• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

309 IT Security courses in Belfast delivered Online

CISM Certification Domain 2: Information Risk Management Video Boot Camp 2019

By Packt

Get 7.5 hours of videos and downloadable lecture slides for Certified Information Security Manager (CISM) Domain 2

CISM Certification Domain 2: Information Risk Management Video Boot Camp 2019
Delivered Online On Demand7 hours 29 minutes
£137.99

CISSP®️ Certification Domain 6 - Security Assessment and Testing Video Boot Camp for 2022

By Packt

This course helps you prepare for your CISSP certification. In this course, we will be discussing CISSP? Certification Domain 6 - Security Assessment and Testing. This course focuses on how we assess and test the security measures we have in place; this is done to ensure we are as secure as we think we are and to improve our security posture. Domain 6 makes up 12% of the exam questions.

CISSP®️ Certification Domain 6 - Security Assessment and Testing Video Boot Camp for 2022
Delivered Online On Demand1 hour 17 minutes
£74.99

CISSP®ï¸ Certification Domain 2: Asset Security Video Boot Camp for 2022

By Packt

This course helps you prepare for your CISSP certification. In this course, we will be discussing Domain 2, which covers 10% of the exam weightage.

CISSP®ï¸ Certification Domain 2: Asset Security Video Boot Camp for 2022
Delivered Online On Demand1 hour 19 minutes
£28.99

Data Protection : Data Protection ( GDPR, Cyber, IT & Security)

By Training Tale

Data Protection : Data Protection If you want to learn about Data Protection: Data Protection Course and become an expert in the field, you have arrived at the right place. Industry experts designed this Data Protection: Data Protection course to enable you to learn quickly and efficiently and at your own pace and convenience. The Data Protection: Data Protection course contains all major GDPR topics in several lectures to help you learn more. This Data Protection: Data Protection also covers the UK's implementation of the General Data Protection: Data Protection Regulation Act. Data Protection: Data Protection Course aims to equip people and businesses with knowledge of the GDPR's obligations and measures. They must take to follow the regulation. The Data Protection: Data Protection Training seeks to educate individuals on their data rights and the obligations of organizations when it comes to collecting, processing, and keeping personal data. The Data Protection: Data Protection also includes best data protection: data protection, privacy practices, and advice on addressing data breaches and other problems. Main Course: GDPR Training Course Free Courses: Course 01: Security Management Diploma Course 02: Level 5 Diploma in Cyber Security Course 03: IT Security Data Protection : Data Protection Industry Experts Designed this Data Protection: Data Protection course into 09 detailed modules. Who is this course for? Data Protection : Data Protection This Data Protection: Data Protection course is open to everyone, Requirements Data Protection : Data Protection There are no specific requirements for this Data Protection : Data Protection course because it does not require any advanced knowledge or skills. Career path Data Protection : Data Protection

Data Protection : Data Protection ( GDPR, Cyber, IT & Security)
Delivered Online On Demand20 hours
£12

CISSP®️ Certification Domain 4 - Communication and Network Security Video Boot Camp for 2022

By Packt

This course helps you prepare for your CISSP certification. In this course, we will be discussing CISSP®? Certification Domain 4: Communication and Network Security. This course focuses on how our network and communications channels work and how to protect them. Domain 4 makes up 13% of the weighted exam questions.

CISSP®️ Certification Domain 4 - Communication and Network Security Video Boot Camp for 2022
Delivered Online On Demand5 hours
£74.99

CISSP®️ Certification Domain 7 - Security Operations Video Boot Camp for 2022

By Packt

This course helps you prepare for your CISSP certification. In this course, we will be discussing CISSP? Certification Domain 7 - Security Operations. This course is about how we secure our day-to-day operations, how we continue to function in a disaster event, and how we recover after an event. This domain makes up 13% of the exam questions.

CISSP®️ Certification Domain 7 - Security Operations Video Boot Camp for 2022
Delivered Online On Demand4 hours 46 minutes
£74.99

CISSP®️ Certification Domain 8 - Software Development Security Video Boot Camp for 2022

By Packt

This course helps you prepare for your CISSP certification. In this course, we will be discussing CISSP? Certification Domain 8 - Software Development Security. This course focuses on how to secure software as we develop it. Domain 8 makes up 11% of the exam questions.

CISSP®️ Certification Domain 8 - Software Development Security Video Boot Camp for 2022
Delivered Online On Demand2 hours 52 minutes
£74.99

CISSP®️ Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022

By Packt

This course helps you prepare for your CISSP certification. In this course, we will be discussing CISSP? Certification Domain 3: Security Architecture and Engineering, which makes up 13% of the weighted exam questions; being so broad, it contains close to 25% of the exam materials.

CISSP®️ Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022
Delivered Online On Demand7 hours 37 minutes
£74.99

Symantec Endpoint Protection 14.X - Configure And Protect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions

Symantec Endpoint Protection 14.X - Configure And Protect
Delivered OnlineFlexible Dates
Price on Enquiry

SonicWALL Network Security Administrator For Sonic OS 7 - SNSA v7 - NA

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with at least one year of experience in implementing IT security technologies (Network, Applications, and Systems). Overview This course will enable students to configure, monitor, manage, and optimize the SonicWall Network Security firewall appliances running the new SonicOS 7 to effectively defend against limitless network and cyberthreats and implement SonicWall Boundless Cybersecurity safeguards for seamless protection. Upon completion of the course, students will be able to configure the SonicWall firewall for Secure and Remote Connectivity, Network Optimization, and Advanced Threat Protection. The SonicWall Network Security Administrator (SNSA) for SonicOS 7.0curriculum provides students the required background, knowledge, and hands-on experience to begin designing, implementing, and troubleshooting SonicWall Network Security products. SonicOS 7 is SonicWall?s brand new and most advanced security operating system and is at the core of its latest physical and virtual firewalls, including models from the TZ, NSv, NSa and NSsp Series. SonicOS 7.0 features advanced security, simplified policy management, and critical networking and management capabilities for distributed enterprises and small- to medium-sized businesses with SD-branch support. Course Outline Setting up Basic Firewall Components Unified Threat Management Secure Access Deep Packet Inspection for SSL (DPI-SSL) Content Filtering Services Application Control Scalability and Reliability SD-WAN High Availability Troubleshooting Tools

SonicWALL Network Security Administrator For Sonic OS 7 - SNSA v7 - NA
Delivered OnlineFlexible Dates
Price on Enquiry