• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

837 Security Management courses

Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System installersSystem integratorsSystem administratorsNetwork administratorsSolution designers Overview After taking this course, you should be able to:Describe the Cisco IOS XR software architecture, high availability components, and scalability featuresPerform basic configurations on a Cisco IOS XR routerDescribe Cisco IOS XR software operationsDescribe the configuration file systemPerform Cisco IOS XR software installationsConfigure AAA servicesConfigure NTPConfigure Simple Network Management Protocol (SNMP), telemetry, and loggingConfigure routing protocolsMonitor processesUse error messages and core dumps he Introduction to Cisco IOS XR (IOSXR100) v2.0 course introduces you to the features and functions of the Cisco© Internetwork Operating System (Cisco IOS©) XR Software operating system. You learn the fundamental concepts on which the operating system is based and Cisco IOS XR basic operations, system administration, and troubleshooting. Cisco IOS XR Software Overview Platform Overview Cisco IOS XR Architecture Cisco IOS XR High Availability Cisco IOS XR Software Configuration Basics Cisco IOS XR Configuration Operations Cisco IOS XR Initial Configuration Reviewing the Configuration Cisco IOS XR Software Operations Examining Configuration Operations Examining Configuration Rollback and Recovery Configuration File System Overview Examining the Binary Configuration Examining the Commit Database Examining the ASCII Configuration Examining the Nonvolatile Generation (NVgen) Files Verifying Cisco Fabric Services (CFS) Integrity Cisco IOS XR Software Installation Software Package Basics Installing Software Packages AAA Security AAA Fundamentals Task-Based Security Configuring a User Security Policy Authentication with Remote Servers Configuring Router to AAA Server Communication Configuring Authentication Terminal Access Controller Access-Control System Plus (TACACS+) Command Authorization Configuring Accounting AAA Troubleshooting Network Time Synchronization Network Time Protocol SNMP, Telemetry, and Logging Examining SNMP Examining Telemetry Examining Logging Basic Routing Configuration Configuring Intermediate System to Intermediate System (IS-IS) Configuring Open Shortest Path First (OSPF) Configuring Border Gateway Protocol (BGP) Configuring Routing Protocol for LLN (RPL) Policy Packet Filtering Access Control Lists Unicast Reverse Path Forwarding Management Plane Protection Monitoring Process Examining Processes and Threads Process Crashes Commands for Debugging Processes Restartability of Processes Process Monitoring Identifying Memory Problems Memory Depletion Core Dumps Core Dump Fundamentals Using Core Dump Information Additional course details: Nexus Humans Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Managing Enterprise Networks with Cisco Prime Infrastructure (MENPI)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Engineers Technicians Overview Upon completing this course, the learner should be able to meet these overall objectives: Fundamental network management concepts and introduce the features of Cisco Prime Infrastructure Manage the inventory with Cisco Prime Infrastructure Map the network using the tools in Cisco Prime Infrastructure Manage user access to tasks, functions, and devices in Cisco Prime Infrastructure Manage the devices and configuration archive in Cisco Prime Infrastructure Work with Cisco AVC, QoS, and Cisco IWAN services using Cisco Prime Infrastructure tools and deploy Cisco TrustSec identity services using Cisco Prime Infrastructure Monitor and troubleshoot your network with Cisco Prime Infrastructure Perform system administration tasks in Cisco Prime Infrastructure In this Cisco Prime Infrastructure training course, you will learn how to design, deploy, operate, and optimize enterprise networks with the Cisco Prime Infrastructure solution (PI). Cisco Prime Infrastructure is part of a Unified Access solution that converges traditional wired and wireless networks into a single network management tool. The Managing Enterprise Networks labs put you in a realistic customer scenario and let you practice what you learned using Cisco Prime Infrastructure 3.7. This MENPI training course?s network management perspective has a heavier lean to the wired side of the network management. We suggest students have a working understanding of networks and networking terminology with regards to CCNA Routing and Switching. Course Outline Module 1: Cisco Prime Infrastructure Overview Module 2: Inventory Management Module 3: Map the Network Module 4: Role-Based Access Control Module 5: Configuration Management Module 6: Compliance Management Module 7: Services Management Module 8: Monitor and Troubleshoot Module 9: System Administration

Cisco Managing Enterprise Networks with Cisco Prime Infrastructure (MENPI)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Data Centre Migration Specialist (CDMS)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Participants who have actual experience in the data centre and/or IT infrastructures are best suited. Attendance of the CDCP© course is recommended but not a requirement. Overview After completion of the course the participant will be able to: 1. Develop and review their data centre strategy 2. Use different risk assessment methodologies together with practical tips specifically for data centre migrations to reduce the risk during a data centre migration 3. Understand different migration strategies 4. Understand the legal aspects when migrating a data centre 5. Understand the importance of Business Service Reviews and Service Level Objectives 6. Size and design the target data centre 7. Understand the importance of detailed discovery and how dependencies influence migration waves 8. Understand the safety requirements during migration 19. Get lots of practical tips when moving to another data centre This course is designed to expose participants to a step-by-step methodology which will enable them to reduce the risks involved when undertaking a data centre migration. It will also give participants a lot of valuable practical hints and tips by trainers having extensive experience in moving and consolidating mission critical data centre. Data Centre Strategy Data centre lifecycle Reasons to migrate a data centre Alternatives to data centre migration Consolidation Outsourcing Cloud computing Upgrade existing data centre or build new Project Management Project management and methods Scope statement Statement Of Work (SOW) Work Breakdown Structure (WBS) Allocate time to the project Cost and estimation methodology Project communication Risk Management Risk management and methods Risk identification Risk assessment methodologies Qualitative approach Semi-quantitative approach Quantitative approach Risk evaluation Risk treatment Risk in data centre migrations Migration Strategies Different data centre migration strategies Heterogeneous migration Homogeneous migration Physical migration Different IT transformations Pre-migration transformation Migration transformation Post-migration transformation Legal Aspects Regulatory requirements Contractual considerations Legal aspects when decommissioning High Level Discovery & Planning The importance of Business Service Reviews The concept of Availability The concept of Recoverability The importance of Service Level Objectives Requirements on designing the target IT architecture Information needed for high level planning Design Target Data Centre Requirements for the target data centre Sizing the data centre Architectural requirements Cooling requirements Power requirements Security Detailed Discovery and Planning The importance of discovery Automated discovery tools Asset management Network and system dependencies Detailed migration planning Migration waves Staffing Warranties and insurance Safety Safety precautions Technical safety review Electrical safety Lifting Personal safety during migration Fire safety during migration Security Controversy between access and security Access control Managing security during migration Security during migration Key management Practical hints and tips Continuous improvement Implementation Rehearsal Route investigation Resourcing Logistics team Packing Transport Installing the equipment Post migration support End of Project Why project closure Lessons learned Phased completion of project Criteria for project closure The outcome of the project End of project Exam: Certified Data Centre Migration Specialist Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified Data Centre Migration Specialist (CDMS)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Server administrators Network engineers Systems engineers Consulting systems engineers Technical solutions architects Network administrators Storage administrators Network managers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and implement Fibre Channel, zoning, and N-Port Virtualization (NPV) features on Cisco UCS Describe and implement Fibre Channel over Ethernet (FCoE) on Cisco UCS Describe Cisco UCS policies for service profiles Describe Cisco Adapter Fabric Extender (FEX) and Single Root I/O Virtualization Describe and implement Role-Based Access Control (RBAC) on Cisco UCS Describe and implement external authentication providers on Cisco UCS Manager Describe and implement key management on Cisco UCS Manager Describe Cisco UCS Director Describe and implement Cisco Intersight Describe the scripting options for Cisco UCS Manager Describe and implement monitoring on Cisco UCS Manager The Configuring Cisco Unified Computing System (DCCUCS) v1.0 shows you how to deploy, secure, operate, and maintain Cisco Unified Computing System? (Cisco UCS©) B-series blade servers, Cisco UCS C-Series, and S-Series rack servers for use in data centers. You will learn how to implement management and orchestration software for Cisco UCS. You will gain hands-on practice: configuring key features of Cisco UCS, Cisco UCS Director, and Cisco UCS Manager; implementing UCS management software including Cisco UCS Manager and Cisco Intersight?; and more. Implementing Cisco UCS Storage Area Network (SAN) SAN Introduction Cisco UCS Fabric Interconnect Fibre Channels modes Named VSANs Cisco UCS Fibre Channel and FCoE Storage Connectivity Describing Cisco UCS Policies for Service Profiles Storage Policies and Profiles Basic Input Output System (BIOS) Policies Boot Policy Intelligent Platform Management Interface (IPMI) Policies Scrub Policies Maintenance Policies Describing Cisco Adapter FEX and Single Root I/O Virtualization Cisco FEX Overview Cisco Adapter FEX Single Root I/O Virtualization Implementing RBAC on Cisco UCS RBAC in Cisco UCS Users, Roles, and Privileges Functions of Organizations and Locales Effective Rights of a User Implementing External Authentication Providers Options for External Authentication Providers Implementing Key Management on Cisco UCS Manager Public Key Infrastructure Implementing Cisco UCS Director Cisco UCS Director Overview Policies, Virtual Data Centers, and Catalogs Cisco UCS Director Virtualization Support Managing Compute with Cisco UCS Director Cisco UCS Manager Orchestration Self-Service Portal Reporting and Monitoring in Cisco UCS Director Implementing Cisco Intersight Cisco UCS Director Overview Important Features of Cisco Intersight Describing the Scripting Options for Cisco UCS Manager Cisco UCS Manager XML API Cisco UCS Management Information Tree Managed Object Browser Cisco UCS PowerTool Cisco UCS Python Software Development Kit (SDK) Implementing Key Management on Cisco UCS Manager Public Key Infrastructure Implementing Cisco Intersight Cisco Intersight Overview Important Features of Cisco Intersight Describing the Scripting Options for Cisco UCS Manager Cisco UCS Manager XML API Cisco UCS Management Information Tree Managed Object Browser Cisco UCS Manager PowerTool Cisco UCS Python SDK Implementing Monitoring on Cisco UCS Manager Logging Sources in Cisco UCS Manager Port Monitoring Capabilities of Cisco UCS Manager Simple Network Management Protocol (SNMP) Security Ramifications Cisco UCS Manager Call Home Feature Lab outline Configure Pod-Specific Device Aliases Configure Zoning Configure VSANs in Cisco UCS Manager Configure Unified Ports on Cisco UCS Fabric Interconnects Install and Boot VMware Elastic Sky X Integrated (ESXi) on Cisco UCS from the FCoE Logical Unit Number (LUN) via FCoE Configure RBAC Configure Cisco UCS Manager to Authenticate Users via Open Lightweight Directory Access Protocol (OpenLDAP) Configure a Trusted Point and Key Ring in Cisco UCS Manager Configure Cisco UCS with Cisco Intersight Configure Cisco UCS Manager Using Scripting Implement Syslog and Call Home Additional course details: Nexus Humans Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Configuring Cisco Unified Computing System v1.0 (DCCUCS)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Hardware Asset Management Professional (CHAMP)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for IT Asset Managers and other IT professionals involved in Asset Management, resource budgeting, finance, software licensing, contract management and strategic planning. Overview Students earning a CHAMP certification will see financial benefits of enhanced Hardware Asset Management best practices and uncover many savings opportunities to increase their organizations' bottom line by managing the lifecycle of the hardware asset. They will receive an awareness of several avenues for savings, compliance, global disposal and revenue generation practices for properly managing the lifecycle of hardware assets. Designed to address the numerous issues plaguing professionals in managing hardware assets, the IAITAM Certified Hardware Asset Management Professional (CHAMP) Course follows the lifecycle of IT hardware assets beyond the scope of the cradle to grave analogy and discusses the business practices that can best be used to manage those assets efficiently and cost-effectively. Emphasis is placed on identifying the policies that enhance lifecycle management. In general, policies are only effective if developed by a cross-section of the impacted departments, are reviewed frequently to remain current and are consistently communicated and enforced. The course is followed by a certification test for those that wish to achieve CHAMP certification. Course Outline Basics of Hardware Asset Management The Power of ITAM Centralization Best Practices for Asset Standards Implementing a Program Project Planning Change Management Measuring Success Tools & Automation Repository Tool Discovery Tool Acquisition & Receiving Selection & Negotiations Managing the Inventory Management During Use IMAC Process Improving the Program Improving the Value of Assets Hardware Security Reuse & Disposal Processes E-waste Decisions Evaluating ITAD Vendors Additional course details: Nexus Humans Certified Hardware Asset Management Professional (CHAMP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Hardware Asset Management Professional (CHAMP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Hardware Asset Management Professional (CHAMP)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course benefits cloud consumers and administrators of public cloud, private cloud, and hybrid cloud infrastructures: Security architects Cloud architects Network engineers and administrators System engineers and adminstrators Cloud security consumers Cloud application administrators IT managers Line of business managers Cisco integrators and partners Overview After taking this course, you should be able to: Describe public, private, and hybrid cloud models, concepts, and design Explain the concepts and components for securing cloud environments Describe Cisco security offerings for Amazon Web Services (AWS) Define methods to secure SaaS application usage The Introducing Cisco Cloud Consumer Security (SECICC) v1.0 course gives you a technical overview of basic concepts and components of the cloud, and the Cisco© solutions used to provide comprehensive security of your cloud-based environment. In this primarily lecture-based course, you?ll learn the basics from a cloud consumer perspective including securing cloud and Software as a Service (SaaS) application environments. This introductory course provides insights on using Cisco Stealthwatch? Cloud, Cisco CloudLock, Cisco Umbrella? and more to protect the user when using cloud-based applications. Introducing the Cloud Describe the Evolution of Cloud Computing Explain Cloud Service Models Explore Cloud Deployment Models Introducing Securing the Cloud Describe the Cisco Threat-Centric Approach to Network Security Describe Cloud Physical Environment Security Describe Cloud Network Infrastructure Security Explain Application Security Explore Cloud Management and API Security Describe Cisco Cloud-Based Security Solutions Describe Network Functions Virtualization (NFV), Virtual Network Function (VNF), and Secure Agile Exchange (SAE) Describe Cisco CloudCenter for MultiCloud Management Describe Cisco Stealthwatch Describing Cloud Security Solutions Using AWS Identify AWS Security Offerings Identify Cisco Security Solutions in AWS Introducing Security in an SaaS Environment Describe SaaS Applications Describe SaaS Security Challenges Explain Cloud Access Security Broker Describe Cisco CloudLock Describe OAuth and OAuth Attacks Describe Cisco Advanced Malware Protection for Endpoints Describe Cisco Cloud Email Security Describe Cisco Umbrella Lab outline Explore Cisco Stealthwatch Cloud Explore Stealthwatch Cloud Alerts Settings, Watchlists, and Sensors Explore Cisco Security Solutions in AWS Marketplace Explore the Cisco CloudLock Dashboard and User Security Explore Cisco CloudLock Application and Data Security Explore Cisco Advanced Malware Protection (AMP) Endpoints Explore the Cisco Umbrella Roaming Client Additional course details: Nexus Humans Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Multicast v2.0 (MCAST)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network professionals, including systems engineers Channel Partners Customers Overview After taking this course, you should be able to: Describe IP multicast services Identify IP multicast issues on a data link layer Explain why Protocol Independent Multicast Sparse Mode (PIM-SM) is the most current scalable IP multicast routing protocol Describe Rendezvous Point (RP) distribution solutions Recognize the drawbacks of the PIM-SM and describe two extensions to provide possible solutions Explain basic concepts of Multiprotocol BGP (MP-BGP) and its use in the IP multicast environment Configure and deploy Multicast Source Discovery Protocol (MSDP) in the interdomain environment Describe solutions to mitigate security issues in the IP multicast network Describe the process of monitoring and maintaining multicast high-availability operations Design multicast-related application and network solutions in customer and service provider networks The Implementing Cisco Multicast (MCAST) v2.0 course teaches you the fundamentals of IP multicasting, including multicast applications, sources, receivers, group management, and IP multicast routing protocols such as Protocol Independent Multicast (PIM) used within a single administrative domain. You will learn about issues in switched LAN environments and reliable IP multicasting, and technical solutions for simple deployments of IP multicast within a provider or customer network. The course reviews the configuration and troubleshooting guidelines for implementation of IP multicast on Cisco© routers. Labs offer hands-on experience to help you prepare to deploy IP multicast successfully. Course Outline Module 1: IP Multicast Concepts and Technologies Module 2: Multicast on the LAN Module 3: PIM Sparse Mode Module 4: Rendezvous Point Engineering Module 5: PIM Sparse Mode Protocol Extensions Module 6: Multiprotocol Extensions for BGP Module 7: Interdomain IP Multicast Module 8: IP Multicast Security Module 9: Multicast Optimization and High-Availability Features Module 10: Applications of Multicast

Cisco Implementing Cisco Multicast v2.0 (MCAST)
Delivered OnlineFlexible Dates
Price on Enquiry

Educators matching "Security Management"

Show all 817
Security Management South West Limited

security management south west limited

4.4(31)

Plymouth

TRAINING & DEVELOPMENT DOOR SUPERVISORS AND TOP-UP INTRODUCTION In the realm of security management, continuous learning and development upskilling are essential to keep up with evolving threats and challenges. Security Management South West Limited (SMSW) is a company that places a strong emphasis on professional development, offering a range of specialised courses through their Training Academy DOOR SUPERVISOR COURSES: A GATEWAY TO SECURITY EXCELLENCE The Door Supervisor Course offered by the SMSW Training Academy is specifically designed for individuals aspiring to become licensed Door Supervisors and Security Officers. This comprehensive course equips participants with the knowledge and skills necessary to excel in these challenging and critical role and goes far and above the minimum standards. KEY COMPONENTS OF THE DOOR SUPERVISOR COURSE: LEGAL AND REGULATORY KNOWLEDGE: Participants gain a deep understanding of the legal responsibilities and obligations associated with the role of a door supervisor. This includes crowd management regulations, licensing laws, and procedures for handling incidents. CONFLICT MANAGEMENT: Door supervisors often encounter challenging situations that require effective conflict management. The course provides techniques for de-escalation, communication, and handling confrontations professionally. PHYSICAL INTERVENTION: In situations where verbal communication is not enough, door supervisors must be able to use physical intervention techniques safely and responsibly. The course includes training in physical restraint methods following legal guidelines. FIRST AID INTRODUCTION In high-pressure situations, having skilled first responders who can provide immediate medical assistance can be a matter of life and death. Security Management South West Limited (SMSW) recognises the critical importance of emergency first aid training and has integrated it into their Training Academy KEY COMPONENTS OF THE TRAINING: BASIC LIFE SUPPORT (BLS): Participants learn how to perform Cardiopulmonary Resuscitation (CPR) effectively, a life-saving technique used to maintain blood circulation and provide oxygen to the brain during cardiac arrest. DEALING WITH CHOKING: The course covers procedures to handle choking incidents, ensuring that participants can respond promptly to clear an obstructed airway. TREATING WOUNDS AND BLEEDING: You will learn how to provide appropriate first aid for different types of wounds and control bleeding effectively. MANAGING SHOCK: Participants are trained to recognize the signs of shock and provide immediate assistance to stabilize the casualty’s condition. MEDICAL CONDITIONS: The training includes guidance on handling common medical conditions such as heart attacks, strokes, and seizures. HIGHFIELD QUALIFICATIONS APPROVED TRAINING CENTRE As a Highfield Qualifications Approved Training Centre, we are committed to adhere to their quality assurance standards and to implement a program of continuous improvement in training delivery and assessment. We are currently registered to provide Highfield Qualifications Accredited Training programs leading to the following sample qualifications: Courses can be booked here [http://www.smsw.co.uk/events] * Highfield Level 2 Award for Security Officers in the Private Security Industry (Top Up) * Highfield Level 3 Award in Emergency First Aid at Work (RQF) * Highfield Level 2 Award for Working as a Door Supervisor within the Private Security Industry * Highfield Level 2 Award for Door Supervisors in the Private Security Industry (Top Up) * Full list of available qualifications here [https://smsw.co.uk/wp-content/uploads/2019/01/Highfield-Courses.pdf]

Nemstar Ltd

nemstar ltd

5.0(12)

Belfast

NEMSTAR INFORMATION SECURITY? Nemstar is a specialist in Information Security & Cyber Training with over 25 years' industry experience. The company was founded by Sean Hanna, four times winner of the EC Council's global cyber security trainer of the year. Based in Belfast, Northern Ireland, Nemstar delivers world class training across the UK, Ireland and internationally. NEMSTAR HAVE BEEN TRUSTED BY A WIDE RANGE OF LOYAL CUSTOMERS PROVIDING LEARNING SOLUTIONS THAT WORK. NEMSTAR IS & CYBER SECURITY TRAINING [https://www.youtube.com/watch?v=OVVbEiukYKs] > “There is a wide spectrum of information security knowledge that is required > to ensure security. These range from the ability to call out risk in the > Boardroom to the ethical hacking of intricate data systems. It is my mission > to broaden these skills needed in the workplace and to create opportunities > for people in this area.” Sean Hanna We offer a comprehensive range of learning solutions from foundation to advanced masterclasses in ethical hacking, most leading to globally recognised industry certifications. Our experts work closely with customers to build the trust, respect and partnership required to deliver world-class Information Security and Cyber Training. Our intensive, lab-based approach to learning has certified and enhanced the careers of thousands of cyber professionals. We only use industry leading experts with a wealth of consulting experience to lead a Nemstar training event, ensuring the best possible learning outcomes and highest quality delivery. We are an Accredited Training Centre for EC Council [https://www.eccouncil.org/], meeting their strict standards of excellence for delivering instructor-led training using our ISO 9001 [https://www.iso.org/iso-9001-quality-management.html] compliant quality systems. Nemstar is dedicated to delivering an expert, tailored service to everyone we work with and our services can be tailored to meet your needs, budget and timescales.