-
All
-
Online
-
Filters
Information security courses
- Master
- Huddersfield
- 2 Years
... of the topics, the supervisor, funding information and eligibility criteria: Induction of Intelligent and Interpretable Systems for Clinical Decision Support... Learn about: Computer Architecture, Computer Aided Design, Computer Science and Informatics...
- Course
- Blended
- Advanced
- Different dates available
- 18 Months
...This is an 18 month programme and all elements must be completed in order to achieve an Apprenticeship in Health & Social Care. Listed below are some of the areas within Health & Social Care covered within this framework: 1). Maintaining health, safety & security in the workplace 2). Reflecting... Learn about: Health and Social Care, Safety & Security, Planning and reviews...
- Course
- London-city
...AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice... Learn about: IT risk, Best Practice, Service Management...
- Master
- Maynard (USA)
- Different dates available
... of surface transportation systems through advanced technologies in information systems, communications, and sensors. In the United States, ITS represents the major post-Interstate-era program for advancing surface transportation in highways and public transportation, and is potentially comparable to the... Learn about: Political Science, Vehicle Design, Information Systems...
- Master
- Huddersfield
- 1 Year
... of the topics, the supervisor, funding information and eligibility criteria: Algorithms for rapid hypothesis suggestion during digital investigations Augmented... Learn about: Procedure Planning, Medical notes, Digital Investigation...
- Course
- Online
- Intermediate
- Different dates available
- 1 Year
...Ethical Hacking is one of the most popular career choices within Cyber Security. Considered to be experiencing a skills gap, there are more jobs available than certified candidates to fill them. This, high basic salaries and good career prospects, make Ethical Hacking an excellent career choice... Learn about: Ethical Hacking, Security Devices, Linux Fundamentals...
- Master
- Vilnius (Lithuania)
- September
- 2 Years
... and scientific point of view on modern information security insurance methods and technologies, developing original and critical thinking, managerial, research and innovation skills. It has a length of 2 years (4 semesters); graduation is finalized with the defense of Final project. To this programme, applicants... Learn about: Performance Management, Information Systems management, Information Technology Security...
- Master
- Brisbane (Australia)
- 1 Year
... honours degree in computer science or information technology (or a related field) – see Program Details for more information on entry requirements. Complete your choice of courses that cover topics from computer science, software engineering, information systems, communication systems, interaction design... Learn about: Software Engineering, Communication Training, Information Systems...
- Master
- Lancaster
- Different dates available
- 4 Years
... partners in industry. Based around our dedicated Software Engineering Design Studio, your first year will provide you with the fundamentals of computer science, software development, and digital and information systems, allowing you to gain the essential knowledge needed for analysis and design... Learn about: Computer Science, Information Systems, Digital Systems...
- Course
- Distance Learning
...This book describes in detail every one of the eight Information Security Architecture (ISA) components. The book also outlines how to establish an effective plan to implement each piece of the ISA within an organization...
- Course
- Distance Learning
...This book provides guidance on standard policy, requirements and methodology for information security incident response and management...
- Training
- Wembley
...HA9CISM is the most prestigious global qualification available for information security managers today - and the fastest growing with nearly six thousand certifications since being introduced in 2002...
- Course
- London
- Different dates available
...Training Course Content View information Edit information Structure information Get Word documents into Rational DOORS Generate requirements... Learn about: Basic IT training, Basic IT...
- Course
- London
- 3 Days
... up items and assets Lesson 3: Entering assets information Unit 4: Purchasing Lesson 1: Procurement process and setup overview Lesson 2: Requisitioning Lesson... Learn about: IT Management, Asset Management...
- Course
- Online
... information. How to make your claim for PMI PDU’s Use the PMI’s Continuing Certification Requirements System (CCRS) website at https://ccrs.pmi.org/ to register... Learn about: IT Management, Project Management, IT Project Management...
- Postgraduate
- London
- 1 Year
...The threat of cyber security attacks is increasingly apparent to individuals and organisations across the globe. From hacking to phishing, scamming to grooming, and botnets to cyber-terrorism, the variety and ingenuity of exploits appear to expand constantly. In this context, this programme... Learn about: Security Management, IT & Internet Law, Digital Forensics...
- Course
- Online
- Intermediate
- Different dates available
- 15h
... this Certified Information Security Manager (CISM) Professional Training Diploma course. In this course, you’ll equip yourself with the knowledge and proficiency to prepare for the globally recognized CISM certification exam. Overall, this intensive course recognizes the individual who controls, designs... Learn about: Security Awareness, Risk Management, Security Management...
- Course
- Online
- Different dates available
... and increasingly threatening range of information security risks - risks which can, if unmitigated, lead to severe financial, regulatory and reputation damage... Learn about: IT risk, Risk Assessment, Risk Management...
- NVQ
- Blended
...Give customers a positive impression of yourself and your organisation, contribute to the effectiveness of teams, promote, monitor and maintain health, safety and security in the workplace. Suitable for: Hospital support staff: porters administrators...
- Course
- London
...Aimed at seasoned security professionals, this course surveys the entire information security landscape and the technologies involved. The course addresses the ten knowledge domains that comprise the Common Body of Knowledge (CBK) for information systems security professionals and prepares... Learn about: Information Systems, Security Management, IT Security...