-
All
-
Online
-
Filters
IT Security courses
-
Their course material is compact and easy to understand. Their support services are quick with every solution.
← | →
-
Thomas was a helpful person; he gave us lots of information of the course.
← | →
- Course
- Online
- Intermediate
- Different dates available
...to project manager, and network security specialist. This course starts off with the CompTIA Network+, which covers such things as topologies... Learn about: Cisco networking, Network Training...
...to project manager, and network security specialist. This course starts off with the CompTIA Network+, which covers such things as topologies... Learn about: Cisco networking, Network Training...
-
Their course material is compact and easy to understand. Their support services are quick with every solution.
← | → see all
-
Thomas was a helpful person; he gave us lots of information of the course.
← | → see all
-
Trainer's flexibility to go off topic to look into our needs impressed me, I would highlight it.
← | →
- Short course
- Inhouse
- Advanced
- Different dates available
...to prevent the occurrences of these dangerous bugs, detect them before market launch or prevent their exploitation. Upon completion of this course... Learn about: XML training, Network security, Net ASP...
...to prevent the occurrences of these dangerous bugs, detect them before market launch or prevent their exploitation. Upon completion of this course... Learn about: XML training, Network security, Net ASP...
-
Trainer's flexibility to go off topic to look into our needs impressed me, I would highlight it.
← | →
-
I’ve enjoyed the CISSP course. It really got me back up to speed with things. So I am now going to take more class with e-Careers.
← | →
- Vocational qualification
- Online
- Different dates available
...control and security of corporate computer and networking resources. It is also suitable for individuals who need to achieve an industry-recognised qualification... Learn about: Certified Information Systems Auditor, Information Systems, CYBER SECURITY...
...control and security of corporate computer and networking resources. It is also suitable for individuals who need to achieve an industry-recognised qualification... Learn about: Certified Information Systems Auditor, Information Systems, CYBER SECURITY...
-
I’ve enjoyed the CISSP course. It really got me back up to speed with things. So I am now going to take more class with e-Careers.
← | →
-
Excellent.
← | →
-
Course was very good.
← | →
-
The staff were very welcoming and friendly. The training was well structured, useful, and intensive. The consultants were highly talented and happy to answer questions on the subject areas. They provided a diverse array of examples which aided our understanding of the material. I look forward to being in further contact with LCT in the future.
← | →
- Short course
- London
- Advanced
- February
...and suggests how IT can enable and deliver that. This includes reviewing common challenges; opportunities, risks, management information, project management... Learn about: Financial Training, Strategic Information Technology, IT Strategy...
...and suggests how IT can enable and deliver that. This includes reviewing common challenges; opportunities, risks, management information, project management... Learn about: Financial Training, Strategic Information Technology, IT Strategy...
-
Excellent.
← | → see all
-
Course was very good.
← | → see all
-
The staff were very welcoming and friendly. The training was well structured, useful, and intensive. The consultants were highly talented and happy to answer questions on the subject areas. They provided a diverse array of examples which aided our understanding of the material. I look forward to being in further contact with LCT in the future.
← | → see all
-
This course helped in my career since I’m a business Analyst now.
← | →
- Course
- Online
- Different dates available
- 1 Year
...will put you into an interactive environment where you will learn how to scan, test, hack and secure your own systems with the books and tools provided with this course... Learn about: IDS training...
...will put you into an interactive environment where you will learn how to scan, test, hack and secure your own systems with the books and tools provided with this course... Learn about: IDS training...
-
This course helped in my career since I’m a business Analyst now.
← | →
- Course
- Online
- Different dates available
...as well as executives and board members of larger organizations. This publication is fully aligned with COBIT 4.1. Program This guide is based on COBIT... Learn about: IT Security, IT risk...
- Course
- London
...Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation... Learn about: IT Security...
-
The coach explained everything really well, I am thankful.
← | →
- Short course
- Inhouse
- Intermediate
- Different dates available
...easy it is to exploit these vulnerabilities by the attackers. Upon completion of this course, you will be able to:* Understand basic concepts of security... Learn about: Structured Programming, Object oriented analysis and design, Design patterns...
...easy it is to exploit these vulnerabilities by the attackers. Upon completion of this course, you will be able to:* Understand basic concepts of security... Learn about: Structured Programming, Object oriented analysis and design, Design patterns...
-
The coach explained everything really well, I am thankful.
← | →
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
- Training
- Online
- Beginner
- Different dates available
...Forensics Investigation Process Digital Evidence Data Acquisition and Duplication Password Crackers Network Forensics Email Crimes Steganography Everyone can take this course... Learn about: Mobile Investigation, Log Correlation, Forensics Investigation...
...Forensics Investigation Process Digital Evidence Data Acquisition and Duplication Password Crackers Network Forensics Email Crimes Steganography Everyone can take this course... Learn about: Mobile Investigation, Log Correlation, Forensics Investigation...
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
- Course
- Online
- Different dates available
...coding, and testing phases. This book is the first to cover this subject in-depth. Program Threat modeling is the methodology used by Microsoft's security... Learn about: IT Security...
- Course
- Online
- Different dates available
...of IT systems requires that systems be continually re-evaluatedin terms of their ability to maintain their integrity. This bookprovides detailed information... Learn about: Computer Security, IT Security, Fraud Prevention...
- Course
- Online
- Different dates available
...network security have developed. This text provides a practical survey of both the principles and practice of cryptography and network security... Learn about: Network security, Network Training, IT Security...
- Course
- London
...and LDP Loop-Free Alternate. The concepts are put into practice with a series of in-depth hands-on labs, which will allow participants to gain experience... Learn about: IT Security...
- Course
- Online
- Different dates available
...code vulnerabilities lie-without delving into the specifics of each system architecture, programming or scripting language, or application-and how best to fix... Learn about: IT Security...
- Course
- Online
- Different dates available
...evolving regulatory requirements that cover personal data and computer security. Program ORDER THIS DETAILED GUIDE OF CORE GUIDANCE ON THREAT 2.0 TODAY!... Learn about: IT Security, Web 2.0, Computer Security...
-
I thank Thomas White for guiding me with this amazing course.
← | →
-
Very good online courses. It’s a good place to begin improving your IT skills whatever they are.
← | →
- Course
- Online
- Different dates available
- 12 Months
...start a career in IT; broaden their current IT skills; upgrade their current IT certifications; explore new technical fields; or increase their salary by gaining more qualifications... Learn about: MCSA training, Windows Server, Office IT...
...start a career in IT; broaden their current IT skills; upgrade their current IT certifications; explore new technical fields; or increase their salary by gaining more qualifications... Learn about: MCSA training, Windows Server, Office IT...
-
I thank Thomas White for guiding me with this amazing course.
← | → see all
-
Very good online courses. It’s a good place to begin improving your IT skills whatever they are.
← | → see all
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Training
- Online
- Beginner
- Different dates available
...prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation... Learn about: SQL Injection, Web servers, Web Application Vulnerabilities...
...prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation... Learn about: SQL Injection, Web servers, Web Application Vulnerabilities...
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Course
- Online
- Different dates available
...expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective... Learn about: Online Course, IT Career, Network security...
- Course
- Cardiff
- Different dates available
- 3 Days
...The Microsoft Technology Associate (MTA) is Microsoft’s newest suite of technology certification exams that validate fundamental knowledge needed to begin... Learn about: IT Security, Network Training, Network security...
- Course
- Cardiff
- Different dates available
- 1 Day
...to build enterprise Java application. Pre-requisites There are no pre-requisites required to attend this course. Candidates with an understanding of... Learn about: IT Security, Oriented Programming...