-
All
-
Online
-
Filters
Security testing courses
- Short course
- Inhouse
- Intermediate
- Different dates available
- 3 Days
... Engineering Steps * Software Security Testing * Secure Code Review * Step 1: Identify Security Code Review Objectives * Step 2: Perform Preliminary Scan *... Learn about: Access Control, Java security, Embedded programming...
- Training
- London
- Different dates available
... Library and Resource Protection · Types of Intrusion Detection Systems · Vulnerability and Penetration Testing · Facsimile Security · RAID, Redundant... Learn about: Access Control, IT Security, IT Development...
- Bachelor's degree
- Online
- Different dates available
- 4 Years
...Food – One of the basic necessities for survival. Providing food security to the teeming millions is a day–to–day challenge that developing countries are facing today. The study and application of food science and technology principles would enable us to combat such difficult situations. In an era... Learn about: Statistics in Research, Food Production, Food Packaging...
- Course
- Distance Learning
- Intermediate
- Different dates available
- 120h - 12 Months
... to Ensure Network Availability Unit 15: Organizational Documents and Policies Unit 16: High Availability and Disaster Recovery Unit 17: Common Security... Learn about: IPV6 training, Ethernet training, Basic IT training...
- Course
- Online
- Intermediate
- Different dates available
- 12 Months
..., and implementing and testing a pilot project. Understand how to design a cloud environment based on compliance, security, and identity access management requirements. Also understand maintenance, backup, restores, disaster recovery, and business continuity measures. Analyse performance, growth forecasting... Learn about: Secure Cloud, Cloud Environment, Testing Pilot Project Deploy...
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
- Training
- Online
- Beginner
- Different dates available
- 19h
...CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal... Learn about: Email Crimes, Forensics Investigation, Web Attacks...
...CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal... Learn about: Email Crimes, Forensics Investigation, Web Attacks...
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
- Course
- Cardiff
- Different dates available
- 5 Days
... testing methodology How to use Heartbleed Cryptography How to address existing threats to an infrastructure Course Outline Overview of Information security... Learn about: Network Training, IT Security, IT Management...
- Course
- Online
- Different dates available
... and to manage, maintain, troubleshoot, install, operate and configure basic network infrastructure. This course makes sure the successful candidate has the knowledge and skills required to implement a defined network architecture with basic network security. Furthermore, a successful candidate will be... Learn about: Network security, IT Training, Network Training...
- Course
- Online
- Different dates available
...data secure Don’t transfer data outside EEA Keep your own data safe... Learn about: Obtain data fairly, Data safety, Communication Skills...
- Course
- City of London
... to mitigate the enlisted risks. A special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5. A number of security-related extensions to PHP are introduced like hash, mcrypt and OpenSSL for cryptography, or Ctype, ext/filter and HTML Purifier for input validation...
- Bachelor's degree
- Scarborough
... HND (year 2) Designing and Using Databases Web Design and Project Management Software Development IT Security On successful completion... Learn about: Information Systems, IT Security, Database Management...
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Training
- Online
- Beginner
- Different dates available
- 13h
...The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments... Learn about: Scanning Networks, System Hacking, Ethical Hacker...
...The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments... Learn about: Scanning Networks, System Hacking, Ethical Hacker...
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Course
- Online
- Different dates available
..., management-related services, and security. This video tutorial also covers networking, developer tools, and application layer... Learn about: IT Security, IT Management...
- Short course
- Online
- Different dates available
- 365 Days
..."Enhance your security awareness and learn how to respond in disaster situations. With the threats of cybercrime, leakage and natural disasters on the rise, The Certified Disaster Recovery Engineer course will give learners an understanding of how to respond in those situations. The course gives... Learn about: IT risk, Information Security Manager, Project Manager...
- Course
- Distance Learning
...Threat modeling is the methodology used by Microsoft's security experts to identify security risks, verify an application's security architecture, and develop countermeasures in the design, coding, and testing phases. This book is the first to cover this subject in-depth...
- Course
- London
- Different dates available
... opportunity to engage in lively group discussion, panel debate on current initiatives and Q&A sessions. What does this course cover? Most information security... Learn about: IT Security, Network Training...
- Course
- Online
- Intermediate
- Different dates available
- 100h - 1 Year
...Master the skills of hacking and penetration to help improve corporate IT security with this comprehensive bundle of courses. This course includes all the materials and exercises required to obtain the following industry-recognised qualifications: Certified Ethical Hacker. Computer Hacking... Learn about: Social Engineering, Scanning Networks, Security Manager...
- Course
- Online
- Beginner
- Different dates available
... for creating System Security programs. It is Simple, yet the most powerful programming language which is very close to the Machine Language. If you have never... Learn about: Creating System, Programming Language, Security programs...
- Course
- Online
- Different dates available
.... His university thesis was a Java EE 7 full-stack e-commerce application. He participated in the first NetBeans Day Greece in Athens 2005, where he spoke about his Java EE 7 journey. Loyal NetBeans fan and user, took part in the last NetCAT testing the Java Editor and Glassfish integrations... Learn about: Application Development...
-
I work in a law firm, so that was why I chose Law A level. With my qualifications I can now go onto university!
← | →
- Course
- Glasgow
- Different dates available
... Standard SubscriptionsFree course upgrades PACKAGE INCLUDES:Online Instructor Led Video Training for Over 100 IT CoursesDemos and Lab LearningeBooks to Supplement Your LearningMultimedia Presentations and Self-Paced NavigationPractice Exam and Test Simulator Online Tutor Support... Learn about: Office IT, ASP net training, Windows Server...
... Standard SubscriptionsFree course upgrades PACKAGE INCLUDES:Online Instructor Led Video Training for Over 100 IT CoursesDemos and Lab LearningeBooks to Supplement Your LearningMultimedia Presentations and Self-Paced NavigationPractice Exam and Test Simulator Online Tutor Support... Learn about: Office IT, ASP net training, Windows Server...
-
I work in a law firm, so that was why I chose Law A level. With my qualifications I can now go onto university!
← | →