• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

367 Security courses in Wokingham

Cyber Security Overview 1 Day Training in Wokingham

By Mangates

Cyber Security Overview 1 Day Training in Wokingham

Cyber Security Overview 1 Day Training in Wokingham
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Bracknell

By Mangates

Cyber Security Overview 1 Day Training in Bracknell

Cyber Security Overview 1 Day Training in Bracknell
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Reading

By Mangates

Cyber Security Overview 1 Day Training in Reading

Cyber Security Overview 1 Day Training in Reading
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Fleet

By Mangates

Cyber Security Overview 1 Day Training in Fleet

Cyber Security Overview 1 Day Training in Fleet
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Slough

By Mangates

Cyber Security Overview 1 Day Training in Slough

Cyber Security Overview 1 Day Training in Slough
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Windsor Town

By Mangates

Cyber Security Overview 1 Day Training in Windsor Town

Cyber Security Overview 1 Day Training in Windsor Town
Delivered In-Person + more
£595 to £795

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

The Ultimate Guide to Event Planning - 1 Day Workshop in Bracknell

By Mangates

Event Planning 1 Day Training in Bracknell

The Ultimate Guide to Event Planning - 1 Day Workshop in Bracknell
Delivered In-Person + more
£595 to £795

The Ultimate Guide to Event Planning - 1 Day Workshop in Slough

By Mangates

Event Planning 1 Day Training in Slough

The Ultimate Guide to Event Planning - 1 Day Workshop in Slough
Delivered In-Person + more
£595 to £795

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

Educators matching "Security"

Show all 125
Casec, Canine & Security Education Centre

casec, canine & security education centre

Marlow

The Canine and Security Education Centre UK was born out of the necessity to provide competent, reliable and professional training services to the K9 sector of the security industry within the UK and Europe. Our facilities This is achieved using an all-weather facility, fit for purpose, taking the best elements observed in the UK, Europe and the USA, to accomplish the provision of rounded and targeted training packages. Our Services Our portfolio of services include all elements of EDD and GP training. This includes: Basic courses for handler and dog Remedial training, Monthly CT Task specific training Air cargo screening Explosive odour tracking Baggage screening and bulk EDD CT Scent recognition Annual certification compliant with BS:8517-1 and 2 NASDU requirements are also available monthly Our Courses Our Instructors To be an instructor with CASEC UK, he or she must have completed operational deployments in their field of expertise for a minimum of 5 years and have an experienced and successful training record. Our trainers have Police, military and civilian security backgrounds ensuring that our pool of experience is as varied as possible. Our team of instructors and managers have over 120 years’ worth of operational and training experience with the instructors still being operational and certified for ground deployment. This ensures their sector knowledge is up to date and relevant. CASEC UK is a Ltd company registered within the UK, holds full insurance for the training of EDD and GP dog teams and has been inspected by NASDU.