve conflict and learning from conflict. Contact drills, on foot and vehicle borne, IED's, hostile environment. Suitable...
-
The accomodation was excellent,the food was excellent,the trainers were highly professional and motivated. The other students were a great bunch of lads and Ive made a few friends for life through the courses I choose. I will recommend NSC to anyone who shows an interest in a career in Close Protection. The value for money is second to none.
← | → see all
-
I would highly recommend this course so you get up to date or learn the real profession as a HE close protection operator. An excellent service and training establishment with outstanding courses from the NSC with the full value for money factor. It's the real thing not just talk, if you don't make NSC's grade which is second to none, you fail... there's no if's or buts', it's as simple as that! It's not only just what you've been trained it's how and by whom you've been trained which counts for you and recognized, respected prospective future employers who know that what I've learnt I will use.
← | → see all
-
Excellent course that challenges you mentally and physically. If you pass the course there is a tremendous sense of achievement and you are left in no doubt as to the attributes that will be required of you as a PSD operator in a hostile environment.
← | → see all
- Course
- Distance Learning
...This resource provides the tools you need to perform practical security audits on the entire spectrum of a company's IT platforms-from the mainframe to the individual PC-as well as the networks that connect them to each other and to the global marketplace...