-
All
-
Online
-
Filters
Information security courses
- Master
- London
... and postgraduate students. It covers military, naval, diplomatic and imperial history, international relations, defence and regional security policy studies... Learn about: Security Policy, English Language, Military history...
- Course
- Distance Learning
...This volume delivers a comprehensive overview of database and applications security for technical managers, technologists, and executives, as well as for those intending to pursue research in the field. It provides a high-level overview while discussing many technical details... Learn about: Data Management...
- Bachelor's degree
- Lancaster
- Different dates available
- 3 Years
... Computing Society (BCS) and the Institute of Engineering and Technology (IET). Based around our dedicated Software Engineering Design Studio, your first year will provide you with the fundamentals of computer science, software development, and digital and information systems, allowing you to... Learn about: Operating Systems, Distributed systems, Information Systems...
- Course
- London-city
... who support medium to large enterprises and have fundamental knowledge and experience in networking with Windows Server Audience Profile This course is intended for Information Technology (IT) professionals who have some networking knowledge and experience and are looking for a single course that will further... Learn about: Windows Server, Network security, Network Training...
- Short course
- Online
- Different dates available
- 365 Days
... and expertise and it will give your CV a boost and increase your marketability. The Information System and Security Course Bundle are comprehensively designed to cover extensively on cyber attacks and security. The course will cover essential principles of network security and risk management, how to defeat... Learn about: Network Training, IT risk, Cyber Security Analyst...
- Course
- Online
- Intermediate
- Different dates available
- 32h - 12 Months
...Hudson have partnered with Mile2 as an Authorized Training Center to offer the Certified Information Systems Security Manager (CISSM) course. Mile2 designs, develops, and delivers Information Security training and Information Assurance services that meet military, government, private sector... Learn about: Security Manager, Security Incident Management, Information Systems...
- Training
- Amsterdam (Netherlands)
- Intermediate
- 5 Days
...5-day training to become a Certified Chief Information Security Officer (C/CISO). C/CISO is the first and only certification in the world for CISOs and aspiring CISOs!... Learn about: Key Performance Indicators, Security Officer, Information Security...
- Course
- Online
...This is the downloadable version of the book which is designed to help companies understand this developing law of information security, the obligations it imposes on them, and the standard for corporate compliance that appears to be developing worldwide. Available for ORDER...
- Course
- Distance Learning
...This book provides a pragmatic approach to evaluating security at a company and putting together an effective information security program...
- Course
- Distance Learning
...This book is designed to help companies understand this developing law of information security, the obligations it imposes on them, and the standard for corporate compliance that appears to be developing worldwide. Available for ORDER...
- Short course
- Inhouse
- 1 Day
...Suitable for: Managers involved in the implementation and management of an information security management system Quality managers or internal auditors planning to complete other Information Security Management Systems training...
- Master
- Online
- Different dates available
... course provides a solid basis so that the student can continue his/her academic studies at doctoral level. After the one-year course, the student will have theoretical and practical knowledge and the ability to create strategies to ensure computer security and to implement policies and design solutions... Learn about: Database security, Digital identity, Technical audit...
- Bachelor's degree
- Lancaster
- Different dates available
- 4 Years
... of Computer Science Information Systems Software Development Optional Creative Technology Fundamentals of Communication Systems Year 2 Core Advanced Programming... Learn about: Communication systems, Digital Systems, Information Systems...
- Vocational qualification
- Online
- Different dates available
...Master information systems security and get on your way to earning a globally recognised qualification which is seen as a benchmark in the industry with this Certified Information System Security Professional (CISSP) course... Learn about: Information Systems, Software Engineering, Information Systems management...
- Vocational qualification
- Online
- Different dates available
...Master information systems security and get on your way to earning a globally recognised qualification which is seen as a benchmark in the industry with this Certified Information System Security Professional (CISSP) course... Learn about: Criminal law, Information Systems, Information Systems management...
- Vocational qualification
- Online
- Different dates available
...Master information systems security and get on your way to earning a globally recognised qualification which is seen as a benchmark in the industry with this Certified Information System Security Professional (CISSP) course... Learn about: Criminal law, Software Engineering, Information Systems management...
- Vocational qualification
- Online
- Different dates available
...Master information systems security and get on your way to earning a globally recognised qualification which is seen as a benchmark in the industry with this Certified Information System Security Professional (CISSP) course... Learn about: Information Systems, Software Engineering, Information Management System...
- Course
- Distance Learning
...The book illustrates how policies and procedures support the efficient running of an organization. This volume points out how security documents and standards are key elements in the business process, but should never be undertaken to satisfy a perceived audit or security requirement...
- Course
- Distance Learning
...Up-to-date quick reference to the knowledge, skills, techniques and tools required by all information security professionals. Includes in-depth coverage of the (ISC)2's Common Body of Knowledge...
- Course
- Distance Learning
... and increasingly threatening range of information security risks - risks which can, if unmitigated, lead to severe financial, regulatory and reputation damage...