• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

30 Educators providing Security courses in Nantwich delivered Online

Nightingale Training And Consultancy Services

nightingale training and consultancy services

Cheshire,

We are Nightingale: a leading specialist security and training firm based in the United Kingdom. Staffed by a handpicked, professionally trained team of multi-national operatives, each one of our highly skilled staff members has – on average – over two decades’ worth of experience behind them. Whatever your goals, Nightingale provides specialised, tangible solutions that guarantee success. "We found ourselves in a predicament where we may have lost everything. We contacted NCL having been given their details by a friend who had been in a similar situation, and from calling them up to them being with us at our home was less than 24 hours. The NCL team calmed the storm and conducted a short term relocation, whilst still protecting our family possessions. They demonstrated an amazing amount of restraint and professionalism throughout the whole episode, and without their advice and guidance, I believe everything would have escalated beyond return. We have since used them for a more permanent relocation and continue to utilise their services for both business and domestic security. NCL was there when we needed them and others had failed us. " Why Choose Us? As an industry leader, we know that breadth of experience is just as important as depth. Our renowned experts have backgrounds spanning the civilian, law enforcement, government, and specialist military sectors. Between us, we have first-hand operational experience covering everything – from corporate security and personal protection, asset investigation and recovery to life-threatening medical trauma and frontline combat. We pride ourselves on our wealth of diverse multicultural skills and awareness, gained in the field during domestic and international operations in over 50 countries to date. Working With You Today, we put this extensive experience at your disposal. We offer a range of consultancy services in which we use utilise an array of methodical, ethical and efficient techniques to successfully get you results that you know you can rely upon. Our operationally experienced and qualified instructors also deliver a range of training sessions and fully bespoke courses tailored to your specific requirements. Meanwhile, our medical training also extends to research and development of new appliances and applications. Some of these are already seeing widespread use both domestically and internationally.

Train In A Day

train in a day

Newcastle under Lyme

Train in a Day is the leading UK training provider specialising in management and leadership. From our humble beginnings as an in-house training company, we have grown into one of the nation's most trusted providers of corporate education. Delivering employee training courses since 2004 We've been delivering training to UK businesses for eighteen years. Providing remote and inhouse training to work teams We work with small and large businesses with one thing in common - a desire to improve productivity through development of their employees Training Company Working in partnership with you; meeting your needs and delivering your training courses. Pre-Course Learning Most people would prefer an honest assessment of their management skills before attending a training seminar. That's why we offer our pre-course learning materials. They're designed to help employees get up to speed quickly, so the actual training course can focus on the new material. Our pre-learning materials are available online, and they cover all the basics you need to know. Engaging Training Courses Gain an edge on the competition with remote and in-house training. Our convenient, cost-effective training solutions will help you reduce costs and increase productivity. We offer experiential in-house training that encourages team-building and develops highly-productive teams. With highly-skilled leaders and managers, you'll be able to raise your productivity to new heights.

Total Network Solutions (Europe)

total network solutions (europe)

London

Our Responsiveness, A Service Obsession We live by the clock, and our processes are designed specifically with quick problem resolution in mind. We’re committed to not just the highest level of service, but the fastest. Our service obsession isn’t just a bunch of hollow buzzwords, it’s a firm part of the TNS culture that encompasses every one of our processes and tasks. We continuously and obsessively track our performance and your problems status. And keeping with our responsiveness mantra, if you call us, you will be speaking directly with a technician, 24 hours a day, 365 days a year. Our Technology, A Cutting Edge Foundation We implement award winning, cutting edge technology in order to provide you with a solid foundation from which to deliver excellent IT Consulting Service. This includes proactive device monitoring, 24/7/365. We won’t just wait for something to go wrong, we actively monitor every device in your network and preemptively handle most issues before they even occur. We also access, manage, upgrade, secure and fix workstations, servers and network devices remotely – and often automatically. Coupled with our preventive maintenance, cloud based solutions and state of the art virus protection and security analysis, you’ll always be up and running. Our Staff, Going the Extra Mile We firmly believe that, if you hire the best people, give them the best tools and engage them daily as human beings, they pass on this respect to their clients in the form of great service.Getting the technical side right is always our focus but we also never forget that in a service-centric business it all comes down to the people – and ours are the best. We take pride in our staff and genuinely value the relationships that we’ve built with our clients over the years. At the end of the day, this increases retention and, as a bi-product, profitability. It’s a mutually beneficial relationship!

Courses matching "Security"

Show all 4526

GLOBALIZATION AND THE GLOBAL POLITICAL ECONOMY | Live Online | Learning University-Level Course (Non-Credit)

By Gada Academy

Master Globalization and the Global Economy 🌍💡 Discover the forces driving our interconnected world in this live online course. Explore the interplay of politics and economics through key theories, global trade, finance, and governance. Perfect for aspiring policymakers, business leaders, and global thinkers—enroll today to unlock the skills to navigate the global political economy!

GLOBALIZATION AND THE GLOBAL POLITICAL ECONOMY | Live Online | Learning University-Level Course (Non-Credit)
Delivered Online
€119 to €352

GLOBALIZATION AND THE GLOBAL POLITICAL ECONOMY | Live Online | Learning University-Level Course (Non-Credit)

By Gada Academy

This course offers a dynamic introduction to Globalization and the Global Political Economy (GPE), exploring the intricate relationship between political actors and the global economic marketplace. Through a theoretically rich and historically grounded lens, you’ll examine the development, operations, and future trajectory of the global political economy. You’ll learn to apply diverse theoretical frameworks to critically analyze global economic processes. The course begins with an in-depth look at foundational GPE perspectives—mercantilism, liberalism, and structuralism—each built on distinct assumptions that shape our understanding of global economic events. From there, we’ll investigate the international "structures" of production, trade, finance, and knowledge, addressing critical questions: Who controls these structures, and to what end? What rules govern international trade? How do institutions like the IMF, World Bank, and multinational corporations shape global flows of goods and investment? Who benefits from controlling knowledge? The course culminates with an exploration of 21st-century global governance, highlighting the rise of new economic and political power centers and their evolving roles in the world. The course concludes with an exploration of 21st-century global governance, spotlighting the emergence of new economic and political power centers, such as BRICS, and their evolving roles in the world. We’ll also examine how the United States under Donald Trump shifted from traditional liberal internationalism toward more transactional and bilateral approaches, reshaping global relationships and challenging established norms Learning Outcomes By the end of this course, you will be able to: Analyze the major political themes in the historical evolution of the international economy. Understand debates surrounding the emergence and impacts of a globalized economy, including patterns of inequality. Evaluate key GPE theories and perspectives in both historical and contemporary contexts. Apply theoretical insights to explain the causes and effects of international trade, capital flows, monetary relations, and globalization debates. Recognize the vital role of human and environmental security in political economy studies. Demonstrate strong analytical and critical thinking skills when assessing political phenomena. Why Study Global Political Economy? Global Political Economy (GPE), also known as International Political Economy (IPE), untangles the complex interplay between global politics and economics. It’s an ideal field for anyone eager to understand how international policies, trade, finance, and institutions shape the world’s economic landscape. Whether you’re aiming for a career in policymaking, international relations, or a related field, this course equips you with essential tools to navigate the complexities of the global economic system and its profound influence on our world. Who Should Take This Course? This course is perfect for professionals, academics, and students interested in international relations, the global economy, or related disciplines. Whether your focus is policymaking, economic analysis, or global studies, you’ll gain valuable insights and analytical skills to deepen your understanding. Take the Next Step Don’t miss out—register today to secure your spot and immerse yourself in the fascinating world of globalization and political economy!

GLOBALIZATION AND THE GLOBAL POLITICAL ECONOMY | Live Online | Learning University-Level Course (Non-Credit)
Delivered Online
€119 to €352

International Security in a Changing World | Live Online Learning

By Gada Academy

Explore "International Security in a Changing World" through live online learning. Join expert-led sessions to understand global security dynamics, emerging threats, and strategic solutions in an interactive, real-time format. Enroll now to stay informed and engaged.

International Security in a Changing World | Live Online Learning
Delivered Online + more
€119 to €352

Global Power Shifts and China's Evolving Role in Africa | Live Online Learning

By Gada Academy

Explore China’s growing influence in Africa through this in-depth course. Weekly themes blend history, trends, and analysis to unpack the economic, political, and social layers of this evolving relationship. Gain a nuanced view of its impact on Africa’s global role

Global Power Shifts and China's Evolving Role in Africa | Live Online Learning
Delivered Online + more
€119 to €352

CONFLICT AND PEACEMAKING IN DIVIDED SOCIETIES | Live Online Learning | University-Level Course (Non-Credit)

By Gada Academy

Explore why people, groups, and states engage in conflict and why peace remains elusive. Dive into the causes of conflict, effective resolution strategies, and peacebuilding efforts worldwide. Learn how historical, cultural, and political factors shape disputes and discover insights into fostering lasting peace. #ConflictStudies #PeaceInitiatives #GlobalUnderstanding

CONFLICT AND PEACEMAKING IN DIVIDED SOCIETIES | Live Online Learning | University-Level Course (Non-Credit)
Delivered Online + more
€119 to €352

ISSUES AND TRENDS IN CONTEMPORARY AFRICAN POLITICS | Live Online Learning

By Gada Academy

Unveil Africa’s political future: Dive into colonial legacies, state-building challenges, democratization efforts, the African Union’s influence, and emerging great power rivalries. Discover sharp, insightful takes on contemporary African politics.

ISSUES AND TRENDS IN CONTEMPORARY AFRICAN POLITICS | Live Online Learning
Delivered Online + more
€119 to €352

Maryland Security Officer Initial & Renewal Course

5.0(1)

By MDSPOSA & USTASC TRAINING PORTAL

This course meets and exceeds the Maryland requirement for the security officer course of 12 hours. The course is taught over 2 days, 6 hours per day. In this course, you will learn the required curriculum for security officers prescribed by the Maryland Police and Corrections Training Commission.

Maryland Security Officer Initial & Renewal Course
Delivered Online + more
$250

C20M01 - Intruder & Hold up alarm foundation EN50131 (online)

5.0(1)

By Ember Compliance

Learners will be introduced to the design, installation, commissioning, and maintenance of intruder and hold-up alarm systems.

C20M01 - Intruder & Hold up alarm foundation EN50131 (online)
Delivered Online + more
ÂŁ230

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
ÂŁ2,797

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
ÂŁ3,697