-
All
-
Online
-
Filters
Information security courses
- Master
- Huddersfield
- 2 Years
... of the topics, the supervisor, funding information and eligibility criteria: Induction of Intelligent and Interpretable Systems for Clinical Decision Support... Learn about: Computer Programming, Science and Informatic, Computer Aided Design...
- Course
- Blended
- Advanced
- Different dates available
- 18 Months
...This is an 18 month programme and all elements must be completed in order to achieve an Apprenticeship in Health & Social Care. Listed below are some of the areas within Health & Social Care covered within this framework: 1). Maintaining health, safety & security in the workplace 2). Reflecting... Learn about: Health and Social Care, Health and Safety Law, Safety & Security...
- Course
- London-city
... portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management and business. Active cyber resilience is achieved through people, process and technology. Target Audience IT Service Management, Business analysts, IT Architects, IT Project... Learn about: IT risk, Risk Management, Service Management...
- Master
- Maynard (USA)
- Different dates available
... of surface transportation systems through advanced technologies in information systems, communications, and sensors. In the United States, ITS represents the major post-Interstate-era program for advancing surface transportation in highways and public transportation, and is potentially comparable to the... Learn about: Vehicle Design, Political Science, Information Systems...
- Master
- Huddersfield
- 1 Year
... of heterogeneous security data to identify potential irregularities Research Enviroment We provide a supportive and vibrant research environment for postgraduate... Learn about: Procedure Planning, Digital Investigation, Medical notes...
- Course
- Online
- Intermediate
- Different dates available
- 1 Year
...Ethical Hacking is one of the most popular career choices within Cyber Security. Considered to be experiencing a skills gap, there are more jobs available than certified candidates to fill them. This, high basic salaries and good career prospects, make Ethical Hacking an excellent career choice... Learn about: Security Devices, Ethical Hacking, Linux Fundamentals...
- Master
- Vilnius (Lithuania)
- September
- 2 Years
... and scientific point of view on modern information security insurance methods and technologies, developing original and critical thinking, managerial, research and innovation skills. It has a length of 2 years (4 semesters); graduation is finalized with the defense of Final project. To this programme, applicants... Learn about: Security Mechanisms, Information technology, Information Systems management...
- Master
- Brisbane (Australia)
- 1 Year
... honours degree in computer science or information technology (or a related field) – see Program Details for more information on entry requirements. Complete your choice of courses that cover topics from computer science, software engineering, information systems, communication systems, interaction design... Learn about: Software Engineering, Information Systems, Communication Training...
- Master
- Lancaster
- Different dates available
- 4 Years
... partners in industry. Based around our dedicated Software Engineering Design Studio, your first year will provide you with the fundamentals of computer science, software development, and digital and information systems, allowing you to gain the essential knowledge needed for analysis and design... Learn about: Computer Science, Information Systems, Digital Systems...
- Course
- Distance Learning
...This book describes in detail every one of the eight Information Security Architecture (ISA) components. The book also outlines how to establish an effective plan to implement each piece of the ISA within an organization...
- Course
- Distance Learning
...This book provides guidance on standard policy, requirements and methodology for information security incident response and management...
- Training
- Wembley
...HA9CISM is the most prestigious global qualification available for information security managers today - and the fastest growing with nearly six thousand certifications since being introduced in 2002...
- Course
- London
- Different dates available
...Training Course Content View information Edit information Structure information Get Word documents into Rational DOORS Generate requirements... Learn about: Basic IT, Basic IT training...
- Course
- London
- 3 Days
... up items and assets Lesson 3: Entering assets information Unit 4: Purchasing Lesson 1: Procurement process and setup overview Lesson 2: Requisitioning Lesson... Learn about: IT Management, Asset Management...
- Course
- Online
... information. How to make your claim for PMI PDU’s Use the PMI’s Continuing Certification Requirements System (CCRS) website at https://ccrs.pmi.org/ to register... Learn about: Project Management, IT Project Management, IT Management...
- Postgraduate
- London
- 1 Year
...The threat of cyber security attacks is increasingly apparent to individuals and organisations across the globe. From hacking to phishing, scamming to grooming, and botnets to cyber-terrorism, the variety and ingenuity of exploits appear to expand constantly. In this context, this programme... Learn about: Digital Forensics, Computer Security, IT & Internet Law...
- Course
- Online
- Intermediate
- Different dates available
- 15h
... this Certified Information Security Manager (CISM) Professional Training Diploma course. In this course, you’ll equip yourself with the knowledge and proficiency to prepare for the globally recognized CISM certification exam. Overall, this intensive course recognizes the individual who controls, designs... Learn about: Security Manager, IT risk, Strategy Development...
- Course
- Online
- Different dates available
... and increasingly threatening range of information security risks - risks which can, if unmitigated, lead to severe financial, regulatory and reputation damage... Learn about: Risk Assessment, IT Security, Risk Management...
- NVQ
- Blended
...Give customers a positive impression of yourself and your organisation, contribute to the effectiveness of teams, promote, monitor and maintain health, safety and security in the workplace. Suitable for: Hospital support staff: porters administrators...
- Course
- London
...Aimed at seasoned security professionals, this course surveys the entire information security landscape and the technologies involved. The course addresses the ten knowledge domains that comprise the Common Body of Knowledge (CBK) for information systems security professionals and prepares... Learn about: Information Systems, Security Management, IT Security...