• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

CIA courses in Weybridge

We couldn't find any listings for your search. Explore our online options and related educators below to see if they help you.

Know someone teaching this? Help them become an Educator on Cademy.

1...9

Online Options

Show all 65

Cryptography: Learn Public Key Infrastructure from Scratch

By Packt

This interactive course will help you to gain a solid understanding of cryptography. With the help of engaging activities and examples, you'll be familiarized with different security certificates and become confident in deploying PKI on Windows Servers.

Cryptography: Learn Public Key Infrastructure from Scratch
Delivered Online On Demand6 hours 39 minutes
£44.99

The Write Path: A Self-Guided Course for Crafting a Compelling Resume/CV

5.0(2)

By Canary Careers

Maximize your career potential in 2024 with the Jobstacle Course: a targeted crash course designed to navigate the complexities of the modern job market. This dynamic program offers expert insights into the latest hiring trends, essential skills, and strategies to stand out in a crowded field. Whether you're seeking to advance in your current role or exploring new opportunities, the Jobstacle Course equips you with the knowledge and tools needed for success. Dive into a curriculum that prepares you for tomorrow's job market today. Join us to transform your career prospects and embrace the future with confidence.

The Write Path: A Self-Guided Course for Crafting a Compelling Resume/CV
Delivered Online On Demand1 hour 30 minutes
£28.99

CISSP Certification Domain 1: Security and Risk Management Video Boot Camp for 2022

By Packt

This course is designed to prepare you to achieve the internationally recognized Certified Information Systems Security Professional (CISSP) certification exam. This course covers one of the major domains (Domain 1 with 15% weightage) needed for the certification and will help you improve your IT security and risk management knowledge.

CISSP Certification Domain 1: Security and Risk Management Video Boot Camp for 2022
Delivered Online On Demand4 hours 35 minutes
£74.99

Criminal Intelligence Researcher

4.5(3)

By Studyhub UK

Step into the intriguing world of criminal intelligence with the 'Criminal Intelligence Researcher' course, a journey that blends criminology, intelligence, and justice. This course is a gateway to understanding the intricate web of criminal intelligence, beginning with foundational knowledge in this topic and crime intelligence analysis.  As you progress, the curriculum delves into the historical roots of analysis disciplines, fostering a deeper appreciation of the intelligence cycle and process. The inclusion of the UK's National Intelligence Model offers a real-world perspective, enhancing your understanding of the criminal justice system. Moreover, the course addresses the evolving field of crime science, emphasising the importance of pattern detection and analysis. You'll gain insights into critical thinking approaches, crime mapping, and strategic analysis, skills crucial for a criminal-intelligence analyst.  The journey culminates in exploring the realms of research, inference policing, and behavioural science, equipping you for diverse roles in criminal intelligence agencies and beyond. Learning Outcomes: Gain comprehensive knowledge of this field, including its application in crime analysis and justice. Understand the historical evolution and significance of this topic. Acquire skills in the intelligence cycle, crime mapping, and strategic analysis for practical application. Develop a critical thinking approach to analyse criminal patterns and statistics. Learn about the interplay of behavioural science in criminal intelligence and its role in modern policing strategies. Why buy this Criminal Intelligence Researcher Course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Certification After studying the course materials of the Criminal Intelligence Researcher you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Criminal Intelligence Researcher course for? Individuals aspiring to work in national criminal intelligence services. Graduates seeking criminal intelligence analyst jobs. Professionals in law enforcement seeking to enhance their analytical skills. Students interested in the intersection of artificial intelligence and criminal justice. Career switchers aiming to enter this field. Prerequisites This Criminal Intelligence Researcher was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Intelligence Analyst: £30,000 - £45,000 Per Annum Crime Data Analyst: £27,000 - £40,000 Per Annum Intelligence Researcher for National Services: £35,000 - £50,000 Per Annum Crime Pattern Analyst: £29,000 - £43,000 Per Annum Intelligence Officer in Criminal Justice: £31,000 - £46,000 Per Annum Forensic Behavioural Scientist: £32,000 - £48,000 Per Annum Course Curriculum Criminology, Intelligence and Criminal Justice Module 01: Criminal Intelligence and Crime Intelligence Analysis Module 01: Criminal Intelligence and Crime Intelligence Analysis 00:15:00 Module 02: A Historical Perspective on the Discipline of Analysis Module 02: A Historical Perspective on the Discipline of Analysis 00:15:00 Module 03: The Intelligence Cycle and Process Module 03: The Intelligence Cycle and Process 00:30:00 Module 04: Example of a National Intelligence Model: The United Kingdom Module 04: Example of a National Intelligence Model: The United Kingdom 00:15:00 Module 05: Introduction to Criminal Justice Module 05: Introduction to Criminal Justice 01:00:00 Crime Science, Pattern Detection and Analysis Module 06: Crime Science: Theories Principles and Intelligent Sources Module 06: Crime Science: Theories, Principles and Intelligent Sources 00:17:00 Module 07: Evaluation of Information Module 07: Evaluation of Information 00:15:00 Module 08: Introduction to the Analysis of Patterns, Statistics & Relationships Module 08: Introduction to the Analysis of Patterns, Statistics & Relationships 00:35:00 Thinking approach, Crime Mapping and Strategic Analysis Module 09: A Critical Thinking Approach to Analysis Module 09: A Critical Thinking Approach to Analysis 00:35:00 Module 10: Tactical Analysis with Crime Mapping and the GIS System Module 10: Tactical Analysis with Crime Mapping and the GIS System 00:20:00 Module 11: Strategic Analysis Variations Module 11: Strategic Analysis Variations 01:00:00 Module 12: Realising The Power of Analytics: Arming the Human Mind Module 12: Realizing The Power of Analytics: Arming the Human Mind 01:00:00 Research, Inference Policing and the Behavioural Science Module 13: Research Method and Statistics in Crime Analysis Module 13: Research Method and Statistics in Crime Analysis 00:20:00 Module 14: Inference Development and the Presentation of the Results Module 14: Inference Development and the Presentation of the Results 00:35:00 Module 15: Homeland Security and Counter Terrorism Module 15: Homeland Security and Counter Terrorism 01:30:00 Module 16: Models of Policing and Security Module 16: Models of Policing and Security 01:20:00 Module 17: Behavioural Sciences Module 17: Behavioural Sciences 00:10:00 Module 18: Career in CIA (Crime Intelligence Analyst) Module 18: Career in CIA (Crime Intelligence Analyst) 00:15:00 Additional Reading Materials Additional Reading Materials - Criminal Intelligence Researcher 00:00:00 Mock Exam Mock Exam - Criminal Intelligence Researcher 00:20:00 Final Exam Final Exam - Criminal Intelligence Researcher 00:20:00

Criminal Intelligence Researcher
Delivered Online On Demand11 hours 7 minutes
£10.99

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019

By Packt

Get 3.5 hours of videos and downloadable lecture slides for Certified Information Security Manager (CISM) Domain 1

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019
Delivered Online On Demand3 hours 15 minutes
£37.99

Internal Auditor QLS Level 5 Diploma

By Imperial Academy

Free Level 5 QLS Endorsed Certificate | CPD Accredited | 150 CPD Points | Advanced Learning Materials | Lifetime Access

Internal Auditor QLS Level 5 Diploma
Delivered Online On Demand
£100

Level 7 Diploma in Criminal Intelligence Researcher - QLS Endorsed

By Kingston Open College

QLS Endorsed + CPD QS Accredited - Dual Certification | Instant Access | 24/7 Tutor Support | All-Inclusive Cost

Level 7 Diploma in Criminal Intelligence Researcher - QLS Endorsed
Delivered Online On Demand11 hours
£105

Certified Virtualization Security Expert (Advanced VMware Security) Training

4.3(43)

By John Academy

Description This Certified Virtualization Security Expert (Advanced VMware Security) Training covers everything you need to know becoming a Certified Virtualization Security Expert. In this course you will learn about routing and the security design of VMware, Remote DataStore security, Penetration Testing 101, information gathering, scanning and enumeration, penetration testing and the tools of the trade, DMZ virtualization and common attack vectors, hardening your ESX server, hardening your ESXi server, hardening your vCenter server, and 3rd party mitigation tools. This Advanced course provides a solid understanding of the various components that make up the VMware vSphere environment. You will have the opportunity to study and understand all aspects of the CIA triad as it pertains to the VMware vSphere infrastructure from the virtual CPU to the storage devices attached to your host and everything in and around that network, including the interconnectivity and design of all those components. So, get this course to learn more. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our Certified Virtualization Security Expert (Advanced VMware Security) Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge FREE 00:25:00 Virtual Ports 00:21:00 Symmetric vs. Asymmetric Encryption 01:07:00 File System Structure 00:13:00 Accounts and Groups 00:35:00 Routing and the Security Design of VMware Routing and the Security Design of Vmware 00:11:00 Virtualization Layer 00:28:00 Memory Virtualization 00:28:00 Major Benefits of Using VLANs 00:13:00 Remote Data Store Security Remote DataStore Security 00:15:00 Fiber Channel Attacks - The Basics 00:22:00 Penetration Testing 101 Penetration Testing 101 00:33:00 The Evolving Threat 00:40:00 Information Gathering, Scanning and Enumeration Information Gathering, Scanning and Enumeration9 00:30:00 FireFox Fully Loaded 00:14:00 Introduction to Port Scanning 00:30:00 UDP Port Scan 00:42:00 Penetration Testing and the Tools of the Trade Penetration Testing and the Tools of the Trade 00:43:00 Windows Password Cracking 00:24:00 VASTO 00:22:00 DMZ Virtualization and Common Attack Vectors DMZ Virtualization and Common Attack Vectors9 00:21:00 Clearly Label Networks for Each Zone within the DMZ 00:22:00 Schmoo Con 2010 Virtualization Vulnerabilities Found! 00:08:00 Hardening Your ESX Server Hardening Your ESX Server 01:03:00 Configuring the ESX ESXi Host 02:19:00 Establish a Password Policy for Local User Accounts 00:21:00 Secure the SNMP Configuration 00:19:00 Hardening Your ESXi Server Hardening Your ESXi Server 00:20:00 Hardening Your vCenter Server Hardening Your vCenter Server 00:17:00 VMware Converter Enterprise 01:10:00 3rd Party Mitigation Tools 3rd Party Mitigation Tools 00:24:00 Mock Exam Mock Exam- Certified Virtualization Security Expert (Advanced VMware Security) Training 00:20:00 Final Exam Final Exam- Certified Virtualization Security Expert (Advanced VMware Security) Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Virtualization Security Expert (Advanced VMware Security) Training
Delivered Online On Demand17 hours
£24

15th January Ciara McEllin #Agent121. Looking for: ADULT FICTION / NON-FICTION

5.0(1)

By I Am In Print

LOOKING FOR: ADULT FICTION / NON-FICTION Ciara McEllin is building her list as a Junior Agent at Watson Little. She reads widely across book club, upmarket and literary fiction. Within these areas, she is drawn to novels that examine family and relationship dynamics, sexuality, identity, and vulnerability. Ciara is keen to hear from writers who take a fresh approach to these themes, whether that be a new perspective on a traditional narrative or a focus on characters and voices that remain underrepresented: think Kairos by Jenny Erpenbeck, Asymmetry by Lisa Halliday or Monkey Grip by Helen Garner. She will always want to read beautifully written novels with a strong sense of place, tangible characters and an essence that stays with you – living deep in your bones – long after you’ve finished reading. Recent reads Ciara has enjoyed include: Lonesome Dove by Larry McMurtry, Enter Ghost by Isabella Hammad, Close to Home by Michael Magee, Siblings by Brigitte Reimann, Trespasses by Louise Kennedy, The Idiot by Elif Batuman, Highway Blue by Ailsa McFarlane and My Phantoms by Gwendoline Riley. At the moment Ciara is particularly eager to see: - Sexy, sensual and seductive stories that explore desire and sexual boundaries not often represented in literature such as Little Rabbit by Alyssa Songsiridej, Cleanness by Garth Greenwell and Mrs. S by K Patrick - An atmospheric and existential thriller in the vein of Intimacies by Katie Kitamura, In The Cut by Susanna Moore and Drive Your Plow Over the Bones of the Dead by Olga Tokarczuk - An intoxicating coming of-age-tale that captures the aliveness, intelligence and wildness of girlhood like Brutes by Dizz Tate, The Virgin Suicides by Jeffrey Eugenides and The Girls by Emma Cline - Books that are joyful or brutal, particularly those that are both, similar to Headshot by Rita Bullwinkel, Kick the Latch by Kathryn Scanlan and Small Things Like These by Claire Keegan - Stories exploring an Australia or Ireland that is rarely seen in literature for example A Loving, Faithful Animal by Josephine Rowe and Wild Houses by Colin Barrett In non-fiction, Ciara enjoys narrative, memoir and essay collections. She is interested in hearing from experts, academics, critics and journalists writing about society, culture and food, and excited by writers seeking to revise, reshape or revolutionise the conversation in their area of expertise. Some of her favourite non-fiction titles include How To Survive A Plague by David France, The Transgender Issue by Shon Faye, the Living Autobiography Series by Deborah Levy, Last Witnesses: Unchildlike Stories by Svetlana Alexievich, King Kong Theory by Virginie Despentes; and she particularly enjoys the work of M.F.K Fisher, Annie Ernaux, Natalia Ginsburg and Helen Garner. Ciara is not looking for Children’s, YA or Fantasy. Ciara would like you to submit a covering letter, 1 -2 page synopsis and the first 5,000 words of your completed manuscript in a single word document. (In addition to the paid sessions, Ciara is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 6th January 2025

15th January Ciara McEllin #Agent121. Looking for: ADULT FICTION / NON-FICTION
Delivered Online + more
£72

Computer Networks Security

5.0(10)

By Apex Learning

Overview This comprehensive course on Computer Networks Security will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Computer Networks Security comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Computer Networks Security. It is available to all students, of all academic backgrounds. Requirements Our Computer Networks Security is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 12 sections • 52 lectures • 08:08:00 total length •Introduction: 00:10:00 •1.1 Computer Network: 00:11:00 •1.2 Computer Network Topologies: 00:11:00 •1.3 Categories of Computer Network: 00:10:00 •1.4 Computer Network Devices: 00:11:00 •1.5 Transmission Media: 00:09:00 •2.1 ISO/OSI Model: 00:10:00 •2.2 Application, Presentation, and Session Layers: 00:12:00 •2.3 Transport and Network Layers: 00:11:00 •2.4 Data Link and Physical Layers: 00:09:00 •2.5 ISO/OSI Model in Action: 00:10:00 •3.1 Introduction to Computer Networks Protocols: 00:11:00 •3.2 IP Protocol: 00:13:00 •3.3 TCP and UDP Protocols: 00:12:00 •3.4 Application Protocols: 00:12:00 •3.5 TCP/IP Characteristics and Tools: 00:11:00 •4.1 Wireless Networks Benefits: 00:09:00 •4.2 Types of Wireless Networks: 00:12:00 •4.3 Wireless Networks Protocol (Wi-Fi): 00:07:00 •4.4 Wireless Networks Devices: 00:10:00 •4.5 Wireless Networks Drawbacks: 00:09:00 •5.1 Security Goals: 00:09:00 •5.2 Securing the Network Design: 00:10:00 •5.3 TCP/IP Security and Tools: 00:12:00 •5.4 Port Scanning and Tools: 00:11:00 •5.5 Sniffing and Tools: 00:10:00 •6.1 Reasons to Use Firewall: 00:13:00 •6.2 Firewalls Rules: 00:11:00 •6.3 Firewalls Filtering: 00:09:00 •6.4 Honeypots: 00:07:00 •6.5 Bypassing Firewalls: 00:08:00 •7.1 Intrusion Detection System: IDS: 00:11:00 •7.2 Network IDS: NIDS: 00:06:00 •7.3 NIDS Challenges: 00:09:00 •7.4 Snort as NIDS: 00:08:00 •7.5 Intrusion Prevention Systems: IPS: 00:07:00 •8.1 Wired Equivalent Privacy WEP Attacking: 00:11:00 •8.2 WPA and AES Protocols: 00:09:00 •8.3 Wireless Security Misconceptions: 00:09:00 •8.4 Wireless Attacks and Mitigation: 00:09:00 •8.5 Secure Network Design with Wireless: 00:09:00 •9.1 Physical Security Objectives: 00:11:00 •9.2 Physical Threats and Mitigation: 00:11:00 •9.3 Defense in Depth (DiD): 00:07:00 •9.4 Incident: 00:06:00 •9.5 Incident Handling: 00:14:00 •10.1 Confidentiality, Integrity, and Availability (CIA): 00:06:00 •10.2 Assets, Threats, and Vulnerabilities: 00:04:00 •10.3 Risks and Network Intrusion: 00:06:00 •10.4 Common Attacks: 00:09:00 •10.5 Security Recommendations: 00:06:00 •Assignment - Computer Networks Security: 00:00:00

Computer Networks Security
Delivered Online On Demand8 hours 8 minutes
£12