-
All
-
Online
-
Filters
Security risk management courses
- Course
- Online
- Intermediate
- Different dates available
- 12h - 1 Year
...Units of Study Cloud computing security knowledge (CCSK) Architecture Governance and Enterprise Risk Legal Issues- Contracts and Electronic... Learn about: Legal issues, Computing security, Data security...
- Course
- Huntingdon
- Beginner
- 1 Day
...What does the course cover? · Hazards and risks arising from the use of abrasive wheels and precautions which should be observed · Methods of marking... Learn about: Safe Use of Equipment, Workplace Hazards, Team Working...
-
Great service with easy access to modules course materials and able to train in own time.
← | →
-
Excellent course, full of detail, interactive demos, thank you!
← | →
-
I’ve dealt with two online consultants from e-Careers (Scott and Erick) and they have been very helpful and friendly. The course itself was truly beneficial, as the materials and the online lessons were comprehensive.
← | →
- Vocational qualification
- Online
- Different dates available
... administration frameworks. The potential risks and consequences of Cloud adoption. Cloud Computing Security Knowledge Basic understanding of Cloud architecture... Learn about: Data security, Encrypting and web security, CompTIA Cloud...
... administration frameworks. The potential risks and consequences of Cloud adoption. Cloud Computing Security Knowledge Basic understanding of Cloud architecture... Learn about: Data security, Encrypting and web security, CompTIA Cloud...
-
Great service with easy access to modules course materials and able to train in own time.
← | → see all
-
Excellent course, full of detail, interactive demos, thank you!
← | → see all
-
I’ve dealt with two online consultants from e-Careers (Scott and Erick) and they have been very helpful and friendly. The course itself was truly beneficial, as the materials and the online lessons were comprehensive.
← | → see all
- Postgraduate
- London
... governance, financial markets, financial modelling and statistics, investments, portfolio management, risk management, and securities analysis. Teaching..... Learn about: Management of Risk, Corporate Governance, Risk Management...
- Course
- Online
- Different dates available
... management Data collection •Planning and deployment"... Learn about: Security Risk, Network Environments, Information Security Risk...
- Postgraduate
- Islington
... to those looking to either extend the scope of their current responsibilities or to make a career change into an area such as portfolio management, security... Learn about: IT Law, Decision Making, Skills and Training...
- Course
- Online
- Different dates available
... Assessment A risk assessment will help the organization identify possible security and safety concerns. We will look at a five-step plan that any organization... Learn about: Conflict Management, Communication Skills, Communication Training...
- Master
- Online
- Different dates available
- 12 Months
... is really safe from cyber-attacks, which makes information security essential. Data protection must take place both at the database and strategic levels to protect and maintain business competitiveness. Another aspect is business online reputation, which is critical for all brands, because if damaged... Learn about: Data Protection, BUSINESS CRYPTOGRAPHY, IT Management...
-
They have amazing staff strength. They guided me to choose the perfect course for me. the course structure is amazing and easy to follow.
← | →
- Course
- Online
- Different dates available
... Infrastructure Library, is a set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITIL 2011), ITIL is published as a series of five core volumes, each of which covers a different ITSM lifecycle stage.... Learn about: Service reports and dashboards, IT Service Management, Service Operations...
... Infrastructure Library, is a set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITIL 2011), ITIL is published as a series of five core volumes, each of which covers a different ITSM lifecycle stage.... Learn about: Service reports and dashboards, IT Service Management, Service Operations...
-
They have amazing staff strength. They guided me to choose the perfect course for me. the course structure is amazing and easy to follow.
← | →
-
Tutors were brilliant which made the classes even more fun. LFS staff is very friendly and the quality of education is high and challenging. Location is great also. I strongly recommend it.
← | →
-
LFS Courses are exhibited by experts that comprehend the level of material fund pioneers request in the event that they are to surrender time from their bustling calendars. Through luring high end teachers, the courses are introduced in a way that connections best scholarly research with the substances professionals confront.
← | →
-
In my formal instruction I realized what and who moulded the art of the venture business. In my LFS class, Dr. De Bondt shed new light on the advancement of new thoughts and the time they take to end up series.
← | →
- Short course
- Londonandanother venue.
- New York
- Different dates available
- 2 Days
... in the cross section of securities - Price trends and reversals - Fixation on reported earnings - Fixation on earnings targets Strategic refinements... Learn about: Business Relationships, Financial Training, Psychological mechanisms...
... in the cross section of securities - Price trends and reversals - Fixation on reported earnings - Fixation on earnings targets Strategic refinements... Learn about: Business Relationships, Financial Training, Psychological mechanisms...
-
Tutors were brilliant which made the classes even more fun. LFS staff is very friendly and the quality of education is high and challenging. Location is great also. I strongly recommend it.
← | → see all
-
LFS Courses are exhibited by experts that comprehend the level of material fund pioneers request in the event that they are to surrender time from their bustling calendars. Through luring high end teachers, the courses are introduced in a way that connections best scholarly research with the substances professionals confront.
← | → see all
-
In my formal instruction I realized what and who moulded the art of the venture business. In my LFS class, Dr. De Bondt shed new light on the advancement of new thoughts and the time they take to end up series.
← | → see all
- Training
- Online
- Intermediate
- April
- 1h - 1 Day
...By Attending this Best Training program you will learn about ransomware prevention AND know what to do if they suspect ransomware has been introduced to the computer network, Computer security is one thing, understanding Ransomware and how it is implemented is different... Learn about: HIPAA Compliance, Network Training, HIPAA regulations...
- Short course
- Inhouse
- Beginner
- Different dates available
- 2 Days
... introduced statutory and regulatory acts. The course consists of five primary modules that address NIST Critical Security Factors which are Identify, Protect, Detect, Respond, and Recover. In addition, the course introduces GAP Assessment and four tiers of capability and maturity created to... Learn about: Embedded security, IT risk, Java security...
- Postgraduate
- Islington
... Finance will equip you with a rigorous understanding of the theory behind asset pricing, fixed income securities and risk management, supported by solid... Learn about: IT Law, Fixed Income, IT Management...
- Postgraduate
- Online
- Different dates available
- 1 Year
... forensics analyst, information security analyst, risk manager and digital security consultant... Learn about: Cyber Law, Computer Security, World Law...
- Course
- Online
- Intermediate
- Different dates available
...This certification in Treasury Markets introduces candidates to functions of a Treasury Department in a bank or corporate. The Certification also covers various financial products in the treasury department and the risk management techniques used in the treasury. A Vskills Certified treasury market... Learn about: Primary Market, Financial Training, IT risk...
- Foundation degree
- Islington
... of managing UK MSW: A method to assist waste management firms with strategic planning and compliance with emerging EU legislationSagianos, Evangelos (2009). Structural identification and the optimal assignment problem.Mr Christou, Dimitrios (2011). Approximate algebraic computations and... Learn about: Biomedical Engineering, Fibre Optic, IT Development...
- Vocational qualification
- Online
- Different dates available
... for remote access. • Master security, including storage security concepts and methods, different encryption technologies and identifying access control methods... Learn about: Network Protocol, Network Training, IT Performance...
- Postgraduate
- Islington
... lending, securitisation, credit derivatives, bridge financing, asset management, trading foreign exchange and securities, derivatives and structured... Learn about: IT Law, Financial Training, Corporate Finance...
- Training
- Online
- 4h
... Requirements for Transaction Reporting Lesson 5: AML in Banking, Lesson 6: Securities, Investments, Insurance and AML (Online course: the access is valid for... Learn about: Anti-money Laundering, Report Writing, Regulation Financial...
- Vocational qualification
- Online
- Different dates available
... for remote access. • Master security, including storage security concepts and methods, different encryption technologies and identifying access control methods... Learn about: IT risk, Network Protocol, Network Training...