-
All
-
Online
-
Filters
Information security courses
-
Mostly self studying and alot of clubs and societies to get involved in. Do study as well.
← | →
- Bachelor's degree
- Hull
... have the option to study modules in: Artificial Intelligence; E-Commerce and E-Business; Information Systems; User Interface Design; Security; and Networking... Learn about: IT Management, Information Systems...
... have the option to study modules in: Artificial Intelligence; E-Commerce and E-Business; Information Systems; User Interface Design; Security; and Networking... Learn about: IT Management, Information Systems...
-
Mostly self studying and alot of clubs and societies to get involved in. Do study as well.
← | →
- Vocational qualification
- Online
- Different dates available
... and explaining computer components. Setting up a workstation, including conducting software installations. Establishing network connectivity. Identifying compatibility issues and identifying and preventing security risks. Managing the safety and preventative maintenance of computers. After completing... Learn about: Computer Engineering, Data security, Computer Systems...
- NVQ
- Online
- Different dates available
- 100h - 12 Months
... within an organisation How to protect data and information from security breaches Carry our risk assessments and understand how to deal with hazards... Learn about: Business Administration, Equality and Diversity, Team Training...
- Training
- Online
- Intermediate
- 20h - 4 Weeks
..., Performing the period end process, Using Credit Lines, Describing the Cash Management Integration, Performing Analysis in the Transaction Manager, Managing Securities and other exchange traded products, Gaining efficiency with the Trade Finance Process, FX Risk Management Process, Handling FX Deals... Learn about: Investment Management, Risk Management, Cash Management...
- Training
- Online
- Advanced
- 3h
... of private health information. More importantly I will show you how to limit those risks by simply taking proactive steps and utilizing best practices. Don't always believe what you read online about HIPAA, especially as it relates to encryption and IT, there are a lot of groups selling... Learn about: Federal Audit Process, Protected health information, Security rule...
- Vocational qualification
- Southport
- Different dates available
- 2 Years
...Which other courses link well with this subject? The Travel and Tourism Diploma will make up the bulk of your study time at KGV, however there may be opportunities... Learn about: Travel management, Transport Management, Travel Tourism...
- Course
- Online
- Intermediate
- 40h - 5 Days
...The CISSP certification is currently one of the most popular certification in the field of information security. This CISSP CBKv4 course trains you to become a broadly-skilled information security specialist. Upon completion of the course, you will have a solid knowledge of the 8 CISSP domains... Learn about: Security Operations, Asset Security, Security Manager...
- Course
- (Ntb)
- Intermediate
- 5 Days
...The CISSP certification is currently one of the most popular certification in the field of information security. This CISSP CBKv4 course trains you to become a broadly-skilled information security specialist. Upon completion of the course, you will have a solid knowledge of the 8 CISSP domains... Learn about: Security Assessment and Testing, Communications and Network Security, Security Engineering...
- Course
- London
- Different dates available
... and profiles are defined, how to navigate the GRC Platform, how to work with records and design topics. They will learn about using AFCON, configuring the home page, defining views, configuring field dependencies and dependent picklists, and setting record level security... Learn about: IT Security, Team Training...
- Course
- London
- Different dates available
... procedure query subjects Identify the effects on generated SQL when modifying query subjects, SQL settings and relationships Set Security in Framework Manager... Learn about: IT Security...
- Bachelor's degree
- Blended in Londonand4 other venues
- London, Birmingham, Manchester
- 3 Years
...Module Details Level 4 Professional Development Computer Systems Security Information Systems in Organisations Plus 3 modules from your chosen... Learn about: Systems Security I, Information Systems, Computer Systems...
- Course
- London
- Different dates available
... PowerPlay cubes and reports in IBM Cognos Administration Secure IBM Cognos 8 BI PowerPlay using the IBM Cognos 8 security model... Learn about: IT Security...
-
Iam at SU and the infrastructure is amazingly designed to ease everyone. Nearby facilities, classes only few minutes away and much more. The best part of SU is that it is centrally located. Wifi is lightfast till now.
← | →
- Bachelor's degree
- Plymouth
- October
- 3 Years
..., alongside an essential background in wider IT topics. This is particularly important in light of the national Cyber Security Strategy and the current shortage of related skills in the marketplace. You will enhance your knowledge of a variety of computing disciplines, including analysis and design... Learn about: Web Development, Object-oriented training, Object oriented training...
..., alongside an essential background in wider IT topics. This is particularly important in light of the national Cyber Security Strategy and the current shortage of related skills in the marketplace. You will enhance your knowledge of a variety of computing disciplines, including analysis and design... Learn about: Web Development, Object-oriented training, Object oriented training...
-
Iam at SU and the infrastructure is amazingly designed to ease everyone. Nearby facilities, classes only few minutes away and much more. The best part of SU is that it is centrally located. Wifi is lightfast till now.
← | →
- Course
- London
- Different dates available
... online course and includes hands-on remote labs. The average amount of time to complete this course is 16 hours. Once you receive your access information, you will have 30 days to complete this course and its labs.This course is designed to provide the database application designer with knowledge... Learn about: Basic IT, IT Development, IT Security...
- Course
- (Wembley Park)
- 5 Days
... after security recognized accreditation...
-
Really enjoyed this learning experience, so interesting.Everything straight forward, excellent tutor who is very helpful and supportive with clear, fair and speedy feedback.
← | →
- Course
- Online
- Different dates available
... infrastructure. This certification gives students the opportunity to demonstrate their level of competence with the various domains of the compendium of best practices for information security. Successful completion of the CISSP certification validates your experience, skills and commitment as an information... Learn about: Information Security, IT Security, Information Systems...
... infrastructure. This certification gives students the opportunity to demonstrate their level of competence with the various domains of the compendium of best practices for information security. Successful completion of the CISSP certification validates your experience, skills and commitment as an information... Learn about: Information Security, IT Security, Information Systems...
-
Really enjoyed this learning experience, so interesting.Everything straight forward, excellent tutor who is very helpful and supportive with clear, fair and speedy feedback.
← | →
- Master
- Oslo (Norway)
- Different dates available
- 2 Years
...The master's programme will provide deeper insight into how computers work and how they can be used to solve problems. Information technology is an aid in many fields such as medicine, biotechnology, law, culture and learning. Your master's will focuse on one of these fields. The programme covers... Learn about: Scientific work, Multimedia systems, Information Systems...
- Master
- Adelaide (Australia)
- Different dates available
... Security (3 units)*^ COMP SCI 7091 Commercialising IT Research (3 units) COMP SCI 7022 Computer Vision (3 units) COMP SCI 7023 Software Process Improvement... Learn about: Full Time, IT Security...
- Course
- London
- Different dates available
... procedure query subjects Identify the effects on generated SQL when modifying query subjects, SQL settings and relationships Set Security in Framework Manager... Learn about: IT Security...
- Course
- Online
- Intermediate
- 12h - 1 Year
... services, and IT security roles. Ideal for those looking to develop critical problem-solving skills, the course also emphasises responsible and ethical approaches to digital finance management. SEO keywords such as credit card recovery, debit card security, fraud prevention, cybersecurity skills... Learn about: Credit Management, Debit Credit, Credit Protection...