-
All
-
Online
-
Filters
IT Security courses
-
Their course material is compact and easy to understand. Their support services are quick with every solution.
← | →
-
Thomas was a helpful person; he gave us lots of information of the course.
← | →
- Course
- Online
- Intermediate
- Different dates available
...to project manager, and network security specialist. This course starts off with the CompTIA Network+, which covers such things as topologies... Learn about: Network Training, Cisco networking...
...to project manager, and network security specialist. This course starts off with the CompTIA Network+, which covers such things as topologies... Learn about: Network Training, Cisco networking...
-
Their course material is compact and easy to understand. Their support services are quick with every solution.
← | → see all
-
Thomas was a helpful person; he gave us lots of information of the course.
← | → see all
-
Trainer's flexibility to go off topic to look into our needs impressed me, I would highlight it.
← | →
- Short course
- Inhouse
- Advanced
- Different dates available
...to prevent the occurrences of these dangerous bugs, detect them before market launch or prevent their exploitation. Upon completion of this course... Learn about: ASP net training, Net ASP, Network security...
...to prevent the occurrences of these dangerous bugs, detect them before market launch or prevent their exploitation. Upon completion of this course... Learn about: ASP net training, Net ASP, Network security...
-
Trainer's flexibility to go off topic to look into our needs impressed me, I would highlight it.
← | →
-
I’ve enjoyed the CISSP course. It really got me back up to speed with things. So I am now going to take more class with e-Careers.
← | →
- Vocational qualification
- Online
- Different dates available
...control and security of corporate computer and networking resources. It is also suitable for individuals who need to achieve an industry-recognised qualification... Learn about: Information Systems, Certified Information Systems Auditor, CYBER SECURITY...
...control and security of corporate computer and networking resources. It is also suitable for individuals who need to achieve an industry-recognised qualification... Learn about: Information Systems, Certified Information Systems Auditor, CYBER SECURITY...
-
I’ve enjoyed the CISSP course. It really got me back up to speed with things. So I am now going to take more class with e-Careers.
← | →
-
Excellent.
← | →
-
Course was very good.
← | →
-
The staff were very welcoming and friendly. The training was well structured, useful, and intensive. The consultants were highly talented and happy to answer questions on the subject areas. They provided a diverse array of examples which aided our understanding of the material. I look forward to being in further contact with LCT in the future.
← | →
- Short course
- London
- Advanced
- February
...and suggests how IT can enable and deliver that. This includes reviewing common challenges; opportunities, risks, management information, project management... Learn about: Cloud computing, Enterprise Resource Planning, Social Media...
...and suggests how IT can enable and deliver that. This includes reviewing common challenges; opportunities, risks, management information, project management... Learn about: Cloud computing, Enterprise Resource Planning, Social Media...
-
Excellent.
← | → see all
-
Course was very good.
← | → see all
-
The staff were very welcoming and friendly. The training was well structured, useful, and intensive. The consultants were highly talented and happy to answer questions on the subject areas. They provided a diverse array of examples which aided our understanding of the material. I look forward to being in further contact with LCT in the future.
← | → see all
-
This course helped in my career since I’m a business Analyst now.
← | →
- Course
- Online
- Different dates available
- 1 Year
...will put you into an interactive environment where you will learn how to scan, test, hack and secure your own systems with the books and tools provided with this course... Learn about: IDS training...
...will put you into an interactive environment where you will learn how to scan, test, hack and secure your own systems with the books and tools provided with this course... Learn about: IDS training...
-
This course helped in my career since I’m a business Analyst now.
← | →
- Course
- Online
- Different dates available
...as well as executives and board members of larger organizations. This publication is fully aligned with COBIT 4.1. Program This guide is based on COBIT... Learn about: IT Security, IT risk...
- Course
- London
...Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation... Learn about: IT Security...
-
The coach explained everything really well, I am thankful.
← | →
- Short course
- Inhouse
- Intermediate
- Different dates available
...easy it is to exploit these vulnerabilities by the attackers. Upon completion of this course, you will be able to:* Understand basic concepts of security... Learn about: Advanced C++, Design patterns, Object oriented analysis and design...
...easy it is to exploit these vulnerabilities by the attackers. Upon completion of this course, you will be able to:* Understand basic concepts of security... Learn about: Advanced C++, Design patterns, Object oriented analysis and design...
-
The coach explained everything really well, I am thankful.
← | →
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
- Training
- Online
- Beginner
- Different dates available
...Forensics Investigation Process Digital Evidence Data Acquisition and Duplication Password Crackers Network Forensics Email Crimes Steganography Everyone can take this course... Learn about: Windows Forensics, Email Crimes, Web Attacks...
...Forensics Investigation Process Digital Evidence Data Acquisition and Duplication Password Crackers Network Forensics Email Crimes Steganography Everyone can take this course... Learn about: Windows Forensics, Email Crimes, Web Attacks...
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
- Course
- Online
- Different dates available
...coding, and testing phases. This book is the first to cover this subject in-depth. Program Threat modeling is the methodology used by Microsoft's security... Learn about: IT Security...
- Course
- Online
- Different dates available
...of IT systems requires that systems be continually re-evaluatedin terms of their ability to maintain their integrity. This bookprovides detailed information... Learn about: Fraud Prevention, Computer Security, IT Security...
- Course
- Online
- Different dates available
...network security have developed. This text provides a practical survey of both the principles and practice of cryptography and network security... Learn about: IT Security, Network security, Network Training...
- Course
- London
...and LDP Loop-Free Alternate. The concepts are put into practice with a series of in-depth hands-on labs, which will allow participants to gain experience... Learn about: IT Security...
- Course
- Online
- Different dates available
...code vulnerabilities lie-without delving into the specifics of each system architecture, programming or scripting language, or application-and how best to fix... Learn about: IT Security...
- Course
- Online
- Different dates available
...evolving regulatory requirements that cover personal data and computer security. Program ORDER THIS DETAILED GUIDE OF CORE GUIDANCE ON THREAT 2.0 TODAY!... Learn about: IT Security, Computer Security, Web 2.0...
-
I thank Thomas White for guiding me with this amazing course.
← | →
-
Very good online courses. It’s a good place to begin improving your IT skills whatever they are.
← | →
- Course
- Online
- Different dates available
- 12 Months
...start a career in IT; broaden their current IT skills; upgrade their current IT certifications; explore new technical fields; or increase their salary by gaining more qualifications... Learn about: Windows Server, MCSA training, MCSE training...
...start a career in IT; broaden their current IT skills; upgrade their current IT certifications; explore new technical fields; or increase their salary by gaining more qualifications... Learn about: Windows Server, MCSA training, MCSE training...
-
I thank Thomas White for guiding me with this amazing course.
← | → see all
-
Very good online courses. It’s a good place to begin improving your IT skills whatever they are.
← | → see all
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Training
- Online
- Beginner
- Different dates available
...prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation... Learn about: System Hacking, Wireless Networks, Ethical Hacker...
...prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation... Learn about: System Hacking, Wireless Networks, Ethical Hacker...
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Course
- Online
- Different dates available
...expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective... Learn about: IT Career, Security Awareness, IT Training...
- Course
- Cardiff
- Different dates available
- 3 Days
...The Microsoft Technology Associate (MTA) is Microsoft’s newest suite of technology certification exams that validate fundamental knowledge needed to begin... Learn about: IT Security, Network Training, Network security...
- Course
- Cardiff
- Different dates available
- 1 Day
...to build enterprise Java application. Pre-requisites There are no pre-requisites required to attend this course. Candidates with an understanding of... Learn about: IT Security, Oriented Programming...