-
All
-
Online
-
Filters
-
Location
-
Online
-
Type of studies
-
+ Filters (1)
Distance and online learning Security Systems training
- Training
- Online
- Beginner
- 14 Days
- Virtual classes
- Support service
- Delivery of study materials
- Personal tutor
...DNS servers 8. Video compression 9. Bandwidth considerations 10. MAC addresses 11. Remote confirguration of... Learn about: Security Awareness, Security Systems Installation...
- Training
- Distance Learning
- Beginner
...A Practical Training Course That Teaches Real World Skills In this project-based Mastering Python - Networking and Security video tutorial series... Learn about: IT Security...
Similar training in other typologies
- Course
- Online
- Different dates available
...Understand the competing tensions of laws related to privacy and national security, and the impending consequences of this battle for our networked world... Learn about: IT Security, National secutiry...
- Course
- Distance Learning
- 8 Weeks
...The course will provide the basic knowledge and confidence to work effectively, efficiently and safely with electronic security equipment...
- Course
- Distance Learning
- Beginner
- Different dates available
- Delivery of study materials
- Personal tutor
- Support service
... profit protection procedures. Develop profit protection techniques. Develop investigation techniques. Improve physical security. Improve effectiveness of profit protection teams. Suitable for: This course is suitable for anyone, including complete beginners who are working or aspire to work in the... Learn about: Analysis of data, Report preparation, Communication Skills...
- Course
- Distance Learning
...This book provides a practical foundation for establishing an effective and efficient security metrics programme. It defines more than 900 ready to use security & privacy metrics...
- Course
- Distance Learning
...Comprehensive best-practice guide to defining, creating, and utilising security metrics in organisations. Shows readers current best practices in analyzing security effectiveness...
- Course
- Online
... to identifying and dealing with potential security threats. Comprehensive and convenient The course is arranged into 20 comprehensive but manageable bite sized... Learn about: Cabin Crew...
- Course
- Distance Learning
- Beginner
... Process Management in Linux Demo - Viewing System Information Demo - Modifying Process Behavior System Startup / Shutdown Security Demo - Password... Learn about: IT Security, Network Training...
- Course
- Online
- Different dates available
- Virtual classes
- Support service
- Delivery of study materials
- Online campus
... system including general duties of a legal secretary, managing meetings, keeping records with a different filing system, developing research skills, managing transcription for judges, etc. You will also learn the tips for writing and proofreading. Finally, the course shows you how legal system works... Learn about: Customer Service, Legal services, Legal Secretary...
- Course
- Online
... Certification Authorities and the trust model Certificate chains Obtaining free certificates Using S/MIME to communicate Secrecy, Security and Oppresive Regimes... Learn about: IT Security...
- Course
- Online
- Intermediate
- Different dates available
- Delivery of study materials
- Online campus
- Virtual classes
- Support service
... organizations employ CCISOs around the world and few of them are: Department of Defence Department of Energy US Department of Homeland Security GE HP RSA Security... Learn about: Information Systems, Network security, Network Training...
- Course
- Online
- Intermediate
- Different dates available
- Online campus
- Virtual classes
- Delivery of study materials
- Support service
... different pen testing requirements across different domains. It is a highly engaging, interactive, intensive 5-days training program that teaches Information Security professionals how professional real-life penetration testing is conducted. Although such knowledge, skills, and abilities are covered... Learn about: Testing Scoping, Testing and Methodologies, Penetration Testing Methodology...
- Course
- Online
...This intensive and highly practical 5-day course has been accredited by BCS Professional Certifications. By the end of this course, delegates will have a clear understanding of all the key components of information security best practice... Learn about: IT Security, Security Management, IT Management...
- Course
- Online
- Different dates available
...In this course, students analyze some of the hardest national security challenges the United States will face in the decade ahead... Learn about: American National Security...
- Course
- Online
...The EC-Council Security Analyst (ECSA) programme is a comprehensive, standards-based, methodology intensive training program which teaches information security professionals to conduct real life penetration tests by utilizing EC-Council's published penetration testing methodology... Learn about: IT Security...
- Course
- Distance Learning
...Cranes. Useful tools. Powerful tools. Tools that need to be treated with respect. Why? The reason is simple. Any mistake with a crane, even a small mistake...
- Course
- Distance Learning
...If there is no way of either removing or reducing risks to the individual, personal protective equipment should be provided. The following course...
- Course
- Online
- Different dates available
...Learn the principles of programming for building large and extensible systems. The following course, offered by Edx, will help you improve your skills and achieve your professional goals. During the program you will study different subjects which are deemed to be useful for those who... Learn about: Oriented Programming, Object-oriented training, Object oriented Programming...
- Course
- Online
- Intermediate
- 9 Days
- Virtual classes
... in practice and you are fully prepared for the CCSP exam of ISC2. More and more companies and organizations turn to the deployment of powerful cloud solutions within their business. Understanding the information security risks and matching mitigation strategies is of crucial importance. Legacy approaches... Learn about: Cloud Data Security, Cloud Application Security, Security Officer...
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you