• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

903 Cyber Security courses in London delivered Online

Advanced Computer Networks Security Course

4.8(9)

By Skill Up

Gain the solid skills and knowledge to kickstart a successful career and learn from the experts with this

Advanced Computer Networks Security Course
Delivered Online On Demand8 hours 8 minutes
£25

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered OnlineFlexible Dates
£2,037

Your guide to Data Loss Prevention

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

Your guide to Data Loss Prevention
Delivered Online On Demand20 minutes
FREE

Your digital footprint

4.4(5)

By The Security Company (International) Limited

Information on the risks and practical advice to address them TSC's eBooks, whitepapers, and reports cover some of the most important risks in information and cyber security — risks that constantly challenge information and cyber security professionals who work tirelessly to reduce them across their organisations and home users alike.

Your digital footprint
Delivered Online On Demand20 minutes
FREE

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - Information Security Governance Develop an Information Security Strategy Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements Justify Investment in Information Security Identify Drivers Affecting the Organization Obtain Senior Management Commitment to Information Security Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels 2 - Information Risk Management Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs Identify and Evaluate Risk Mitigation Strategies Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk 3 - Information Security Program Development Develop Plans to Implement an Information Security Strategy Security Technologies and Controls Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions Identify Resources Needed for Information Security Program Implementation Develop Information Security Architectures Develop Information Security Policies Develop Information Security Awareness, Training, and Education Programs Develop Supporting Documentation for Information Security Policies 4 - Information Security Program Implementation Integrate Information Security Requirements into Organizational Processes Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics 5 - Information Security Program Management Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues 6 - Incident Management and Response Develop an Information Security Incident Response Plan Establish an Escalation Process Develop a Communication Process Integrate an IRP Develop IRTs Test an IRP Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered OnlineFlexible Dates
£1,995

CISSP Certification Domain 1: Security and Risk Management Video Boot Camp for 2022

By Packt

This course is designed to prepare you to achieve the internationally recognized Certified Information Systems Security Professional (CISSP) certification exam. This course covers one of the major domains (Domain 1 with 15% weightage) needed for the certification and will help you improve your IT security and risk management knowledge.

CISSP Certification Domain 1: Security and Risk Management Video Boot Camp for 2022
Delivered Online On Demand4 hours 35 minutes
£74.99

Cloud Architect Engineer Job Ready Program with Money Back Guarantee

4.9(27)

By Apex Learning

Land Your Dream Job! Get Personalised Career Support & Expert Tips, Craft Your CV, Explore Top Jobs & Ace Interviews!

Cloud Architect Engineer Job Ready Program with Money Back Guarantee
Delivered Online On Demand12 weeks
£1,199

CyberSec First Responder: Threat Detection and Response (Exam CFR-210) at QLS Level 7

4.8(9)

By Skill Up

Level 7 QLS Endorsed Diploma | 180 CPD Points | +Gifts: QLS Certificate + PDF Certificate | 24/7 Learner Support

CyberSec First Responder: Threat Detection and Response (Exam CFR-210) at QLS Level 7
Delivered Online On Demand3 weeks
£100

Cybersecurity: Social Engineering

5.0(9)

By Chart Learning Solutions

At its core, social engineering is not a cyber attack. Instead, social engineering is all about the psychology of persuasion: It targets the mind like your old-school grifter or con man. The aim is to gain the trust of targets, so they lower their guard, and then encourage them into taking unsafe actions such as divulging personal information or clicking on web links, or opening attachments that may be malicious. Learning Objectives The following are some of the key outcomes in this course: Understand Social Engineering and how to spot common infiltration methods Learn about the different types of social engineering attacks and how to avoid becoming a victim Understand what phishing is and how to spot the red flags of fraudulent emails Explore the best cybersecurity practices to protect your systems and accounts Learn about the five types of business email compromise Detect the warning signs of this scam and how to prevent attacks Target Audience Young Professionals

Cybersecurity: Social Engineering
Delivered Online On Demand18 minutes
£34.95

Cybersecurity: Protect your Data

5.0(9)

By Chart Learning Solutions

A robust cybersecurity policy protects secure, critical or sensitive data and prevents it from falling in to the hands of malicious third parties. Accounts that contain highly sensitive data often require multiple layers of security - or multifactor authentication (MFA). Personal security can't just be restricted to your computer. All of your devices, even those without internet connectivity, need protective measures. Learning Objectives The following are some of the key outcomes in this course: What are portable devices and removable media? Know the risks associated with using them and how you can safeguard your devices Understand the risks associated with portable devices and removable media Understand physical safety and the value of any effort to mitigate on-site threats to facilities, assets, and employees Target Audience Young Professionals

Cybersecurity: Protect your Data
Delivered Online On Demand18 minutes
£34.95