-
All
-
Online
-
Filters
Information security courses
- Course
- Online
- Intermediate
- Different dates available
- 3h - 1 Year
..., password security, data protection, and network safety, ensuring they gain a practical and confident understanding of cyber security principles. The course also covers how attacks are carried out, how to recognise vulnerabilities, and how to apply simple techniques to reduce security risks. By studying... Learn about: Principles Of Cyber Security, CYBER SECURITY, Computer protocols...
- Course
- Online
- Different dates available
... Professional (CISSP) Certified Information Systems Auditor (CISA) You can choose to study as few or as many courses as you like. Which course should I start with? . If you are new to IT, start with CompTIA IT Fundamentals. It provides a broad understanding of the IT profession. It helps answer the question... Learn about: Network Training, Security Manager, Information Systems...
- Course
- Online
- Different dates available
... concepts and practices. This Computer Security Essentials course provides students with an insight into topics like general information technology, network security, computer scripting and programming and data management... Learn about: Computer Security...
-
My experience was great.
← | →
-
My experience was great.
← | →
-
Overall I came to prefer British English over US English. Thanks for the same, I enjoyed a lot, here.
← | →
- Bachelor's degree
- Coventry
- Different dates available
- 3 Years
... how to harden the security posture of an organisation's cyber systems. You will be studying on a course that has received provisional GCHQ certification as a Bachelor’s Degree in Cyber Security. You will be studying at a University that is recognised as a GCHQ Academic Centre of Excellence for Cyber... Learn about: Information Management, Cyber Context, Cyber Defence...
... how to harden the security posture of an organisation's cyber systems. You will be studying on a course that has received provisional GCHQ certification as a Bachelor’s Degree in Cyber Security. You will be studying at a University that is recognised as a GCHQ Academic Centre of Excellence for Cyber... Learn about: Information Management, Cyber Context, Cyber Defence...
-
My experience was great.
← | → see all
-
My experience was great.
← | → see all
-
Overall I came to prefer British English over US English. Thanks for the same, I enjoyed a lot, here.
← | → see all
- Postgraduate
- Luton
- 12 Months
...Students will be equipped with a sound understanding of the various methods and techniques used in the area of information management and security. Suitable for graduates wishing to expand their existing skills in information management and security related technologies. For students with no formal...
- Course
- (Wembley Park)
- 3 Days
... who require and in-dept. understanding of information security management including: o CISO's, CIO's, CSO's, privacy officers, risk managers. o security auditors and compliance personnel. o BCP / DR personnel. o execut...
- Course
- Online
- Advanced
- Different dates available
- 13h
... about dynamic encryption key generation, SOHO 802.11 security, fast secure roaming, wireless security risks, and wireless LAN security auditing. You will also learn how to implement wireless security monitoring, VPNs, remote access and guest access services, the WLAN security infrastructure, and WLAN security... Learn about: Network Training, IT Auditing...
- Course
- Online
- Intermediate
- Different dates available
- 12 Months
... this designation have the necessary knowledge and experience to provide effective security management. This course trains students for a position in Risk Management, Security Auditor, Compliance Officer or an executive management position as a CSO, CTO or... Learn about: Risk Assessment, IT risk, Communication Training...
- Course
- Online
...Master the fundamentals of information systems security and build a career in the burgeoning IT security sector. Overseen by the Information Systems Security Certification Consortium (ISSCC), the Certified Information Systems Security Professional qu... Learn about: IT Security, Information Systems...
- Course
- Online
- Beginner
- Different dates available
- 1 Year
...CISSP certification is a globally recognized standard of achievement that confirms an individual’s knowledge in the field of information security. Through the Information Systems Security Professional Certification – (CISSP) Course you will gain the foundational knowledge to fully prepare... Learn about: Information Systems...
- Course
- Online
- Advanced
- Different dates available
- 24h
... – one is network administration, and another one is about network security. Both the sections help you to achieve a strong command over the technology. The basic concept of Radio Frequency (RF), WLAN security system, Legal system, Encryption Cipers and methods will be discussed in the Wireless Security... Learn about: Fundamentals of RF, Network Administration, Network Training...
-
Good experience, people were helpful.
← | →
-
Helpful staff members, got 3 degrees from UOP. It was a good experience!
← | →
-
UOP offered best experience, learned a lot, good deal of support was provided, good gudiance was provided and I did my bachelors and associate with them and half way through with my Masters degree. I enjoyed my experience and would recommend the same to all.
← | →
- Master
- Online
- Different dates available
...The Master of Information Systems (MIS) program provides the knowledge to successfully apply information systems theory and principles to address real world business opportunities and challenges to meet the needs of today's information economy. Under the guidance of practitioner faculty... Learn about: Information Systems...
...The Master of Information Systems (MIS) program provides the knowledge to successfully apply information systems theory and principles to address real world business opportunities and challenges to meet the needs of today's information economy. Under the guidance of practitioner faculty... Learn about: Information Systems...
-
Good experience, people were helpful.
← | → see all
-
Helpful staff members, got 3 degrees from UOP. It was a good experience!
← | → see all
-
UOP offered best experience, learned a lot, good deal of support was provided, good gudiance was provided and I did my bachelors and associate with them and half way through with my Masters degree. I enjoyed my experience and would recommend the same to all.
← | → see all
-
A wonderful experience with wonderful encounters, during the very interesting and passionate teachers. I really improves my English.
← | →
-
I recommend the school in Westwood share its effectiveness and its location.
← | →
-
A wonderful experience with wonderful encounters, during the very interesting and passionate teachers. I really improves my English.
← | →
- Master
- Distance Learning
...Students will learn: The theory, principles, and practices of information systems. How to employ project management skills. How to analyze data to solve complex problems. Suitable for students with a bachelor's degree from a regionally or nationally accredited college or university with a major...
...Students will learn: The theory, principles, and practices of information systems. How to employ project management skills. How to analyze data to solve complex problems. Suitable for students with a bachelor's degree from a regionally or nationally accredited college or university with a major...
-
A wonderful experience with wonderful encounters, during the very interesting and passionate teachers. I really improves my English.
← | → see all
-
I recommend the school in Westwood share its effectiveness and its location.
← | → see all
-
A wonderful experience with wonderful encounters, during the very interesting and passionate teachers. I really improves my English.
← | → see all
- Course
- Middlesbrough
- Different dates available
... Assurance Officer.Units Covered include - Principles of information and Governance AssuranceTesting the Security of Information SystemsPrinciples of Secure System DevelopmentPrinciples of ICT System and Data SecurityThe apprentice NMW applies to all 16 to 18 year old apprentices and to those aged...
- Training
- Londonand4 other venues
- Birmingham, Bristol, Manchester, Newcastle-Upon-Tyne
- Intermediate
- Different dates available
- 2 Days
...The aim of this course is to provide you with knowledge, understanding and practical skills required to undertake internal audits of Information Security Management System based on ISO 27001. You will also be able to report on the effective implementation and maintenance of the system in accordance... Learn about: Work experience preferred, Basic grammar required...
-
Flexible programs, good experience, nice work life balance was maintained.
← | →
-
Exceptional experience, faculty was good and they helped us a lot.
← | →
-
UOP's offered good experience, instructors were good and welcoming, I enjoyed my time, overall a positive experience.
← | →
- Master
- Tempe (USA)
- Different dates available
...The Master of Information Systems (MIS) program provides the knowledge to successfully apply information systems theory and principles to address real world business opportunities and challenges to meet the needs of today's information economy. Under the guidance of practitioner faculty... Learn about: Information Systems...
...The Master of Information Systems (MIS) program provides the knowledge to successfully apply information systems theory and principles to address real world business opportunities and challenges to meet the needs of today's information economy. Under the guidance of practitioner faculty... Learn about: Information Systems...
-
Flexible programs, good experience, nice work life balance was maintained.
← | → see all
-
Exceptional experience, faculty was good and they helped us a lot.
← | → see all
-
UOP's offered good experience, instructors were good and welcoming, I enjoyed my time, overall a positive experience.
← | → see all
- Course
- Rochester
- 1 Day
...Introduction to Information Security Management Systems and ISO27001 C ourse overview We now live and work in the digital economy, where the demand...
- Master
- Surrey
- 2 Years
... are inextricably linked, the course also covers dependable and highly available architectures. Techniques and technologies to combat threats will be explored, from secure authentication mechanisms, through firewalls, to information policies and user education to combat social engineering and data leakage... Learn about: Security Management, Management Studies, Network Training...
- Postgraduate
- Wembley
- 1 Year
...This course has been designed on good foundation and rigorous practical training in the respective areas. The aim is to provide necessary knowledge through a combination of theory and practice. Suitable for: The course emphasizes the risk exposures in an Information System environment and focuses...
-
Great learning programs, one of them was MBA.
← | →
-
Online courses were provided, you can learn, practice, and apply the same. They gave ample of time to complete assignments. Overall, learning experience was good and welcoming.
← | →
-
Excellent experience, flexible work schedule and overall courses were good.
← | →
- Bachelor's degree
- Online
- Different dates available
...The Bachelor of Science in Information Technology (BSIT) program provides the knowledge to successfully apply information technology theory and principles to address real world business opportunities and challenges. The program covers fundamental and advanced knowledge in a variety of IT related...
...The Bachelor of Science in Information Technology (BSIT) program provides the knowledge to successfully apply information technology theory and principles to address real world business opportunities and challenges. The program covers fundamental and advanced knowledge in a variety of IT related...
-
Great learning programs, one of them was MBA.
← | → see all
-
Online courses were provided, you can learn, practice, and apply the same. They gave ample of time to complete assignments. Overall, learning experience was good and welcoming.
← | → see all
-
Excellent experience, flexible work schedule and overall courses were good.
← | → see all
- Postgraduate
- Harrow
- 9 Months
...Postgraduate Diploma in Information Security and Assurance (ISA) Leading to MSc Computer Security Forensics and Risk Management (CSFRM)...
- Postgraduate
- Hayes
... and acceptance of SIRM Postgraduate Diploma in Information Security and Assurance (PgD ISA) for entry onto Master of Science (MSc). Formerly...
- Course
- Online
- Intermediate
- Different dates available
- 12 Months
... practices for information security... Learn about: Information Systems, Network security, IT risk...