-
All
-
Online
-
Filters
Information security courses
- Bachelor's degree
- High Wycombe
- 3 Years
...Data science can be described, in simple terms, as the study of data. Data scientists are in high demand because they can interrogate data and use analytics to find patterns, trends and relationships in data sets. This information can then be used in everything from predicting consumer behaviour... Learn about: Data Management, Information Security, Computer Architectures...
- Training
- London
- Beginner
- 3 Days
... Implementation of an information security risk management program Understanding an organization and its context Risk identification and risk analysis... Learn about: ISO 27005, Risk Assessment, ISO Audit...
- Bachelor's degree
- High Wycombe
- 4 Years
... strengths and development needs for progression onto an undergraduate degree. Data science can be described, in simple terms, as the study of data. Data scientists are in high demand because they can interrogate data and use analytics to find patterns, trends and relationships in data sets. This information... Learn about: Information Security, Data Management, Computer Architectures...
- Course
- London
- Different dates available
.... The course covers configuring a z/OS queue manager, setting up distributed queuing, IBM MQ clustering, IBM MQ on z/OS recovery and restart, security, and performance considerations. It also covers day-to-day administration and problem recovery. The hands-on lab exercises give you direct experience with IBM MQ... Learn about: IT Security...
- Course
- Online
- Intermediate
- 32h - 8 Days
... is not included . The course includes: ISC2 official CBK trainings guide Security Academy CCSP courseware The CCSP exam is optional. If you want to do the exam... Learn about: Governance and Management of IT, Development and Implementation, Protection of Information Assets...
- Course
- (Ntb)
- Intermediate
- 4 Days
... is not included . The course includes: ISC2 official CBK trainings guide Security Academy CCSP courseware The CCSP exam is optional. If you want to do the exam... Learn about: Security Officer, Information Systems Acquisition, Protection of Information Assets...
- Course
- London
- Different dates available
... and other system components as required, configuring object stores and file systems for storing documents, and implementing system security and access control structures.In addition, this course is for those whose job responsibility is to build or implement a business solution using the tools provided with an... Learn about: IT Security...
- Course
- London
- Different dates available
... learn how to install, deploy, and administer WebSphere Service Registry and Repository environments. You also learn how to troubleshoot and configure role-based security on WebSphere Service Registry and Repository.The lab environment for this course uses the Microsoft Windows platform.For information... Learn about: IT Security...
- Course
- London
- Different dates available
... failure. Observe security restrictions. Change direct security of a document. Change the owner of a document. Customize document access. Configure security... Learn about: IT Security...
- Course
- London
- 3 Days
... and monitoring administration GUIs Configuring query history Backup and restore Security including authenticating users with LDAP... Learn about: IT Security, IT Management...
- Course
- London
- Different dates available
..., and governed. In this course, you learn how to install, deploy, and administer WebSphere Service Registry and Repository environments. You also learn how to troubleshoot and configure role-based security on WebSphere Service Registry and Repository. The lab environment for this course uses the Windows platform... Learn about: IT Security...
- Training
- Online
- Intermediate
- Different dates available
...ISO/IEC 27001 is an international standard for Information Security Management. ISO27001 provides a model to establish, implement, maintain and continually improve a risk-managed ISMS (Information Security Management System)... Learn about: IT risk, Risk Management, Security Management...
- Training
- Online
- Intermediate
- Different dates available
... and data protection by design are covered. Data security in addition to incident response are important areas. Compliance has been a big driver for... Learn about: Party risk, Business Risk, Data security...
- Training
- Online
- Intermediate
- Different dates available
...ISO/IEC 27001 is an international standard for Information Security Management. ISO27001 provides a model to establish, implement, maintain and continually improve a risk-managed ISMS (Information Security Management System)... Learn about: Data security, Security and risk, Security Management...
- Course
- London
- Different dates available
... management features, and contract standards administration.This course also explores concepts such as security lists, notifications, approvals, quotes, and process schedules in the Emptoris Contract Management system.This course provides recorded demonstrations along with the informational content... Learn about: IT Management, IT Security...
- Course
- London
- Different dates available
...Advanced Junos Enterprise Switching Troubleshooting Training CourseThis one-day course is designed to provide students with information about troubleshooting spanning tree protocols, Q-in-Q tunneling, port security features, multicast, and class of service (CoS). Students will gain experience... Learn about: IT Security...
- Course
- London
- Different dates available
- 3 Days
...With IBM Tivoli Monitoring, users can manage their systems graphically, dynamically, and flexibly. A browser-enabled interface helps transform systems management data into information you need to keep systems available. In this course, you learn how to implement IBM Tivoli Monitoring version... Learn about: Service Management, IT Security, IT Management...
- Training
- London
- Beginner
- 5 Days
...technical techniques and management skills. The course has been designed by Industry experts with in-depth experience in the Penetration Testing fields... Learn about: Information Systems, Systems Security, PCI DSS...
- Course
- London
- Different dates available
... security model Authentication methods Security model and framework Groups and users Unit 7: Device management What is modeling? Intelligent configuration... Learn about: IT Management, Quality Training, IT Security...
- Course
- London
- Different dates available
...IBM Tivoli Monitoring 6.3 for Implementers (SPVC) Training CourseWith IBM Tivoli Monitoring, users can manage their systems graphically, dynamically, and flexibly. A browser-enabled interface helps transform systems management data into information you need to keep systems available... Learn about: IT Management, Service Management, IT Security...