-
All
-
Online
-
Filters
Information security courses
- Course
- Online
- Different dates available
... the necessary skills, knowledge and information of Windows... Learn about: Deployment Strategies, Managing Hard Disks, Primary Feature...
- Vocational qualification
- Online
- Different dates available
...The Certified Ethical Hacker training (CEH) course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments... Learn about: Network Engineering, IT Security, IT Systems...
- Course
- Online
- Different dates available
... current skills using this program, then you have selected the right course. Explore the functions various and features of Microsoft Access. In this course you will learn the necessary skills, knowledge and information of Microsoft Access... Learn about: User State Virtualization, Managing Hard Disks, Database training...
- Master
- London
... research interests and ensure your research topic falls within one of these areas. Our research interests include: Professor Funmi Olonisakin: • Discourses on the 'edge' of global security • Transnational security complexes • Gender and security • The leadership role of regional organisations... Learn about: English Language, Security Architecture, Professor Training...
- Course
- Online
- Intermediate
- Different dates available
- 12 Months
..., and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers, while managing risk. While there is no required prerequisite, the... Learn about: Risk Management, IT risk, Network Training...
- Vocational qualification
- Online
- 12 Months
... Technologies VoIP Quality and Security Additional Information for Stage 2: Lan Technologies Enterprise Operating System Principles Enterprise Operating System...
- Course
- Birminghamandanother venue.
- London-City
... and maintaining countermeasures such as Firewalls, Intrusion Detection or Prevention, Anti-Virus solutions or Public Key Infrastructures and you want a certification to attest to your skills and professionalism within Information Security, this is it. This credential is ideal of those who have already obtained... Learn about: Network Training...
- Training
- Londonandanother venue.
- Bath
- 1 Day
... Policy and IPSec to implement a network isolation solution; describe how to implement. Suitable for: This course builds on existing knowledge of server and client security and provides students with the knowledge and skills to apply security best practices to assessing and managing risk in an information...
- Course
- Online
...The Cyber Security Professional Package is a prestige selection of IT and cyber security courses that will build your knowledge of key technologies and concepts from the ground up. This comprehensive package has the cyber security training needed to... Learn about: Network Training...
- Course
- Online
- Intermediate
- Different dates available
- 12 Months
...Completion Certificate awarded upon completion to show employers your new skills Free upgrade on to our state of the art platform Career Advice available on completion 12 Months unlimited Access Cloud Computing Security Knowledge (CCSK) The Cloud Computing Security Knowledge class provides students... Learn about: NIST Definitions, Cloud Service Brokers, IT risk...
- Bachelor's degree
- High Wycombe
- 3 Years
..., when combined with role experience, to become a confident and highly capable Organisational Security Manager. Security and management have a crucial role to play in limiting the impacts of threats upon every organisation, whether profit or not for profit, public or private sector. This course aims to help... Learn about: Business Consulting, Physical security, Workplace Investigation...
- Short course
- Londonandanother venue.
- Bath
- 1 Day
... Server, Microsoft Internet Security and Acceleration (ISA) Server 2004 or Microsoft Identity Integration Server 2003...
- Master
- Hatfield
- Different dates available
- 2 Years
... to enable critical cyber security decision marking, the extant threats to current and emerging systems and networks and the effective countermeasures to such threats in compliance with information security management standards, and the social, legal and ethical issues relating to cyber security... Learn about: Security Management...
- Course
- London
- 4 Days
... management, and backup and recovery, and administrative tasks related to key Information Server products such as DataStage and Information Analyzer. If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and... Learn about: IT Security, IT Management...
- Bachelor's degree
- Leeds
- 1 Year
...This course is subject to validation with The Open University. We aim to provide students with sufficient knowledge and skills to enable them to operate immediately at a professional level in IT sectors of commerce and industry. A degree in Networking and Security will equip the students... Learn about: Project Management, IT Project Management, Database training...
- Short course
- Londonandanother venue.
- Bath
- 1 Day
... the RMS Administration Toolkit; implement a VPN solution that incorporates L2TP/IPSec. Suitable for: This hands-on lab allows students to apply information that can help in implementing and managing security in a network based on Microsoft Windows and that includes Microsoft Exchange Server, Microsoft...
- Course
- Online
...Demonstrate excellence in IT systems auditing by completing the ISACA Certified Information Systems Auditor course. Designed according to the rigorous requirements of the ISACA, students can be sure of learning the theories and practical skills requi... Learn about: Information Systems...
- Bachelor's degree
- Distance Learning
... Systems Fundamentals of Programming and Logic Introduction to Databases Network Infrastructure Basics Information Technology Security Introduction to... Learn about: Network Administration, System Architecture, Project Management...
- Course
- Online
- Different dates available
- 1 Year
... computer and networking resources.. Consultants tasked with documenting current business system provisions and making recommendations on how to improve monitoring, control and protection provisions.. Junior IT security team members who would like to take their knowledge to expert level.. Individuals... Learn about: IT Auditing, Information Systems...
- Training
- Londonandanother venue.
- Bath
- 1 Day
...After completing this course, students will be able to describe how to deploy a secure Exchange Server 2003 infrastructure; describe how to implement ISA Server to increase the security of perimeter networks; describe general planning considerations for deploying a defense against malicious...
- Training
- Londonandanother venue.
- Bath
- 1 Day
... will also benefit from experience with Microsoft Exchange Server, Microsoft SQL Server, and Microsoft Internet Security and Acceleration (ISA) Server 2000. The students will be in an environment where they are responsible for aspects of security management and deployment associated with their...
- Training
- Londonandanother venue.
- Bath
- 1 Day
...After completing this course, students will be able to establish the business case for security; apply the Security Risk Management Discipline (SRMD); use multiple layers of defense; respond effectively to security incidents; implement best practices; discuss the 10 immutable laws of security...
- Training
- Londonandanother venue.
- Bath
- 1 Day
... security; understand how to plan for service-account security; explain how to secure. Suitable for: This course builds on existing knowledge of server and client security and provides students with the knowledge and skills to apply best practices to securing Exchange Server clients, protecting e-mail...