• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

781 Cyber Security courses in Leicester delivered On Demand

Your guide to Security by Design

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

Your guide to Security by Design
Delivered Online On Demand20 minutes
FREE

CISSP Certification Domain 1: Security and Risk Management Video Boot Camp for 2022

By Packt

This course is designed to prepare you to achieve the internationally recognized Certified Information Systems Security Professional (CISSP) certification exam. This course covers one of the major domains (Domain 1 with 15% weightage) needed for the certification and will help you improve your IT security and risk management knowledge.

CISSP Certification Domain 1: Security and Risk Management Video Boot Camp for 2022
Delivered Online On Demand4 hours 35 minutes
£74.99

Your guide to Phishing

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

Your guide to Phishing
Delivered Online On Demand20 minutes
FREE

Advanced Computer Networks Security Course

4.8(9)

By Skill Up

Gain the solid skills and knowledge to kickstart a successful career and learn from the experts with this

Advanced Computer Networks Security Course
Delivered Online On Demand8 hours 8 minutes
£25

Your digital footprint

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

Your digital footprint
Delivered Online On Demand20 minutes
FREE

Your guide to Data Loss Prevention

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

Your guide to Data Loss Prevention
Delivered Online On Demand20 minutes
FREE

Cloud Architect Engineer Job Ready Program with Money Back Guarantee

4.9(27)

By Apex Learning

Land Your Dream Job! Get Personalised Career Support & Expert Tips, Craft Your CV, Explore Top Jobs & Ace Interviews!

Cloud Architect Engineer Job Ready Program with Money Back Guarantee
Delivered Online On Demand12 weeks
£1,199

Cybersecurity: Social Engineering

5.0(9)

By Chart Learning Solutions

At its core, social engineering is not a cyber attack. Instead, social engineering is all about the psychology of persuasion: It targets the mind like your old-school grifter or con man. The aim is to gain the trust of targets, so they lower their guard, and then encourage them into taking unsafe actions such as divulging personal information or clicking on web links, or opening attachments that may be malicious. Learning Objectives The following are some of the key outcomes in this course: Understand Social Engineering and how to spot common infiltration methods Learn about the different types of social engineering attacks and how to avoid becoming a victim Understand what phishing is and how to spot the red flags of fraudulent emails Explore the best cybersecurity practices to protect your systems and accounts Learn about the five types of business email compromise Detect the warning signs of this scam and how to prevent attacks Target Audience Young Professionals

Cybersecurity: Social Engineering
Delivered Online On Demand18 minutes
£34.95

Cybersecurity: Protect your Data

5.0(9)

By Chart Learning Solutions

A robust cybersecurity policy protects secure, critical or sensitive data and prevents it from falling in to the hands of malicious third parties. Accounts that contain highly sensitive data often require multiple layers of security - or multifactor authentication (MFA). Personal security can't just be restricted to your computer. All of your devices, even those without internet connectivity, need protective measures. Learning Objectives The following are some of the key outcomes in this course: What are portable devices and removable media? Know the risks associated with using them and how you can safeguard your devices Understand the risks associated with portable devices and removable media Understand physical safety and the value of any effort to mitigate on-site threats to facilities, assets, and employees Target Audience Young Professionals

Cybersecurity: Protect your Data
Delivered Online On Demand18 minutes
£34.95

CyberSec First Responder: Threat Detection and Response (Exam CFR-210) at QLS Level 7

4.8(9)

By Skill Up

Level 7 QLS Endorsed Diploma | 180 CPD Points | +Gifts: QLS Certificate + PDF Certificate | 24/7 Learner Support

CyberSec First Responder: Threat Detection and Response (Exam CFR-210) at QLS Level 7
Delivered Online On Demand3 weeks
£100