-
All
- Online
-
Filters
-
Location
- Online
-
Type of studies
-
+ Filters
... delegates introduced to the venue and their peers, before moving onto subject matter such as Crime Reduction models, Security of Medicines, Drugs. Week... Learn about: Crime Reduction, Negotiation Skills, Counter terrorism...
... delegates introduced to the venue and their peers, before moving onto subject matter such as Crime Reduction models, Security of Medicines, Drugs. Week... Learn about: Crime Reduction, Negotiation Skills, Counter terrorism...
...ISO 27001: 2013 is the accepted global standard for effective information security management. Implementing ISO 27001 can bring you peace of mind that you are protecting your business and your customers’ data in line with good practice and GDPR requirements. In our Introduction to ISO 27001: 2013... Learn about: Security Management, Risk Analysis, Risk Factors...
...ISO 27001: 2013 is the accepted global standard for effective information security management. Implementing ISO 27001 can bring you peace of mind that you are protecting your business and your customers’ data in line with good practice and GDPR requirements. In our Introduction to ISO 27001: 2013... Learn about: Security Management, Risk Analysis, Risk Factors...
... used to implement information security controls from all areas of ISO/IEC 27002. This training is consistent with the project management practices established in ISO 10006 (Quality Management Systems – Guidelines for Quality Management in Projects). This training is also fully compatible with ISO/IEC... Learn about: IT risk, Security Management, Information Security...
... used to implement information security controls from all areas of ISO/IEC 27002. This training is consistent with the project management practices established in ISO 10006 (Quality Management Systems – Guidelines for Quality Management in Projects). This training is also fully compatible with ISO/IEC... Learn about: IT risk, Security Management, Information Security...
...Advanced Close Protection & Security Management. The 10 day course is designed for hostile environments. This unique course is one our most complete training packages, covering a wide range of high level specialist security and risk management skills... Learn about: Risk Assessment, Security Officer, Close protection...
...Advanced Close Protection & Security Management. The 10 day course is designed for hostile environments. This unique course is one our most complete training packages, covering a wide range of high level specialist security and risk management skills... Learn about: Risk Assessment, Security Officer, Close protection...
... content is delivered from a truly independent and consultative perspective with no bias towards any technology solution or portfolio. Each of our engaging Certified GCHQ Cyber Security trainers has 15+ years experience and is a subject matter expert. Our delivery style is designed to be interactive... Learn about: Security Manageme, Incident management, Risk Management...
... content is delivered from a truly independent and consultative perspective with no bias towards any technology solution or portfolio. Each of our engaging Certified GCHQ Cyber Security trainers has 15+ years experience and is a subject matter expert. Our delivery style is designed to be interactive... Learn about: Security Manageme, Incident management, Risk Management...
...A brief introduction about the SIEM: SIEM is simply an approach of the security management. This provides a holistic view of company’s IT security... Learn about: Security Management...
...A brief introduction about the SIEM: SIEM is simply an approach of the security management. This provides a holistic view of company’s IT security... Learn about: Security Management...
.... They are also internationally regarded as one of the most effective asset management tools available thanks to their strong regulation, which results in high levels of investor protection... Learn about: Liquid Financial Instruments, Management Tools, Investment Funds...
.... They are also internationally regarded as one of the most effective asset management tools available thanks to their strong regulation, which results in high levels of investor protection... Learn about: Liquid Financial Instruments, Management Tools, Investment Funds...
...CCTV Installation & Maintenance Course This course covers areas of CCTV installation with IP setting for installation and maintenance. At the successful... Learn about: Security Management, Security Systems Installation...
...CCTV Installation & Maintenance Course This course covers areas of CCTV installation with IP setting for installation and maintenance. At the successful... Learn about: Security Management, Security Systems Installation...
... systems that run Windows 7 client, supporting mobile users. and identifying cause of and resolving security issues... Learn about: Internet Explorer, Network Connectivity, Network Training...
... systems that run Windows 7 client, supporting mobile users. and identifying cause of and resolving security issues... Learn about: Internet Explorer, Network Connectivity, Network Training...
...Course Programme Benefits of Good Data Safety Rights and Conditions The Data Protection Act Data Sharing and Security Creating a Data Protection... Learn about: Security risk management, Data security, Training regulations...
...Course Programme Benefits of Good Data Safety Rights and Conditions The Data Protection Act Data Sharing and Security Creating a Data Protection... Learn about: Security risk management, Data security, Training regulations...
...This session will describe the information security compliance process, how it works, and how it can help you decide how to integrate e-mail and texting into your organization in a compliant way, learn how to use an information security management process to evaluate risks and make decisions... Learn about: Security Management, IT risk...
...This session will describe the information security compliance process, how it works, and how it can help you decide how to integrate e-mail and texting into your organization in a compliant way, learn how to use an information security management process to evaluate risks and make decisions... Learn about: Security Management, IT risk...
...This two-day course will help anyone responsible for managing an Information Security Management System (ISMS) to remain consistently compliant against the requirements of ISO27001: 2013. With a hands-on approach to auditing, this course teaches the gap analysis skills needed to continually improve... Learn about: Auditing documentation, Security Management, IT Auditing...
...This two-day course will help anyone responsible for managing an Information Security Management System (ISMS) to remain consistently compliant against the requirements of ISO27001: 2013. With a hands-on approach to auditing, this course teaches the gap analysis skills needed to continually improve... Learn about: Auditing documentation, Security Management, IT Auditing...
...a basic knowledge of ISO/IEC 27001:2005 and ISO/IEC 27002:2013 is recommended Educational approach This training is based on both theory and practice... Learn about: ISO requirements, Information Systems, Information Security...
...a basic knowledge of ISO/IEC 27001:2005 and ISO/IEC 27002:2013 is recommended Educational approach This training is based on both theory and practice... Learn about: ISO requirements, Information Systems, Information Security...
...Safety Awareness for Door Supervisors a knowledge unit covering counter terrorism issues, first aid situations and requirements regarding children and young people 2 guided learning hours. Physical Intervention Skills for the Private Security Industry 10 guided learning hours (7.5 hours... Learn about: Upskilling Door Supervisors Physical Intervention, Saftey on stairs, Escorting Techniques...
...Safety Awareness for Door Supervisors a knowledge unit covering counter terrorism issues, first aid situations and requirements regarding children and young people 2 guided learning hours. Physical Intervention Skills for the Private Security Industry 10 guided learning hours (7.5 hours... Learn about: Upskilling Door Supervisors Physical Intervention, Saftey on stairs, Escorting Techniques...
...2414 offer Certified Cyber Security Courses, available UK wide. The UK Government has identified a significant shortage of skilled cyber security professionals and Government Communications Headquarters (GCHQ) is working with other government departments to address this issue... Learn about: IT Security, CYBER SECURITY, Security Manager...
...2414 offer Certified Cyber Security Courses, available UK wide. The UK Government has identified a significant shortage of skilled cyber security professionals and Government Communications Headquarters (GCHQ) is working with other government departments to address this issue... Learn about: IT Security, CYBER SECURITY, Security Manager...
... an ISMS that will achieve consistent improvements in your information security and compliance with legislation... Learn about: Security Management, Best Practice, Business Continuity...
... an ISMS that will achieve consistent improvements in your information security and compliance with legislation... Learn about: Security Management, Best Practice, Business Continuity...
...Summary This five-day intensive course enables participants to develop the necessary expertise to lead a professional penetration test using a mix of practical technical techniques and management skills. The course has been designed by Industry experts with in-depth experience in the Penetration... Learn about: Systems Security, Risk Assessment, ISO 27001...
...Summary This five-day intensive course enables participants to develop the necessary expertise to lead a professional penetration test using a mix of practical technical techniques and management skills. The course has been designed by Industry experts with in-depth experience in the Penetration... Learn about: Systems Security, Risk Assessment, ISO 27001...
...ISO/IEC 27001 is an international standard for Information Security Management. ISO27001 provides a model to establish, implement, maintain and continually improve a risk-managed ISMS (Information Security Management System)... Learn about: Security and risk, Data security, Security Management...
...ISO/IEC 27001 is an international standard for Information Security Management. ISO27001 provides a model to establish, implement, maintain and continually improve a risk-managed ISMS (Information Security Management System)... Learn about: Security and risk, Data security, Security Management...
... Application Of GPO 6.12 Delegating Administrative Control Of Group Policy 6.13 Summary Module 7: Desktop Environmental And Security Management 7.1 Configure... Learn about: Desktop Environmental, Security Management, Disaster Recovery...
... Application Of GPO 6.12 Delegating Administrative Control Of Group Policy 6.13 Summary Module 7: Desktop Environmental And Security Management 7.1 Configure... Learn about: Desktop Environmental, Security Management, Disaster Recovery...
... courses aiming to leave our candidates with an impression that goes beyond just a qualification. The course is particularly aimed at any person responsible for security, protection, screening the suitability of people entering premises or dealing with conflict in the pubs, clubs and other licensed premises... Learn about: Civil law, Decision Making, Physical intervention skills...
... courses aiming to leave our candidates with an impression that goes beyond just a qualification. The course is particularly aimed at any person responsible for security, protection, screening the suitability of people entering premises or dealing with conflict in the pubs, clubs and other licensed premises... Learn about: Civil law, Decision Making, Physical intervention skills...
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you
Training by subject