-
All
- Online
-
Filters
-
Netherlands
- Online
-
Type of studies
-
+ Filters (1)
IT Security training Netherlands
- Training
- Naardenandanother venue.
- Brussels
- Beginner
- 5 Days
...The SABSA Foundation Modules are the starting point for developing Security Architecture competencies. They are designed to create a broad spectrum of understanding of the SABSA method, its frameworks, concepts, models and techniques, Theories and concepts are put to the test in "proof of concept... Learn about: Holistic Framework, SABSA priciples, Business Attributes Profiling...
- Training
- Amsterdamandanother venue.
- 5 Days
... will provide real life practical examples to illustrate key concepts. This course is designed to provide an intensive and complete preparation to ensure that delegates pass the (ISC)2 CISSP examination at the very first attempt. Suitable for: CISO, CSO, Security Engineers, Members of the Information Security...
- Training
- Utrecht (Netherlands)
- Advanced
- 02 Oct 2024
- 4 Days
... compromising security or exposing sensitive information. Security and Identity Management & Access Control leaders often struggle with launching and sustaining Identity Management & Access Control initiatives. International Management Forum (IMF) advocates an approach to govern Identity Management & Access... Learn about: Access Control, Identity Management and Access Control, Identity Management...
- Training
- Amsterdam (Netherlands)
- Advanced
- 10 Jun 2024
- 5 Days
...This 5-day CISSP certification training will prepare you for the official (ISC)2 CISSP exam. Get certified now for CISSP, the world’s premier (cyber) security certification!... Learn about: Security and Risk Management, Security Professionals, Information Security...
Similar training and in other locations
- Training
- Distance Learning
... topics such as Access Control Systems, Cryptography, and Security Management Practices...
- Training
- Distance Learning
... OF THIS COURSE This course will benefit government security agencies as well as organizations intent on pursuing any corrective action, litigation, or proof of guilt based on digital...
- Training
- Online
- Intermediate
- Different dates available
.... With this course you can move beyond effective cyber security and achieve cyber resilience... Learn about: Cyber Resilience, IT professionals, Common Language...
- Training
- Online
- Intermediate
- Different dates available
... Personal Computer Operating Systems Windows Control Panel Utilities Command Line Tools Windows Security Settings Windows Operating System Tools Operational... Learn about: Computer Operating Systems, Operating Systems, System Components...
- Training
- Online
- Intermediate
- Different dates available
... the infrastructure of corporates from various data breaches. In our training, you can learn step by step basics methodologies like how to write virus codes that the hackers use, reverse engineering and more in-depth. Candidates can develop their skills in network security by learning different concepts like advanced... Learn about: Network Training...
- Training
- Online
- Beginner
- Different dates available
..., Ensures better control over the data , security over information access and achieving desired results, Through BPC can improve the accuracy and reliability, Can have audit trial, Can streamline their business process, Can come up with accurate plans, budgets and can incorporate the actual... Learn about: Financial Training, SAP FUNCTIONAL CONSULTANTS, Financial Accounting...
-
Well structured and easy to understad. I have already recommended this centre to my friends and one has signed up. Thank you so much!
← | →
- Training
- Online
- Beginner
- Different dates available
..., PMI Risk Management Professional, CISA, CASP and Security+. Take yourself to the top of your field with this Learn365 Training Bundle. PLEASE NOTE: These are the training courses only. Exam costs are not included. Some certifications have additional requirements for exam eligibility such as job-role... Learn about: IT Security, IT risk, Risk Management...
..., PMI Risk Management Professional, CISA, CASP and Security+. Take yourself to the top of your field with this Learn365 Training Bundle. PLEASE NOTE: These are the training courses only. Exam costs are not included. Some certifications have additional requirements for exam eligibility such as job-role... Learn about: IT Security, IT risk, Risk Management...
-
Well structured and easy to understad. I have already recommended this centre to my friends and one has signed up. Thank you so much!
← | →
-
Excellent course. I'll continue using Oxford Applied Traning platform.Overall I found the course well worth the time and effort to help guide me in order to get the certificate. Thanks.
← | →
- Training
- Online
- Beginner
- Different dates available
...The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, oversees, and assesses an enterprise’s information security... Learn about: Program Implementation, Incident management, Security Manager...
...The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, oversees, and assesses an enterprise’s information security... Learn about: Program Implementation, Incident management, Security Manager...
-
Excellent course. I'll continue using Oxford Applied Traning platform.Overall I found the course well worth the time and effort to help guide me in order to get the certificate. Thanks.
← | →
- Training
- Online
- Intermediate
- Different dates available
...This CompTIA Security+ course is designed to enable delegates to prepare for the successful achievement of the CompTIA Security+ examination. This CompTIA Security+ Certification program is an industry-wide, vendor-neutral program which is developed and sponsored by The Computing Industry... Learn about: Environmental Nature, Technology Association, Vendor Neutral Program...
- Training
- Distance Learning
...If you are studying for your Security+ certification and want a route to study in your own time and at your own pace then this is the computer based training course you need...
- Training
- Distance Learning
...: Application and System Development. Module 10: Operations Security...
- Training
- Online
- Intermediate
- Different dates available
- 1 Year
...It'll help them test various scenarios by emulating their network.GNS3 integrates with Virtual Machines and uses the GNS3 templates to allow users simulate... Learn about: Network Training, Vendor support...
- Training
- Online
- Intermediate
- Different dates available
...(Control Objectives for Information and Related Technology) framework was developed by ISACA (Information Systems Audit & Control Association)... Learn about: Information Systems, COBIT5 framework...
- Training
- Online
- Intermediate
- Different dates available
...Intro to Git distributed version control system Installation and setup Installation git on Mac/Windows/Linux Git file lifecycle Learn about github Understanding...
- Training
- Online
- Beginner
...ERP overview SAP overview ABAP overview Data Types Formatting Options - Parameters Data Types String Operations - System Defined Variable Control Statements... Learn about: DD Foreign Key, Data Dictionary Lock Objects, SQL Statements...
- Training
- Online
- Different dates available
...IT Security is considered by many to be the fastest growing and most lucrative sector in the IT market. With today's leading companies putting an ever growing importance on the security of their infrastructure, IT Security pros are capitalizing on acquiring high salary positions to protect these... Learn about: Cloud computing, IT Security, IOS Network...
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you