-
All
-
Online
-
Filters
Information security courses
- Master
- Oslo (Norway)
- Different dates available
- 2 Years
... system development, programming, data communication, distributed systems and information security. With a master's degree in Informatics: programming and system architecture, you understand the whole of such systems and the theories they are based... Learn about: Information Security, Programming and System, Distributed systems...
- Bachelor's degree
- High Wycombe
- 3 Years
...Data science can be described, in simple terms, as the study of data. Data scientists are in high demand because they can interrogate data and use analytics to find patterns, trends and relationships in data sets. This information can then be used in everything from predicting consumer behaviour... Learn about: Information Security, Data Management, Computer Architectures...
- Training
- London
- Beginner
- 3 Days
... Implementation of an information security risk management program Understanding an organization and its context Risk identification and risk analysis... Learn about: ISO Audit, ISO 27005, Risk Assessment...
- Bachelor's degree
- High Wycombe
- 4 Years
... strengths and development needs for progression onto an undergraduate degree. Data science can be described, in simple terms, as the study of data. Data scientists are in high demand because they can interrogate data and use analytics to find patterns, trends and relationships in data sets. This information... Learn about: Information Security, Data Management, Computer Architectures...
- Course
- Online
- Intermediate
- Different dates available
- 1 Year
...KEY LEARNING POINTS The course will prepare you with all forms of information in a legal and moral manner, furthermore, equipping you with business... Learn about: Information Systems management, Business Finance, Information Visualisation...
- Training
- Online
- Intermediate
- Different dates available
...ISO/IEC 27001 is an international standard for Information Security Management. ISO27001 provides a model to establish, implement, maintain and continually improve a risk-managed ISMS (Information Security Management System)... Learn about: Security and risk, IT risk, IEC 27001...
- Training
- Online
- Intermediate
- Different dates available
...ISO/IEC 27001 is an international standard for Information Security Management. ISO27001 provides a model to establish, implement, maintain and continually improve a risk-managed ISMS (Information Security Management System)... Learn about: Security Management, Data security, Risk Management...
- Course
- London
- Different dates available
.... The course covers configuring a z/OS queue manager, setting up distributed queuing, IBM MQ clustering, IBM MQ on z/OS recovery and restart, security, and performance considerations. It also covers day-to-day administration and problem recovery. The hands-on lab exercises give you direct experience with IBM MQ... Learn about: IT Security...
- Course
- Online
- Intermediate
- 32h - 8 Days
... is not included . The course includes: ISC2 official CBK trainings guide Security Academy CCSP courseware The CCSP exam is optional. If you want to do the exam... Learn about: Governance and Management of IT, Information Systems Acquisition, Development and Implementation...
- Course
- (Ntb)
- Intermediate
- 4 Days
... is not included . The course includes: ISC2 official CBK trainings guide Security Academy CCSP courseware The CCSP exam is optional. If you want to do the exam... Learn about: Process of auditing information systems, Development and Implementation, Protection of Information Assets...
- Course
- London
- Different dates available
... and other system components as required, configuring object stores and file systems for storing documents, and implementing system security and access control structures.In addition, this course is for those whose job responsibility is to build or implement a business solution using the tools provided with an... Learn about: IT Security...
- Course
- London
- Different dates available
... learn how to install, deploy, and administer WebSphere Service Registry and Repository environments. You also learn how to troubleshoot and configure role-based security on WebSphere Service Registry and Repository.The lab environment for this course uses the Microsoft Windows platform.For information... Learn about: IT Security...
- Training
- London
- Beginner
- 5 Days
...technical techniques and management skills. The course has been designed by Industry experts with in-depth experience in the Penetration Testing fields... Learn about: Risk Assessment, Systems Security, Security Management...
- Course
- London
- Different dates available
... failure. Observe security restrictions. Change direct security of a document. Change the owner of a document. Customize document access. Configure security... Learn about: IT Security...
- Postgraduate
- Online
- Different dates available
- 1 Year
... of Security Issues of Privacy Technical Issues in Cyber Contracts IV. Types of Electronic Contracts Employment Contracts Consultant Agreements Contractor... Learn about: World Law, Cyber Law, IT Law...
- Course
- (Wembley Park)
- 3 Days
... and the obligations of the IT and Security department. Suitable for: This course is recommended for all managers and professionals who need to understand and speak the specialized language of Sarbanes Oxley, SOX compliance. This course is highly recommended for: IT and Information Security Managers and Professionals...
- Course
- London
- 3 Days
... and monitoring administration GUIs Configuring query history Backup and restore Security including authenticating users with LDAP... Learn about: IT Management, IT Security...
- Course
- London
- Different dates available
..., and governed. In this course, you learn how to install, deploy, and administer WebSphere Service Registry and Repository environments. You also learn how to troubleshoot and configure role-based security on WebSphere Service Registry and Repository. The lab environment for this course uses the Windows platform... Learn about: IT Security...
- Training
- Online
- Intermediate
- Different dates available
... and data protection by design are covered. Data security in addition to incident response are important areas. Compliance has been a big driver for... Learn about: Business Risk, Data security, Business policies...
- Course
- Online
- Intermediate
- Different dates available
... – enterprise, web, core clinical HI203-07 Networks and Communications HI203-08 Systems Security HI203-09 Information Privacy HI203-10 Standards in Health... Learn about: Information Privacy, Information in the Healthcare Setting, Systems Implementation and User Support...