• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

207 Security Awareness courses

Information Security Manager

By Compliance Central

Are you looking to enhance your Information Security Manager skills? If yes, then you have come to the right place. Our comprehensive course on Information Security Manager will assist you in producing the best possible outcome by mastering the Information Security Manager skills. The Information Security Manager course is for those who want to be successful. In the Information Security Manager course, you will learn the essential knowledge needed to become well versed in Information Security Manager. Our Information Security Manager course starts with the basics of Information Security Manager and gradually progresses towards advanced topics. Why would you choose the Information Security Manager course from Compliance Central: Lifetime access to Information Security Manager course materials Full tutor support is available from Monday to Friday with the Information Security Manager course Learn Information Security Manager skills at your own pace from the comfort of your home Gain a complete understanding of Information Security Manager course Accessible, informative Information Security Manager learning modules designed by experts Get 24/7 help or advice from our email and live chat teams with the Information Security Manager Curriculum Breakdown of the Information Security Manager Course Course Outline: Module 01: Introduction Module 02: Organisational Security Management Module 03: Risk Analysis and Risk Reduction Module 04: Physical and Information Security Protection Module 05: Business Resilience and Crisis Management Module 06: Cyber Security and Fraud Prevention Module 07: Security Investigations and Threat Awareness Module 08: Laws and Regulations CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Information Security Manager course helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in Information Security Manager. Requirements To enrol in this Information Security Manager course, all you need is a basic understanding of the English Language and an internet connection. Career path Information Security Analyst: £40,000 to £70,000 per year Cybersecurity Consultant: £45,000 to £80,000 per year IT Risk Manager: £50,000 to £90,000 per year Security Operations Center (SOC) Analyst: £35,000 to £60,000 per year Penetration Tester (Ethical Hacker): £40,000 to £75,000 per year Chief Information Security Officer (CISO): £70,000 to £150,000 per year Certificates CPD Accredited PDF Certificate Digital certificate - Included CPD Accredited PDF Certificate CPD Accredited Hard Copy Certificate Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Information Security Manager
Delivered Online On Demand4 hours
£12

Safeguarding Vulnerable Adults: Protection of at-risk Adults

By Xpert Learning

About Course Master Adult Safeguarding: Ensure empowerment and protection of at-risk Adults This course is suitable to provide a general awareness of safeguarding responsibilities in the workplace, recognise potential safeguarding concerns, and be able to act upon them appropriately. The objective of this course is to ensure every adult is protected from abuse and can exercise their basic human right irrespective of race, religion, gender or location. If you aspire to or already work in the health and social care sectors, you will need to learn about the legislation as well as the nuances of the subject matter. The course provides an in-depth overview of how to tackle safeguarding issues and help adults preserve their basic rights. Not all abuse can be seen because not all mistreatment is physical and this course helps you understand when and how to make assumptions regarding abuse. We trace the roots of abuse and neglect, which can appear in many forms, and describe the types and possible indicators of various types of abuse: physical, emotional, sexual, domestic, discriminatory and financial. Older people suffering abuse can be afraid and embarrassed to talk about it so we show you how to spot signs of abuse in older people. We discuss the importance of communication in care settings in detail. Communication is defined by more than the words we use and we cover different channels, including verbal, non-verbal and written communication. The course also demonstrates how listening and paying attention plays an important role in handling complaints from either the client or their family. The aims of safeguarding are to prevent harm, abuse and neglect and to reduce the risk of abuse to people with care needs. Enrol now and equip yourself and your organization to ensure the protection of vulnerable adults. What Will You Learn? Identify and Address Adult Mistreatment Grasp the concepts of vulnerability and risk factors among adults in various settings. Recognize the importance of safeguarding as a proactive approach to ensuring the well-being of at-risk adults. Navigate Legislation and Ethical Responsibilities for Comprehensive Protection Explore the legal frameworks and ethical obligations that guide safeguarding practices for both adults and children. Understand the roles and responsibilities of professionals in social care, teaching, and related fields. Course Content Understanding Protection for At-Risk Adults Understanding Protection for At-Risk Adults Legislation for Protection Legislation for Protection Adult Mistreatment Adult Mistreatment Grasping the Nature of Abuse & Neglect Grasping the Nature of Abuse & Neglect Dementia Care Dementia Care Protection of At-Risk Adults: Policies, Duties, and Roles Protection of At-Risk Adults: Policies, Duties, and Roles Addressing Abuse Addressing Abuse The Crucial Role of Communication in Care The Crucial Role of Communication in Care Disclosure Management and Information Sharing Disclosure Management and Information Sharing Voicing Your Concerns Voice Your Concerns A course by Xpert Learning RequirementsLearners do not require any prior qualifications to enrol on this course. Audience Professionals in Health and Social Care Settings Caregivers, support workers, and care assistants Social workers and care managers Nurses and healthcare professionals Residential and nursing home staff Education Professionals: Teachers, educators, and school staff Childcare providers and school counselors Managers and Designated Safeguarding Leads Anyone Committed to Adult Safeguarding: Individuals with a personal interest in contributing to the protection of adults at risk Audience Professionals in Health and Social Care Settings Caregivers, support workers, and care assistants Social workers and care managers Nurses and healthcare professionals Residential and nursing home staff Education Professionals: Teachers, educators, and school staff Childcare providers and school counselors Managers and Designated Safeguarding Leads Anyone Committed to Adult Safeguarding: Individuals with a personal interest in contributing to the protection of adults at risk

Safeguarding Vulnerable Adults: Protection of at-risk Adults
Delivered Online On Demand1 hour 45 minutes
£9.99

Hand-Arm Vibration Syndrome (HAVS) Awareness

By NextGen Learning

***A Better Pathway for Rapid Growth! Limited Time Opportunity; Hurry Up!*** Ignite your dynamic career and strengthen your deep insight knowledge by signing up for Hand-Arm Vibration Syndrome (HAVS) Awareness. This course is the ideal approach for you to obtain a thorough understanding and knowledge of the subject. We are concerned about the progression of your career. Therefore, after conducting extensive studies and consulting with experienced personnel, we formulated this outstanding Hand-Arm Vibration Syndrome (HAVS) Awareness course to improve your pertinent skills. In this easy-to-digest course, you will get exclusive training, which will enable you to stand out in this competitive market. However, the course covers all of the recent materials in order to keep you up to date with the job market and make you a good fit for your career. This top-notch Hand-Arm Vibration Syndrome (HAVS) Awareness course curriculum comprises basic to advanced levels of modules that will increase your skill sets. After completing this programme, you will attain the productivity to succeed in your organisation. So, if you are eager to see yourself in a gratifying career, then enrol in the course today! What will Make You Stand Out? On completion of this Hand-Arm Vibration Syndrome (HAVS) Awareness online course, you will gain: CPD QS Accredited course After successfully completing the Course, you will receive a FREE PDF Certificate as evidence of your newly acquired abilities. Lifetime access to the whole collection of learning materials. Enroling in the Course has no additional cost. 24x7 Tutor Support You can study and complete the course at your own pace. Course Curriculum Hand-Arm Vibration Syndrome (HAVS) Awareness Module 01: Introduction to Hand-arm Vibration and HAVS Module 02: Popular Syndromes Module 03: HAVS Training and Assessment Module 04: Controlling Risks Module 05: Laws and Regulations Show off your new skills with a certificate of completion. After successfully completing the course, you can order your CPD Accredited Certificates as proof of your achievement absolutely free. Please Note: The delivery charge inside the U.K. is £4.99, and international students have to pay £8.99. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Is This Course the Right Option for You? This Hand-Arm Vibration Syndrome (HAVS) Awareness course is open to everybody. You can access the course materials from any location in the world and there are no requirements for enrolment. Requirements Without any formal requirements, you can delightfully enrol in this Hand-Arm Vibration Syndrome (HAVS) Awareness course. Just get a device with internet connectivity and you are ready to start your learning journey. Thus, complete this course at your own pace. Career path The aim of this exclusive Hand-Arm Vibration Syndrome (HAVS) Awareness course is to help you toward your dream career. So, complete this course and enhance your skills to explore opportunities in relevant areas.

Hand-Arm Vibration Syndrome (HAVS) Awareness
Delivered Online On Demand2 hours
£12

Security Management Level 1 Diploma

5.0(1)

By Empower UK Employment Training

Step into the realm of Security Management with our comprehensive course. Master risk analysis, physical and information security, legal frameworks, and the use of technology in security. Elevate your skills for a robust career in security management.

Security Management Level 1 Diploma
Delivered Online On Demand1 hour 30 minutes
£5

Information Management Diploma

5.0(1)

By Empower UK Employment Training

Information Management Diploma Unlock the potential of effective data governance with our Information Management Diploma. This course is meticulously designed to equip you with the expertise needed in Information Management, focusing on IT Asset Management (ITAM), data security, compliance, and the legal landscape around data management, such as GDPR. Learning Outcomes: Master the essentials of ITAM Policies and delineate IT Management Responsibilities within the scope of Information Management. Understand the intricacies of setting up an effective ITAM Program as a pivotal part of your Information Management strategy. Be adept in IT Asset Procurement and Deployment, essential processes in Information Management. Gain comprehensive knowledge in IT Asset Security and Compliance, key components of Information Management. Become proficient in the Principles of GDPR, especially its implications on Information Management. Recognise the Rights of Data Subjects and learn how to safeguard them in your Information Management systems. More Benefits: LIFETIME access Device Compatibility Free Workplace Management Toolkit Key Modules from Information Management Diploma: ITAM Policies and IT Management Responsibilities in Information Management Learn the foundational policies that govern IT Asset Management and the responsibilities that IT managers bear in Information Management. Setting up an ITAM Program within Information Management Acquire the knowledge and tools required to initiate, plan, and manage an ITAM program, ensuring it complements your Information Management strategy effectively. IT Asset Procurement and Deployment in Information Management Delve into the processes that govern the acquisition and implementation of IT assets, understanding how these processes fit into Information Management. IT Asset Security and Compliance in Information Management Develop the acumen to secure IT assets effectively and understand the compliance parameters within the realm of Information Management. Principles of GDPR in Information Management Equip yourself with an in-depth understanding of GDPR principles and their critical importance to Information Management. Rights of Data Subjects in Information Management Comprehend the rights that data subjects possess under GDPR and learn how to implement mechanisms to protect these rights within your Information Management strategies.

Information Management Diploma
Delivered Online On Demand3 hours 48 minutes
£5

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting This course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA). Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface

Cisco Securing the Web with Cisco Web Security Applicance v3.0 (SWSA)
Delivered OnlineFlexible Dates
Price on Enquiry

SWSA v3.0-Securing the Web with Cisco Web Security Appliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SWSA v3.0-Securing the Web with Cisco Web Security Appliance
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances

Cisco Securing Email with Cisco Email Security Appliance v3.1 (SESA)
Delivered OnlineFlexible Dates
Price on Enquiry

Cybersecurity Fundamentals for the Business or End User

By Nexus Human

Duration 0.5 Days 3 CPD hours Overview By the end of the course, delegates will know: The difference between cybersecurity and physical security Identify what information is sought after How to protect valuable data and accounts How to detect a data breach How to respond to an incident How to recover from a data breach A security checklist Why You Should Care What are cybersecurity threats How to improve cybersecurity Account access best practices How to protect cloud-based information How to prevent phishing Detecting a data breach Responding to a data breach Protection against scams

Cybersecurity Fundamentals for the Business or End User
Delivered OnlineFlexible Dates
Price on Enquiry

A snapshot of what we offer. See something you like, please get in touch.

TSC Showreel
Delivered Online On Demand2 minutes
FREE