-
All
-
Online
-
Filters
Security system access control courses
- Course
- Online
...SY0-501 is the latest and most up-to-date version of the CompTIA Security+ syllabus. CompTIA update their syllabus every three years and SY0-501 contains vital updates to reflect the changes that have taken place in technology and IT security in the...
- Course
- Londonand2 other venues
- Leeds, Wokingham
...This course has been designed to provide engineers with the foundation knowledge and skills required to implement and manage network access security through the deployment of the Cisco Identity Services Engine and 802.1x Solution...
- Course
- London
- 3 Days
...This course provides students with an introduction to the skills and knowledge needed to administer a Db2 12 for z/OS system...
- Course
- London-city
... model.Manage user identity and access management in the AWS cloud.Use AWS security services such as AWS Identity and Access Management, Amazon Virtual Private Cloud, AWS Config, AWS CloudTrail, AWS Key Management Service, AWS CloudHSM, and AWS Trusted Advisor.Implement better security controls for... Learn about: Business Continuity, Database training, IT risk...
- Course
- Inhouse
- 2 Days
...The Cisco Security Agent functions to protect networks from intrusions, as compared to simply detecting attempted intrusions. HIPS is a 2day, labintensive course that develops the knowledge and skills to deploy, configure and administer the Cisco Security Agent product to protect server...
- Short course
- London
...Securing Hosts Using Cisco Security Agent (HIPS) v3.0 is a course on using the Cisco Security Agent 5.0 product to protect host systems from intrusions and security threats. The Cisco Security Agent functions to protect from intrusions, as compared to simply detecting attempted intrusions...
- Course
- Londonandanother venue.
- Bath
- 5 Days
...After completing this course, students will be able to:Implement Group Policy. Create and work with user accounts and security groups. Implement account policies and security templates. Administer account based security. Install and maintain certificate authorities. Manage a public...
- Course
- Online
... and firewalld configurations, and the use of Bash shell scripting to help automate, configure, and troubleshoot the system. Through lectures and hands-on labs, delegates who have already earned the RHCSA certification will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE)... Learn about: Red Hat, Network Training...
- Course
- Inhouse
- 5 Days
... Windows Server 2003 based infrastructuresolutions but will include some client. Suitable for: The course is for a system administrator or system engineer who has the foundation implementation skills and knowledge for the deployment of secure Microsoft Windows Server 2003 based solutions...
- Course
- London
- 18 Weeks
...This course is a benchmark certification that incorporates acomprehensive range of security knowledge areas, offering those whogain the qualification a path to a fulfilling and challengingsecurity career. On successful completion, students have arecognised industry credential that offers proof...
- Course
- Online
...First of all you’ll get up-to-speed with the skills you need to achieve CompTIA Security+ 2014 (SY0-401) and CompTIA Network+ 2015 (N10-006) certification. Next you’ll learn what you need to know to attain Cisco 100-101 ICND1 and Cisco 200-101 IC..... Learn about: Ethernet training, Network Training, Active Directory...
- Course
- Readingand2 other venues
- Birmingham, London-City
... and firewalld configurations, and the use of Bash shell scripting to help automate, configure, and troubleshoot the system. Through lectures and hands-on labs, delegates who have already earned the RHCSA certification will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE)... Learn about: Network Training, Red Hat...
- Training
- Leeds
...Learn to implement and administer basic security policies relating to user authentication (including PAM and NIS) and securing network applications using application level access control and kernel level firewalling (ipchains). Students additionally learn skills in administering SELinux, system...
-
Excellent courses offered, concise and easy to follow. The Microsoft 70-243 administering and deploying SCCM 201 is great.
← | →
- Vocational qualification
- Online
- Different dates available
... in a WAN. Our curriculum covers basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills. The use of these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing... Learn about: Cisco routers, Computer Science, Computer Systems...
... in a WAN. Our curriculum covers basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills. The use of these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing... Learn about: Cisco routers, Computer Science, Computer Systems...
-
Excellent courses offered, concise and easy to follow. The Microsoft 70-243 administering and deploying SCCM 201 is great.
← | →
- Course
- London
- 5 Days
...The five day CCSA and CCSE R80.10 Fast Track course provides an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. It also allows you to validate your understanding and skills necessary to configure and optimally manage...
- Course
- Online
- Intermediate
- 3h - 1 Year
... planning to progress towards recognised CISSP certification. Topics are presented in clear modules, making it easier to understand essential principles such as governance, compliance, threat prevention, and security monitoring. The CISSP Course strengthens confidence in analysing risks, applying controls... Learn about: Security Management, Network security, Network Training...
- Course
- Leicester
- 1 Year
...Knowledge of the structured models commonly used within each stage of the development of an information system, and the structured methods and techniques for specifying, documenting and constructing them. Suitable for people who want to work with computers and need some entry level education...
- Course
- Inhouse
- 5 Days
...Extensive hands-on exercises help you gain confidence in writing software to exploit the system features of Unix. Exercises include: Taking a snapshot of the filesystem and reporting changes. Creating a simple web server. Writing a client to transfer files using the TFTP service. Developing...
- Vocational qualification
- Online
- Different dates available
... 2012. It also teaches them how to set up database systems, make sure the systems operate efficiently, and regularly store, back up, and secure data from unauthorized access. This course will help current and aspiring data professionals to prepare for exam 70-462, known as Administering Microsoft... Learn about: Computer Systems, Computer Science, Network Engineering...
- Course
- London
- 5 Days
... functionalities; how to administer policies, handle incidents, upgrade, manage and assess the health of the Forcepoint Email Security system. You will develop skills in creating email policies, configure email encryption, incident management, reporting, and system architecture and maintenance. *Please... Learn about: Network Training, Database training...