-
All
-
Online
-
Filters
Security testing courses
- Short course
- Inhouse
- Intermediate
- Different dates available
- 3 Days
... Engineering Steps * Software Security Testing * Secure Code Review * Step 1: Identify Security Code Review Objectives * Step 2: Perform Preliminary Scan *... Learn about: Access Control, Java security, Network security...
- Training
- London
- Different dates available
... Library and Resource Protection · Types of Intrusion Detection Systems · Vulnerability and Penetration Testing · Facsimile Security · RAID, Redundant... Learn about: Access Control, IT Development, IT Security...
- Bachelor's degree
- Online
- Different dates available
- 4 Years
...Food – One of the basic necessities for survival. Providing food security to the teeming millions is a day–to–day challenge that developing countries are facing today. The study and application of food science and technology principles would enable us to combat such difficult situations. In an era... Learn about: Statistics in Research, Food Production, Marketing for information Professional...
- Course
- Distance Learning
- Intermediate
- Different dates available
- 120h - 12 Months
... to Ensure Network Availability Unit 15: Organizational Documents and Policies Unit 16: High Availability and Disaster Recovery Unit 17: Common Security... Learn about: Basic IT, Basic IT training, IT Management...
- Course
- Online
- Intermediate
- Different dates available
- 12 Months
..., and implementing and testing a pilot project. Understand how to design a cloud environment based on compliance, security, and identity access management requirements. Also understand maintenance, backup, restores, disaster recovery, and business continuity measures. Analyse performance, growth forecasting... Learn about: Business Continuity, Testing Pilot Project Deploy, Cloud Environment...
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
- Training
- Online
- Beginner
- Different dates available
- 19h
...CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal... Learn about: Forensics Investigation, Email Crimes, Log Correlation...
...CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal... Learn about: Forensics Investigation, Email Crimes, Log Correlation...
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
- Course
- Cardiff
- Different dates available
- 5 Days
... testing methodology How to use Heartbleed Cryptography How to address existing threats to an infrastructure Course Outline Overview of Information security... Learn about: Network Training, IT Management, IT Security...
- Course
- Online
- Different dates available
... and to manage, maintain, troubleshoot, install, operate and configure basic network infrastructure. This course makes sure the successful candidate has the knowledge and skills required to implement a defined network architecture with basic network security. Furthermore, a successful candidate will be... Learn about: IT Certification, IT Training, Network Training...
- Course
- Online
- Different dates available
...data secure Don’t transfer data outside EEA Keep your own data safe... Learn about: Keep data secure, Data protection in the workplace, Obtain data fairly...
- Course
- City of London
... to mitigate the enlisted risks. A special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5. A number of security-related extensions to PHP are introduced like hash, mcrypt and OpenSSL for cryptography, or Ctype, ext/filter and HTML Purifier for input validation...
- Bachelor's degree
- Scarborough
... HND (year 2) Designing and Using Databases Web Design and Project Management Software Development IT Security On successful completion... Learn about: IT Security, Development technical management, Database monitoring...
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Training
- Online
- Beginner
- Different dates available
- 13h
...The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments... Learn about: Scanning Networks, SQL Injection, Ethical Hacker...
...The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments... Learn about: Scanning Networks, SQL Injection, Ethical Hacker...
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Course
- Online
- Different dates available
..., management-related services, and security. This video tutorial also covers networking, developer tools, and application layer... Learn about: IT Management, IT Security...
- Short course
- Online
- Different dates available
- 365 Days
..."Enhance your security awareness and learn how to respond in disaster situations. With the threats of cybercrime, leakage and natural disasters on the rise, The Certified Disaster Recovery Engineer course will give learners an understanding of how to respond in those situations. The course gives... Learn about: IT risk, Project Manager, Information Security Analyst...
- Course
- Distance Learning
...Threat modeling is the methodology used by Microsoft's security experts to identify security risks, verify an application's security architecture, and develop countermeasures in the design, coding, and testing phases. This book is the first to cover this subject in-depth...
- Course
- London
- Different dates available
... opportunity to engage in lively group discussion, panel debate on current initiatives and Q&A sessions. What does this course cover? Most information security... Learn about: Network Training, IT Security...
- Course
- Online
- Intermediate
- Different dates available
- 100h - 1 Year
...Master the skills of hacking and penetration to help improve corporate IT security with this comprehensive bundle of courses. This course includes all the materials and exercises required to obtain the following industry-recognised qualifications: Certified Ethical Hacker. Computer Hacking... Learn about: Scanning Networks, System Hacking, Viruses & Worms...
- Course
- Online
- Beginner
- Different dates available
... for creating System Security programs. It is Simple, yet the most powerful programming language which is very close to the Machine Language. If you have never... Learn about: Security programs, Creating System, Programming Language...
- Course
- Online
- Different dates available
.... His university thesis was a Java EE 7 full-stack e-commerce application. He participated in the first NetBeans Day Greece in Athens 2005, where he spoke about his Java EE 7 journey. Loyal NetBeans fan and user, took part in the last NetCAT testing the Java Editor and Glassfish integrations... Learn about: Application Development...
-
I work in a law firm, so that was why I chose Law A level. With my qualifications I can now go onto university!
← | →
- Course
- Glasgow
- Different dates available
... Standard SubscriptionsFree course upgrades PACKAGE INCLUDES:Online Instructor Led Video Training for Over 100 IT CoursesDemos and Lab LearningeBooks to Supplement Your LearningMultimedia Presentations and Self-Paced NavigationPractice Exam and Test Simulator Online Tutor Support... Learn about: IT Development, Network Training, Office IT...
... Standard SubscriptionsFree course upgrades PACKAGE INCLUDES:Online Instructor Led Video Training for Over 100 IT CoursesDemos and Lab LearningeBooks to Supplement Your LearningMultimedia Presentations and Self-Paced NavigationPractice Exam and Test Simulator Online Tutor Support... Learn about: IT Development, Network Training, Office IT...
-
I work in a law firm, so that was why I chose Law A level. With my qualifications I can now go onto university!
← | →