• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

11 Courses in London

ISM,ISPS,MLC Maritime Internal Auditor

By International Maritime Training

The course approaches the audit process in the context of international standards and therefore, it is equally suitable for sea-going and office-based staff and its benefits are as following: Individuals will have a good understanding of the ISM Code, its importance, and their role within it, including ISM, ISO and MLC auditing requirements Individuals will be actively involved in the ongoing evaluation and development of a Company Safety, Environmental and Quality Management System Providing the Company and its auditors with the ability to establish the effectiveness of a Company Management System ahead of external verification by Administrations or Port State Control Delivered by experts with International safety and security management, compliance and verification experience in an engaging interactive style with a variety of security and safety related scenario case study workshops exercises during the training course

ISM,ISPS,MLC Maritime Internal Auditor
Delivered Online & In-PersonFlexible Dates
£200

Online Options

Show all 524

BCS Foundation Certificate in Information Security Management Principles

5.0(12)

By Nemstar Ltd

This CISMP course and exam is for anyone wishing to progress their career in the rapidly expanding fields of Information Security, risk and cyber especially within the UK public sector.

BCS Foundation Certificate in Information Security Management Principles
Delivered OnlineFlexible Dates
£1,914

Certificate of Cloud Security Knowledge (CCSK)

5.0(12)

By Nemstar Ltd

Enhance cloud security expertise with specialized training, bridge skill gaps for job growth, and excel in cloud controls and best practices. This course is delivered online by Sean Hanna, three time EC-Council global trainer of the year award winner.

Certificate of Cloud Security Knowledge (CCSK)
Delivered OnlineFlexible Dates
£1,914

SOC - EC Council Official SOC Analyst (CSA) with exam

5.0(12)

By Nemstar Ltd

Classroom based, instructor led workshop with proctor at home exam. The lab-intensive Certified SOC Analyst (CSA) program emphasizes the holistic approach to deliver the advanced knowledge of how to identify, validate and defend against cyber-attacks.

SOC - EC Council Official SOC Analyst (CSA) with exam
Delivered OnlineFlexible Dates
£2,394

CND - EC Council Official Certified Network Defender

5.0(12)

By Nemstar Ltd

This is the perfect launch pad for a technical career in Cyber Security and fully prepares every delegate for the prestigious Certified Ethical Hacking (CEH) Course that comes next on the Cyber & Hacking Learning Pathways by Nemstar.

CND - EC Council Official Certified Network Defender
Delivered OnlineFlexible Dates
£3,294

Information Security Consultant (ISC) - CPD Certified

4.5(3)

By Studyhub UK

24 Hour Flash Deal **25-in-1 Information Security Consultant (ISC) Mega Bundle** Information Security Consultant (ISC) Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Information Security Consultant (ISC) package online with Studyhub through our online learning platform. The Information Security Consultant (ISC) bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Information Security Consultant (ISC) course provides complete 360-degree training on Information Security Consultant (ISC). You'll get not one, not two, not three, but twenty-five Information Security Consultant (ISC) courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Information Security Consultant (ISC) courses are yours for as long as you want them once you enrol in this course This Information Security Consultant (ISC) Bundle consists the following career oriented courses: Course 01: CompTIA Security+ Course 02: CompTIA CySA+ Cybersecurity Analyst Course Course 03: Web Application Penetration Testing Course 04: CompTIA PenTest+ (Ethical Hacking) course Course 05: CEH: Learn Ethical Hacking From A-Z: Beginner To Expert Course 06: Cyber Security Incident Handling and Incident Response Course 07: CompTIA Cloud+ (CV0-002) Course 08: Computer Networks Security from Scratch to Advanced Course 09: GDPR Training Course 10: Data Protection and Data Security (GDPR) Training Certification Course 11: Cyber Security Law Course 12: Cyber Security Awareness Training Course 13: Information Governance and Data Management Training Course 14: Foundations of IT Security: Protecting Digital Assets Course 15: Security Management and Fraud Prevention Training Course 16: Security Analyst Course 17: Fraud Detection & Prevention: Safeguarding Against Deception Course 18: Computer Workstation Safety Training Course 19: Diploma in CompTIA A+ Course 20: SQL for Data Science, Data Analytics and Data Visualization Course 21: Python Basic Programming for Absolute Beginners Course 22: Machine Learning Basics Course 23: Network Security and Risk Management Course 24: IT Administration and Networking Course 25: Touch Typing Complete Training Diploma The Information Security Consultant (ISC) course has been prepared by focusing largely on Information Security Consultant (ISC) career readiness. It has been designed by our Information Security Consultant (ISC) specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Information Security Consultant (ISC) Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Information Security Consultant (ISC) bundle course has been created with twenty-five premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Information Security Consultant (ISC) Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Information Security Consultant (ISC) Elementary modules, allowing our students to grasp each lesson quickly. The Information Security Consultant (ISC) course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. In this exclusive Information Security Consultant (ISC) bundle, you really hit the jackpot. Here's what you get: Step by step Information Security Consultant (ISC) lessons One to one assistance from Information Security Consultant (ISC)professionals if you need it Innovative exams to test your knowledge after the Information Security Consultant (ISC)course 24/7 customer support should you encounter any hiccups Top-class learning portal Unlimited lifetime access to all twenty-five Information Security Consultant (ISC) courses Digital Certificate, Transcript and student ID are all included in the price PDF certificate immediately after passing Original copies of your Information Security Consultant (ISC) certificate and transcript on the next working day Easily learn the Information Security Consultant (ISC) skills and knowledge you want from the comfort of your home CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Information Security Consultant (ISC) training is suitable for - Students Recent graduates Job Seekers Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Information Security Consultant (ISC) Certified Information Security Manager (CISM) Certified Information Security Management Principles (CISMP) Certified Information Systems Security Professional (CISSP) Requirements To participate in this Information Security Consultant (ISC) course, all you need is - A smart device A secure internet connection And a keen interest in Information Security Consultant (ISC) Career path You will be able to kickstart your Information Security Consultant (ISC) career because this course includes various courses as a bonus. This Information Security Consultant (ISC) is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Information Security Consultant (ISC) career opportunities. Certificates CPD Accredited Certificate Digital certificate - Included CPD Accredited e-Certificate - Free CPD Accredited Hardcopy Certificate - Free Enrolment Letter - Free Student ID Card - Free

Information Security Consultant (ISC) - CPD Certified
Delivered Online On Demand6 days
£279

Certified Cloud Security Professional (CCSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CCSP is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Overview Upon completing this course, the participants will gain valuable knowledge and skills including the ability to: - Successfully pass the CCSP exam. - Understand the fundamentals of the cloud computing architecture framework. - Understand security challenges associated with different types of cloud services. - Identify and evaluate security risks for their organization?s cloud environments. - Select and implement appropriate controls to ensure secure implementation of cloud services. - Thoroughly understand the 6 essential core domains of the CCSP common body of knowledge: 1. Architectural Concepts & Design Requirements 2. Cloud Data Security 3. Cloud Platform & Infrastructure Security 4. Cloud Application Security 5. Operations 6. Legal & Compliance The goal of the course is to prepare professionals for the challenging CCSP exam by covering the objectives of the exam based on the six domains as defined in the (ISC)2 CCSP common body of knowledge. 1 - Architectural Concepts and Design Requirements Cloud Computing Concepts Cloud Reference Architecture Cloud Computing Security Concepts Design Principles of Secure Cloud Computing Trusted Cloud Services 2 - Cloud Data Security CSA (Cloud Security Alliance) Cloud Data Lifecycle Cloud Data Storage Architectures Data Security Strategies Data Discovery and Classification Technologies Protecting Privacy and PII (Personally Identifiable Information) Data Rights Management Data Retention, Deletion, and Archiving Policies Auditability, Traceability, and Accountability of Data Events 3 - Cloud Platform and Infrastructure Security Cloud Infrastructure Components Cloud Infrastructure Risks Designing and Planning Security Controls Disaster Recovery and Business Continuity Management 4 - Cloud Application Security The Need for Security Awareness and Training in application Security Cloud Software Assurance and Validation Verified Secure Software SDLC (Software Development Life Cycle) Process Secure SDLC Specifics of Cloud Application Architecture Secure IAM (Identity and Access Management) Solutions 5 - Operations Planning Process for the Data Center Design Installation and Configuration of Physical Infrastructure for Cloud Environment Running Physical Infrastructure for Cloud Environment Managing Physical Infrastructure for Cloud Environment Installation and Configuration of Logical Infrastructure for Cloud Environment Running Logical Infrastructure for Cloud Environment Managing Logical Infrastructure for Cloud Environment Compliance with Regulations and Controls Risk Assessment for Logical and Physical Infrastructure Collection, Acquisition, and Preservation of Digital Evidence Managing Communication with Stakeholders 6 - Legal and Compliance Legal Requirements and Unique Risks within the Cloud Environment Relevant Privacy and PII Laws and Regulations Audit Process, Methodologies, and Required Adaptions for a Cloud Environment Implications of Cloud to Enterprise Risk Management Outsourcing and Cloud Contract Design Vendor Management

Certified Cloud Security Professional (CCSP)
Delivered OnlineFlexible Dates
£4,549

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495

EC-Council Certified Chief Information Security Officer (C|CISO)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems. In this course, students will learn in-depth content in each of the 5 CCISO Domains Domain 01 - Governance Define, Implement, Manage, and Maintain an Information Security Governance Program Information Security Drivers Establishing an information security management structure Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures Managing an enterprise information security compliance program Risk Management Risk mitigation, risk treatment, and acceptable risk Risk management frameworks NIST Other Frameworks and Guidance (ISO 31000, TARA, OCTAVE, FAIR, COBIT, and ITIL) Risk management plan implementation Ongoing third-party risk management Risk management policies and processes Conclusion Domain 2 - Security Risk Management, Controls, & Audit Management INFORMATION SECURITY CONTROLS COMPLIANCE MANAGEMENT GUIDELINES, GOOD AND BEST PRACTICES AUDIT MANAGEMENT SUMMARY Domain 03 - Security Program Management and Operations PROGRAM MANAGEMENT OPERATIONS MANAGEMENT Summary Domain 04 - Information Security Core Concepts ACCESS CONTROL PHYSICAL SECURITY NETWORK SECURITY ENDPOINT PROTECTION APPLICATION SECURITY ENCRYPTION TECHNOLOGIES VIRTUALIZATION SECURITY CLOUD COMPUTING SECURITY TRANSFORMATIVE TECHNOLOGIES Summary Domain 05 - Strategic Planning, Finance, Procurement and Vendor Management STRATEGIC PLANNING Designing, Developing, and Maintaining an Enterprise Information Security Program Understanding the Enterprise Architecture (EA) FINANCE PROCUREMENT VENDOR MANAGEMENT Summary

EC-Council Certified Chief Information Security Officer (C|CISO)
Delivered OnlineFlexible Dates
£3,495

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered OnlineFlexible Dates
£3,395

Certified Information Systems Auditor (CISA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - The Process of Auditing Information Systems ISACA Information Systems Auditing Standards and Guidelines Fundamental Business Processes Develop and Implement an Information Systems Audit Strategy Plan an Audit Conduct an Audit The Evidence Life Cycle Communicate Issues, Risks, and Audit Results Support the Implementation of Risk Management and Control Practices 2 - IT Governance and Management Evaluate the Effectiveness of IT Governance Evaluate the IT Organizational Structure and HR Management Evaluate the IT Strategy and Direction Evaluate IT Policies, Standards, and Procedures Evaluate the Effectiveness of Quality Management Systems Evaluate IT Management and Monitoring of Controls IT Resource Investment, Use, and Allocation Practices Evaluate IT Contracting Strategies and Policies Evaluate Risk Management Practices Performance Monitoring and Assurance Practices Evaluate the Organizations Business Continuity Plan 3 - Information Systems Acquisition, Development, and Implementation Evaluate the Business Case for Change Evaluate Project Management Frameworks and Governance Practices Development Life Cycle Management Perform Periodic Project Reviews Evaluate Control Mechanisms for Systems Evaluate Development and Testing Processes Evaluate Implementation Readiness Evaluate a System Migration Perform a Post-Implementation System Review 4 - Information Systems Operations, Maintenance, and Support Perform Periodic System Reviews Evaluate Service Level Management Practices Evaluate Third-Party Management Practices Evaluate Operations and End User Management Practices Evaluate the Maintenance Process Evaluate Data Administration Practices Evaluate the Use of Capacity and Performance Monitoring Methods Evaluate Change, Configuration, and Release Management Practices Evaluate Problem and Incident Management Practices Evaluate the Adequacy of Backup and Restore Provisions 5 - Protection of Information Assets Information Security Design Encryption Basics Evaluate the Functionality of the IT Infrastructure Evaluate Network Infrastructure Security Evaluate the Design, Implementation, and Monitoring of Logical Access Controls Risks and Controls of Virtualization Evaluate the Design, Implementation, and Monitoring of Data Classification Process Evaluate the Design, Implementation, and Monitoring of Physical Access Controls Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered OnlineFlexible Dates
£3,250

Educators matching "CISMP"

Show all 14
Net Security Training

net security training

3.7(6)

London

Net Security Training is an independent specialist Cyber Security training company whose total focus is the provision of specialised courses and appreticeships catering for Cyber Security and Information Assurance professionals. CyberSecurity, IT Security, Information Risk Management, Compliance and Governance training are the cornerstone of our course offerings. We have invested heavily in establishing our credentials by working with the very best certification and examination bodies. We are approved and/or endorsed by the leading players in the cyber security industry to deliver training to their exact standards. We have been pioneers in commissioning, developing and introducing high end material in to the market place for courses and apprenticeships Longest established Cyber Security Training specialist in the UK, since 2003 11000+ Trained Globally- including FTSE 250 Content developed by industry Professionals Classroom based small, highly interactive sessions – which encourages active learner participation The escalating complexity of Technology and Business needs will always result in companies being exposed to security threats, and most networks will be breached if faced with a sustained attack. The key to minimising the damage hackers do when they inevitably force their way on to corporate networks is to make sure your Cyber Security staff are knowledgeable enough to respond appropriately to minimise the harm Intruders can cause to the Organisation. Our History Net-Security Training is the first specialist Information Security training company in the United Kingdom. We have kept true to this niche market since our incorporation in 2003. In-fact we were the only independent training Partner that VeriSign ever approved in Europe. We have been pioneers in commissioning, developing and introducing high end course materials in to the market place. These include Penetration Testing, Securing Network Perimeter, Public Key Infrastructure, Firewalls, Virtual Private Networks, Computer Hacking, IT Security Principals, Security Awareness and many more. Our history is testament to why we have continued to stay ahead of the curve in our fast moving Industry.

Training Express

training express

5.0(2)

London

About Us Training Express is a premier course provider, established by a committed team of experts working across the UK. We deliver accredited certification and training to UK businesses aiming to enhance organisational performance. Our extensive courses span a wide range of sectors and industries, with a strong emphasis on promoting high standards of food hygiene, business wellbeing, and workplace safety. Our goal is to assist businesses in making smarter decisions regarding their management of in-house safety standards and regulations by bringing in specialists to guide you every step of the way. We pride ourselves on continuously improving our course quality and catalogue, consistently introducing new opportunities for our learners to maximise their professional development. Quality is paramount to us, which is why we only collaborate with trainers and professionals we can trust. We employ only the most qualified experts to support you in your studies, ensuring a high standard of service every time. This dedication has led us to become one of the most respected training providers, renowned for helping businesses ensure workplace proficiency, professionalism, and safety. Our Vision Training Express has one clear vision: to enhance workplace standards for organisations across the UK. Our mission and values are centred on raising awareness regarding professional compliance, competency, and preparedness in matters of health and safety. This means that we endeavour to help everyone we work with take steps towards a safer and more productive working environment. The ultimate goal: to boost business performance, ensure safer working environments, and uphold a high standard of professionalism in businesses nationwide. Our Aim As a leading health and safety training course provider, we strive to improve workplace standards, awareness, quality, and compliance. We offer on-site tuition to ensure a user-friendly service that will equip you with the information needed to effectively train staff on industry best practices. Each course is accredited and approved by a professional, guaranteeing quality training material in accordance with industry standards. We also aim to maintain complete transparency, and you can learn about your rights as a trainee and how we manage and store your data in our detailed Business and Privacy Policy. Should you wish to know more about our terms of service, please feel free to contact us at any time via email or phone. Our customer service team is always on hand to address any issues or queries you may have. Why choose us At Training Express, we are confident that our professional dedication, user-friendly platform and commitment to delivering quality training sets us apart from our competitors. Our team is experts in their field and our specially curated courses are designed to make learning online as flexible and efficient as possible. Our trusted, high quality and affordable online courses are designed to train individuals to become experts in their field. * Accredited Certification * Meets UK & EU Standards * Developed by Qualified Professionals * Engaging Audio Visual Training * Instant Course Access * Study Wherever, Whenever * Instant Digital Certificate * Premium Support: Live Chat, Email, Telephone

Course Gate

course gate

5.0(1)

London

Welcome to Course Gate, your gateway to a world of knowledge and opportunity. We are a leading online learning marketplace dedicated to empowering individuals and organisations with the skills they need to succeed in today's dynamic and competitive environment. -------------------------------------------------------------------------------- Our Mission Our mission is to make education accessible and enjoyable for everyone. We want to help you discover your passion, expand your knowledge, and grow your confidence. Whether you want to learn a new language, master software, or develop a hobby, we have the right course for you.  -------------------------------------------------------------------------------- Our Vision  At Course Gate, we envision a future where education knows no boundaries. Our goal is to eliminate the traditional barriers of time, location, and accessibility, empowering learners from diverse backgrounds to unlock their full potential. Through our innovative approach, we aim to revolutionise the learning experience by making top-quality education accessible to everyone, regardless of their location. -------------------------------------------------------------------------------- Why Choose Course Gate? When you opt for Course Gate, you're choosing excellence, convenience, and an unparalleled learning experience. Here's why learners and organisations worldwide trust us: * Unmatched Quality: We meticulously curate our courses, collaborating with industry-leading experts to provide the highest-quality, relevant, and up-to-date content. * Flexible Learning: Our platform enables you to learn at your own pace, fitting into your schedule. Whether you're a full-time professional, a stay-at-home parent, or a busy student. * 24/7 Customer Support: Our dedicated customer support team is available to assist you whenever you need help. * Accreditation & Endorsement: CPD accredited & UKRLP registered course provider in the UK. * Affordability: We believe education should be accessible to all. Course Gate provides competitive pricing and discounts, ensuring that the cost never becomes a barrier to your personal and professional development. So, what are you waiting for? Join the thousands of learners who have already chosen Course Gate as their trusted learning partner and unlock your full potential. --------------------------------------------------------------------------------

Academy for Health and Fitness

academy for health and fitness

4.8(77)

London

WHO WE ARE Academy for Health and Fitness is your premier online destination for accredited health and fitness courses. We're committed to helping you transform your life through our comprehensive programs. Our courses are meticulously designed to cater to three core areas: fitness, therapy, and health. We offer a vast array of online courses and a robust certification program that empowers millions of professionals with the skills they need to excel in their careers. Our focus is on equipping you with the expertise necessary to thrive in today's dynamic world. OUR MISSION As a leading online health and fitness course provider, our mission is to deliver exceptional learning experiences and make quality education accessible to everyone. We strive to maintain the highest standards of excellence, transparency, and customer service. OUR VISION Our vision is to become the UK's most trusted and respected online course provider. We aim to create a safe and flexible learning environment that maximizes your potential and enhances your employability. WHAT WE OFFER * Expert-Curated Courses: Our courses are developed by industry-leading experts. * Fully Accredited Courses and Study Materials: Ensure quality and credibility. * Business Team Training: Tailor-made programs for corporate teams. * Affordable Subscriptions: Flexible payment options to suit your budget. * Accredited Certifications: Validate your skills and expertise. * New Courses Monthly: Stay updated with the latest trends. * Flexible Learning: Learn at your own pace and convenience. * 24/7 Support: Dedicated assistance whenever you need it. WHY CHOOSE US We're dedicated to providing unparalleled customer service and the most comprehensive selection of online health and fitness courses. With new courses added regularly, you can be confident in your choice to learn from us. Our exceptional customer support team is always ready to assist you on your journey to success.

IIL Europe Ltd

iil europe ltd

London

At IIL, our fundamental values of Intelligence, Integrity, and Innovation guide our actions and achievements with each customer, partner, and colleague. Our deepest purpose is to foster the growth and success of individuals, teams, and organizations through enduring relationships and top-notch learning content delivered through various methods. Explore our learning categories: NEW Generative Artificial Intelligence Agile and Scrum Business Analysis Business Relationship Management Cybersecurity IT Management Lean Six Sigma Microsoft Project Project, Program and Portfolio Management INNOVATION IN PROFESSIONAL DEVELOPMENT & TRAINING IIL offers a wide variety of delivery methods to ensure an optimal learning experience. Using its proprietary Many Methods of Learning™, IIL delivers innovative, effective and consistent training solutions through a variety of learning approaches: * In-Person Classroom Courses * Self-Paced On-Demand Training * Live Virtual Classes * Simulations * Free Videos & Webinars * Mobile IIL ACCREDITING BODIES AND PARTNERSHIPS IIL is a PMI® Charter Global Registered Education Provider and member of PMI’s Global Executive Council as well as a Microsoft Partner (with a Microsoft Gold Project and Portfolio Management competency), IIL is also an Accredited Training Partner for: * PRINCE2 * ITIL * Association for Project Management (APM) * PeopleCert on behalf of AXELOS * IASSC Accredited Training Organization® * The American Council on Education (ACE), an APMG International Accredited Training Organization (ATO) * Scrum Alliance REA organization * Authorized CEU Sponsor Member of the International Association for Continuing Education and Training (IACET). * IIBA® Endorsed Education Provider. IIL is the training solution partner of choice for many top global companies.  * Women’s Business Enterprise National Council (WBENC) corporate member.