• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4526 Security courses in Ross-on-Wye delivered Online

International Security in a Changing World | Live Online Learning

By Gada Academy

Explore "International Security in a Changing World" through live online learning. Join expert-led sessions to understand global security dynamics, emerging threats, and strategic solutions in an interactive, real-time format. Enroll now to stay informed and engaged.

International Security in a Changing World | Live Online Learning
Delivered Online + more
€119 to €352

Global Power Shifts and China's Evolving Role in Africa | Live Online Learning

By Gada Academy

Explore China’s growing influence in Africa through this in-depth course. Weekly themes blend history, trends, and analysis to unpack the economic, political, and social layers of this evolving relationship. Gain a nuanced view of its impact on Africa’s global role

Global Power Shifts and China's Evolving Role in Africa | Live Online Learning
Delivered Online + more
€119 to €352

CONFLICT AND PEACEMAKING IN DIVIDED SOCIETIES | Live Online Learning | University-Level Course (Non-Credit)

By Gada Academy

Explore why people, groups, and states engage in conflict and why peace remains elusive. Dive into the causes of conflict, effective resolution strategies, and peacebuilding efforts worldwide. Learn how historical, cultural, and political factors shape disputes and discover insights into fostering lasting peace. #ConflictStudies #PeaceInitiatives #GlobalUnderstanding

CONFLICT AND PEACEMAKING IN DIVIDED SOCIETIES | Live Online Learning | University-Level Course (Non-Credit)
Delivered Online + more
€119 to €352

ISSUES AND TRENDS IN CONTEMPORARY AFRICAN POLITICS | Live Online Learning

By Gada Academy

Unveil Africa’s political future: Dive into colonial legacies, state-building challenges, democratization efforts, the African Union’s influence, and emerging great power rivalries. Discover sharp, insightful takes on contemporary African politics.

ISSUES AND TRENDS IN CONTEMPORARY AFRICAN POLITICS | Live Online Learning
Delivered Online + more
€119 to €352

Maryland Security Officer Initial & Renewal Course

5.0(1)

By MDSPOSA & USTASC TRAINING PORTAL

This course meets and exceeds the Maryland requirement for the security officer course of 12 hours. The course is taught over 2 days, 6 hours per day. In this course, you will learn the required curriculum for security officers prescribed by the Maryland Police and Corrections Training Commission.

Maryland Security Officer Initial & Renewal Course
Delivered Online + more
$250

C20M01 - Intruder & Hold up alarm foundation EN50131 (online)

5.0(1)

By Ember Compliance

Learners will be introduced to the design, installation, commissioning, and maintenance of intruder and hold-up alarm systems.

C20M01 - Intruder & Hold up alarm foundation EN50131 (online)
Delivered Online + more
£230

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered OnlineFlexible Dates
£2,475

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Educators matching "Security"

Show all 27
Prostars

prostars

5.0(76)

Gloucestershire,

Belief – We firmly believe that all schools have a duty to their children to develop their fundamental movement skills, whilst providing a fun and engaging environment and to ensure that every child leaves primary school physically literate. Aim – Recent studies have proven that a healthy body is a healthy mind and regular physical activity increases concentration, motivation and ultimately academic performance. Allied to this, we aim to educate children on the importance of physical activity and give teachers the knowledge and expertise to deliver engaging lessons so every child has a positive experience of P.E in their school. Objective – Our principle objective is to give all children a platform in which to realise their sporting potential in a safe and competitive environment, whilst inspiring them to remain active throughout their life. We provide children with the tools that will allow them to not only thrive academically and in sport but also socially, developing their life skills such as communication, listening, problem solving, leadership and decision making. Hassle Free – ProStars pride themselves on being hassle free. This means that you will consistently have the same coach throughout the year. This is not only important for child development but they will understand the schools policies, procedures and the day to day running of the school to ensure everything runs smoothly. We’ve never cancelled a session – On the rare occasion your coach is absent we will instantly find a replacement. The replacement coach will be of equal quality, briefed on policies and procedures, class management, how the day is run, know what the children have previously been learning and what they need to learn that lesson. We are local –We are based in The Dean Academy, Lydney and use local coaches that have been developed through our BTEC and HND programme. We are in daily contact with our team of coaches to ensure that all planning and assessments are done to the highest standard. We are also a very close group of colleges with immense job satisfaction and therefore have a very low turnover of staff, ensuring that you get consistency throughout each year. Staff qualifications – Not only do all P.E specialists have a degree or are working towards a degree in sports coaching and development, they also hold at least a level 2 coaching qualification in their chosen sport. Alongside this, they have undergone an enhanced DBS check, first aid, safeguard and child protection training. We won’t be beaten on price – We understand that schools in the local area come in different sizes and budgets can be tight, therefore we can tailor packages that suit each individual school. Why use ProStars? Where it has been reported that the general health and ability of children is in decline nationally we have seen a rise in the ability of children our coaches are regularly working with. When schools work with ProStars, they are able to offer a high standard of P.E that fits the curriculum expectations. With this they also receive planning, evaluations and assessments carried out by qualified and experienced P.E specialists. Schools are also able to offer more after school and lunchtime clubs, sport leadership awards, enter and run more tournaments which will benefit your OFSTED inspection and healthy schools award.

Laguna's Spitfire Legacy

laguna's spitfire legacy

Westbury-On-Severn

NEVER WAS SO MUCH 'STILL' OWED BY SO MANY, TO THE 'FORGOTTEN FEW' OF THE BATTLE OF BRITAIN. On June 4th 1940, following the evacuation of British and Allied forces from the beaches of Dunkirk and the decimation of the British Army, all that stood between German invasion of Britain was a 20 mile stretch of the English Channel and the pilots of the RAF’s Hurricane, Spitfire and bomber squadrons, later to be called ‘The Few’. And so began the Battle of Britain. Among the brave airmen who fought in the skies above Britain during the Battle and after, were a few Polish fighter pilots, volunteers, our first Allies who had been ordered to evacuate across German-occupied Europe to continue the fight for the defence of France and then Britain. Sadly at the end of the war they never formally received the recognition they, we feel deserved, and were not wholly allowed to participate in the VE Day celebrations. We call them ‘The Forgotten Few’ and want to change this to ensure there is a lasting remembrance, unity, legacy and education (RULE) for all generations. You can help us with this by simply sharing this website and telling your friends, family, teachers and frankly, anyone else. We are also developing education packs that we hope to supply to schools wishing to participate, ensuring children can continue to learn about the sacrifice made for their future. You could also help through volunteering, donating, or buying something from our store so we can continue to fund the project.

Betaris Training

betaris training

4.8(28)

Gloucestershire

Betaris Training is an Accredited Training Provider, with a fantastic reputation, specialising in a range of work-based learning in Apprenticeships, and courses for the unemployed, and employed. Specialising also in Rail/HGV and Security courses. BETARIS TRAINING is located at the Cowshed in rural Gloucestershire where a passion for providing excellence and innovation have always been at its core values. Established in 2011 by Louise and Vanessa, Betaris has grown and developed, providing work-based training programmes, alternative learning for young people as well as recruitment and security solutions. Betaris Training have years of experience in managing and implementing training, in a variety of settings. Betaris Trainers and Assessors are highly skilled, making the learning process engaging and accessible to all. The team deliver high-quality training, working with different businesses and individuals to suit their needs and requirements. Training is delivered in a flexible approach to suit the requirements of businesses and individuals. Betaris are passionate about working with the unemployed, working with job centres and housing associations across the country, and offering training programmes across different sectors, often free of charge, funded by the Government. The skills and qualifications gained on successful completion of courses equip learners to re-enter employment within the sector-specific industry. Betaris offers recruitment services – ‘Betaris Recruitment Bureau (BRB)’ offers staffing solutions, across a number of different industries. Many of Betaris Recruitment Bureau services are offered FREE of charge, for example in recruiting a new Apprentice. Security solutions are also available from Betaris Security. Betaris Security is an area of the business that has grown since the success of running Security Training Courses. Allowing Betaris Security to offer security staff for buildings, venues and events as part of our range of services.