• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

87 Educators providing Information Security (IS) courses in Sedgley

Insite Training

insite training

London

inSITE Training & Development, Inc., a woman owned small business, was started in 1991 by Founder Susan S. Porter. Upon her retirement in 2010, Carol Erdman, who had worked with inSITE for 15 years became President and CEO. Since the turn of the century, inSITE has continued to grow and serve the business community as well as contribute to the community as a whole. Improving the quality and availability of education remains our primary focus for corporations, government agencies, and the non profit community. With a strong administrative team, instructional design staff and seasoned facilitators, inSITE has the unique ability to provide a wide variety of services. We hire graduate level interns to demonstrate our commitment to development of the next generation of instructional designers and instructors. Our forte has been to place teams on-site to assess, develop, deliver, and evaluate classroom-based training and web-based solutions. inSITE has expertise in conducting comprehensive needs and task analysis that truly determine skill-based needs. We focus on performance, not training, so our recommendations, once implemented, create an environment where employees not only have task-related skills to conduct their jobs, but are able to perform at levels needed for employees to reach their benchmarks, departments to achieve their goals, and the organization to attain its strategic plan while being flexible and ready to take on new challenges. Our eLearning modules can be tailored to include your policies, culture and other specific content. We use gamification to engage learners in classroom and web-based platforms. Adults learn when they are engaged and participating so our classroom learning engages all the senses. In order to ensure significant learning occurs in two to six hour courses, we limit lectures to 15 minutes or less and call them lecturettes. The remainder of the class is for large and small group discussion, enriching case studies that are so true to life they arouse emotion, role plays that help participants understand how they naturally behave in certain situations, simulations and video vignettes that demonstrate typical work place issues and bring learning to life. We provide a number of inventories including MBTI and its Step 2, DiSC, Thomas Kilmann, Gregorc Style Delineator, and the Conflict Mode Instrument. The use of the World Café is a highly successful learning format that draws in high level professionals and managers. We ensure a great deal of practice of all new skills and tools so that participants can transfer learning readily upon return to their job. inSITE Training & Development, inc. has conducted all aspects of the ADDIE model for both the Federal government and private sector. Most often, we conduct a needs analysis as a prelude to designing and developing instruction as well. By being involved in the entire ADDIE process and often delivering the training ourselves, we have learned just how comprehensive the needs analysis must be. We have on staff advanced degreed Instructional Designers, Project Managers, Instructors and Facilitators (PhD, MBA, Masters Degree), Coaches (ICF certified), a Psychometrician, a Web designer and a Gamification/eLearning programmer.

1...789

Courses matching "Information Security (IS)"

Show all 2

Information Security Management Principle

5.0(10)

By GBA Corporate

Overview Objective Understand the requirement of Information Security Concepts and Definitions of Information Security Management Systems Deeply Analysing the policies, Standards and procedures How to deliver a balanced ISMS and following its security procedures Analysing the Information risk management Evaluating the organisational responsibilities Understanding the Information security controls Scrutinising Legal framework Techniques of Cryptographic models

Information Security Management Principle
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997