• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4518 Courses delivered Online

40032 Networking and Security Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft Technology Associate (MTA) is Microsoft?s newest suite of technology certification exams that validate fundamental knowledge needed to begin building a career using Microsoft technologies. This program provides an appropriate entry point to a future career in technology and assumes some hands-on experience or training but does not assume on-the-job experience. Overview This five-day Training 2-Pack helps you prepare for Microsoft Technology Associate Exams 98-366 and 98-367, and build an understanding of these topics: Network Infrastructures, Network Hardware, Protocols and Services, Security Layers, Operating System Security, Network Security, Security Software. These courses leverage the same content as found in the Microsoft Official Academic Courses (MOAC) for these exams. Understand Network InfrastructuresUnderstand Network HardwareUnderstand Protocols and ServicesUnderstand Security LayersUnderstand Operating System SecurityUnderstand Network SecurityUnderstand Security Software UNDERSTANDING LOCAL AREA NETWORKINGDEFINING NETWORKS WITH THE OSI MODELUNDERSTANDING WIRED AND WIRELESS NETWORKSUNDERSTANDING INTERNET PROTOCOLIMPLEMENTING TCP/IP IN THE COMMAND LINEWORKING WITH NETWORKING SERVICESUNDERSTANDING WIDE AREA NETWORKSDEFINING NETWORK INFRASTRUCTURES AND NETWORK SECURITYUNDERSTANDING SECURITY LAYERSAUTHENTICATION, AUTHORIZATION, AND ACCOUNTINGUNDERSTANDING SECURITY POLICYUNDERSTANDING NETWORK SECURITYPROTECTING THE SERVER AND CLIENT

40032 Networking and Security Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

Close Protection and Security Management Diploma

By Compliance Central

Are you looking to become an expert in Security Guard and Close Protection? Do you want to be able to respond to any situation with confidence and authority? Then you are in the right place. Get 2 CPD Accredited Courses: Course 01: Close Protection Course 02: Diploma in Security Management at QLS Level 5 The Close Protection and Security Management bundle is for those who want to be successful. In the Close Protection and Security Management course, you will learn the essential skills and gain the knowledge needed to become well versed in Close Protection and Security Management. Close Protection and Security Management Course Learning Outcomes: Introduction and initiation of close protection. Team planning and implementation in close protection. Close protection threat review and project execution. How to nominate a route in close protection. A clear understanding of close protection laws. Stand out in the job market by completing the Close Protection course. Get accredited certificates and add them to your resume to impress your employers. Close Protection, Security Guard, and Security Management Curriculum Breakdown of the Close Protection Course Introduction to Close Protection The Close Protection Team The Planning in Close Protection Close Protection Threat Assessment Close Protection Vehicle Drills: Embus and Debus Route Selection and Reconnaissance in Close Protection Legislation Regarding Close Protection Curriculum Breakdown of the Diploma in Security Management at QLS Level 5 Course Introduction to Security Management Organisational Security Management Security Risk Analysis and Risk Reduction Physical and Information Security Protection Business Resilience and Crisis Management Cyber Security and Fraud Prevention Security Investigations and Threat Awareness Laws and Regulations CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Close Protection and Security Guard course helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in . It is also great for professionals who are already working in Close Protection and Security Guard and want to get promoted at work. Requirements To enrol in this Close Protection, Security Guard, and Security Management course, all you need is a basic understanding of the English Language and an internet connection. Career path The Close Protection, Security Guard, and Security Management course will enhance your knowledge and improve your confidence in exploring opportunities in various sectors related to this: Security Operative Personal Bodyguard Security Specialist Security Manager Security Agents Security Risk Consultant Certificates 2 CPD Accredited PDF Certificate Digital certificate - Included Each CPD Accredited Hardcopy Certificate Hard copy certificate - £10.79 Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Close Protection and Security Management Diploma
Delivered Online On Demand7 hours
£12

IT Manager - QLS Endorsed Bundle

By Imperial Academy

10 QLS Endorsed Courses for IT Managers | 10 QLS Endorsed Hard Copy Certificates Included | Lifetime Access | Tutor Support

IT Manager - QLS Endorsed Bundle
Delivered Online On Demand
£599

TW108G IBM Security Verify Access Foundations

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for system administrators and implementors interested in learning IBM Security Verify Access. Overview Describe IBM Security Verify Access product and its key features Discuss the architecture and deployment process Configure IBM Security Verify Access users, groups, and domains Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure Describe protected object space and the policy access control model Explain how to set up reverse proxy junctions to handle web requests Discuss and configure authentication mechanisms that are supported by Verify Access Explain and set up logging, auditing, and tracing for Verify Access components IBM Security Verify Access helps you simplify your users' access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned. Unit 1 Introduction to IBM Security Verify Access Unit 2 Architecture and deployment Unit 3 Managing users, groups, and domains Unit 4 Reverse Proxy (WebSEAL) concepts Unit 5 Managing access control Unit 6 Configuring junctions for back-end resources Unit 7 Authentication framework and methods Unit 8 Logging, auditing, and tracing Additional course details: Nexus Humans TW108G IBM Security Verify Access Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TW108G IBM Security Verify Access Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

TW108G IBM Security Verify Access Foundations
Delivered OnlineFlexible Dates
Price on Enquiry

Conversation on Cryptography

By Course Cloud

Course Overview Learn how to use the most critical part of IT security and the critical role it plays in protecting our digital data with this comprehensive Conversation on Cryptography. The use of practical cryptography is essential for the installation and maintenance of IT security protection. This course provides extensive and expert tuition for the most valuable cyphers and methods for safeguarding an IT environment. This Cryptography course provides an excellent overview of the cryptographic principles that need to be understood and mastered in an IT security role. You will be shown the most appropriate cyphers to use for different settings, types of asymmetric methods, usage of Public Key Infrastructure (PKI), and much more. If you want to gain the highest level of cybersecurity expertise, this will be the ideal choice for your learning needs. Enrol now and keep the cybercriminals in their place. This best selling Conversation on Cryptography has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Conversation on Cryptography is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Conversation on Cryptography is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Conversation on Cryptography is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Conversation on Cryptography, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Conversation on Cryptography will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Conversation on Cryptography to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Conversation on Cryptography
Delivered Online On Demand
£319

CompTIA Network+ Training

4.7(26)

By Academy for Health and Fitness

24 Hours Left! Don't Let Year-End Deals Slip Away - Enrol Now! Are you ready to take your networking skills to the next level? Look no further than the CompTIA Network+ Training bundle, featuring 11 comprehensive courses designed to enhance your understanding of IT fundamentals, cybersecurity, cloud computing, and more. Start with the QLS-endorsed CompTIA Network+ Training course, which comes with a free QLS hardcopy certificate to add to your professional portfolio. Then, delve into 10 CPD-QS accredited courses that cover everything from computer network security to building your own computer. With the CompTIA Network+ Training bundle, you'll gain a deep understanding of the latest industry standards and best practices, allowing you to take your career to the next level. Plus, with the QLS hardcopy certificate, you'll have a tangible symbol of your hard work and dedication to your craft. Don't settle for subpar networking skills - invest in the CompTIA Network+ Training bundle today and join the ranks of top IT professionals around the world. Enrol right now! This CompTIA Network+ Training Bundle Package includes: Course 01: Diploma in CompTIA Network Training at QLS Level 7 10 Premium Additional CPD QS Accredited Courses - Course 01: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 02: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 03: CompTIA Network+ Certification (N10-007) Course 04: Computer Science With Python Course 05: Computer Networks Security from Scratch to Advanced Course 06: CompTIA PenTest+ (Ethical Hacking) Course 07: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 08: Linux Security and Hardening Course 09: MD-100: Windows 10 Course 10: Building Your Own Computer Course Why Prefer This CompTIA Network+ Training Bundle? You will receive a completely free certificate from the Quality Licence Scheme Option to purchase 10 additional certificates accredited by CPD Get a free Student ID Card - (£10 postal charges will be applicable for international delivery) Free assessments and immediate success results 24/7 Tutor Support After taking this CompTIA Network+ Training bundle course, you will be able to learn the following: Upon completion of the courses, you will be able to: Gain a comprehensive understanding of IT fundamentals and cybersecurity best practices Develop practical skills in computer network security and ethical hacking Learn about cloud computing and the latest industry standards Enhance your knowledge of computer science with Python programming language Build your own computer and develop an understanding of hardware components Prepare for CompTIA certification exams and advance your career in IT Earn a QLS-endorsed certificate and CPD-QS accreditation to showcase your expertise ***Curriculum breakdown of Diploma in CompTIA Network+ Training at QLS Level 7*** Network Theory Bounded Network Media Unbounded Network Media Network Implementations TCP/IP Addressing and Data Delivery Routing TCP/IP Services WAN Infrastructure Cloud and Virtualization Technologies Network Security Basics Preventing Security Breaches Responding to Security Incidents Remote Networking Network Management Troubleshooting Network Issues Planning and Implementing a SOHO Network How is the CompTIA Network+ Training Bundle Assessment Process? You have to complete the assignment questions given at the end of the course and score a minimum of 60% to pass each exam. Our expert trainers will assess your assignment and give you feedback after you submit the assignment. You will be entitled to claim a certificate endorsed by the Quality Licence Scheme after you successfully pass the exams. CPD 280 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This bundle is perfect for: IT professionals looking to enhance their networking skills Students interested in pursuing a career in IT Anyone seeking to expand their knowledge of IT fundamentals and cybersecurity Individuals looking to earn industry-recognized certifications Career path Network Administrator with a salary range of £20,000 to £40,000 per year Information Security Analyst with a salary range of £35,000 to £65,000 per year Cloud Systems Administrator with a salary range of £30,000 to £60,000 per year IT Support Specialist with a salary range of £20,000 to £30,000 per year Cybersecurity Analyst with a salary range of £25,000 to £50,000 per year Certificates CPD QS Accredited Certificate Digital certificate - Included Upon successfully completing the Bundle, you will need to place an order to receive a PDF Certificate for each course within the bundle. These certificates serve as proof of your newly acquired skills, accredited by CPD QS and will cost you £10 for each course. Also, the certificates are recognised throughout the UK and internationally. CPD QS Accredited Certificate Hard copy certificate - Included International students are subject to a £10 delivery fee for their orders, based on their location. Diploma in CompTIA Network Training at QLS Level 7 Hard copy certificate - Included

CompTIA Network+ Training
Delivered Online On Demand4 weeks
£159

C)SLO-Certified Security Leadership Officer Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for C - Level Managers IT Managers Cyber Security Personelle Engineers Information Systems Owners ISSO's CISSP Students ISO's Overview Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam. You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture. Certified Security Leadership Officerÿ course is designed for mid and upper-level managers.ÿ If you are an engineer, this course will increase your knowledge in the leading information system security teams. Plus, the C)SLO will give you an essential understanding of current security issues, best practices, and technology. With this knowledge you will then be prepared to manage the security component of an information technology project. As a Security Leadership Officer, you will be the bridge between cybersecurity and business operations. Course Outline Security Management Risk Management Encryption Information Security Access Control Concepts Incident Handling and Evidence Operations Security Network Security Additional course details: Nexus Humans C)SLO-Certified Security Leadership Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)SLO-Certified Security Leadership Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)SLO-Certified Security Leadership Officer Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Securing Databases | Database Security (TT8700)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is an introduction to database security course for intermediate skilled team members. Attendees might include DBAs, system administrators, developers and other enterprise team members. Ideally, students should have approximately 6 months to a year of database working knowledge. Overview Students who attend Securing Databases will leave the course armed with the skills required to recognize actual and potential database vulnerabilities, implement defenses for those vulnerabilities, and test those defenses for sufficiency. This course introduces students to the most common security vulnerabilities faced by databases today. Each vulnerability is examined from a database perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Multiple practical demonstrations reinforce these concepts with real vulnerabilities and attacks. Students will learn how to design and implement the layered defenses they will need in defending their own databases. Securing Databases is an essential training course for DBAs and developers who need to produce secure database applications and manage secure databases. Data, databases, and related resources are at the heart of most IT infrastructures. These assets can have high value from a business, regulatory, and liability perspective, and must be protected accordingly. This course showcases demonstrations on how to repeatedly attack and then defend various assets associated with a fully functional database. This approach illustrates the mechanics of how to secure databases in the most practical of terms. Security experts agree that the least effective approach to security is 'penetrate and patch'. It is far more effective to 'bake' security into an application throughout its lifecycle. After spending significant time trying to defend a poorly designed (from a security perspective) database application, students will learn how to build secure their databases and applications, starting at project inception. Securing Databases Foundation Why Hunt for Security Defects? Fingerprinting Databases Principles of Information Security Database Security Vulnerabilities Database Security Concerns Vulnerabilities Cryptography Overview Database Security Database Security What Next? Secure Development Lifecycle (SDL) SDL Process Overview Taking Action Now Asset Analysis Design Review Making Application Security Real

Securing Databases | Database Security (TT8700)
Delivered OnlineFlexible Dates
Price on Enquiry

Security Management with Cyber Security & Risk Management

By Wise Campus

Security Management: Security Management Encompass your assets! - to learn about controlling policy and process, enrol in our Security Management Diploma. Are you concerned about the prospects for the future? Our expertly designed Security Management Diploma Course is available to address all of your issues. With the help of this thorough Security Management Diploma course, you'll have all of your concerns assessed and the required knowledge.The Security Management Diploma Program is recent, trustworthy, and relevant. Your job and resume will both benefit from taking a Security Management Diploma course. To allow you to learn at your own pace and in your own time, this comprehensive Security Management Diploma is offered online and divided into manageable units. Your diploma in security management will educate you on the value of security and how to manage physical security. The Security Management Diploma course also covers crisis management, risk management, security, and the integration of security systems. With the help of our Security Management Diploma, you can gain knowledge about various tools, strategies, dealing with violence, and managing conflicts. So, show your expertise in this Security Management field to get extra advantage from other competitors. Enrol today to learn to protect tomorrow! Main Course: Security Management Diploma Free Courses are including with this Security Management: Security Management Course. Along with The Security Management: Security Management Course, We Offer a free Cyber Security Course Along with Security Management: Security Management Course, We Offer a free Risk Management Course Special Offers of this Security Management: Security Management Course This Security Management: Security Management Course includes a FREE PDF Certificate. Lifetime access to this Security Management: Security Management Course Instant access to this Security Management: Security Management Course Get FREE Tutor Support to this Security Management: Security Management Course Security Management: Security Management With the help of our extensive Security Management course, realize your full potential. Examine security management practices, security management strategies, and theories. Get the knowledge and abilities in security management that you need to succeed in the workplace. Enroll in our Security Management course now to make an investment in your future! Who is this course for? Security Management: Security Management Those who want to develop their abilities while preparing for a job should benefit from the Security Management Diploma program. Requirements Security Management: Security Management To enrol in this Security Management: Security Management Course, students must fulfil the following requirements. To join in our Security Management: Security Management Course, you must have a strong command of the English language. To successfully complete our Security Management: Security Management Course, you must be vivacious and self driven. To complete our Security Management: Security Management Course, you must have a basic understanding of computers. A minimum age limit of 15 is required to enrol in this Security Management: Security Management Course. Career path Security Management: Security Management Use this comprehensive Security Management Diploma course to gain the knowledge and skills necessary to succeed at work.

Security Management with Cyber Security & Risk Management
Delivered Online On Demand1 hour 18 minutes
£12

CertNexus Certified Internet of Things Security Practitioner (CIoTSP) v1.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for IoT practitioners who are looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students who are seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110. Overview This program will validate that the candidate has the knowledge, skills, and abilities to secure network environments for IoT devices, analyze vulnerabilities and determine reasonable controls against threats, and effectively monitor IoT devices and respond to incidents. This course is designed for practitioners who are seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. Managing IoT Risks Map the IoT Attack Surface Build in Security by Design Securing Web and Cloud Interfaces Identify Threats to IoT Web and Cloud Interfaces Prevent Injection Flaws Prevent Session Management Flaws Prevent Cross-Site Scripting Flaws Prevent Cross-Site Request Forgery Flaws Prevent Unvalidated Redirects and Forwards Securing Data Use Cryptography Appropriately Protect Data in Motion Protect Data at Rest Protect Data in Use Controlling Access to IoT Resources Identify the Need to Protect IoT Implement Secure Authentication Implement Secure Authorization Implement Security Monitoring on IoT Systems Securing IoT Networks Ensure the Security of IP Networks Ensure the Security of Wireless Networks Ensure the Security of Mobile Networks Ensure the Security of IoT Edge Networks Ensuring Privacy Improve Data Collection to Reduce Privacy Concerns Protect Sensitive Data Dispose of Sensitive Data Managing Software and Firmware Risks Manage General Software Risks Manage Risks Related to Software Installation and Configuration Manage Risks Related to Software Patches and Updates Manage Risks Related to IoT Device Operating Systems and Firmware Promoting Physical Security Protect Local Memory and Storage Prevent Physical Port Access

CertNexus Certified Internet of Things Security Practitioner (CIoTSP) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry