-
All
- Online
-
Filters
-
London
- Online
-
Type of studies
-
+ Filters (1)
IT Security Training London
- Training
- London
- Intermediate
- 40h - 5 Days
...Summary This five-day intensive course enables participants to develop the necessary expertise to support an organization in implementing and managing an Information Security Management System (ISMS) based on ISO/IEC 27001:2013. Participants will also gain a thorough understanding of best practices... Learn about: Information Security, Information Systems, ISO 27001...
- Training
- London
- Different dates available
... CISSP examination. Who is this course suitable for? Experienced security professionals who want to expand their knowledge and gain an internationally... Learn about: IT Development, IT Security, Access Control...
- Training
- London
- Beginner
- 30h - 3 Days
... Implementation of an information security risk management program Understanding an organization and its context Risk identification and risk analysis... Learn about: ISO 27005, Information Security, Risk Management...
- Training
- London
- Beginner
- 40h - 5 Days
...Conducting an ISO27001 audit Communication during the audit Audit procedures: observation, document review, interview, sampling techniques, technical verification... Learn about: Lead auditor, ISO Audit, ISO requirements...
- Training
- London
- Beginner
- 40h - 5 Days
...To be able to interpret and illustrate the main Penetration Testing Concepts and Principles To understand the core technical knowledge needed to organize... Learn about: ISO 27001, CYBER SECURITY, Penetration Testing...
- Training
- London
- Intermediate
- 5 Days
...#text-block-10 { margin-bottom:0px; text-align:left; } Core Modules 1. Need for Security Analysis 2. TCP IP Packet Analysis 3. Penetration Testing... Learn about: Java security, Embedded security, Network security...
- Training
- London
- Intermediate
- 5 Days
... CHFI Certification Program. Computer Security and Computer investigations are changing terms. More tools are invented daily for conducting Computer Investigations, be it computer crime, digital forensics, computer investigations, or even standard computer data recovery. The tools and techniques covered... Learn about: EC Council, Ethical Hacking, Computer Hacking...
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you