-
All
- Online
-
Filters
Security Management Training
- Training
- Iver
- Beginner
- Different dates available
... delegates introduced to the venue and their peers, before moving onto subject matter such as Crime Reduction models, Security of Medicines, Drugs. Week... Learn about: Security of Medicines, Witness Statements, Negotiation Skills...
- Training
- Online
- Intermediate
- Different dates available
... content is delivered from a truly independent and consultative perspective with no bias towards any technology solution or portfolio. Each of our engaging Certified GCHQ Cyber Security trainers has 15+ years experience and is a subject matter expert. Our delivery style is designed to be interactive... Learn about: Security Manageme, Information Security, Incident management...
- Training
- London
- Intermediate
- 5 Days
... used to implement information security controls from all areas of ISO/IEC 27002. This training is consistent with the project management practices established in ISO 10006 (Quality Management Systems – Guidelines for Quality Management in Projects). This training is also fully compatible with ISO/IEC... Learn about: CYBER SECURITY, Information Security, ISO 27001...
- Training
- Chennai (India)
- Intermediate
- Different dates available
...A brief introduction about the SIEM: SIEM is simply an approach of the security management. This provides a holistic view of company’s IT security... Learn about: Security Management...
- Training
- Inhouse in Fayetteville (USA)
- Advanced
- 10 Days
...Advanced Close Protection & Security Management. The 10 day course is designed for hostile environments. This unique course is one our most complete training packages, covering a wide range of high level specialist security and risk management skills... Learn about: Close protection, Security Management, Security Officer...
- Training
- Online
- Intermediate
- Different dates available
...2414 offer Certified Cyber Security Courses, available UK wide. The UK Government has identified a significant shortage of skilled cyber security professionals and Government Communications Headquarters (GCHQ) is working with other government departments to address this issue... Learn about: Security Manager, Security Awareness, Security Systems Installation...
- Training
- London
- Beginner
- 5 Days
...a basic knowledge of ISO/IEC 27001:2005 and ISO/IEC 27002:2013 is recommended Educational approach This training is based on both theory and practice... Learn about: Information Security, ISO Audit, ISO requirements...
- Training
- Redhill
- Different dates available
- 1 Day
...ISO 27001: 2013 is the accepted global standard for effective information security management. Implementing ISO 27001 can bring you peace of mind that you are protecting your business and your customers’ data in line with good practice and GDPR requirements. In our Introduction to ISO 27001: 2013... Learn about: ISO 27001, Risk Analysis, Risk Mgmt...
- Training
- Online
- 2h
...A UCITS is a collective investment undertaking whose sole aim is the collective investment in transferable securities and/or other liquid financial instruments of capital raised from the public. UCITS are established and authorised under a harmonised EU legal framework... Learn about: EU Legal Framework, Investment Funds, Financial Sector...
- Training
- Online
- Intermediate
- Different dates available
...ISO/IEC 27001 is an international standard for Information Security Management. ISO27001 provides a model to establish, implement, maintain and continually improve a risk-managed ISMS (Information Security Management System)... Learn about: Security Management, Security and risk, IT risk...
- Training
- London
- Beginner
- 5 Days
...Summary This five-day intensive course enables participants to develop the necessary expertise to lead a professional penetration test using a mix of practical technical techniques and management skills. The course has been designed by Industry experts with in-depth experience in the Penetration... Learn about: CYBER SECURITY, Security Management, PCI DSS...
- Training
- Redhill
- Beginner
- 2 Days
... an ISMS that will achieve consistent improvements in your information security and compliance with legislation... Learn about: Best Practice, ISO 27001, Business Continuity...
-
everything was practical and understandable. one of best courses I've been into.
← | →
-
It's my out most pleasure to have a made a decision to become a CCTV engineer, and F R Joseph Anton Limited, assisted me in completing my goals. the course it self cover all area about CCTV system, more importantly The practical and theory aspect of the course is well conducted. simple and easy to understand.
← | →
-
The course contained almost all the information to install a cctv system. When I started the course had no technical information and now I can install a cctv with confidence.
← | →
- Training
- Erith
- 3 Days
...CCTV Installation & Maintenance Course This course covers areas of CCTV installation with IP setting for installation and maintenance. At the successful... Learn about: Security Systems Installation, Security Management...
...CCTV Installation & Maintenance Course This course covers areas of CCTV installation with IP setting for installation and maintenance. At the successful... Learn about: Security Systems Installation, Security Management...
-
everything was practical and understandable. one of best courses I've been into.
← | → see all
-
It's my out most pleasure to have a made a decision to become a CCTV engineer, and F R Joseph Anton Limited, assisted me in completing my goals. the course it self cover all area about CCTV system, more importantly The practical and theory aspect of the course is well conducted. simple and easy to understand.
← | → see all
-
The course contained almost all the information to install a cctv system. When I started the course had no technical information and now I can install a cctv with confidence.
← | → see all
- Training
- Online
- Intermediate
- Different dates available
...ISO/IEC 27001 is an international standard for Information Security Management. ISO27001 provides a model to establish, implement, maintain and continually improve a risk-managed ISMS (Information Security Management System)... Learn about: Security Management, Data security, Risk Management...
-
The various features and capabilities are endless. New software updates keep advancing the technology. Between the users group, CRM site, and tech support, addressing any issues is made easy.
← | →
- Training
- Inhouse
- Different dates available
- 5 Days
...If you are interested in performing a meticulous analysis regarding the Security Requirements. Then, you should look at this online program added by Emagister. The ISO 27001:2013 Lead Auditor program performed by IQMS will allow you to have an in-depth understanding of the ISO 27001:2013... Learn about: And management systems, IT Management, IT Security...
...If you are interested in performing a meticulous analysis regarding the Security Requirements. Then, you should look at this online program added by Emagister. The ISO 27001:2013 Lead Auditor program performed by IQMS will allow you to have an in-depth understanding of the ISO 27001:2013... Learn about: And management systems, IT Management, IT Security...
-
The various features and capabilities are endless. New software updates keep advancing the technology. Between the users group, CRM site, and tech support, addressing any issues is made easy.
← | →
- Training
- Redhill
- Different dates available
- 2 Days
...This two-day course will help anyone responsible for managing an Information Security Management System (ISMS) to remain consistently compliant against the requirements of ISO27001: 2013. With a hands-on approach to auditing, this course teaches the gap analysis skills needed to continually improve... Learn about: Security Management, ISO 27001, Auditing documentation...
- Training
- Colchesterandanother venue.
- Chelmsford
- Different dates available
- 4 Days
... courses aiming to leave our candidates with an impression that goes beyond just a qualification. The course is particularly aimed at any person responsible for security, protection, screening the suitability of people entering premises or dealing with conflict in the pubs, clubs and other licensed premises... Learn about: Decision Making, Holding Techniques, Conflict Management...
- Training
- Online
- Different dates available
...Course Programme Benefits of Good Data Safety Rights and Conditions The Data Protection Act Data Sharing and Security Creating a Data Protection... Learn about: Data Collection, Security Management, Training regulations...
- Training
- Online
- Intermediate
- Different dates available
- 3h - 1 Day
...This session will describe the information security compliance process, how it works, and how it can help you decide how to integrate e-mail and texting into your organization in a compliant way, learn how to use an information security management process to evaluate risks and make decisions... Learn about: IT risk, Security Management...
- Training
- Redhill
- Intermediate
- 2 Days
...This two-day course will help anyone responsible for managing their organisation’s information security management system (ISMS) to remain consistently compliant against the GDPR requirements. With a hands-on approach to auditing, this course teaches the gap analysis skills needed to continually... Learn about: System auditing, Audit Process, Internal Auditng...
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you