-
All
- Online
-
Filters
-
Type of studies
-
+ Filters (1)
IT Security inhouse
- Short course
- Inhouse
- Advanced
- Different dates available
...attacks, protection techniques and counter attacks in three days. Upon completion of this course, you will be able to:Android application developers... Learn about: Mobile security, Java security, Software Security...
- Course
- Inhouse
- 4 Days
...for the day-to-day administration of Microsoft Windows 2000. Students should have general knowledge of networking concepts and one or more years of experience...
- Course
- Inhouse
- 5 Days
...corporate development teams. This course is intended for experienced,professional application developers, including those employed by softwarecompanies...
- Course
- Inhouse
- 5 Days
...foundation implementation skills and knowledge for the deployment of secure Microsoft Windows Server 2003 based solutions. This course is not intended to provide design skills...
- Course
- Inhouse
- 3 Days
...This course is intended for IT professionals andis not intended for network architects. Three of the major job roles performedby IT professionals to...
- Course
- Inhouse
- 4 Days
...are responsible for designing and implementing security solutions.Individuals should have knowledge and experience to install and configure theActive Directory®...
- Training
- Inhouse
- Different dates available
- 148 Days
...and build an understanding of these topics: Security Layers, Operating System Security, Network Security, Security Software. This course leverages... Learn about: Network Training, Network security, Operating System...
- Training
- Inhouse
- Different dates available
- 37 Days
...network and have an interest in Network Security. CompTIA Security+ is an intensive course designed for IT professionals wishing to improve their knowledge in network security... Learn about: Access Control, Network security, Network Training...
-
Trainer's flexibility to go off topic to look into our needs impressed me, I would highlight it.
← | →
- Short course
- Inhouse
- Advanced
- Different dates available
...to prevent the occurrences of these dangerous bugs, detect them before market launch or prevent their exploitation. Upon completion of this course... Learn about: ASP net training, XML training, Net ASP...
...to prevent the occurrences of these dangerous bugs, detect them before market launch or prevent their exploitation. Upon completion of this course... Learn about: ASP net training, XML training, Net ASP...
-
Trainer's flexibility to go off topic to look into our needs impressed me, I would highlight it.
← | →
- Course
- Inhouse
- Different dates available
...and technical governance and policy. The course also presents the terminologies used to describe security threats and issues and, in particular... Learn about: Security Manager...
- Short course
- Inhouse
- Intermediate
- Different dates available
...including preventing electronics, firmware, network, and physical attacks using only the processing power and memory of resource-constrained embedded devices... Learn about: Embedded programming, Embedded software, Embedded systems design...
- Short course
- Inhouse
- Intermediate
- Different dates available
...In communications, information security also covers trustworthy authentication of messages that cover identification of the parties, verifying... Learn about: IT Law, Network security, Network Training...
- Short course
- Inhouse
- Beginner
- Different dates available
...and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities... Learn about: IDS training, Network Training, Network security...
- Training
- Inhouse
- Different dates available
- 210 Days
...overview of how to implement Microsoft's Tools and processes, aligned with the traditional Project 'Waterfall' model, and also when aligned to Agile development processes...
-
The coach explained everything really well, I am thankful.
← | →
- Short course
- Inhouse
- Intermediate
- Different dates available
...easy it is to exploit these vulnerabilities by the attackers. Upon completion of this course, you will be able to:* Understand basic concepts of security... Learn about: Design patterns, Object oriented, Advanced C++...
...easy it is to exploit these vulnerabilities by the attackers. Upon completion of this course, you will be able to:* Understand basic concepts of security... Learn about: Design patterns, Object oriented, Advanced C++...
-
The coach explained everything really well, I am thankful.
← | →
-
The course notes are very detailed, the study guide is really good and productive in just 3days.
← | →
-
I found the course and the company and the people in here very amazing and wonderfull. Iam very much looking forward for other courses as well.
← | →
- Course
- Inhouse
- Different dates available
...When do I and my users do acceptance testing? What techniques and real world best practices can I use to motivate and encourage the team? I haven’t played... Learn about: Team Training...
...When do I and my users do acceptance testing? What techniques and real world best practices can I use to motivate and encourage the team? I haven’t played... Learn about: Team Training...
-
The course notes are very detailed, the study guide is really good and productive in just 3days.
← | → see all
-
I found the course and the company and the people in here very amazing and wonderfull. Iam very much looking forward for other courses as well.
← | → see all
-
The virtual course is like to attend the actual classroom without having to travel.
← | →
-
I have waited three times to opt course of my choice. Its an experience worth praising.
← | →
- Course
- Inhouse
- Different dates available
...such as writing acceptance criteria as upfront requirements, Test Driven Development, test automation, exploratory testing, usability testing... Learn about: Team Training...
...such as writing acceptance criteria as upfront requirements, Test Driven Development, test automation, exploratory testing, usability testing... Learn about: Team Training...
-
The virtual course is like to attend the actual classroom without having to travel.
← | → see all
-
I have waited three times to opt course of my choice. Its an experience worth praising.
← | → see all
- Short course
- Inhouse
- Intermediate
- Different dates available
...engineers and their managers #text-block-10 { margin-bottom:0px; text-align:left; } Introduction A Brief History of Embedded Systems Attacks Uniquely Embedded... Learn about: Mobile security, Embedded programming, Embedded security...
- Short course
- Inhouse
- Beginner
- Different dates available
...loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the class helps students take the necessary... Learn about: Network security, Online banking, Social Networking...
- Short course
- Inhouse
- Beginner
- Different dates available
...Respond, and Recover. In addition, the course introduces GAP Assessment and four tiers of capability and maturity created to help organizations plan their CyberSecurity roadmap... Learn about: Network security, IT risk, Embedded programming...
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you