-
All
-
Online
-
Filters
Information security courses
- Course
- Online
- Intermediate
- Different dates available
- 3h - 1 Year
..., password security, data protection, and network safety, ensuring they gain a practical and confident understanding of cyber security principles. The course also covers how attacks are carried out, how to recognise vulnerabilities, and how to apply simple techniques to reduce security risks. By studying... Learn about: Information Security, Principles Of Cyber Security, CYBER SECURITY...
- Course
- Online
- Different dates available
... Professional (CISSP) Certified Information Systems Auditor (CISA) You can choose to study as few or as many courses as you like. Which course should I start with? . If you are new to IT, start with CompTIA IT Fundamentals. It provides a broad understanding of the IT profession. It helps answer the question... Learn about: Security Manager, Information Systems, Network Training...
- Course
- Online
- Different dates available
... concepts and practices. This Computer Security Essentials course provides students with an insight into topics like general information technology, network security, computer scripting and programming and data management... Learn about: Computer Security...
-
My experience was great.
← | →
-
My experience was great.
← | →
-
Overall I came to prefer British English over US English. Thanks for the same, I enjoyed a lot, here.
← | →
- Bachelor's degree
- Coventry
- Different dates available
- 3 Years
... Security Research... Learn about: Risk Management, Cyber Context, Cyber Defence...
... Security Research... Learn about: Risk Management, Cyber Context, Cyber Defence...
-
My experience was great.
← | → see all
-
My experience was great.
← | → see all
-
Overall I came to prefer British English over US English. Thanks for the same, I enjoyed a lot, here.
← | → see all
- Bachelor's degree
- Online
- Different dates available
- 2 Years
...BTech in Information Technology meets the computational needs of business with an emphasis on technology. The exponential growth of user expectations and the increasing workload has created immense requirements for the professionals in the field of Information technology. The course focuses... Learn about: International Peace, Technical Engineering, International Laws...
- Postgraduate
- Luton
- 12 Months
...Students will be equipped with a sound understanding of the various methods and techniques used in the area of information management and security. Suitable for graduates wishing to expand their existing skills in information management and security related technologies. For students with no formal...
- Course
- Online
- Advanced
- Different dates available
- 13h
... about dynamic encryption key generation, SOHO 802.11 security, fast secure roaming, wireless security risks, and wireless LAN security auditing. You will also learn how to implement wireless security monitoring, VPNs, remote access and guest access services, the WLAN security infrastructure, and WLAN security... Learn about: IT Auditing, Network Training...
- Course
- (Wembley Park)
- 3 Days
... who require and in-dept. understanding of information security management including: o CISO's, CIO's, CSO's, privacy officers, risk managers. o security auditors and compliance personnel. o BCP / DR personnel. o execut...
- Course
- Online
- Intermediate
- Different dates available
- 12 Months
... this designation have the necessary knowledge and experience to provide effective security management. This course trains students for a position in Risk Management, Security Auditor, Compliance Officer or an executive management position as a CSO, CTO or... Learn about: Communication Training, Risk Management, Access Control...
- Course
- Online
...Master the fundamentals of information systems security and build a career in the burgeoning IT security sector. Overseen by the Information Systems Security Certification Consortium (ISSCC), the Certified Information Systems Security Professional qu... Learn about: Information Systems, IT Security...
- Course
- Online
- Advanced
- Different dates available
- 24h
... – one is network administration, and another one is about network security. Both the sections help you to achieve a strong command over the technology. The basic concept of Radio Frequency (RF), WLAN security system, Legal system, Encryption Cipers and methods will be discussed in the Wireless Security... Learn about: RF Signal and Antenna Concepts, Fundamentals of RF, Network Administration...
- Course
- Online
- Beginner
- Different dates available
- 1 Year
...CISSP certification is a globally recognized standard of achievement that confirms an individual’s knowledge in the field of information security. Through the Information Systems Security Professional Certification – (CISSP) Course you will gain the foundational knowledge to fully prepare... Learn about: Information Systems...
-
Good experience, people were helpful.
← | →
-
Helpful staff members, got 3 degrees from UOP. It was a good experience!
← | →
-
UOP offered best experience, learned a lot, good deal of support was provided, good gudiance was provided and I did my bachelors and associate with them and half way through with my Masters degree. I enjoyed my experience and would recommend the same to all.
← | →
- Master
- Online
- Different dates available
...The Master of Information Systems (MIS) program provides the knowledge to successfully apply information systems theory and principles to address real world business opportunities and challenges to meet the needs of today's information economy. Under the guidance of practitioner faculty... Learn about: Information Systems...
...The Master of Information Systems (MIS) program provides the knowledge to successfully apply information systems theory and principles to address real world business opportunities and challenges to meet the needs of today's information economy. Under the guidance of practitioner faculty... Learn about: Information Systems...
-
Good experience, people were helpful.
← | → see all
-
Helpful staff members, got 3 degrees from UOP. It was a good experience!
← | → see all
-
UOP offered best experience, learned a lot, good deal of support was provided, good gudiance was provided and I did my bachelors and associate with them and half way through with my Masters degree. I enjoyed my experience and would recommend the same to all.
← | → see all
-
A wonderful experience with wonderful encounters, during the very interesting and passionate teachers. I really improves my English.
← | →
-
I recommend the school in Westwood share its effectiveness and its location.
← | →
-
A wonderful experience with wonderful encounters, during the very interesting and passionate teachers. I really improves my English.
← | →
- Master
- Distance Learning
...Students will learn: The theory, principles, and practices of information systems. How to employ project management skills. How to analyze data to solve complex problems. Suitable for students with a bachelor's degree from a regionally or nationally accredited college or university with a major...
...Students will learn: The theory, principles, and practices of information systems. How to employ project management skills. How to analyze data to solve complex problems. Suitable for students with a bachelor's degree from a regionally or nationally accredited college or university with a major...
-
A wonderful experience with wonderful encounters, during the very interesting and passionate teachers. I really improves my English.
← | → see all
-
I recommend the school in Westwood share its effectiveness and its location.
← | → see all
-
A wonderful experience with wonderful encounters, during the very interesting and passionate teachers. I really improves my English.
← | → see all
- Course
- Middlesbrough
- Different dates available
... Assurance Officer.Units Covered include - Principles of information and Governance AssuranceTesting the Security of Information SystemsPrinciples of Secure System DevelopmentPrinciples of ICT System and Data SecurityThe apprentice NMW applies to all 16 to 18 year old apprentices and to those aged...
- Training
- Londonand4 other venues
- Birmingham, Bristol, Manchester, Newcastle-Upon-Tyne
- Intermediate
- Different dates available
- 2 Days
...The aim of this course is to provide you with knowledge, understanding and practical skills required to undertake internal audits of Information Security Management System based on ISO 27001. You will also be able to report on the effective implementation and maintenance of the system in accordance... Learn about: Work experience preferred, Basic grammar required...
-
Flexible programs, good experience, nice work life balance was maintained.
← | →
-
Exceptional experience, faculty was good and they helped us a lot.
← | →
-
UOP's offered good experience, instructors were good and welcoming, I enjoyed my time, overall a positive experience.
← | →
- Master
- Tempe (USA)
- Different dates available
...The Master of Information Systems (MIS) program provides the knowledge to successfully apply information systems theory and principles to address real world business opportunities and challenges to meet the needs of today's information economy. Under the guidance of practitioner faculty... Learn about: Information Systems...
...The Master of Information Systems (MIS) program provides the knowledge to successfully apply information systems theory and principles to address real world business opportunities and challenges to meet the needs of today's information economy. Under the guidance of practitioner faculty... Learn about: Information Systems...
-
Flexible programs, good experience, nice work life balance was maintained.
← | → see all
-
Exceptional experience, faculty was good and they helped us a lot.
← | → see all
-
UOP's offered good experience, instructors were good and welcoming, I enjoyed my time, overall a positive experience.
← | → see all
- Course
- Rochester
- 1 Day
...Introduction to Information Security Management Systems and ISO27001 C ourse overview We now live and work in the digital economy, where the demand...
- Master
- Surrey
- 2 Years
...You will gain a critical awareness of the current developments and future trends in cryptography, network security and wireless security, starting from the mathematical principles behind cryptographic algorithms and moving on to secure network protocols. As security and dependability... Learn about: Security Management, Information Security, Data Communications...
- Postgraduate
- Wembley
- 1 Year
...This course has been designed on good foundation and rigorous practical training in the respective areas. The aim is to provide necessary knowledge through a combination of theory and practice. Suitable for: The course emphasizes the risk exposures in an Information System environment and focuses...
-
Great learning programs, one of them was MBA.
← | →
-
Online courses were provided, you can learn, practice, and apply the same. They gave ample of time to complete assignments. Overall, learning experience was good and welcoming.
← | →
-
Excellent experience, flexible work schedule and overall courses were good.
← | →
- Bachelor's degree
- Online
- Different dates available
...The Bachelor of Science in Information Technology (BSIT) program provides the knowledge to successfully apply information technology theory and principles to address real world business opportunities and challenges. The program covers fundamental and advanced knowledge in a variety of IT related...
...The Bachelor of Science in Information Technology (BSIT) program provides the knowledge to successfully apply information technology theory and principles to address real world business opportunities and challenges. The program covers fundamental and advanced knowledge in a variety of IT related...
-
Great learning programs, one of them was MBA.
← | → see all
-
Online courses were provided, you can learn, practice, and apply the same. They gave ample of time to complete assignments. Overall, learning experience was good and welcoming.
← | → see all
-
Excellent experience, flexible work schedule and overall courses were good.
← | → see all
- Postgraduate
- Harrow
- 9 Months
...Postgraduate Diploma in Information Security and Assurance (ISA) Leading to MSc Computer Security Forensics and Risk Management (CSFRM)...
- Postgraduate
- Online
- Different dates available
- 1 Year
... networks, but it also encompasses other information distribution technologies such as television and telephones. Several industries are associated with information technology, including computer hardware, software, electronics, semiconductors, internet, telecom equipment, and e-commerce... Learn about: Technology skills, Technology Services Management, Information Security...