• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

918 Courses delivered Online

How to Study for CISSP®️ Certification - Tips, Materials, and Approach

By Packt

Preparing for the CISSP Certification Exam? Then this course is for you. In this course, you will learn more effective CISSP study techniques, exam hacks, formats, and strategies, as well as how to correctly respond to exam questions.

How to Study for CISSP®️ Certification - Tips, Materials, and Approach
Delivered Online On Demand2 hours 31 minutes
£56.99

NCSP ISO 27001 Specialist

By IIL Europe Ltd

The NCSP® ISO 27001 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the ISO 27001 controls in the context of a NIST Cybersecurity Framework program.This course looks at the impact of adapting a principled approach to an enterprise risk management framework to better support cybersecurity decisions within the context of the selected informative reference. It guides participants on the best approach to adapt, implement, and operate (AIO) a comprehensive cybersecurity program that integrates into existing organizational capabilities and incorporates the selected Informative Reference. NCSP® ISO 27001 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the perspective of the selected cybersecurity informative reference. The overall approach places these activities into systems thinking context by introducing the Service Value Management System composed of three aspects, governance, assurance, and the Z-X Model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ presented in the NCSP Practitioner. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.

NCSP ISO 27001 Specialist
Delivered OnlineFlexible Dates
£2,995

Advanced Computer Networks Security Course

4.8(9)

By Skill Up

Gain the solid skills and knowledge to kickstart a successful career and learn from the experts with this

Advanced Computer Networks Security Course
Delivered Online On Demand8 hours 8 minutes
£25

Security Officer Training Course

4.7(160)

By Janets

Learn how to establish and enforce security policies and procedures in the workplace with the Security Officer Training Course. This security risk management program is ideal for beginners who are new to this field. You will get a complete overview of the role and responsibilities of a security officer, and on completion, will be equipped with the skills and knowledge to kick-start your career. Throughout this security management course, you will explore the basic principles of security and the fundamental principles of security governance. You will also develop your understanding of the different types of crimes, prevention strategies and organisation security models. Learning Outcomes of The Security Officer Training Course:  Understand the basics of security management, planning and implementing Explore the fundamental principles of security governance and the accountability framework Expand your knowledge of the different types of crimes and crime prevention tactics Familiarise with the role and responsibilities of a security office Learn about the different types of organisational security models Get a detailed overview of security risk management and how to conduct a risk assessment Understand how to effectively manage and report cases of domestic and sexual violence in the workplace Explore prevention strategies for domestic and violent abuse Why choose this course Earn an e-certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full Tutor Support on Weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certification After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post. Course Content Security Officer Training The Basics Of Security Management 00:15:00 Security Management Planning And Implementing 00:15:00 How to Build a Security Management Team 00:15:00 The Role And Responsibilities of a Security Officer 00:30:00 Security Management Governance 00:15:00 Organizational Security Models 00:30:00 Understanding Risk, Threat, And Vulnerability 00:15:00 Information Risk Management 00:30:00 Different Types of Crimes 00:15:00 Understanding What Burglaries Are 00:15:00 Definition and Dangers of Hijacking 00:15:00 Domestic Violence in the Workplace 00:30:00 Child abuse: Identification, Reporting, and Prevention 00:30:00 Sexual Violence: Prevention Strategies 00:15:00 Order your Certificates & Transcripts Order your Certificates & Transcripts 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Security Officer Training Course
Delivered Online On Demand4 hours 45 minutes
£25

Cybersecurity: Social Engineering

5.0(9)

By Chart Learning Solutions

At its core, social engineering is not a cyber attack. Instead, social engineering is all about the psychology of persuasion: It targets the mind like your old-school grifter or con man. The aim is to gain the trust of targets, so they lower their guard, and then encourage them into taking unsafe actions such as divulging personal information or clicking on web links, or opening attachments that may be malicious. Learning Objectives The following are some of the key outcomes in this course: Understand Social Engineering and how to spot common infiltration methods Learn about the different types of social engineering attacks and how to avoid becoming a victim Understand what phishing is and how to spot the red flags of fraudulent emails Explore the best cybersecurity practices to protect your systems and accounts Learn about the five types of business email compromise Detect the warning signs of this scam and how to prevent attacks Target Audience Young Professionals

Cybersecurity: Social Engineering
Delivered Online On Demand18 minutes
£34.95

Cybersecurity: Protect your Data

5.0(9)

By Chart Learning Solutions

A robust cybersecurity policy protects secure, critical or sensitive data and prevents it from falling in to the hands of malicious third parties. Accounts that contain highly sensitive data often require multiple layers of security - or multifactor authentication (MFA). Personal security can't just be restricted to your computer. All of your devices, even those without internet connectivity, need protective measures. Learning Objectives The following are some of the key outcomes in this course: What are portable devices and removable media? Know the risks associated with using them and how you can safeguard your devices Understand the risks associated with portable devices and removable media Understand physical safety and the value of any effort to mitigate on-site threats to facilities, assets, and employees Target Audience Young Professionals

Cybersecurity: Protect your Data
Delivered Online On Demand18 minutes
£34.95

CyberSec First Responder: Threat Detection and Response (Exam CFR-210) at QLS Level 7

4.8(9)

By Skill Up

Level 7 QLS Endorsed Diploma | 180 CPD Points | +Gifts: QLS Certificate + PDF Certificate | 24/7 Learner Support

CyberSec First Responder: Threat Detection and Response (Exam CFR-210) at QLS Level 7
Delivered Online On Demand3 weeks
£100

Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux

By Packt

Build a strong foundation in ethical hacking with this course. In this course, you will start from scratch, from setting up your hacking lab environment to implementing advanced Wi-Fi attacks. Moreover, you will learn how to perform Man in the Middle attacks after gaining access to a Wi-Fi network and protect your connected devices from these kinds of attacks.

Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux
Delivered Online On Demand5 hours 48 minutes
£44.99

Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

Cyber Safe
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£30

Level 5 Diploma in Computer Networks Security

By Compliance Central

Cybersecurity whispers in hushed tones - a dark underbelly to the bright, interconnected world we inhabit. It's a realm of shadows and shields, where digital predators lurk and networks stand as the battlefield. But what if you could become the protector, the architect of fortresses that hold back the tide of digital darkness? This Level 5 Diploma in Computer Networks Security is your gateway to that world. It's more than just knowledge; it's a weapon forged in understanding, honed by logic, and wielded with the precision of a digital warrior. You'll delve into the very core of networks, dissecting their anatomy, understanding their language (think TCP/IP, the Esperanto of data), and mastering the intricacies of security protocols like firewalls and honeypots. This isn't a playground for casual observers; it's a training ground for elite defenders. You'll navigate the labyrinthine pathways of the ISO/OSI model, unveil the secrets of wireless networks, and learn to anticipate the moves of your adversaries in the intricate game of intrusion detection. Physical security, incident handling - no stone is left unturned in this comprehensive odyssey. So, unsheathe your curiosity, lace up your digital boots, and prepare to conquer the ever-evolving realm of computer networks security in this comprehensive diploma. Level 5 Diploma in Computer Networks Security Course Learning Outcomes Craft an intricate understanding of network architecture and protocols. Decipher the layers of the ISO/OSI and TCP/IP models, the blueprints of secure networks. Master the art of securing both wired and wireless networks, leaving no vulnerability unguarded. Become a firewall architect, wielding these digital shields to deflect malicious attacks. Craft a strategic defense against intruders, deploying intrusion detection and prevention systems. Navigate the complex terrain of physical security and incident handling, ensuring airtight network protection. Level 5 Diploma in Computer Networks Security Introduction Section 01: An Introduction to Computer Networks Section 02: ISO/OSI Model Section 03: TCP/IP Protocols Section 04: Wireless Networks Section 05: Network Security Section 06: Firewalls and Honeypots Section 07: Intrusion Detection and Prevention System Section 08: Wireless Network Security Section 09: Physical Security and Incident Handling Section 10: Network Security: Conclusion Certificate of Achievement Endorsed Certificate of Achievement from the Quality Licence Scheme Learners will be able to achieve an endorsed certificate after completing the course as proof of their achievement. You can order the endorsed certificate for Free to be delivered to your home by post. For international students, there is an additional postage charge of £10. Endorsement The Quality Licence Scheme (QLS) has endorsed this course for its high-quality, non-regulated provision and training programmes. The QLS is a UK-based organisation that sets standards for non-regulated training and learning. This endorsement means that the course has been reviewed and approved by the QLS and meets the highest quality standards. Who is this course for? Level 5 Diploma in Computer Networks Security Network Security Analyst Cybersecurity Specialist IT Security Consultant Penetration Tester Ethical Hacker Cloud Security Architect Requirements Level 5 Diploma in Computer Networks Security To enrol in this Level 5 Diploma in Computer Networks Security, Purchasing & Procurement course, all you need is a basic understanding of the English Language and an internet connection. Career path Level 5 Diploma in Computer Networks Security Network Security Analyst: £30,000 to £60,000 per year Cybersecurity Consultant: £40,000 to £70,000 per year IT Security Engineer: £35,000 to £65,000 per year Information Security Officer: £40,000 to £75,000 per year Penetration Tester (Ethical Hacker): £35,000 to £70,000 per year Certificates CPD Accredited PDF Certificate Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included CPD Accredited Hard Copy Certificate Hard copy certificate - £9.99 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Level 5 Diploma in Computer Networks Security
Delivered Online On Demand8 hours
£109