-
All
-
Online
-
Filters
Security Training
- Training
- Brusselsandanother venue.
- Naarden
- Beginner
- 5 Days
...The SABSA Foundation Modules are the starting point for developing Security Architecture competencies. They are designed to create a broad spectrum of understanding of the SABSA method, its frameworks, concepts, models and techniques, Theories and concepts are put to the test in "proof of concept... Learn about: SABSA priciples, Enterprise Architecture, Policy Architecture...
- Training
- Chennai (India)
- Intermediate
- Different dates available
...A brief introduction about the SIEM: SIEM is simply an approach of the security management. This provides a holistic view of company’s IT security... Learn about: Security Management...
- Training
- Online
- Intermediate
- Different dates available
- 30h
... Installation and Running Running Jenkins from the jar file Installation of Jenkins in a servlet container Security-Setup Email and Version Control Configurations...
- Training
- Online
- Advanced
- 1 Day
... and geared to "the computer security community". Several Federal "Security Risk Assessment Tools" are available but are incomplete, cumbersome and have an explicit disclaimer - use of the tool does not guarantee compliance with federal, state or local laws. Attend this session to learn the three components... Learn about: Medical Billing and Coding, Risk Management, Protected health information...
- Training
- Abu Dhabi (United Arab Emirates)
- Advanced
- Different dates available
- 2 Days
...://www.invensislearning.com/it-security-governance/cobit-5-foundation-certification-training-abu-dhabi-united-arab-emirates/cobit94invl30212/ Benefits of our COBIT 5 Foundation... Learn about: IT Management, IT Security...
- Training
- Distance Learning
... OF THIS COURSE This course will benefit government security agencies as well as organizations intent on pursuing any corrective action, litigation, or proof of guilt based on digital...
- Training
- Inhouse
...Our tutor will come out to your premises or you can come to our purpose built training facilities near Manchester City Football Club. We will then...
-
I just finished my Security Guarding - Level 2 course. I really enjoyed this course and would highly recommend the Specialist Security Group. This was a great week and I HAVE made some good friends and learned a lot from the tutor. The feedback given was veru useful. I would recommend these guys to anyone trying to get into the Security industry. Thank you to all the staff as they have been brilliant.
← | →
-
The course material was comprehensive, relevant and easy to understand. The teacher was cooperative in asking and answering queries but his accent was too fast to catch. venue was also comfortable in terms of class environment and basic facilities.
← | →
- Training
- Londonand22 other venues
- Sheffield, Bristol, Cardiff, Leicester, Coventry, Bradford, Newcastle-Upon-Tyne, Stoke-On-Trent, Wolverhampton, Nottingham, Plymoth ...
- 3 Days
... Guarding meets the requirement for the SIA License. The SIA Security Guarding course is run over three days and has a minimum of 26 hours of tuition and exams. There are 3 multiple choice exams...
... Guarding meets the requirement for the SIA License. The SIA Security Guarding course is run over three days and has a minimum of 26 hours of tuition and exams. There are 3 multiple choice exams...
-
I just finished my Security Guarding - Level 2 course. I really enjoyed this course and would highly recommend the Specialist Security Group. This was a great week and I HAVE made some good friends and learned a lot from the tutor. The feedback given was veru useful. I would recommend these guys to anyone trying to get into the Security industry. Thank you to all the staff as they have been brilliant.
← | → see all
-
The course material was comprehensive, relevant and easy to understand. The teacher was cooperative in asking and answering queries but his accent was too fast to catch. venue was also comfortable in terms of class environment and basic facilities.
← | → see all
- Training
- Chennai (India)
- Intermediate
- Different dates available
...It offers flexible deployment. We can able to include this in our app / installed user or system installations. We can also use this with the Docker containers...
- Training
- Online
- Intermediate
- 1h - 1 Day
... HIPAA Risk Analysis clearly and simply for staff of Covered Entities and Business Associates tasked with doing a HIPAA Risk Analysis who are not members of "the computer security community" Clarify and follow NIST methods without confusing jargon and complexity Cover Risk Analysis of all PHI - not... Learn about: Computer Security, Hipaa law, Risk Analysis...
- Training
- Chennai (India)
- Intermediate
- Different dates available
... Installation and Running Running Jenkins from the jar file Installation of Jenkins in a servlet container Security-Setup Email and Version Control Configurations...
- Training
- Online
- Intermediate
- Different dates available
- 30h
... Handling Security/ Encryption Excel Automation Image Recognition Email Automation commands Citrix Automation Scheduling Database Connect Disconnect Sql query... Learn about: Citrix Automation, Automation Anywhere, Control room...
-
Brilliant
← | →
-
Enjoy your training.
← | →
- Training
- Luton
- 3 Days
...Suitable for: Who is it for this for? New entrants to the security industry and those who are returning to it, having previously worked prior to the introduction of SIA licensing in 2005, will need to undertake the SIA training course and pass all of the assessments to be able to apply for an...
...Suitable for: Who is it for this for? New entrants to the security industry and those who are returning to it, having previously worked prior to the introduction of SIA licensing in 2005, will need to undertake the SIA training course and pass all of the assessments to be able to apply for an...
-
Brilliant
← | → see all
-
Enjoy your training.
← | → see all
- Training
- Online
- Advanced
- 1h
... you will be required to show the government you have all the necessary documentation in place for safeguarding patient Protected Health Information and indicate how you addressed all required security safeguards. This starts with the understanding the fundamentals of a HIPAA compliance program... Learn about: HIPAA compliance program, Hipaa checklist 2018, Hipaa standards...
- Training
- Online
- Advanced
- 2h
... be taking beyond the paperwork that can make an actual difference in patient data security. Why should you Attend: Did you conduct a technology security review, update your business associates agreements, have patients sign an updated privacy form and establish a disaster plan in the event of a data breach... Learn about: Hipaa violation, HIPAA Risk Management Plan, Hipaa laws...
- Training
- Online
- Advanced
- 1h
...Overview: The Risk Assessment which is required by the HIPAA Security Rule is often overlooked, misunderstood, or it seems to be too complex to even find a starting point. What some organizations find out is that while they brought in a third party auditor to do a "IT network assessment... Learn about: Hipaa regulations 2018, Hipaa form, Risk assessment process...
- Training
- Online
- Advanced
- 2h
...302-288-6884 Email: support@mentorhealth.com Website: http://www.mentorhealth.com/ http://www.mentorhealth.com/control/w_product/~product_id=801306LIVE?emagister_jun_2018_SEO... Learn about: Clinical Social Work, Private Security, Contract Negotiation...
- Training
- Chennai (India)
- Intermediate
- Different dates available
... Handling Security/ Encryption Excel Automation Image Recognition Email Automation commands Citrix Automation Scheduling Database Connect Disconnect Sql query... Learn about: Automation Anywhere, Excel Automation, Control room...
- Training
- Online
- Advanced
- 1h
...,a technology security review, updated business associates agreements, updated privacy forms, documented training, a disaster recovery plan in the event of a data breach and more. Faced with all there is to do it is easy to do nothing or to do the wrong things. This course will give you eight steps to... Learn about: Hipaa privacy and security rules, Hipaa hitech, New hipaa requirements...
- Training
- Online
- Intermediate
- 20h - 4 Weeks
..., Performing the period end process, Using Credit Lines, Describing the Cash Management Integration, Performing Analysis in the Transaction Manager, Managing Securities and other exchange traded products, Gaining efficiency with the Trade Finance Process, FX Risk Management Process, Handling FX Deals... Learn about: IT risk, Market Risk, Risk Management...