-
All
-
Online
-
Filters
Information security courses
- Training
- Online
- Advanced
- 3h
... of private health information. More importantly I will show you how to limit those risks by simply taking proactive steps and utilizing best practices. Don't always believe what you read online about HIPAA, especially as it relates to encryption and IT, there are a lot of groups selling... Learn about: What is hipaa law, Federal Audit Process, Hipaa Text...
- Vocational qualification
- Southport
- Different dates available
- 2 Years
...Which other courses link well with this subject? The Travel and Tourism Diploma will make up the bulk of your study time at KGV, however there may be opportunities... Learn about: Tourism Industry, Tourism management, Transport Planning...
- Course
- Online
- Intermediate
- 40h - 5 Days
...The CISSP certification is currently one of the most popular certification in the field of information security. This CISSP CBKv4 course trains you to become a broadly-skilled information security specialist. Upon completion of the course, you will have a solid knowledge of the 8 CISSP domains... Learn about: Security Officer, Security Engineering, Security and Risk Management...
- Course
- (Ntb)
- Intermediate
- 5 Days
...The CISSP certification is currently one of the most popular certification in the field of information security. This CISSP CBKv4 course trains you to become a broadly-skilled information security specialist. Upon completion of the course, you will have a solid knowledge of the 8 CISSP domains... Learn about: Communications and Network Security, Security Manager, Security and Risk Management...
- Course
- (Ntb)
- Intermediate
- 5 Days
... are inadequate, and organizations must have competent and experienced professionals on board to successfully make use of the Cloud. These professionals must have the right knowledge and skills to ensure security of the Cloud. With recent developments in legislation and regulations - such as the Law Reporting... Learn about: Security Officer, Architectural Concepts & Design Requirements, Cloud Data Security...
-
Extremely well delivered by Rob over the 4 days. He provided the training with plenty of supporting materials.
← | →
- Course
- Cardiff
- Different dates available
- 4 Days
...The Knowledge Academy CISM Certified Information Security Manager 4 day course covers the following topics: Introduction This 4-day... Learn about: Security Management, Information Systems, IT risk...
...The Knowledge Academy CISM Certified Information Security Manager 4 day course covers the following topics: Introduction This 4-day... Learn about: Security Management, Information Systems, IT risk...
-
Extremely well delivered by Rob over the 4 days. He provided the training with plenty of supporting materials.
← | →
- Bachelor's degree
- Blended in Londonand4 other venues
- London, Birmingham, Manchester
- 3 Years
...Module Details Level 4 Professional Development Computer Systems Security Information Systems in Organisations Plus 3 modules from your chosen... Learn about: Systems Security I, Information Systems, Professional development...
-
Iam at SU and the infrastructure is amazingly designed to ease everyone. Nearby facilities, classes only few minutes away and much more. The best part of SU is that it is centrally located. Wifi is lightfast till now.
← | →
- Bachelor's degree
- Plymouth
- October
- 3 Years
..., alongside an essential background in wider IT topics. This is particularly important in light of the national Cyber Security Strategy and the current shortage of related skills in the marketplace. You will enhance your knowledge of a variety of computing disciplines, including analysis and design... Learn about: Object oriented training, Web Development, Object-oriented training...
..., alongside an essential background in wider IT topics. This is particularly important in light of the national Cyber Security Strategy and the current shortage of related skills in the marketplace. You will enhance your knowledge of a variety of computing disciplines, including analysis and design... Learn about: Object oriented training, Web Development, Object-oriented training...
-
Iam at SU and the infrastructure is amazingly designed to ease everyone. Nearby facilities, classes only few minutes away and much more. The best part of SU is that it is centrally located. Wifi is lightfast till now.
← | →
- Course
- (Wembley Park)
- 5 Days
... after security recognized accreditation...
- Short course
- (Ntb)
- Beginner
- 2 Days
... norms that clients around the world currently demand. With this qualification, you will be internationally recognized as a security professional who is able to implement an information security management system conforming to the ISO27001:2013 standard, thus increasing both your and your organisation’s... Learn about: Security Management, Security Manager, ISO 27001 2013...
- Short course
- Online
- Beginner
- 4 Days
... norms that clients around the world currently demand. With this qualification, you will be internationally recognized as a security professional who is able to implement an information security management system conforming to the ISO27001:2013 standard, thus increasing both your and your organisation’s... Learn about: ISO 27002, Security Officer, ISO 27001...
- Master
- Online
- Different dates available
- 2 Years
... for those managing information technology, especially the information systems development process. The MSIT degree is functionally equivalent to a Master of Information Systems Management, which is one of several specialized master's degree programs recognized by the Association to Advance Collegiate... Learn about: Computer Science, IT Development, Network Training...
- Master
- Oslo (Norway)
- Different dates available
- 2 Years
...The master's programme will provide deeper insight into how computers work and how they can be used to solve problems. Information technology is an aid in many fields such as medicine, biotechnology, law, culture and learning. Your master's will focuse on one of these fields. The programme covers... Learn about: Scientific work, Distributed systems, Multimedia systems...
- Course
- Online
- Intermediate
- 12h - 1 Year
... services, and IT security roles. Ideal for those looking to develop critical problem-solving skills, the course also emphasises responsible and ethical approaches to digital finance management. SEO keywords such as credit card recovery, debit card security, fraud prevention, cybersecurity skills... Learn about: Credit Protection, Debit Credit, Financial Training...
-
Excellent course. I'll continue using Oxford Applied Traning platform.Overall I found the course well worth the time and effort to help guide me in order to get the certificate. Thanks.
← | →
- Training
- Online
- Beginner
- Different dates available
- 13h
...The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, oversees, and assesses an enterprise’s information security... Learn about: Program Development, Risk Management, Program Implementation...
...The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, oversees, and assesses an enterprise’s information security... Learn about: Program Development, Risk Management, Program Implementation...
-
Excellent course. I'll continue using Oxford Applied Traning platform.Overall I found the course well worth the time and effort to help guide me in order to get the certificate. Thanks.
← | →
- Course
- (Wembley Park)
- 5 Days
... for: The course is designed for people who have a good understanding of ISO 27001 and ISO 17799: 2005 Information security management systems also staff tasked with the implementation and management of a ISO 27001: 2005 Information security management system and Information security consultants...
- Course
- (Wembley Park)
- 5 Days
...IT professionals will learn the best firewall practices to safeguard their networks. Suitable for: This course is for those IT professionals who want to master network security...
-
The tutors were always reachable and ready to solve any question. They made the process as easy as possible and I would not hesitate to recommend this centre to anyone.
← | →
-
I discovered the support provided by you to be perfect. You have given me as committed. I have suggested you to my pals and fellow workers.
← | →
-
I think ITonline learning is quite skillful, supportive, and affable company.
← | →
- Course
- Online
- Advanced
- Different dates available
- 12 Months
... the ever increasing job demand. In an article by Computer World, reports showed the demand for cyber security professionals over the past five years grew 3.5 times faster than demand for any other IT jobs. Course Accreditation The Certified Information Systems Security Professional (CISSP®) certification... Learn about: Systems testing, Network analysis, Network Management...
... the ever increasing job demand. In an article by Computer World, reports showed the demand for cyber security professionals over the past five years grew 3.5 times faster than demand for any other IT jobs. Course Accreditation The Certified Information Systems Security Professional (CISSP®) certification... Learn about: Systems testing, Network analysis, Network Management...
-
The tutors were always reachable and ready to solve any question. They made the process as easy as possible and I would not hesitate to recommend this centre to anyone.
← | → see all
-
I discovered the support provided by you to be perfect. You have given me as committed. I have suggested you to my pals and fellow workers.
← | → see all
-
I think ITonline learning is quite skillful, supportive, and affable company.
← | → see all
- Bachelor's degree
- Southport (Australia)
.... Professional recognition The Accounting majors are accredited by Chartered Accountants of Australia and New Zealand (CA) and CPA Australia. Students may apply for membership of the Institute of Public Accountants. The Finance major is aligned with the Australian Securities and Investments Commission (ASIC)... Learn about: Information Systems, Resource Management, International Business...
- Master
- Ormskirk
- 1 Year
... (20 credits) CIS4011 Mobile Applications (20 credits) CIS4101 Information Security Management (20 credits) CIS4102 IT Strategy and Management... Learn about: Wireless Communications, Research Project, Mobile Applications...