-
All
-
Online
-
Filters
-
Location
-
Online
-
Type of studies
-
+ Filters (1)
Distance and online learning IT Security training
- Training
- Distance Learning
...The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multiple choice questions, covering...
- Training
- Distance Learning
... OF THIS COURSE This course will benefit government security agencies as well as organizations intent on pursuing any corrective action, litigation, or proof of guilt based on digital...
-
Excellent course. I'll continue using Oxford Applied Traning platform.Overall I found the course well worth the time and effort to help guide me in order to get the certificate. Thanks.
← | →
- Training
- Online
- Beginner
- Different dates available
...The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, oversees, and assesses an enterprise’s information security... Learn about: Program Development, Security Manager, Incident management...
...The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, oversees, and assesses an enterprise’s information security... Learn about: Program Development, Security Manager, Incident management...
-
Excellent course. I'll continue using Oxford Applied Traning platform.Overall I found the course well worth the time and effort to help guide me in order to get the certificate. Thanks.
← | →
-
Well structured and easy to understad. I have already recommended this centre to my friends and one has signed up. Thank you so much!
← | →
- Training
- Online
- Beginner
- Different dates available
... and even project management security procedures. Students that acquire these certifications will be rewarded with a massive potential of open positions with some of the highest salaries in the IT market. This bundle will provide the necessary training for the following certifications; CISSP, CISM,... Learn about: IT Security, Information Systems, IT risk...
... and even project management security procedures. Students that acquire these certifications will be rewarded with a massive potential of open positions with some of the highest salaries in the IT market. This bundle will provide the necessary training for the following certifications; CISSP, CISM,... Learn about: IT Security, Information Systems, IT risk...
-
Well structured and easy to understad. I have already recommended this centre to my friends and one has signed up. Thank you so much!
← | →
- Training
- Distance Learning
... SSCP exam the first time using this course! Program Buy this essential Systems Security Certified Practitioner (SSCP) computer-based course today!What's...
- Training
- Online
- Different dates available
... to structure preventative measures through penetration testing and network vulnerability assessments. The course bundle is designed to prepare of advance students in the positions of security engineers, security officers, network administrator and security auditors to name a... Learn about: IT Security, Network Training, CYBER SECURITY...
- Training
- Distance Learning
- Beginner
- Different dates available
... a strict set of criteria covering all critical elements necessary for security today. It is aimed at professionals with at least four years of experience... Learn about: Data Collection, IT Security, Access Control...
- Training
- Distance Learning
...The SSCP Study Guide & DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives you 100% coverage of (ISC)2 SSCP security domains plus test preparation software for the edge you need to...
- Training
- Online
- Beginner
- Different dates available
...The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing, and expands into all major domains... Learn about: Risk Management, Audit management, Application Security...
- Training
- Distance Learning
...Study using a convenient route to gaining these highly regarded qualifications using this collection of DVD-ROMs. Using interactive video, instructor-led sessions...
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
- Training
- Online
- Beginner
- Different dates available
...CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal... Learn about: Web Attacks, Log Correlation, Email Crimes...
...CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal... Learn about: Web Attacks, Log Correlation, Email Crimes...
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
- Training
- Distance Learning
...This EC-Council endorsed course will immerse the you into an interactive environment where you will be shown how to scan, test, hack and secure your organisation's own systems...
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Training
- Online
- Beginner
- Different dates available
...The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments... Learn about: Web servers, Scanning Networks, Ethical Hacker...
...The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments... Learn about: Web servers, Scanning Networks, Ethical Hacker...
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Training
- Distance Learning
- Beginner
... techniques for discovering potential security problems with your websites and networks. This course requires that you already have familiarity with the basics...
- Training
- Distance Learning
- Beginner
... have completed these two White Hat Hacking video tutorials, you will be completely comfortable with the methods and tools needed to evaluate potential security...
- Training
- Distance Learning
- Beginner
- Delivery of study materials
...TCP/IP Fundamentals 0201 History Of TCP/IP 0202 Using TCP/IP For Communication 0203 OSI Model 0204 TCP/IP Model 0205 Capturing Packets 0206 Using Wireshark... Learn about: Analysis of TCP/IP, Internet Protocol, OSI Model...
- Training
- Online
- Intermediate
- Different dates available
- Online campus
- Virtual classes
- Delivery of study materials
- Support service
...RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security. It helps embed best practice cyber security skills and behaviours throughout your organization, regardless of employees’ roles or responsibilities... Learn about: Common Language, IT professionals, Best Practice...
- Training
- Distance Learning
...Module 1: Security Management Practices. Module 2: Access Control. Module 3: Cryptography. Module 4: Physical Security. Module 5: Security Architecture and Models. Module 6: Law, Investigation and Ethics. Module 7: Telecommunications and Network. Module 8: Business Continuity Objectives. Module...
- Training
- Online
- Intermediate
- Different dates available
- Online campus
- Virtual classes
- Delivery of study materials
- Support service
... Personal Computer Operating Systems Windows Control Panel Utilities Command Line Tools Windows Security Settings Windows Operating System Tools Operational... Learn about: System Fundamentals, System Components, Device Connections...
- Training
- Distance Learning
...CPTEngineer Self Paced Training Price per Unit (piece): --> Certified Penetration Testing Engineer graduates obtain real world security knowledge...
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you