-
All
-
Online
-
Filters
Security Training
-
The two days course at Knowledgehut for CSM certification was really amazing. In such a short time, they have provided enough information about the subject.
← | →
-
Enjoyed the training with a lovely trainer and got a lot of information and knowledge about the subject.
← | →
-
Madhur is a professional coach, loved the training as they are professionally planned with great learning value.
← | →
- Training
- Online
- Different dates available
- 3 Days
...Certify yourself with the Scrum Master training! The new training offered by Knowledgehut and recently listed in Emagister catalogue provides you... Learn about: Software Engineering Tools, Computer Security, IT Management...
...Certify yourself with the Scrum Master training! The new training offered by Knowledgehut and recently listed in Emagister catalogue provides you... Learn about: Software Engineering Tools, Computer Security, IT Management...
-
The two days course at Knowledgehut for CSM certification was really amazing. In such a short time, they have provided enough information about the subject.
← | → see all
-
Enjoyed the training with a lovely trainer and got a lot of information and knowledge about the subject.
← | → see all
-
Madhur is a professional coach, loved the training as they are professionally planned with great learning value.
← | → see all
- Training
- Online
- Intermediate
- Different dates available
- 1 Month
...The Oracle WebCenter Content Server Administration training helps you develop a conceptual understanding of the behind-the-scenes process for managed content. Expert Oracle University instructors will teach you how to configure Webcenter Content Server, which includes implementing security... Learn about: Content Server, Implementing Security, Revising Content...
-
I’m happy with the content given within this course and the way it was delivered by the instructor. Matthew went beyond the course subject to upskill my comprehension on the matter. He was fun and made the training successful too. Thank you for everything, I look forward to seeing you soon.
← | →
-
I think the course content met my needs. There was a lot to take in since we covered two MTA courses in a week. In general, I feel Matthew was very knowledgeable. He gave us some very useful learning tools, which are very much appreciated and useful. I did feel lost at stages, but this is only due to the pace we had to cover the subjects.
← | →
- Training
- Inhouse
- Different dates available
- 213 Days
...Implement networking for branch offices. Configure advanced networking features. Implement Software Defined Networking... Learn about: MCSA training, Commercial IT, Windows Server...
...Implement networking for branch offices. Configure advanced networking features. Implement Software Defined Networking... Learn about: MCSA training, Commercial IT, Windows Server...
-
I’m happy with the content given within this course and the way it was delivered by the instructor. Matthew went beyond the course subject to upskill my comprehension on the matter. He was fun and made the training successful too. Thank you for everything, I look forward to seeing you soon.
← | → see all
-
I think the course content met my needs. There was a lot to take in since we covered two MTA courses in a week. In general, I feel Matthew was very knowledgeable. He gave us some very useful learning tools, which are very much appreciated and useful. I did feel lost at stages, but this is only due to the pace we had to cover the subjects.
← | → see all
- Training
- London
- Different dates available
... CISSP examination. Who is this course suitable for? Experienced security professionals who want to expand their knowledge and gain an internationally... Learn about: IT Development, IT Security, Access Control...
- Training
- Online
- Intermediate
- Different dates available
...Upon completion of the course delegates will develop their knowledge, skills and understanding in performing tasks associated with the following 3 units: IT User Fundamentals Using Email and the Internet Security for IT Users Available in Microsoft Office 2013, 2010 and 2007, Aspyra offers... Learn about: ECDL Essentials, Microsoft Office, Internet Security...
- Training
- Online
- Different dates available
...it was widely used by the construction industry right up until the year 2000. The Control of Asbestos Regulations 2012 apply to employers, employees... Learn about: Health Ed, Safety Management, Health and Safety...
- Training
- Online
- Different dates available
...it was widely used by the construction industry right up until the year 2000. The Control of Asbestos Regulations 2012 apply to employers, employees... Learn about: Security Awareness, Train the Trainer, Health and Safety...
- Training
- Online
- Different dates available
...Practice Labs for Cisco With our Practice Labs for Cisco we cover topics for ICND (1 & 2), CCNA Routing and Switching, CCNA Security and the more advanced topics of the CCNP exams (Routing, Switching and Troubleshooting) all using real Cisco equipment. The associated lab guides cover exam and... Learn about: IT Career Training Cyber Security, IT Security, IT Career...
- Training
- London
- Intermediate
- 5 Days
... CHFI Certification Program. Computer Security and Computer investigations are changing terms. More tools are invented daily for conducting Computer Investigations, be it computer crime, digital forensics, computer investigations, or even standard computer data recovery. The tools and techniques covered... Learn about: Forensic Investigator, Computer Hacking, IT Security...
- Training
- Utrecht (Netherlands)
- Advanced
- 4 Days
... compromising security or exposing sensitive information. Security and Identity Management & Access Control leaders often struggle with launching and sustaining Identity Management & Access Control initiatives. International Management Forum (IMF) advocates an approach to govern Identity Management & Access... Learn about: Access Control, Identity Management and Access Control, IT risk...
- Training
- Online
- Different dates available
... to structure preventative measures through penetration testing and network vulnerability assessments. The course bundle is designed to prepare of advance students in the positions of security engineers, security officers, network administrator and security auditors to name a... Learn about: IT Security, CYBER SECURITY, Forensic Investigator...
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
- Training
- Online
- Beginner
- Different dates available
- 19h
... professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure... Learn about: Email Crimes, Network Training, Windows Forensics...
... professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure... Learn about: Email Crimes, Network Training, Windows Forensics...
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Training
- Online
- Beginner
- Different dates available
- 13h
...The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments... Learn about: System Hacking, Scanning Networks, SQL Injection...
...The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments... Learn about: System Hacking, Scanning Networks, SQL Injection...
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Training
- London
- Intermediate
- Different dates available
- 2 Days
...The development of security-hardened embedded systems is a challenge. Vulnerabilities in products ranging from medical devices to industrial control systems and automobiles are being exploited by attackers. However, these systems can be (re)secured by following a variety of best practices... Learn about: IT Systems, Embedded security, Embedded Systems...
- Training
- Distance Learning
...The SSCP Study Guide & DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives you 100% coverage of (ISC)2 SSCP security domains plus test preparation software for the edge you need to...
- Training
- Online
- 2h
...for any data protection training. The course provides an introduction and the fundamentals of the GDPR. It talks about why the new legislation is being... Learn about: GDPR Fundamentals, Database training, Private Security...
- Training
- Online
- Intermediate
- Different dates available
...This course is preparation for the Microsoft 70-687 Configuring Windows 8 certification exam. Candidates for this exam are students seeking to be IT professionals who configure or support Windows 8 computers, devices, users, and associated network and security resources. The networks... Learn about: Windows Store, Windows 8, Configuring VPNs...
- Training
- Distance Learning
...Course Instructor: Kenneth Mayer Publisher: Career Academy Format: 7 PC CD-ROMs Published Date: November 2007 Availability: In Stock Order this interactive...
- Training
- Online
- Intermediate
- Different dates available
... Configuring Networking Part 2 3.11 Configuring Networking Part 3 3.12 Operating System Security Part 1 3.13 Operating System Security Part 2 3.14 Operating... Learn about: Operating Systems, PC training, Graphical Administrative Tools...
- Training
- Online
- Intermediate
- April
- 1h - 1 Day
...By Attending this Best Training program you will learn about ransomware prevention AND know what to do if they suspect ransomware has been introduced to the computer network, Computer security is one thing, understanding Ransomware and how it is implemented is different... Learn about: HIPAA regulations, Risk Management, Network Training...