• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

711 Security courses

C40M03 - Safe Isolation of supplies (classroom)

5.0(2)

By Ember Compliance

It is a requirement within codes of practice e.g., BS 5839-1, and within legislation e.g., Health & Safety at Work Act 1974, that duties are placed upon employers and employees regarding health & safety and in particular electrical safety.

C40M03 - Safe Isolation of supplies (classroom)
Delivered In-Person in Broxburn + more
£99

Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

Cyber Safe
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£30

C01M01 - FD&FA Fundamentals - BS 5839-1 (classroom)

5.0(2)

By Ember Compliance

This is a gateway course for all further learning in FD&FA systems.

C01M01 - FD&FA Fundamentals - BS 5839-1 (classroom)
Delivered In-Person in Broxburn + more
£230

C01M02 - FD&FA Design principles - BS 5839-1 (classroom)

5.0(1)

By Ember Compliance

This course will develop knowledge from the FD&FA foundation BS 5839-1 module and/or industry experience and apply this to the design of FD&FA systems.

C01M02 - FD&FA Design principles - BS 5839-1 (classroom)
Delivered In-Person in Broxburn + more
£230

Securing Microsoft systems

5.0(3)

By Systems & Network Training

Microsoft security training course description A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. What will you learn Use Microsoft security tools. Secure Microsoft servers. Secure Microsoft desktops. Secure Microsoft networks. Microsoft security training course details Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. Duration 3 days Microsoft security training course contents Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. Active Directory Admin authority in AD, group policy, trust and authentication. Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. Summary Microsoft security response centre, security advisories.

Securing Microsoft systems
Delivered in Internationally or OnlineFlexible Dates
£3,497

The Ultimate Guide to Event Planning - 1 Day Workshop in Canterbury

By Mangates

Event Planning 1 Day Training in Canterbury

The Ultimate Guide to Event Planning - 1 Day Workshop in Canterbury
Delivered In-Person + more
£595 to £795

SCADA – HMI & Communications

4.7(1243)

By Technique Learning Solutions

What does this course cover? This five-day course covers a range of topics, all of which are covered via a mixture of theoretical and practical training – we aim for our courses to be as hands-on as possible. The course specifically covers: An introduction to SCADA systems, including elements, servers, hardware and software, tags, plus more. A range of systems including automatic control, FIELDBUS, and wireless communication systems. An introduction to serial interferences, ethernet networks, fibre optics, and wireless. Process variables Communications include case studies to establish communication with HMI (Siemens, Allen Bradley, and Pro-face) . Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), sensors and alarms. Introduction to OPC, covering how to configure OPC UA servers and how to program an OPC UA client. Client and servers development Connection management Security configuration Trends and historical data System components What will I gain from this SCADA HMI course? Upon successful completion of this course, candidates will gain a City & Guilds accredited certificate in Scada, HMI and communications.

SCADA – HMI & Communications
Delivered in Clay Cross or Online
£500

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

C01M03 - FD&FA Installation principles - BS 5839-1 (classroom)

5.0(2)

By Ember Compliance

Learners will develop knowledge from the FD&FA foundation BS 5839-1 module and/or industry experience and apply this to the installation of FD&FA systems.

C01M03 - FD&FA Installation principles - BS 5839-1 (classroom)
Delivered In-Person in Broxburn + more
£230

Door Supervisor with Free First Aid

By BKS Training

SIA Door Supervisor Training with Free First Aid

Door Supervisor with Free First Aid
Delivered In-PersonFlexible Dates
£300