-
All
-
Online
-
Filters
-
Location
-
Online
-
Type of studies
-
+ Filters (1)
Distance and online learning IT Security training
- Training
- Distance Learning
...The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multiple choice questions, covering...
- Training
- Distance Learning
... OF THIS COURSE This course will benefit government security agencies as well as organizations intent on pursuing any corrective action, litigation, or proof of guilt based on digital...
- Training
- Online
- Intermediate
- Different dates available
- Virtual classes
- Delivery of study materials
- Online campus
- Support service
...RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security. It helps embed best practice cyber security skills and behaviours throughout your organization, regardless of employees’ roles or responsibilities... Learn about: Cyber Resilience, Best Practice, IT professionals...
- Training
- Online
- Intermediate
- Different dates available
- Support service
- Delivery of study materials
- Virtual classes
- Online campus
... Personal Computer Operating Systems Windows Control Panel Utilities Command Line Tools Windows Security Settings Windows Operating System Tools Operational... Learn about: Operating Systems, Device Connections, Communication Training...
- Training
- Online
- Intermediate
- Different dates available
- Virtual classes
- Support service
- Delivery of study materials
- Online campus
... the infrastructure of corporates from various data breaches. In our training, you can learn step by step basics methodologies like how to write virus codes that the hackers use, reverse engineering and more in-depth. Candidates can develop their skills in network security by learning different concepts like advanced... Learn about: Network Training...
- Training
- Online
- Beginner
- Different dates available
- Delivery of study materials
- Personal tutor
- Online campus
- Support service
- Virtual classes
..., Ensures better control over the data , security over information access and achieving desired results, Through BPC can improve the accuracy and reliability, Can have audit trial, Can streamline their business process, Can come up with accurate plans, budgets and can incorporate the actual... Learn about: Financial Training, Financial Accounting, SAP FUNCTIONAL CONSULTANTS...
-
Excellent course. I'll continue using Oxford Applied Traning platform.Overall I found the course well worth the time and effort to help guide me in order to get the certificate. Thanks.
← | →
- Training
- Online
- Beginner
- Different dates available
...The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, oversees, and assesses an enterprise’s information security... Learn about: Program Development, Risk Management, Program Implementation...
...The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, oversees, and assesses an enterprise’s information security... Learn about: Program Development, Risk Management, Program Implementation...
-
Excellent course. I'll continue using Oxford Applied Traning platform.Overall I found the course well worth the time and effort to help guide me in order to get the certificate. Thanks.
← | →
-
Well structured and easy to understad. I have already recommended this centre to my friends and one has signed up. Thank you so much!
← | →
- Training
- Online
- Beginner
- Different dates available
...After a massive amount of inquires from our students, Learn365 has created the ultimate IT security certification bundle. In today's world, security is a constant concern of any business or organization. With techniques changing every day, it's paramount that companies protect themselves by having... Learn about: IT risk, Risk Management, IT Security...
...After a massive amount of inquires from our students, Learn365 has created the ultimate IT security certification bundle. In today's world, security is a constant concern of any business or organization. With techniques changing every day, it's paramount that companies protect themselves by having... Learn about: IT risk, Risk Management, IT Security...
-
Well structured and easy to understad. I have already recommended this centre to my friends and one has signed up. Thank you so much!
← | →
- Training
- Online
- Intermediate
- Different dates available
...This CompTIA Security+ course is designed to enable delegates to prepare for the successful achievement of the CompTIA Security+ examination. This CompTIA Security+ Certification program is an industry-wide, vendor-neutral program which is developed and sponsored by The Computing Industry... Learn about: CompTIA Security, Technology Association, Environmental Nature...
- Training
- Distance Learning
...If you are studying for your Security+ certification and want a route to study in your own time and at your own pace then this is the computer based training course you need...
- Training
- Distance Learning
...Module 1: Security Management Practices. Module 2: Access Control. Module 3: Cryptography. Module 4: Physical Security. Module 5: Security Architecture and Models. Module 6: Law, Investigation and Ethics. Module 7: Telecommunications and Network. Module 8: Business Continuity Objectives. Module...
- Training
- Online
- Intermediate
- Different dates available
- 1 Year
- Online campus
- Support service
- Virtual classes
- Delivery of study materials
...complex networks and multi-vendor support. This course will help you learn everything from the installation to the practical use of dynamips with real cisco software images... Learn about: Vendor support, Network Training...
- Training
- Online
- Intermediate
- Different dates available
- Support service
- Virtual classes
- Online campus
- Delivery of study materials
...(Control Objectives for Information and Related Technology) framework was developed by ISACA (Information Systems Audit & Control Association)... Learn about: COBIT5 framework, Information Systems...
- Training
- Online
- Intermediate
- Different dates available
- Support service
- Delivery of study materials
- Online campus
- Virtual classes
...branching and tagging in Git Git workflows Types of workflows in Git Real time Open source projects in Git Walkthrough of commands Git plugins with...
- Training
- Online
- Beginner
...This latest data warehouse software runs on the SAP HANA platform. It delivers new levels of simplicity for building and operating data warehouse solutions... Learn about: DD Foreign Key, SQL Statements, Data Dictionary Lock Objects...
- Training
- Online
- Different dates available
...IT Security is considered by many to be the fastest growing and most lucrative sector in the IT market. With today's leading companies putting an ever growing importance on the security of their infrastructure, IT Security pros are capitalizing on acquiring high salary positions to protect these... Learn about: CCN Security, IOS Network, Cisco IOS...
- Training
- Distance Learning
... SSCP exam the first time using this course! Program Buy this essential Systems Security Certified Practitioner (SSCP) computer-based course today!What's...
- Training
- Distance Learning
- Beginner
- Different dates available
... a strict set of criteria covering all critical elements necessary for security today. It is aimed at professionals with at least four years of experience... Learn about: IT Security, Data Collection, IT risk...
- Training
- Distance Learning
...CPTEngineer Self Paced Training Price per Unit (piece): --> Certified Penetration Testing Engineer graduates obtain real world security knowledge...
- Training
- Online
- Intermediate
- Different dates available
- Online campus
- Support service
- Delivery of study materials
- Virtual classes
...then you could become one of those successful blockchain developers. Survey stats that, blockchain market has been expected to grow over 60% per... Learn about: Block hash, Hash Function...