-
All
-
Online
-
Filters
Information security courses
- Master
- Oxford
...The programme offers short courses in more than 35 different subjects: from requirements engineering to object-oriented programming; from security principles to the management of risk and quality; from software engineering mathematics to database design. These courses may be used as credit towards... Learn about: Object oriented Programming, Database training, IT Security...
- Course
- Hammersmith and Fulham
- 2 Days
... to monitor: Connection information. Secure Gateway performance counters. Event Viewer activity related Secure Gateway. Configure CDAs (Content Delivery Agents...
- Course
- Middlebury (USA)
... ▹ CSCI 0461 - Computer Graphics ▹ CSCI 0465 - Information Visualization CSCI 0466 - Usable Mobile Interfaces CSCI 0467 - Generative Art ▲ CSCI 0500... Learn about: Problem Solving...
- Course
- London
- Different dates available
... on your hard drive. You will become confident in using Windows and also learn how to troubleshoot common computer problems. In addition, following on from recent events involving Facebook and data security, you will learn how to better protect your information and personal details and keep them secure...
- Course
- Distance Learning
... Information systems administrators Network administrators Network technicians Technical support specialists Microsoft MCSA Certification This course will guide...
- Course
- Distance Learning
... Devices Network Configuration Wide Area Networking Local Security Management Course Summary Glossary Part B (Exam 70-270) Introduction Security for Domain...
- Bachelor's degree
- High Wycombe
- 4 Years
... can take depends on the number of compulsory modules at each level. You can find more information about how your course is structured via the Academic Advice... Learn about: Airport Marketing, Airport Operations...
- A Level
- Barnet
...In total you will study 18 units - a number of core units including: *Computer Systems *Programming *Information Systems Plus a range of specialist...
- Bachelor's degree
- Islington
... embedded within a safety and security management process and often within a regulatory or licensing process that provides for independent challenge and review. Assurance cases can play a pivotal role in audits and reviews, as well as in incident management and investigation, where they can play a... Learn about: IT Security, IT risk, IT Management...
- Bachelor's degree
- Islington
... of two blocks as follows: Thursday: 5pm-9pm Friday: 9am-5pm Saturday: 9am-5pm The second block is delivered 6 weeks after the first block. This module is taken from the MSc in Management of Information Security and Risk. Course Information Start DateStart TimeDurationCostCourse CodeApply Teaching dates... Learn about: IT Development, IT risk, IT Management...
- Vocational qualification
- Newryand5 other venues
- Armagh, Lurgan, Banbridge, Portadown, Kilkeel
- Different dates available
- 6 Weeks
...This course is suitable for Social networking has encouraged new ways to communicate and share information. Social networking websites such as facebook and twitter are being used regularly by millions of people. This course will introduce you to the world of social networking, helping you to... Learn about: Internet Video, Internet Security, Advanced Internet...
- Course
- Online
... portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management and business. Active cyber resilience is achieved through people, process and technology. Target Audience IT Service Management, Business analysts, IT Architects, IT Project... Learn about: IT risk, Risk Management, Best Practice...
- Course
- London
- Different dates available
...Accelerate, Secure, and Integrate with IBM DataPower V7 Training CourseAn updated version of this course is available. For more information, click Accelerate, Secure and Integrate with IBM DataPower V7.1 (WE711G)This course teaches you the fundamental skills that are required to configure...
- Course
- London
- 5 Days
... switches • Configure virtual switch security, traffic-shaping and load-balancing policies • Compare vSphere distributed switches and standard switches...
- Course
- Online
... to build efficient queries, stored procedures and views that return key information quickly. How to combine datasets, rank results and extend tables... Learn about: MCSA training...
- Course
- Distance Learning
...The posters are designed to be used as part of a general information security education and awareness initiative inside security-conscious organisations and all organizations pursuing ISO27001 certification...
- Course
- Distance Learning
...No matter how many security products are implemented, the information in an organization is not completely secure unless the employees are trained in proper handling and usage and policies are enforced. ISO 17799, HIPAA, GLBA and other legislation all recognize the central role of employee security...
- Course
- Distance Learning
...Through the use of "real-world" examples, this introductory guide focuses on cryptography, access control, protocols, and software to examine the timely issue of information security...
- Course
- Distance Learning
...This volume explains how corporate culture affects perceptions of risk and information security, and how this in turn affects employee behaviour. It then provides a pragmatic approach for educating and training employees in information security...
- Course
- Distance Learning
...Recommended and endorsed by the Institute of Directors, this new book by Alan Calder explains to directors and managers the vital information security issues facing organizations of every type and size and helps them take control of a subject that is critical to their survival.List Price:£18.99...