-
All
-
Online
-
Filters
Security operations courses
- Course
- London-city
...This three-day instructor-led course is aimed at database professionals who manage Business Intelligence (BI) operations. This course looks at various options that provide the ability of business users to analyze data and share their findings, starting with managed BI data sources and expanding... Learn about: Business Intelligence...
- Course
- Distance Learning
... Legislative Customs Customs and Excise: Terms Compulsory stops Clearing goods Warehousing Operations Warehouse Departments Bridge Between Supply and Demand... Learn about: Transport Security, Transport System, Transport Logistics...
- Course
- London
- Different dates available
... environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. This course is based on Junos OS Release 12.1R5.5. Advanced Junos Enterprise Security Troubleshooting is an advanced-level course... Learn about: IT Security...
- Course
- Online
- Advanced
- Different dates available
...The online course will cover, Close Protection and Security Risk Management, broken down into individual training modules. This is a unique opportunity to get internationally recognized qualifications, for the high level protection and security industry... Learn about: Close protection, Security Management, Security Officer...
- Course
- Online
- Intermediate
- Different dates available
- 12 Months
... by the International Information Systems Security Certification Consortium (ISC)2, CISSP is a premium, vendor-neutral certification that recognizes mastery of an international standard for information security and understanding of a Common Body of Knowledge (CBK). The CISSP course provides you with the knowledge... Learn about: IT risk, Information Systems, Network Training...
- NVQ
- Inhouse
...Reflects your areas of competence within a security services environment. Suitable for those individuals whose roles are involved in providing security services...
- NVQ
- Blended in Stockton-on-Tees
... which relates to their job area and which promotes good working practice. It is aimed at the security industry in general, but there are also specific pathways: static and patrol guarding; events security; door supervision; retail security; and CCTV operation...
- Course
- (Alperton)
...The qualification has 4 pathways which enable learners to develop their knowledge in either a generic or specified context. The key fields where this course is targeted are: Non-endorsed (general). -Static and Patrol Guarding. -Door Supervision. -CCTV Operation...
- Course
- Smethwick
- 4 Days
...SIA security. 4 day course (30 hours). DISCOVER HOW TO FAST-TRACK YOUR WAY TO A SUCCESSFUL CAREER IN SECURITY! Level 2 Qualification for door supervisors. Level 2 Security Guarding. Level 2 CCTV Operation Course. Suitable for: SIA security course, door supervision,...
- Vocational qualification
- Online
- 12 Months
...This Cisco CCNA Security training course includes additional stages of network training prior to the Certification stage which is bit found anywhere...
- Foundation degree
- Bolton
- 2 Years
...Recent news reports reveal data breaches at large corporations and some people say the age of cyber-warfare has already begun. The need for talented, professional and ingenious computer network and security professionals has never been greater. Governments, organisations and individuals... Learn about: Network Training, IT Management, Operating Systems...
- Course
- Preston
...During this course you will study: Major causes of retail crime. Prevention and deterrence of retail crime. Effect of retail crime on the business. Security and loss control techniques. Identify potential shoplifters and the various methods they use. Using technology to prevent retail crime...
- Training
- Stonehouse
- Beginner
- 1 Day
... equipment AIMS: To ensure drivers maintain the safety and effective operation of their vehicle during the working day. OBJECTIVES: On completion...
- Course
- London
- Different dates available
... is limited to Patch Management. Â Additional training is recommended for other capabilities such as Security Configuration Management, Asset Discovery, Software Use Analysis, Power Management, Remote Control, OS Deployment, Mobile Device Management, and Core Protection (from malware or data loss).If... Learn about: IT Management...
- BTEC
- (Leeds Bradford Int. Airport)
- 18 Months
...BTEC National Award In Aviation Operations Level Three | Awarding Body: Edexcel | The Aviation Academy | Full-Time Course Description A fantastic...
- Course
- San Francisco (USA)
- Different dates available
..., Data management best practices business impact; Data Management Framework: Data governance, Data architecture, Data security, Reference & master... Learn about: Basic IT training, IT Management, Quality management...
- Course
- Online
...Information and data security are in the news on what seems like a daily basis. Multiple hacks and attacks on some of the world’s biggest organisations and the GDPR law update have seen companies go to more stringent lengths to ensure their data an... Learn about: Information Systems, Security Officer...
- Course
- London
- Different dates available
...IBM Cloud Orchestrator 2.4 Administration and Operations (SPVC) Training CourseLearn how to administer and use the major functions of IBM Cloud Orchestrator. The primary focus is on leveraging the product-provided features to get the most value from your investment. You learn how to install... Learn about: Business Process, IT Management...
- Vocational qualification
- Skipton
- Different dates available
...Practical activities, role-play and presentations Group and individual work Assignments Portfolios of evidence Online tests Work Experience Career Progression Employment as Ground Crew from age 18 years for students who fulfil pre-set criteria Employment as Cabin Crew Aviation Operations Level... Learn about: Skills and Training, Aviation Training, Aviation Academy...
- Course
- Online
- 5 Days
...Outline. Module 1: Security Management Practices. Module 2: Access Control. Module 3: Cryptography. Module 4: Physical Security. Module 5: Security Architecture and Models. Module 6: Law, Investigation and Ethics. Module 7: Telecommunications and Network. Module 8: Business Continuity Objectives...