-
All
-
Online
-
Filters
Information security courses
- Course
- Online
- Different dates available
... as the date of completion. You can print this out or save it digitally to showcase your accomplishment. Course Outline Lesson 1 Information Security Governance... Learn about: Risk Management, Security Management, IT risk...
- Bachelor's degree
- Islington
... Security and Risk. Course Information Start DateStart TimeDurationCostCourse CodeApply Thursday 29 January 2015 Thursday 17:00-21:00; Friday 9:00-17:00; Saturday 9:00-17:00 Two blocks comprising Thursday evening, Friday & Saturday all day £1,500.00 (Home/EU students); £1,500.00 (Non-EU) INM415 Apply Now... Learn about: IT Management, IT risk, IT Security...
- Bachelor's degree
- Islington
... about resilience and security in more complex situations. The module will be delivered in block mode consisting of two blocks: Thursday: 5pm-9pm Friday: 9am-5pm Saturday: 9am-5pm The second block is delivered 6 weeks after the first block. This module is taken from the MSc in Management of Information Security... Learn about: Basic IT training, IT Security, IT risk...
- Bachelor's degree
- Islington
... below. The second block is delivered 6 weeks after the first block. This module is taken from the MSc in Management of Information Security and Risk. Course Information Start DateStart TimeDurationCostCourse CodeApply Teaching dates are provisionally set for October-November 2015. Thursday 17:00-21:00... Learn about: Basic IT, IT risk, Basic IT training...
- Master
- Online
- Different dates available
... course provides a solid basis so that the student can continue his/her academic studies at doctoral level. After the one-year course, the student will have theoretical and practical knowledge and the ability to create strategies to ensure computer security and to implement policies and design solutions... Learn about: Forensic analysis, Professional orientation, Security management systems...
- Bachelor's degree
- Lancaster
- Different dates available
- 4 Years
... of Computer Science Information Systems Software Development Optional Creative Technology Fundamentals of Communication Systems Year 2 Core Advanced Programming... Learn about: Computer Science, Software development, Digital Systems...
- Master
- Vilnius (Lithuania)
- September
- 2 Years
... and scientific point of view on modern information security insurance methods and technologies, developing original and critical thinking, managerial, research and innovation skills. It has a length of 2 years (4 semesters); graduation is finalized with the defense of Final project. To this programme, applicants... Learn about: Security Mechanisms, Information Technology Security, Information technology...
- Course
- Online
- Different dates available
...The Certified Chief Information Security Officer (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The program has certified leading information security professionals around the world, and you could be... Learn about: Security Manager, Information Systems, Management and Response...
- Course
- Online
- Intermediate
- Different dates available
- 15h
...According to the recent studies, CISM is acknowledged as one of the highest paying and sought after IT certifications. This training program is designed principally for experienced information security managers. You can demonstrate your information security management expertise, through... Learn about: Strategy Development, Security Management, Risk Management...
- Course
- Distance Learning
...The book illustrates how policies and procedures support the efficient running of an organization. This volume points out how security documents and standards are key elements in the business process, but should never be undertaken to satisfy a perceived audit or security requirement...
- Course
- Distance Learning
...Up-to-date quick reference to the knowledge, skills, techniques and tools required by all information security professionals. Includes in-depth coverage of the (ISC)2's Common Body of Knowledge...
- Course
- Distance Learning
... and increasingly threatening range of information security risks - risks which can, if unmitigated, lead to severe financial, regulatory and reputation damage...
- Course
- Online
- Different dates available
... and increasingly threatening range of information security risks - risks which can, if unmitigated, lead to severe financial, regulatory and reputation damage... Learn about: IT Security, Risk Assessment, IT risk...
- Training
- Redhill
- Different dates available
- 1 Day
...ISO 27001: 2013 is the accepted global standard for effective information security management. Implementing ISO 27001 can bring you peace of mind that you are protecting your business and your customers’ data in line with good practice and GDPR requirements. In our Introduction to ISO 27001: 2013... Learn about: Risk Strategy, Risk Factors, Security Management...
- Training
- Redhill
- Beginner
- 2 Days
...Implementing an ISO27001: 2013 information security management system is considered best practice for protecting your critical and sensitive data and information. Achieving certification to this standard will ensure GDPR compliance, increase stakeholder trust and support your business continuity... Learn about: Security Management, ISO 27001, Best Practice...
- Training
- Online
- Advanced
- 1 Day
... homePrivacy and Security Rules -Permitted and Required Uses and DisclosuresWhat information must be protectedAdministrative, Technical and Physical... Learn about: What are the hipaa requirements for 2019, 2019 hipaa guidelines, Risk Management...
- Course
- London
...Aimed at seasoned security professionals, this course surveys the entire information security landscape and the technologies involved. The course addresses the ten knowledge domains that comprise the Common Body of Knowledge (CBK) for information systems security professionals and prepares... Learn about: IT Security, Information Systems, Security Management...
- Course
- Online
- Intermediate
- Different dates available
- 20h - 1 Year
...Master the fundamentals of information systems security and build a career in the burgeoning IT security sector. Overseen by the Information Systems Security Certification Consortium (ISSCC), the Certified Information Systems Security Professional qualification is a globally recognised badge... Learn about: Security Assessment Testing, Security Engineering, Asset Security...
- Course
- Distance Learning
...This book presents a balanced overview of IS security, emphasizing the management of technical issues and the related procedures and policies...
- Course
- Online
- Different dates available
... Communications and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security Candidates may receive a one-year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list... Learn about: Network security, Network Training, Information Systems...