-
All
- Online
-
Filters
-
Location
- Online
-
Type of studies
-
+ Filters (1)
IT Security training
- Training
- Distance Learning
...SUMMARY: The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information...
- Training
- London
- Intermediate
- 5 Days
...(Quality Management Systems – Guidelines for Quality Management in Projects). This training is also fully compatible with ISO/IEC 27003... Learn about: Information Systems, CYBER SECURITY, Security Management...
- Training
- Distance Learning
...In October of 2008, CFED was redesigned into a more advanced class and re-titled Certified Digital Forensics Examiner (CDFE). See below! The Certified...
- Training
- Dubai (United Arab Emirates)
- Advanced
- 2 Days
...COBIT 5 Foundation examination with confidence, and become a COBIT 5 Foundation professional on the 2nd day of the training. Please e-mail support@invensislearning... Learn about: IT Management, IT Security...
- Training
- Brusselsandanother venue.
- Naarden
- Beginner
- 5 Days
...o Guiding Principles o The Engineer’s Complex System & Holistic Approach o SABSA Features, Advantages & Benefits · The SABSA Framework o The SABSA Matrix... Learn about: Risk Management, Security Architecture, Holistic Framework...
- Training
- Amsterdamandanother venue.
- 5 Days
...(ISC)2 CISSP examination at the very first attempt. Suitable for: CISO, CSO, Security Engineers, Members of the Information Security Team, IT Management...
-
Excellent course. I'll continue using Oxford Applied Traning platform.Overall I found the course well worth the time and effort to help guide me in order to get the certificate. Thanks.
← | →
- Training
- Online
- Beginner
- Different dates available
...& Technology Professionals Information Technology;Computer Security;Application Security Lesson 1 – Information Security Governance Lesson 2 – Risk Management... Learn about: Program Management, Risk Management, Security Manager...
...& Technology Professionals Information Technology;Computer Security;Application Security Lesson 1 – Information Security Governance Lesson 2 – Risk Management... Learn about: Program Management, Risk Management, Security Manager...
-
Excellent course. I'll continue using Oxford Applied Traning platform.Overall I found the course well worth the time and effort to help guide me in order to get the certificate. Thanks.
← | →
-
Well structured and easy to understad. I have already recommended this centre to my friends and one has signed up. Thank you so much!
← | →
- Training
- Online
- Beginner
- Different dates available
...With this bundle students will cover all crucial areas of security; from network security, cloud security, database security and even project management security procedures... Learn about: IT risk, Risk Management, Information Systems...
...With this bundle students will cover all crucial areas of security; from network security, cloud security, database security and even project management security procedures... Learn about: IT risk, Risk Management, Information Systems...
-
Well structured and easy to understad. I have already recommended this centre to my friends and one has signed up. Thank you so much!
← | →
- Training
- Distance Learning
...computer-based course today!What's Included: DVD-ROMs featuring live instructor-led classroom sessions with full audio, video and demonstration components by Shon Harris...
- Training
- London
- Beginner
- 3 Days
...three-day intensive course participants develop the competence to master the basic risk management elements related to all assets of relevance for information... Learn about: ISO 27005, ISO Audit, Information Security...
- Training
- Riyadh (Saudi Arabia)
- Advanced
- Different dates available
...5 Assessor examination with confidence, and become a COBIT 5 Assessor professional on the 3rd day of the training. Please e-mail support(at)invensislearning(dot)com... Learn about: IT Management, IT Security...
- Training
- Online
- Different dates available
...The theory of this course bundle is to gain the skills to think like the black hat hackers do and then apply the information to structure preventative... Learn about: CYBER SECURITY, Hacking Web Servers, Cyber Forensics...
- Training
- Distance Learning
- Beginner
- Different dates available
...Printable Study Guides Focused on practical solutions to real-world development problems Free 1 Year Upgrade Policy Certificate of Completion COURSE INTRODUCTIONThe... Learn about: IT risk, Access Control, Data Collection...
- Training
- Distance Learning
...This system gives you 100% coverage of (ISC)2 SSCP security domains plus test preparation software for the edge you need to pass the SSCP...
- Training
- Abu Dhabi (United Arab Emirates)
- Advanced
- Different dates available
...COBIT 5 Foundation examination with confidence, and become a COBIT 5 Foundation professional on the 2nd day of the training. Please e-mail support@invensislearning... Learn about: IT Management, IT Security...
- Training
- London
- Beginner
- 5 Days
...Security The ISO/IEC 27001:2013 certification process The Information Security Management System (ISMS) Detailed presentation of the clauses 4 to... Learn about: ISO requirements, ISO Audit, Lead auditor...
- Training
- Online
- Beginner
- Different dates available
...and experts in the following topics: understanding cloud computing, security challenges, cloud computing security, controls recommendation, elasticity... Learn about: Business Continuity, IT risk, Risk Management...
- Training
- Distance Learning
...7 CD-ROMs featuring live instructor-led classroom sessions with full audio, video and demonstration components. Printable courseware. Testing modules...
- Training
- Ad Dammām (Saudi Arabia)
- Advanced
- Different dates available
...COBIT 5 Foundation examination with confidence, and become a COBIT 5 Foundation professional on the 2nd day of the training. Please e-mail support@invensislearning... Learn about: IT Security, IT Management...
- Training
- London
- Beginner
- 5 Days
...Who should attend? Security professionals wanting to gain formal penetration testing skills IT staff looking to enhance their technical skills and knowledge... Learn about: Risk Assessment, Information Systems, Security Management...
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you