-
All
-
Online
-
Filters
Security Training
-
The two days course at Knowledgehut for CSM certification was really amazing. In such a short time, they have provided enough information about the subject.
← | →
-
Enjoyed the training with a lovely trainer and got a lot of information and knowledge about the subject.
← | →
-
Madhur is a professional coach, loved the training as they are professionally planned with great learning value.
← | →
- Training
- Online
- Different dates available
- 3 Days
...Certify yourself with the Scrum Master training! The new training offered by Knowledgehut and recently listed in Emagister catalogue provides you... Learn about: CSM Training, Systems Administration, Computer Programming...
...Certify yourself with the Scrum Master training! The new training offered by Knowledgehut and recently listed in Emagister catalogue provides you... Learn about: CSM Training, Systems Administration, Computer Programming...
-
The two days course at Knowledgehut for CSM certification was really amazing. In such a short time, they have provided enough information about the subject.
← | → see all
-
Enjoyed the training with a lovely trainer and got a lot of information and knowledge about the subject.
← | → see all
-
Madhur is a professional coach, loved the training as they are professionally planned with great learning value.
← | → see all
- Training
- Online
- Intermediate
- Different dates available
- 1 Month
...The Oracle WebCenter Content Server Administration training helps you develop a conceptual understanding of the behind-the-scenes process for managed content. Expert Oracle University instructors will teach you how to configure Webcenter Content Server, which includes implementing security... Learn about: Revising Content, Security Model, Implementing Security...
-
I’m happy with the content given within this course and the way it was delivered by the instructor. Matthew went beyond the course subject to upskill my comprehension on the matter. He was fun and made the training successful too. Thank you for everything, I look forward to seeing you soon.
← | →
-
I think the course content met my needs. There was a lot to take in since we covered two MTA courses in a week. In general, I feel Matthew was very knowledgeable. He gave us some very useful learning tools, which are very much appreciated and useful. I did feel lost at stages, but this is only due to the pace we had to cover the subjects.
← | →
- Training
- Inhouse
- Different dates available
- 213 Days
...Implement networking for branch offices. Configure advanced networking features. Implement Software Defined Networking... Learn about: Windows Server, Commercial IT, MCSA training...
...Implement networking for branch offices. Configure advanced networking features. Implement Software Defined Networking... Learn about: Windows Server, Commercial IT, MCSA training...
-
I’m happy with the content given within this course and the way it was delivered by the instructor. Matthew went beyond the course subject to upskill my comprehension on the matter. He was fun and made the training successful too. Thank you for everything, I look forward to seeing you soon.
← | → see all
-
I think the course content met my needs. There was a lot to take in since we covered two MTA courses in a week. In general, I feel Matthew was very knowledgeable. He gave us some very useful learning tools, which are very much appreciated and useful. I did feel lost at stages, but this is only due to the pace we had to cover the subjects.
← | → see all
- Training
- London
- Different dates available
... CISSP examination. Who is this course suitable for? Experienced security professionals who want to expand their knowledge and gain an internationally... Learn about: Access Control, IT Security, IT Development...
- Training
- Online
- Intermediate
- Different dates available
...Upon completion of the course delegates will develop their knowledge, skills and understanding in performing tasks associated with the following 3 units: IT User Fundamentals Using Email and the Internet Security for IT Users Available in Microsoft Office 2013, 2010 and 2007, Aspyra offers... Learn about: Microsoft Office, Computer Safely, ECDL Essentials...
- Training
- Online
- Different dates available
...it was widely used by the construction industry right up until the year 2000. The Control of Asbestos Regulations 2012 apply to employers, employees... Learn about: Health Ed, Security Awareness, Asbestos Awareness...
- Training
- Online
- Different dates available
...it was widely used by the construction industry right up until the year 2000. The Control of Asbestos Regulations 2012 apply to employers, employees... Learn about: Health Management, Train the Trainer, Health Ed...
- Training
- Online
- Different dates available
...Practice Labs for Cisco With our Practice Labs for Cisco we cover topics for ICND (1 & 2), CCNA Routing and Switching, CCNA Security and the more advanced topics of the CCNP exams (Routing, Switching and Troubleshooting) all using real Cisco equipment. The associated lab guides cover exam and... Learn about: Computer Security, IT Career, Network security...
- Training
- London
- Intermediate
- 5 Days
... CHFI Certification Program. Computer Security and Computer investigations are changing terms. More tools are invented daily for conducting Computer Investigations, be it computer crime, digital forensics, computer investigations, or even standard computer data recovery. The tools and techniques covered... Learn about: Computer Hacking, IT Security, Ethical Hacking...
- Training
- Londonandanother venue.
- In House
- Different dates available
- 1 Day
... recent disruptive events and falling credit quality, the security provided by Covered Bonds is likely to result in much more attention in future... Learn about: Bonds Trading, IT risk, Public Sector...
- Training
- Utrecht (Netherlands)
- Advanced
- 4 Days
... compromising security or exposing sensitive information. Security and Identity Management & Access Control leaders often struggle with launching and sustaining Identity Management & Access Control initiatives. International Management Forum (IMF) advocates an approach to govern Identity Management & Access... Learn about: Identity Management, IT risk, Access Control...
- Training
- Online
- Different dates available
... to structure preventative measures through penetration testing and network vulnerability assessments. The course bundle is designed to prepare of advance students in the positions of security engineers, security officers, network administrator and security auditors to name a... Learn about: CYBER SECURITY, Cisco networking, Wireless Network...
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
- Training
- Online
- Beginner
- Different dates available
- 19h
... professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure... Learn about: Windows Forensics, Log Correlation, Email Crimes...
... professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure... Learn about: Windows Forensics, Log Correlation, Email Crimes...
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Training
- Online
- Beginner
- Different dates available
- 13h
...The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments... Learn about: Ethical Hacker, Wireless Networks, Scanning Networks...
...The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments... Learn about: Ethical Hacker, Wireless Networks, Scanning Networks...
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Training
- London
- Intermediate
- Different dates available
- 2 Days
...The development of security-hardened embedded systems is a challenge. Vulnerabilities in products ranging from medical devices to industrial control systems and automobiles are being exploited by attackers. However, these systems can be (re)secured by following a variety of best practices... Learn about: Embedded security, IT programming, IT Systems...
- Training
- Distance Learning
...The SSCP Study Guide & DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives you 100% coverage of (ISC)2 SSCP security domains plus test preparation software for the edge you need to...
- Training
- Online
- 2h
...for any data protection training. The course provides an introduction and the fundamentals of the GDPR. It talks about why the new legislation is being... Learn about: Data Management, Privacy Program, Data Mining...
- Training
- Online
- Intermediate
- Different dates available
...This course is preparation for the Microsoft 70-687 Configuring Windows 8 certification exam. Candidates for this exam are students seeking to be IT professionals who configure or support Windows 8 computers, devices, users, and associated network and security resources. The networks... Learn about: Mobile Computing, Network Access, Windows 8...
- Training
- Distance Learning
...Course Instructor: Kenneth Mayer Publisher: Career Academy Format: 7 PC CD-ROMs Published Date: November 2007 Availability: In Stock Order this interactive...
- Training
- Online
- Intermediate
- Different dates available
... Configuring Networking Part 2 3.11 Configuring Networking Part 3 3.12 Operating System Security Part 1 3.13 Operating System Security Part 2 3.14 Operating... Learn about: Operating Systems, Operating System, Mobile devices...