-
All
- Online
-
Filters
IT Security courses Croatia
- Short course
- Zagreb (Croatia)
- Advanced
- 4 Weeks
...or usage of “secure“ corporate network. Everyone brave enough to step into this module will be rewarded with the knowledge that is heavily sought after...
Similar training and in other locations
- Course
- Online
- Different dates available
- 1 Year
...learners who want to enhance their skill set, improve their CV, or begin exploring opportunities in finance-related roles. Whether you are looking... Learn about: Financial Training, Financial Advisor, Accounts conclusion...
- Course
- Online
- Different dates available
...and knowledge needed to become specialised in this sector. You will learn real life knowledge and expertise from the industry experts and practitioners... Learn about: IT Management, IT Project Management...
- Course
- Online
- Different dates available
...with the OSI Model Module 3 Understanding Wired and Wireless Networks Module 4 Understanding Internet Protocol Module 5 Implementing TCP-IP in the command... Learn about: Network Training...
- Course
- Distance Learning
- Advanced
- November
- 330h
...Identifying Critical Cyber Assets Classifying Cyber Assets Personally Identifying Information (PII) Identifying the Electronic Security Perimeter (ESP)... Learn about: Penetration Testing, Cyber Crime, Internet Security...
- Course
- Online
- Advanced
- Different dates available
- 1 Year
...your technical confidence in existing roles, the course offers accessible, beginner-friendly learning with clear explanations and practical insights... Learn about: Information Systems, Asset Security, Network security...
- Course
- Online
- Different dates available
- 20h
...Program The Anti Anti-Spyware Programs Research And Learn More Choosing The Best Anti Spyware Tool Computer Security And Spyware The Programs To Avoid Is It Legal?... Learn about: Concept of Private Cloud, Using Disclaimers, Computer Spyware...
- Course
- Online
- Beginner
- Different dates available
- 9h
...They then make recommendations for solutions, including hardware and software programs that can help mitigate risk. These professionals typically design firewalls... Learn about: Common Scams, Internet Safe?, Your Password Safe...
- Course
- Online
- Different dates available
...Do you wonder whether or not your computer is secure? Do you fear that someone might be looking through your files, copying, altering and erasing them?... Learn about: Computer Security...
- Course
- Online
- Intermediate
- Different dates available
- 18h - 1 Year
...Mimikatz DEMO – Hashcat DEMO – Konboot DEMO – Post Exploitation Windows CMD DEMO – Post Exploitation Windows Powershell DEMO – Attacking Linux targets pt... Learn about: Terminology Crash, Network Training, Ethical Hacker...
- Vocational qualification
- Online
- Different dates available
...the fundamentals of cloud computing from both a technical and a business perspective. It also prepares learners for the EXIN Cloud Computing Foundation... Learn about: Computer Science, Data security, Computer Engineering...
- Course
- Online
- Different dates available
- 11h
...There is no experience or previous qualifications required for enrolment on this course. It is available to all students of all academic backgrounds... Learn about: Network Training, Risk Management, IT risk...
- Course
- Online
- Different dates available
- 71h
...COURSE CURRICULUM Overview of Wireless Communications Identify the Importance of Risk Management Assess Risk Mitigate Risk Integrate Documentation... Learn about: Security Policies, Network security, Network Training...
- Course
- Online
- Intermediate
- 4h - 1 Year
...circuits, and safe working practices. Learners study voltage, current, resistance, series and parallel circuits, tools, wiring, and troubleshooting techniques... Learn about: Electrical system, Electrical Maintenance, Basic electricity...
- Vocational qualification
- Online
- Different dates available
...The demand for skilled information security management professionals is on the rise, and the CISM certification is the globally accepted standard of achievement in this... Learn about: Computer Science, Data Protection, Computer Systems...
-
The school was great for individuals who're working, I had a wonderful experience!
← | →
-
Not only top notch education, they offer top of the line that too with great professors. Its a good place to go. I completed degree Bachelors Degree in Psychology, also completed Masters degree in Business administration, 2021. All you need is hard work and dedication. University offered good learning experience. Professors were helpful and my learning journey was good.
← | →
-
UofP offered wonderful experience and I enrolled in the MBA program. For working professionals they offered good experience, Phoenix offered best above all.
← | →
- Course
- Online
- Different dates available
...The Cyber Security Certificate concentrates on the concepts and principles of securing and protecting the information assets of the organization... Learn about: IT risk, Risk Management...
...The Cyber Security Certificate concentrates on the concepts and principles of securing and protecting the information assets of the organization... Learn about: IT risk, Risk Management...
-
The school was great for individuals who're working, I had a wonderful experience!
← | → see all
-
Not only top notch education, they offer top of the line that too with great professors. Its a good place to go. I completed degree Bachelors Degree in Psychology, also completed Masters degree in Business administration, 2021. All you need is hard work and dedication. University offered good learning experience. Professors were helpful and my learning journey was good.
← | → see all
-
UofP offered wonderful experience and I enrolled in the MBA program. For working professionals they offered good experience, Phoenix offered best above all.
← | → see all
- Course
- Online
- Different dates available
- 30h
...Anti-Spyware Tool Computer Security And Spyware The Programs To Avoid Is It Legal? Checklist Of Protection... Learn about: Internet Security- 5 Tips for Using Facebook, IT Security, How I Got Pharmed...
- Course
- Online
- Intermediate
- Different dates available
- 7h
...creating intelligent applications. It is ideal for professionals looking to enhance their technical skills and integrate machine learning into app development workflows... Learn about: App Development, Machine Learning, Data science...
- Course
- Online
- Different dates available
...Encryption Hybrid Encryption Public Key Infrastructures Hash Functions Digital Signatures Protocol Based Pretty Good Privacy Cracking Techniques Summary... Learn about: Computer Engineering, Data security, Network Engineering...
-
The school was amazing, classes were interesting, I enjoyed my time and above all a good experience!
← | →
-
Affordable prices, people were helpful and the school was amazing. Professors were understanding and above all a great experience.
← | →
-
Couldn't get better than this, I enjoyed my time and learning material was good and welcoming. I enjoyed my time.
← | →
- Course
- Online
- Different dates available
...The Information Assurance and Security Certificate offers coursework to successfully apply information technology theory and principles to address... Learn about: Information Systems...
...The Information Assurance and Security Certificate offers coursework to successfully apply information technology theory and principles to address... Learn about: Information Systems...
-
The school was amazing, classes were interesting, I enjoyed my time and above all a good experience!
← | → see all
-
Affordable prices, people were helpful and the school was amazing. Professors were understanding and above all a great experience.
← | → see all
-
Couldn't get better than this, I enjoyed my time and learning material was good and welcoming. I enjoyed my time.
← | → see all
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you