• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4538 Courses delivered Online

Close Protection and Security Management Diploma

By Compliance Central

Are you looking to become an expert in Security Guard and Close Protection? Do you want to be able to respond to any situation with confidence and authority? Then you are in the right place. Get 2 CPD Accredited Courses: Course 01: Close Protection Course 02: Diploma in Security Management at QLS Level 5 The Close Protection and Security Management bundle is for those who want to be successful. In the Close Protection and Security Management course, you will learn the essential skills and gain the knowledge needed to become well versed in Close Protection and Security Management. Close Protection and Security Management Course Learning Outcomes: Introduction and initiation of close protection. Team planning and implementation in close protection. Close protection threat review and project execution. How to nominate a route in close protection. A clear understanding of close protection laws. Stand out in the job market by completing the Close Protection course. Get accredited certificates and add them to your resume to impress your employers. Close Protection, Security Guard, and Security Management Curriculum Breakdown of the Close Protection Course Introduction to Close Protection The Close Protection Team The Planning in Close Protection Close Protection Threat Assessment Close Protection Vehicle Drills: Embus and Debus Route Selection and Reconnaissance in Close Protection Legislation Regarding Close Protection Curriculum Breakdown of the Diploma in Security Management at QLS Level 5 Course Introduction to Security Management Organisational Security Management Security Risk Analysis and Risk Reduction Physical and Information Security Protection Business Resilience and Crisis Management Cyber Security and Fraud Prevention Security Investigations and Threat Awareness Laws and Regulations CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Close Protection and Security Guard course helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in . It is also great for professionals who are already working in Close Protection and Security Guard and want to get promoted at work. Requirements To enrol in this Close Protection, Security Guard, and Security Management course, all you need is a basic understanding of the English Language and an internet connection. Career path The Close Protection, Security Guard, and Security Management course will enhance your knowledge and improve your confidence in exploring opportunities in various sectors related to this: Security Operative Personal Bodyguard Security Specialist Security Manager Security Agents Security Risk Consultant Certificates 2 CPD Accredited PDF Certificate Digital certificate - Included Each CPD Accredited Hardcopy Certificate Hard copy certificate - £10.79 Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Close Protection and Security Management Diploma
Delivered Online On Demand7 hours
£12

TW108G IBM Security Verify Access Foundations

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for system administrators and implementors interested in learning IBM Security Verify Access. Overview Describe IBM Security Verify Access product and its key features Discuss the architecture and deployment process Configure IBM Security Verify Access users, groups, and domains Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure Describe protected object space and the policy access control model Explain how to set up reverse proxy junctions to handle web requests Discuss and configure authentication mechanisms that are supported by Verify Access Explain and set up logging, auditing, and tracing for Verify Access components IBM Security Verify Access helps you simplify your users' access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned. Unit 1 Introduction to IBM Security Verify Access Unit 2 Architecture and deployment Unit 3 Managing users, groups, and domains Unit 4 Reverse Proxy (WebSEAL) concepts Unit 5 Managing access control Unit 6 Configuring junctions for back-end resources Unit 7 Authentication framework and methods Unit 8 Logging, auditing, and tracing Additional course details: Nexus Humans TW108G IBM Security Verify Access Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TW108G IBM Security Verify Access Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

TW108G IBM Security Verify Access Foundations
Delivered OnlineFlexible Dates
Price on Enquiry

IT Manager - QLS Endorsed Bundle

By Imperial Academy

10 QLS Endorsed Courses for IT Managers | 10 QLS Endorsed Hard Copy Certificates Included | Lifetime Access | Tutor Support

IT Manager - QLS Endorsed Bundle
Delivered Online On Demand
£599

C)SLO-Certified Security Leadership Officer Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)SLO-Certified Security Leadership Officer Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

IT (Information Technology) Support Technician

4.9(27)

By Apex Learning

IT Support Technician | Functional Skills IT | Encryption | Cloud Computing ( CompTIA Cloud+ (CV0-002)) | Cyber Security | Data Center Training | Cisco ASA Firewall and much more...

IT (Information Technology) Support Technician
Delivered Online On Demand3 days
£79

Securing Databases | Database Security (TT8700)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is an introduction to database security course for intermediate skilled team members. Attendees might include DBAs, system administrators, developers and other enterprise team members. Ideally, students should have approximately 6 months to a year of database working knowledge. Overview Students who attend Securing Databases will leave the course armed with the skills required to recognize actual and potential database vulnerabilities, implement defenses for those vulnerabilities, and test those defenses for sufficiency. This course introduces students to the most common security vulnerabilities faced by databases today. Each vulnerability is examined from a database perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Multiple practical demonstrations reinforce these concepts with real vulnerabilities and attacks. Students will learn how to design and implement the layered defenses they will need in defending their own databases. Securing Databases is an essential training course for DBAs and developers who need to produce secure database applications and manage secure databases. Data, databases, and related resources are at the heart of most IT infrastructures. These assets can have high value from a business, regulatory, and liability perspective, and must be protected accordingly. This course showcases demonstrations on how to repeatedly attack and then defend various assets associated with a fully functional database. This approach illustrates the mechanics of how to secure databases in the most practical of terms. Security experts agree that the least effective approach to security is 'penetrate and patch'. It is far more effective to 'bake' security into an application throughout its lifecycle. After spending significant time trying to defend a poorly designed (from a security perspective) database application, students will learn how to build secure their databases and applications, starting at project inception. Securing Databases Foundation Why Hunt for Security Defects? Fingerprinting Databases Principles of Information Security Database Security Vulnerabilities Database Security Concerns Vulnerabilities Cryptography Overview Database Security Database Security What Next? Secure Development Lifecycle (SDL) SDL Process Overview Taking Action Now Asset Analysis Design Review Making Application Security Real

Securing Databases | Database Security (TT8700)
Delivered OnlineFlexible Dates
Price on Enquiry

Conversation on Cryptography

By Course Cloud

Course Overview Learn how to use the most critical part of IT security and the critical role it plays in protecting our digital data with this comprehensive Conversation on Cryptography. The use of practical cryptography is essential for the installation and maintenance of IT security protection. This course provides extensive and expert tuition for the most valuable cyphers and methods for safeguarding an IT environment. This Cryptography course provides an excellent overview of the cryptographic principles that need to be understood and mastered in an IT security role. You will be shown the most appropriate cyphers to use for different settings, types of asymmetric methods, usage of Public Key Infrastructure (PKI), and much more. If you want to gain the highest level of cybersecurity expertise, this will be the ideal choice for your learning needs. Enrol now and keep the cybercriminals in their place. This best selling Conversation on Cryptography has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Conversation on Cryptography is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Conversation on Cryptography is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Conversation on Cryptography is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Conversation on Cryptography, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Conversation on Cryptography will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Conversation on Cryptography to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Conversation on Cryptography
Delivered Online On Demand
£319

CompTIA Network+ Training

4.7(47)

By Academy for Health and Fitness

24 Hours Left! Don't Let Year-End Deals Slip Away - Enrol Now! Are you ready to take your networking skills to the next level? Look no further than the CompTIA Network+ Training bundle, featuring 11 comprehensive courses designed to enhance your understanding of IT fundamentals, cybersecurity, cloud computing, and more. Start with the QLS-endorsed CompTIA Network+ Training course, which comes with a free QLS hardcopy certificate to add to your professional portfolio. Then, delve into 10 CPD-QS accredited courses that cover everything from computer network security to building your own computer. With the CompTIA Network+ Training bundle, you'll gain a deep understanding of the latest industry standards and best practices, allowing you to take your career to the next level. Plus, with the QLS hardcopy certificate, you'll have a tangible symbol of your hard work and dedication to your craft. Don't settle for subpar networking skills - invest in the CompTIA Network+ Training bundle today and join the ranks of top IT professionals around the world. Enrol right now! This CompTIA Network+ Training Bundle Package includes: Course 01: Diploma in CompTIA Network Training at QLS Level 7 10 Premium Additional CPD QS Accredited Courses - Course 01: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 02: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 03: CompTIA Network+ Certification (N10-007) Course 04: Computer Science With Python Course 05: Computer Networks Security from Scratch to Advanced Course 06: CompTIA PenTest+ (Ethical Hacking) Course 07: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 08: Linux Security and Hardening Course 09: MD-100: Windows 10 Course 10: Building Your Own Computer Course Why Prefer This CompTIA Network+ Training Bundle? You will receive a completely free certificate from the Quality Licence Scheme Option to purchase 10 additional certificates accredited by CPD Get a free Student ID Card - (£10 postal charges will be applicable for international delivery) Free assessments and immediate success results 24/7 Tutor Support After taking this CompTIA Network+ Training bundle course, you will be able to learn the following: Upon completion of the courses, you will be able to: Gain a comprehensive understanding of IT fundamentals and cybersecurity best practices Develop practical skills in computer network security and ethical hacking Learn about cloud computing and the latest industry standards Enhance your knowledge of computer science with Python programming language Build your own computer and develop an understanding of hardware components Prepare for CompTIA certification exams and advance your career in IT Earn a QLS-endorsed certificate and CPD-QS accreditation to showcase your expertise ***Curriculum breakdown of Diploma in CompTIA Network+ Training at QLS Level 7*** Network Theory Bounded Network Media Unbounded Network Media Network Implementations TCP/IP Addressing and Data Delivery Routing TCP/IP Services WAN Infrastructure Cloud and Virtualization Technologies Network Security Basics Preventing Security Breaches Responding to Security Incidents Remote Networking Network Management Troubleshooting Network Issues Planning and Implementing a SOHO Network How is the CompTIA Network+ Training Bundle Assessment Process? You have to complete the assignment questions given at the end of the course and score a minimum of 60% to pass each exam. Our expert trainers will assess your assignment and give you feedback after you submit the assignment. You will be entitled to claim a certificate endorsed by the Quality Licence Scheme after you successfully pass the exams. CPD 280 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This bundle is perfect for: IT professionals looking to enhance their networking skills Students interested in pursuing a career in IT Anyone seeking to expand their knowledge of IT fundamentals and cybersecurity Individuals looking to earn industry-recognized certifications Career path Network Administrator with a salary range of £20,000 to £40,000 per year Information Security Analyst with a salary range of £35,000 to £65,000 per year Cloud Systems Administrator with a salary range of £30,000 to £60,000 per year IT Support Specialist with a salary range of £20,000 to £30,000 per year Cybersecurity Analyst with a salary range of £25,000 to £50,000 per year Certificates CPD QS Accredited Certificate Digital certificate - Included Upon successfully completing the Bundle, you will need to place an order to receive a PDF Certificate for each course within the bundle. These certificates serve as proof of your newly acquired skills, accredited by CPD QS and will cost you £10 for each course. Also, the certificates are recognised throughout the UK and internationally. CPD QS Accredited Certificate Hard copy certificate - Included International students are subject to a £10 delivery fee for their orders, based on their location. Diploma in CompTIA Network Training at QLS Level 7 Hard copy certificate - Included

CompTIA Network+ Training
Delivered Online On Demand4 weeks
£159

CertNexus Certified Internet of Things Security Practitioner (CIoTSP) v1.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110. Overview This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. Managing IoT Risks Map the IoT Attack Surface Build in Security by Design Securing Web and Cloud Interfaces Identify Threats to IoT Web and Cloud Interfaces Prevent Injection Flaws Prevent Session Management Flaws Prevent Cross-Site Scripting Flaws Prevent Cross-Site Request Forgery Flaws Prevent Unvalidated Redirects and Forwards Securing Data Use Cryptography Appropriately Protect Data in Motion Protect Data at Rest Protect Data in Use Controlling Access to IoT Resources Identify the Need to Protect IoT Implement Secure Authentication Implement Secure Authorization Implement Security Monitoring on IoT Systems Securing IoT Networks Ensure the Security of IP Networks Ensure the Security of Wireless Networks Ensure the Security of Mobile Networks Ensure the Security of IoT Edge Networks Ensuring Privacy Improve Data Collection to Reduce Privacy Concerns Protect Sensitive Data Dispose of Sensitive Data Managing Software and Firmware Risks Manage General Software Risks Manage Risks Related to Software Installation and Configuration Manage Risks Related to Software Patches and Updates Manage Risks Related to IoT Device Operating Systems and Firmware Promoting Physical Security Protect Local Memory and Storage Prevent Physical Port Access

CertNexus Certified Internet of Things Security Practitioner (CIoTSP) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

SWSA v3.0-Securing the Web with Cisco Web Security Appliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SWSA v3.0-Securing the Web with Cisco Web Security Appliance
Delivered OnlineFlexible Dates
Price on Enquiry