• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

73 Information Security (IS) courses in Plymstock delivered Live Online

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Basic knowledge of Information Security is recommended, for instance through the EXIN Information Security Foundation based on ISO/IEC 27001 certification. Overview The module Information Security Management Professional based on ISO/IEC 27001 (ISMP.EN) tests understanding of the organizational and managerial aspects of information security.The subjects of this module are: Information security perspectives: business, customer, service provider/supplier Risk Management: analysis, controls, remaining risks Information security controls: organizational, technical, physical. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC 27000 definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their staff, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. Information Security Perspectives The candidate understands the business interest of information security The canidate understands the customer perspective on governance The candidate understands the supplierïs responsibilities in security assurance Risk Mangement The candidate understands the principles of risk management The candidate knows how to control risks The candidate knows how to deal with remaining risks Information Security Controls The candidate has knowledge of organizational controls The candidate has knowledge of technical controls The candidate has knowledge of physical, employment-related and continuity controls

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional
Delivered OnlineFlexible Dates
Price on Enquiry

BCS Foundation Certificate in Information Security Management Principles

5.0(12)

By Nemstar Ltd

This CISMP course and exam is for anyone wishing to progress their career in the rapidly expanding fields of Information Security, risk and cyber especially within the UK public sector.

BCS Foundation Certificate in Information Security Management Principles
Delivered OnlineFlexible Dates
£1,914

Nemstar's CISSP Programme

5.0(12)

By Nemstar Ltd

Our unique 5 day workshop prepares you for a first time pass of your CISSP exam. Covering each of the famous 8 CBK's, cram the theory before testing your knowledge during exam simulations. Led by a multi-award winning InfoSec consultant, this workshop delivers everything you need to pass,

Nemstar's CISSP Programme
Delivered OnlineFlexible Dates
£2,754

CND - EC Council Official Certified Network Defender

5.0(12)

By Nemstar Ltd

This is the perfect launch pad for a technical career in Cyber Security and fully prepares every delegate for the prestigious Certified Ethical Hacking (CEH) Course that comes next on the Cyber & Hacking Learning Pathways by Nemstar.

CND - EC Council Official Certified Network Defender
Delivered OnlineFlexible Dates
£3,294

SOC - EC Council Official SOC Analyst (CSA) with exam

5.0(12)

By Nemstar Ltd

Classroom based, instructor led workshop with proctor at home exam. The lab-intensive Certified SOC Analyst (CSA) program emphasizes the holistic approach to deliver the advanced knowledge of how to identify, validate and defend against cyber-attacks.

SOC - EC Council Official SOC Analyst (CSA) with exam
Delivered OnlineFlexible Dates
£2,394

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers Privacy Officers Health IS Managers Risk Managers Information Security Managers Compliance and Privacy Officers Overview Upon completion, the student will be ready to take the Certified Healthcare Information Systems Security Practitioner exam by mile2. In addition, at the end of the CHISSP course, the student will be versed with best practices in the healthcare industry and will be able to establish a framework with current best practices in respects to privacy, regulation and risk management. The Certified Healthcare IS Security Practitioner, C)HISSP certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. Course Outline Intro to the Healthcare Industry Regulatory Environment Healthcare Privacy and Security Policies Information Governance Risk Management Third-Party Risk Management

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

Lexcel Standard Training Requirements Course

By DG Legal

This training is for lawyers and covers key topics to ensure compliance with the Lexcel standard and other regulations.

Lexcel Standard Training Requirements Course
Delivered Online + more
£225 to £300

Information Security Management Principle

5.0(10)

By GBA Corporate

Overview Objective Understand the requirement of Information Security Concepts and Definitions of Information Security Management Systems Deeply Analysing the policies, Standards and procedures How to deliver a balanced ISMS and following its security procedures Analysing the Information risk management Evaluating the organisational responsibilities Understanding the Information security controls Scrutinising Legal framework Techniques of Cryptographic models

Information Security Management Principle
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

EC-Council Certified Chief Information Security Officer (C|CISO)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems. In this course, students will learn in-depth content in each of the 5 CCISO Domains Domain 01 - Governance Define, Implement, Manage, and Maintain an Information Security Governance Program Information Security Drivers Establishing an information security management structure Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures Managing an enterprise information security compliance program Risk Management Risk mitigation, risk treatment, and acceptable risk Risk management frameworks NIST Other Frameworks and Guidance (ISO 31000, TARA, OCTAVE, FAIR, COBIT, and ITIL) Risk management plan implementation Ongoing third-party risk management Risk management policies and processes Conclusion Domain 2 - Security Risk Management, Controls, & Audit Management INFORMATION SECURITY CONTROLS COMPLIANCE MANAGEMENT GUIDELINES, GOOD AND BEST PRACTICES AUDIT MANAGEMENT SUMMARY Domain 03 - Security Program Management and Operations PROGRAM MANAGEMENT OPERATIONS MANAGEMENT Summary Domain 04 - Information Security Core Concepts ACCESS CONTROL PHYSICAL SECURITY NETWORK SECURITY ENDPOINT PROTECTION APPLICATION SECURITY ENCRYPTION TECHNOLOGIES VIRTUALIZATION SECURITY CLOUD COMPUTING SECURITY TRANSFORMATIVE TECHNOLOGIES Summary Domain 05 - Strategic Planning, Finance, Procurement and Vendor Management STRATEGIC PLANNING Designing, Developing, and Maintaining an Enterprise Information Security Program Understanding the Enterprise Architecture (EA) FINANCE PROCUREMENT VENDOR MANAGEMENT Summary

EC-Council Certified Chief Information Security Officer (C|CISO)
Delivered OnlineFlexible Dates
£3,495
123...8

Educators matching "Information Security (IS)"

Show all 13
Salt South West

salt south west

Plymouth, Devon

SALT South West is a Plymouth-based Christian voluntary organisation ( known as SAIFLINE until 2006), offering direct help to adult survivors of childhood sexual abuse. SALT is a member agency of The Survivors’ Trust and our Co-ordinator is a member of TAG (Trauma and Abuse Group). We are accountable to our Management Committee of five and have a Council of Reference which includes an MP, a Bishop, another Minister of Religion and a media presenter. We are currently a team of ten members, two of whom are counselling students and three of whom are currently paid part-time (Team Coordinator, Assistant Coordinator and Administrator). Our volunteer listeners have all undertaken the in-house SALT training, some have various counselling qualifications including specific sexual abuse/trauma related subjects. Some members of our team are survivors and bring with them personal experience and knowledge. Supervision is fundamental to our work and each listener receives a minimum of one and a half hours every four weeks. We are a close team and there is always the opportunity to share and offload inbetween when necessary. (Which is often the case in our field of work). Our Annual Away Day gives us a chance to meet outside of work to share, explore and be refreshed as people, not just as co-workers. Behind the scenes, our 60 prayer partners have the important role of supporting us and we meet together once a year. SALT works with adult survivors of childhood sexual abuse, age 16 and above. Everyone is received by us regardless of background, belief or behaviour. Our services are free of charge but donations are always welcomed. We do not want anyone to be excluded from receiving good quality psychological help.

Cognivity

cognivity

London

Welcome to Cognivity Coaching CIC, I hope you find all the information you require in the following pages, Please contact me directly for an informal chat or for any additional information, thank you, Eileen. Cognition offers us the ability to think, learn, respond and recall. A healthy cognition enables us to efficiently receive, understand, store, retrieve and use information, ensuring a more fulfilled, productive and independent life. Creativity is the use of ones imagination to create something new, original, different from before. Creativity is within all of us, so too is Cognition which can be trained to function effectively at any stage of a persons life. It is never too late to start over, look at things differently, achieve the goals set. Cognivity was formed in 2009 as a practice facilitating self development for individuals and groups. Creative thinking and implementation has always been a catalyst for change and Cognivity continues to use creative applications as a means of supporting people to develop skills which positively impact health, business and education. In March 2015 Cognivity became a Community Interest Company and is now a slightly bigger organisation welcoming a range of people who assist in delivering workshops, teaching, creating and coaching, all of whom share in the values of promoting Creativity and Wellness. Facilitating and coaching creatively is at the heart of what Cognivity does: facilitating business success and coaching individuals to embrace their strengths and the challenges ahead of them* With 23 years of technical, managerial and teaching experience gained whilst in industry, manufacturing, business, educational and training establishments; Cognivity has successfully: • Enabled individuals and groups to achieve specific, measurable goals • Delivered training and teaching programs in industry and education • Supported teams in their development including conflict resolution • Developed and implemented improved cost effective systems • Increased productivity • Reduced return rates and claim costs • Improved quality on a wide range of merchandise world wide • Defined and made transparent departmental roles • Improved manufacturing methods • Implemented cost effective quality systems • Reduced transport costs and identified problematic infrastructures • Addressed and acted upon environmental issues improving sustainability So, whether you are A student or potential student wishing to improve, prioritise or focus with one to one coaching or mentoring Someone who is presently lacking direction and would like some time to consider ways forward In a place or position at work that you wish to move on from and would like help clarifying a direct route Have an important challenge to face and would like support A team or organisation that is stuck and or wants to inject new creative ideas for growth Read through the sections on Coaching, Mentoring and Training or give me a call on 07742312828 and I will be pleased to chat about options. As a qualified business coach, mentor and teacher my experience combines industrial, managerial and educational expertise to deliver a range of coaching and training programs, workshops and courses. I use Action Learning and Occupational Psychometric Testing amongst other learning, business and development tools to help clients achieve their aims. “As Quality Control manager for a large buying office in Hong Kong / China Eileen strived hard demonstrating resilience and tenacity in her pursuit to create transparency not only within the quality department, but even more so with the hundreds of suppliers. The end result was much better relationships with those suppliers and a substantially higher level of satisfaction with customers” Koert Tulleners Chief Executive officer Freemans & Grattan Formerly, Managing Director Otto International Asia

Dte-Elite

dte-elite

Callington

DTE Elite – Excellence in Driving Instructor Training DTE-Elite are an industry leader in driving instructor training, backed by almost 20 years of research, teaching and instructing. The most qualified driving instructor training in the UK Founded by Dave Foster with a vision of raising the standard of driving instructor training, DTE-Elite‘s methods solve the industry problems observed by Dave as an experienced instructor trainer. Our revolutionary training methods are proven to help people achieve their goals in becoming a driving instructor. We have helped so many people pass and get on the road to an unlimited earning potential. Our training fees are competitive and can be taken as manageable instalments. Click here to read more about us The name DTE-Elite originated after founder Dave Foster completed his Masters Degree in Driver Training Education (DTE). Dave has been dedicated to the pursuit of furthering his knowledge in everything regarding teaching and training in order to cascade this onto others so they too can become better trainers. Dave has a whole host of qualifications in the field including a diploma in Driving Instruction and others from advanced driver courses, motorcycle qualifications and fleet training. There is literally nobody more qualified to give training to instructors. In most of his driving schools, the instructors were originally trained by Dave, where they found driving instructor training easy with his university researched and proven methods.