-
All
-
Online
-
Filters
-
Location
-
Online
-
Type of studies
-
+ Filters (1)
Distance and online learning IT Security training
- Training
- Distance Learning
- 20h
... to changes in the DR/BCP domain. Mile2 consultants working in the DR/BCP and security field will be dynamically implementing new scenarios...
- Training
- Online
- Intermediate
- Different dates available
- Virtual classes
- Online campus
- Delivery of study materials
- Support service
... the infrastructure of corporates from various data breaches. In our training, you can learn step by step basics methodologies like how to write virus codes that the hackers use, reverse engineering and more in-depth. Candidates can develop their skills in network security by learning different concepts like advanced... Learn about: Network Training...
- Training
- Online
- Intermediate
- Different dates available
- 1 Year
- Online campus
- Virtual classes
- Delivery of study materials
- Support service
...complex networks and multi-vendor support. This course will help you learn everything from the installation to the practical use of dynamips with real cisco software images... Learn about: Vendor support, Network Training...
- Training
- Online
- Intermediate
- Different dates available
- Delivery of study materials
- Online campus
- Virtual classes
- Support service
...(Control Objectives for Information and Related Technology) framework was developed by ISACA (Information Systems Audit & Control Association)... Learn about: Information Systems, COBIT5 framework...
- Training
- Online
- Intermediate
- Different dates available
- Virtual classes
- Online campus
- Delivery of study materials
- Support service
...branching and tagging in Git Git workflows Types of workflows in Git Real time Open source projects in Git Walkthrough of commands Git plugins with...
- Training
- Online
- Intermediate
- Different dates available
- Delivery of study materials
- Virtual classes
- Online campus
- Support service
...then you could become one of those successful blockchain developers. Survey stats that, blockchain market has been expected to grow over 60% per... Learn about: Hash Function, Block hash...
- Training
- Online
- Beginner
- Different dates available
- Support service
- Virtual classes
- Online campus
- Delivery of study materials
- Personal tutor
..., Ensures better control over the data , security over information access and achieving desired results, Through BPC can improve the accuracy and reliability, Can have audit trial, Can streamline their business process, Can come up with accurate plans, budgets and can incorporate the actual... Learn about: Financial Accounting, SAP FUNCTIONAL CONSULTANTS, Financial Training...
- Training
- Online
- Intermediate
- Different dates available
- Online campus
- Delivery of study materials
- Support service
- Virtual classes
..., security and risk management... Learn about: Systems and Infrastructure, IT Governance, IT Auditing...
- Training
- Online
- Beginner
...This latest data warehouse software runs on the SAP HANA platform. It delivers new levels of simplicity for building and operating data warehouse solutions... Learn about: Inner Join, DD Table Type, SQL Statements...
- Training
- Online
- Intermediate
- Different dates available
...This CompTIA Security+ course is designed to enable delegates to prepare for the successful achievement of the CompTIA Security+ examination. This CompTIA Security+ Certification program is an industry-wide, vendor-neutral program which is developed and sponsored by The Computing Industry... Learn about: Environmental Nature, CompTIA Security, Technology Association...
- Training
- Distance Learning
...If you are studying for your Security+ certification and want a route to study in your own time and at your own pace then this is the computer based training course you need...
- Training
- Online
- Different dates available
...IT Security is considered by many to be the fastest growing and most lucrative sector in the IT market. With today's leading companies putting an ever growing importance on the security of their infrastructure, IT Security pros are capitalizing on acquiring high salary positions to protect these... Learn about: Cisco networking, IOS Network, CCN Security...
- Training
- Online
- Different dates available
...IT Security is considered by many to be the fastest growing and most lucrative sector in the IT market. With today's leading companies putting an ever growing importance on the security of their infrastructure, IT Security pros are capitalizing on acquiring high salary positions to protect these... Learn about: IT Law, Security Auditor, CYBER SECURITY...
- Training
- Online
- Beginner
- Different dates available
... an objective measure of excellence, but also a globally recognized standard of achievement. **NOTE: Effective April 15, 2015, the CISSP exam is based on a new exam blueprint. Developed and maintained by the International Information Systems Security Certification Consortium (ISC)2, CISSP is a premium, vendor... Learn about: Access Management, Engineering Management, Risk Management...
- Training
- Online
- Beginner
- Different dates available
...The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions... Learn about: IT risk, Security Practitioner, Security Services...
- Training
- Online
- Beginner
- Different dates available
...CompTIA Security+ certification is globally recognized to validate foundational, vendor-neutral IT security knowledge and skills. This CompTIA Security+ course is an excellent starting point for a career in information security and will prepare you to pass the Security+ exam... Learn about: Monitoring Tools, Networking Terminology, Network Design...
- Training
- Distance Learning
...test, hack and secure your organisation's own systems. You will begin by understanding how perimeter defences work and then be lead into scanning and attacking your own network...
- Training
- Online
- Beginner
- Different dates available
...although it is most suitable for Science & Technology Professionals Information Technology;Computer Security;Application Security Domain 1—The Process... Learn about: Systems Auditor, Information Systems, Systems Acquisition...
- Training
- Online
- Intermediate
- Different dates available
...Cover part 8 2.8 What We Will Cover part 9 2.9 Software Requirements 2.10 Service and Accounts Module 3: SharePoint Architecture, Logical & Physical... Learn about: Service Applications, Logical Architecture, Web Applications...
- Training
- Online
- Intermediate
- Different dates available
...2 1.8 Qualifying Downtime Demo Pt. 3 1.9 Qualifying Downtime Demo Pt. 4 1.10 Qualifying Downtime Demo Pt. 5 1.11 Qualifying Downtime Demo... Learn about: Business Continuity, Applications , Applied Physics...