-
All
-
Online
-
Filters
Security operations courses
- Course
- London
- 5 Days
... and protocol operations. This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. This course is based on the Junos OS Release 17.1. AJSPR is an advanced...
- Bachelor's degree
- Telford
- 12 Years
... (but are not limited to); Cybersecurity Consultant, Cybersecurity Analyst, IT Security Manager, Security Architect and Compliance roles. · For anyone thinking of undertaking further study in cybersecurity e.g. Research Degree or Professional Certifications. · Those already in the sector who wish to enhance / widen...
- Course
- Online
... portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management and business. Active cyber resilience is achieved through people, process and technology. Target Audience IT Service Management, Business analysts, IT Architects, IT Project... Learn about: Best Practice, IT risk, Service Management...
- Course
- Online
... Server Managing Databases in SQL Server 2012 Managing SQL Server Security Implementing Advanced Security Settings Applying Encryption and Compression... Learn about: MCSA training...
- Bachelor's degree
- High Wycombe
- 3 Years
... of the Air Transport Sector Air Cargo Operations Air Transport - Security and Safety Airline and Airport Marketing Airport Operations Introduction to Finance... Learn about: Airport Management, Airline Management, Air Transport...
- Master
- Chicago (USA)
... Securities. 3 hours. Valuation of fixed income securities, term structure estimation and arbitrage trading with practical application using real... Learn about: Risk Management, IDS training, Corporate Finance...
- Course
- Online
- Intermediate
- Different dates available
...Cyber security is often cited among the fastest-growing career paths for the foreseeable future. Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. In 2015, according to Symantec Corporation, more than half a billion identities were stolen... Learn about: Network Training, IT risk, Network security...
- Training
- Online
- Intermediate
- Different dates available
- 40h
... Indirect Set Analysis Set vs Let Mekko Chart, Gauge Chart and Slider Modeling Debugging Scrip Data Modeling Cloning QVD model SCD Security Reduce Storage... Learn about: Script code, Table operation, Script Editing...
- Course
- London-city
... portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management and business. Active cyber resilience is achieved through people, process and technology. Target Audience IT Service Management, Business analysts, IT Architects, IT Project... Learn about: Service Management, Best Practice, IT risk...
- Course
- Sketty
- Different dates available
... Develop own effectivenessand professionalism The Apprenticeship also has these optional specialist units: Security of ICT systems Software Installation... Learn about: Network Training, Web Development...
- Course
- Liverpool
...Evac Chair Training Course This course will take you through the setting up and safe operation of the Excel Tracked Evacuation Chair... Learn about: Emergency Care, Evacuating people from a building, Emergency evacuation...
- Course
- Sketty
- Different dates available
... Develop own effectivenessand professionalism The Apprenticeship also has these optional specialist units: Security of ICT systems Software Installation... Learn about: Web Development, Network Training...
- Course
- London
- 3 Days
...Suitable for: Door Supervisors, Security Guards for CCTV operators...
- Course
- San Francisco (USA)
- Different dates available
... resources; Professional training & behaviors; Risk assessment & management; Planning & procedures; Contractor controls; Security; Emergency response... Learn about: IT Development, Reservoir Engineering, Risk Assessment...
- MBA
- Massachusetts (USA)
- Different dates available
- 16 Months
... Capital Markets FIN-880 Investment Banking FIN-881 Real Estate Finance FIN-882 Applied Risk Management FIN-884 Fixed Income Securities FIN-885 Enterprise... Learn about: Risk Assessment, Enterprise Risk Management, Corporate Finance...
- Training
- Online
- Intermediate
- Different dates available
...Furthermore, ISO 27001 is an information security standard, part of the ISO/IEC 27000 family of standards, of which the last version was published in 2013. There have been a few minor updates since then, mainly for the reason that it is constantly changing and first of all the reason was GDPR... Learn about: Security risks, IT risk, ISO 27001...
- Course
- San Francisco (USA)
- Different dates available
... practices business impact; Data Management Framework: Data governance, Data architecture, Data security, Reference & master data management, Data quality... Learn about: Accounting MBA, Skills and Training, IT Management...
- Course
- San Francisco (USA)
- Different dates available
... Framework: Data governance, Data architecture, Data security, Reference & master data management, Data quality management; Building and Sustaining the... Learn about: IT Management, Oil and Gas, Quality management...
- Course
- Online
... also includes the operation of IP data networks, IP addressing (IPv4 & IPv6), network security, basic troubleshooting and DHCP, NAT, ACLs and other IP routing... Learn about: Cisco networking...
- Bachelor's degree
- Lancaster
..., analysing current trends and security measures and the technologies used in computer communication networks. The final year also includes a large individual... Learn about: PC training, Skills and Training, Network Training...