-
All
-
Online
-
Filters
-
Location
-
Online
-
Type of studies
-
+ Filters (1)
Inhouse IT Security Training
- Training
- Inhouse
- Different dates available
- 148 Days
...This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-367, and build an understanding of these topics: Security Layers, Operating System Security, Network Security, Security Software. This course leverages the same content as found in the Microsoft Official... Learn about: Network Training, Operating System, Network security...
- Training
- Inhouse
- Different dates available
- 37 Days
...CompTIA Security+ is an intensive course designed for IT professionals wishing to improve their knowledge in network security, as well as application, data and host security. It also covers Cryptography, access control and identity management. The course also covers how to access threats... Learn about: Network Training, Access Control, Network security...
- Training
- Inhouse
- Different dates available
- 210 Days
...The Security Development Lifecycle (SDL) is a software development process that helps developers build more secure software and address security compliance requirements while reducing development cost...
- Training
- Inhouse
- Different dates available
- 199 Days
...MCSE Desktop Infrastructure Solutions Expert. Show that you can deploy and manage desktops and devices that provide access from anywhere, while maintaining security and compliance. Also validate your skills in desktop virtualization, remote desktop services, and application virtualization... Learn about: MCSE training...
Similar training in other typologies
- Course
- Inhouse
- 4 Days
...This four-day, instructor-led course provides students with theknowledge and skills to begin supporting network security within anorganization. Students who complete this course will be able to identifysecurity threats and vulnerabilities, and help respond to and recover fromsecurity incidents...
-
Trainer's flexibility to go off topic to look into our needs impressed me, I would highlight it.
← | →
- Short course
- Inhouse
- Advanced
- Different dates available
...Serving teams that use managed code (.NET and ASP.NET typically written in C#) together with native code development (typically C/C++), this training gives a comprehensive overview of the security issues in both environments. Concerning C/C++, common security vulnerabilities are discussed, backed... Learn about: XML training, Network security, ASP training...
...Serving teams that use managed code (.NET and ASP.NET typically written in C#) together with native code development (typically C/C++), this training gives a comprehensive overview of the security issues in both environments. Concerning C/C++, common security vulnerabilities are discussed, backed... Learn about: XML training, Network security, ASP training...
-
Trainer's flexibility to go off topic to look into our needs impressed me, I would highlight it.
← | →
- Course
- Inhouse
- 5 Days
...This five-day instructor-led class providesstudents with a thorough grounding in Microsoft .NET security implementation andgeneral development security best practices. This course will prepare a studentto take the Implementing Security for Applications exam (available in MicrosoftVisual Basic® ...
- Course
- Inhouse
- Different dates available
...The Professional Cloud Security Manager (PCS) course is to explore relevant concepts related to security, risk and compliance within the cloud computing environment. The objectives for this course are to enable the candidates to apply the underpinning security concepts into an enterprise cloud... Learn about: Security Manager...
- Course
- Inhouse
- 5 Days
...Elements of this syllabus are subject to change. Thisfive-day instructor-led course addresses the MCSA and MCSE skills path for ITPro security practitioners, specifically addressing the training needs of thosepreparing for the 70-299 certification exam. The primaryproduct focus is on Microsoft...
- Short course
- Inhouse
- Intermediate
- Different dates available
...Embedded Security Boot Camp® is a week-long immersion into the unique challenges of designing and/or retrofitting security into embedded devices. This comprehensive training is a combination of three of our most popular security short courses and includes hands-on exercises. This intense... Learn about: Embedded systems design, Embedded systems development, Embedded programming...
- Course
- Inhouse
- 3 Days
...The goal of this course is to provide Information Technology(IT) professionals with the knowledge and skills to deploy and manage MicrosoftInternet Security and Acceleration (ISA) Server 2000 in an enterpriseenvironment. Suitable for: This course is intended for IT professionals andis not intended...
- Short course
- Inhouse
- Advanced
- Different dates available
...Android is an open platform for mobile devices such as handsets and tablets. It has a large variety of security features to make developing secure software easier; however, it is also missing certain security aspects that are present in other hand-held platforms. This advanced course gives... Learn about: Mobile security, Network security, Software Security...
- Course
- Inhouse
- 4 Days
... and services, such as Microsoft Internet Explorer, MicrosoftExchange Server, Microsoft Internet Infor. Suitable for: This course is intended for IT systems engineerswho are responsible for designing and implementing security solutions.Individuals should have knowledge and experience to install and configure...
- Short course
- Inhouse
- Intermediate
- Different dates available
...EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas, namely information security, network security, and computer forensics. Information security plays a vital role in most of the organizations. Information security is a state of affairs... Learn about: Network Training, Network security, IT Law...
- Short course
- Inhouse
- Beginner
- Different dates available
...This Program looks at the network security in defensive view while the CEH certification program looks at the security in offensive mode. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop... Learn about: Team Training, Network security, IDS training...
-
The coach explained everything really well, I am thankful.
← | →
- Short course
- Inhouse
- Intermediate
- Different dates available
...This course explains in details the mechanisms underlying typical C/C++ security relevant programming bugs – the common security vulnerabilities. The root causes of the problems are explained through a number of easy-to-understand source code examples, which at the same time make clear how to find... Learn about: Object oriented, Advanced C++, Structured Programming...
...This course explains in details the mechanisms underlying typical C/C++ security relevant programming bugs – the common security vulnerabilities. The root causes of the problems are explained through a number of easy-to-understand source code examples, which at the same time make clear how to find... Learn about: Object oriented, Advanced C++, Structured Programming...
-
The coach explained everything really well, I am thankful.
← | →
-
The course notes are very detailed, the study guide is really good and productive in just 3days.
← | →
-
I found the course and the company and the people in here very amazing and wonderfull. Iam very much looking forward for other courses as well.
← | →
- Course
- Inhouse
- Different dates available
...Deep Dive into the Product Owner Role Expectations from You Time Management for the busy Product Owner! Your Expectations of the Team Business Users... Learn about: Team Training...
...Deep Dive into the Product Owner Role Expectations from You Time Management for the busy Product Owner! Your Expectations of the Team Business Users... Learn about: Team Training...
-
The course notes are very detailed, the study guide is really good and productive in just 3days.
← | → see all
-
I found the course and the company and the people in here very amazing and wonderfull. Iam very much looking forward for other courses as well.
← | → see all
-
The virtual course is like to attend the actual classroom without having to travel.
← | →
-
I have waited three times to opt course of my choice. Its an experience worth praising.
← | →
- Course
- Inhouse
- Different dates available
...in learning about Agile Testing best practices. #text-block-10 { margin-bottom:0px; text-align:left; } Comparing traditional testing to Agile Testing... Learn about: Team Training...
...in learning about Agile Testing best practices. #text-block-10 { margin-bottom:0px; text-align:left; } Comparing traditional testing to Agile Testing... Learn about: Team Training...
-
The virtual course is like to attend the actual classroom without having to travel.
← | → see all
-
I have waited three times to opt course of my choice. Its an experience worth praising.
← | → see all
- Short course
- Inhouse
- Intermediate
- Different dates available
...The development of security-hardened embedded systems is a challenge. Vulnerabilities in products ranging from medical devices to industrial control systems and automobiles are being exploited by attackers. However, these systems can be (re)secured by following a variety of best practices... Learn about: Network security, Java security, Mobile security...
- Short course
- Inhouse
- Beginner
- Different dates available
...The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security... Learn about: Internet Security, Network security, Mac OS...