-
All
-
Online
-
Filters
-
Location
-
Online
-
Type of studies
-
+ Filters (1)
Online/Distance IT Security Training
- Training
- Online
- Intermediate
- Different dates available
..., security and risk management... Learn about: Life Cycle Management, IT Service, Auditing Information...
- Training
- Online
- Different dates available
... to structure preventative measures through penetration testing and network vulnerability assessments. The course bundle is designed to prepare of advance students in the positions of security engineers, security officers, network administrator and security auditors to name a... Learn about: Ethical Hacker, CYBER SECURITY, Hacking Web Servers...
- Training
- Distance Learning
...The SSCP Study Guide & DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives you 100% coverage of (ISC)2 SSCP security domains plus test preparation software for the edge you need to...
- Training
- Distance Learning
... to changes in the DR/BCP domain. Mile2 consultants working in the DR/BCP and security field will be dynamically implementing new scenarios...
- Training
- Online
- Different dates available
...IT Security is considered by many to be the fastest growing and most lucrative sector in the IT market. With today's leading companies putting an ever growing importance on the security of their infrastructure, IT Security pros are capitalizing on acquiring high salary positions to protect these... Learn about: IT risk, IT Law, IT Security...
- Training
- Distance Learning
...in ethical hacking. Key Features and Benefits: Officially endorsed courseware for study toward the EC-Council's Certified Ethical Hacker certification...
- Training
- Online
- Beginner
- Different dates available
...The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing, and expands into all major domains... Learn about: IT risk, Risk Management, Audit management...
- Training
- Distance Learning
...knowledge needed to gain the Certified Forensic Computer Examiner (CFCE) & Certified Computer Examiner (CCE) certifications. Program What's Included?...
- Training
- Online
- Beginner
- Different dates available
... sophisticated attacks. Backed by (ISC)², the globally recognized, not-for-profit organization dedicated to advancing the information security field, deeming CISSP as the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP... Learn about: Access Management, Software Development Security, Security Engineering...
- Training
- Distance Learning
...This course is the equivalent to an intensive 5-day classroom-based course. Upon completion of this course you will have a hands on understanding and experience...
- Training
- Online
- Beginner
- Different dates available
...The CASP exam covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions... Learn about: Secure System Life Cycle, SQL Injection, Security Services...
- Training
- Online
- Beginner
- Different dates available
...CompTIA Security+ certification is globally recognized to validate foundational, vendor-neutral IT security knowledge and skills. This CompTIA Security+ course is an excellent starting point for a career in information security and will prepare you to pass the Security+ exam... Learn about: Security Terminology, Access Control, Disaster Recovery...
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
- Training
- Online
- Beginner
- Different dates available
...CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal... Learn about: Email Crimes, Web Attacks, Network Training...
...CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal... Learn about: Email Crimes, Web Attacks, Network Training...
-
Even though I was skeptical at the beginning, I really enjoyed the course, it was very informative as well as interesting. Highly recommended.
← | →
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Training
- Online
- Beginner
- Different dates available
...The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments... Learn about: Web Application Vulnerabilities, SQL Injection, Wireless Networks...
...The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments... Learn about: Web Application Vulnerabilities, SQL Injection, Wireless Networks...
-
I would definitely recommend Oxford Applied Training to any co-worker interested in the CEH certificate. Very much impressed about how well things work and the staff was always helpful and kind. Will be browsing other courses in the future. Thank you.
← | →
- Training
- Online
- Beginner
- Different dates available
...Applied Training custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market... Learn about: Systems Acquisition, System Operation, Information Systems...
- Training
- Online
- Intermediate
- Different dates available
...on real world scenarios explained by the instructor.Oxford Applied Training always focuses on real world scenarios and skill-set development... Learn about: Web Applications, Service Applications, Logical Architecture...
- Training
- Online
- Intermediate
- Different dates available
...SharePoint 2013 Part 2 3.3 Upgrading to SharePoint 2013 Part 3 3.4 Upgrading to SharePoint 2013 Part 4 3.5 Upgrading to SharePoint 2013 Part 5 3.6 Upgrading... Learn about: Applied Physics, Business Continuity, Applications ...
- Training
- Online
- Different dates available
..., NAT, ACLs); Network Device Security; Basic Troubleshooting... Learn about: Network Training, Cisco IOS, Access Control...
- Training
- Distance Learning
- Beginner
... techniques for discovering potential security problems with your websites and networks. This course requires that you already have familiarity with the basics...
- Training
- Distance Learning
- Beginner
... have completed these two White Hat Hacking video tutorials, you will be completely comfortable with the methods and tools needed to evaluate potential security...