• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4526 Security courses in Sutton Coldfield delivered Online

CompTIA Security+ (SY0-601)

4.8(9)

By Skill Up

In today's world, cyber security is more important than ever. With the increasing sophistication of cyberattacks, it is essential for businesses and organizations of all sizes to have a strong security posture in place. The CompTIA Security+ (SY0-601) course is the perfect way to get started in the world of cyber security.

CompTIA Security+ (SY0-601)
Delivered Online On Demand21 hours 59 minutes
£25

Wordpress Security

By Course Cloud

The innovative WordPress Security has been compiled with the assistance and expertise of industry professionals. It has been carefully crafted to meet the business requirements needed for an outstanding contribution to this role and the career path beyond it. By enrolling in this tutorial, a significant advantage can be gained by the student for securing their dream job and building an excellent reputation in this sector. This popular WordPress Security has been designed to help dedicated individuals train to become the absolute best in this business field. Many other entrepreneurs and talented students have already completed this course, and others like it, empowering them to move onto satisfying and rewarding careers. This unique WordPress Security course is perfectly suited for those dedicated and ambitious individuals who are committed to genuinely becoming the best in the business. The WordPress Security is recognised and accredited by CPD standards, so all contents are guaranteed to be accurate and reputable, adding valuable competencies and qualifications to a CV, making anyone stand out from other potential candidates or business rivals. For added convenience, the WordPress Security consists of a range of educational modules that allow study sessions to be organised at any time and any place When the final assessment of the WordPress Security has been completed, a certificate of completion is supplied to evidence newly acquired skills and knowledge. This will provide a significant boost for job-seeking or entry into a new and exciting career path. The valuable qualification from the [Course Title] course can help to make all the difference in a dynamic employment sector and can also be validated on our website. We are aware that a student's lifestyles and work ethics may not allow much time for a dedicated study session, so the WordPress Security has been specifically designed to be taken at a personally selected pace, and the hours that are suited to each individual. Full access is immediately available after registration, and this can be achieved via any online device, and at any global location you are sighted at.  Our fully-trained tutors are committed to helping you throughout the course, and will instantly respond to any queries that are sent to them via email.  

Wordpress Security
Delivered Online On Demand
£319

Operation and Security Management Diploma

4.3(43)

By John Academy

Description: The Operation and Security Management Diploma course teaches both Operational Management and Security Management concepts and techniques. Throughout the course, you will learn the basics of operation management, human resource management, assets management, supply chain management, and cost management.  Then the course covers the concepts, skills and techniques of Security Management such as types of security threats, identity theft, piracy, data classification, ways of protecting your digital information, malware and more. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Operation and Security Management Diploma is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Operation and Security Management Diploma is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Operation and Security Management Diploma - Updated Version Module 01: Introduction To Operations Management Introduction To Operations Management 00:23:00 Module 02: Project Management Project Management 00:22:00 Module 03: Business Development And Succession Planning Business Development And Succession Planning 00:27:00 Module 04: Process Management Process Management 00:26:00 Module 05: Supply Chain Management Supply Chain Management 00:23:00 Module 06: Planning & Forecasting Operations Planning & Forecasting Operations 00:23:00 Module 07: Procurement & Purchasing Management Procurement & Purchasing Management 00:23:00 Module 08: Manufacturing & Delivery Operations Manufacturing & Delivery Operations 00:19:00 Module 09: Quality Management Quality Management 00:23:00 Module 10: Managing Risk And Recovery Managing Risk And Recovery 00:29:00 Module 11: Performance Management Performance Management 00:21:00 Module 12: Talent Management Talent Management 00:20:00 Module 13: Communication Skills Communication Skills 00:26:00 Module 14: Negotiation Techniques Negotiation Techniques 00:19:00 Module 15: Conflict Management Conflict Management 00:17:00 Module 16: Stress Management Stress Management 00:19:00 Module 17: Time Management Time Management 00:40:00 Module 18: Business Environment Business Environment 00:19:00 Module 19: Business Writing Skills Business Writing Skills 00:39:00 Operation and Security Management Diploma - Old Version Module 01 Designing Your Organizational Structure 00:30:00 Introduction to Operations Management 00:15:00 Understanding Financial Terms 00:30:00 Getting the Right People in Place 00:15:00 Getting Your Product Together 00:15:00 Building a Corporate Brand 00:30:00 Marketing Your Product 01:00:00 Selling Your Product 00:15:00 Planning for the Future 00:15:00 Goal Setting and Goal Getting 00:30:00 Succession Planning 101 00:15:00 Managing Your Money 00:15:00 Ethics 101 00:15:00 Building a Strong Customer Care Team 00:15:00 Training Employees for Success 00:15:00 Leadership Essentials 00:15:00 Module 02 The Fundamentals of Business Process Management 00:30:00 Defining Business Process Management 00:30:00 The Business Process Life Cycle 00:15:00 The Vision Phase 00:15:00 The Design Phase 01:00:00 The Modeling Phase 00:30:00 The Execution Phase 01:00:00 The Monitoring Phase 00:30:00 The Optimizing Phase 01:00:00 Module 03 What is Gap Analysis? 00:30:00 The Gap Analysis Process 00:30:00 Supporting Tools 00:30:00 Creating a Gap Analysis Report 00:15:00 Understanding Lean 00:30:00 The Toyota Production System 00:30:00 The Toyota Production System House 00:15:00 The Five Critical Improvement Concepts 00:15:00 Understanding Value with the Kano Model 00:15:00 Types of Waste 00:15:00 Creating a Lean Enterprise 00:15:00 The Plan, Do, Study, Act (PDSA) Cycle 00:15:00 Using the R-DMAIC-S Model 00:15:00 Lean Thinking Tools 00:15:00 Kaizen Events 00:00:00 Data Gathering and Mapping 00:30:00 A Plan to Take Home 00:15:00 Defining Continuous Improvement 00:15:00 Stage One - Identify Areas For Improvement 00:15:00 Stage Two - Create a Plan for Improvement 00:15:00 Stage Three - Implement the Changes 00:15:00 Stage Four - Review the Impact 00:15:00 Test Driving 00:15:00 Module 04 The Evolution of the Supply Chain 00:15:00 The Basic Supply Chain Structure 00:15:00 Supply Chain Drivers 00:15:00 Aligning Your Supply Chain with Business Strategy 00:15:00 Managing Supply Chain Risks 00:15:00 Tracking and Evaluating Supply Chain Data 00:30:00 Troubleshooting Supply Chain Problems 00:15:00 Sharing Supply Chain Activities 00:15:00 Sustainable Supply Chain Strategies 00:15:00 Applying Lean Techniques to the Supply Chain 00:15:00 The Future of Supply Chain Management 00:15:00 Supply Chain Management Basics 00:30:00 The Purchasing Cycle 00:45:00 Purchasing Toolkit 01:00:00 Managing Competitive Bids 00:45:00 Improving Efficiency and Accuracy 00:30:00 Analyzing and Reducing Risk in the Supply Chain 00:30:00 Managing Internal Relationships 00:30:00 Tools of the Trade 00:30:00 Module 05 What is Inventory? 00:30:00 Types of Inventory 00:15:00 Key Players 00:30:00 Setting up the Warehouse 00:15:00 What Makes a Good Inventory Management System? 00:15:00 The Warehouse Inventory Cycle 00:15:00 Identifying Demand 00:15:00 The Receiving Process 00:15:00 Validating Inventory 00:15:00 The Put-Away Process 00:15:00 Maintaining Inventory Accuracy 00:30:00 The Outbound Process 00:30:00 Industry Trends 00:15:00 Module 06 Concept of Quality FREE 00:19:00 Key Terms 00:23:00 Categories 00:21:00 Customer Input 00:11:00 Plan Quality 00:08:00 Design of Experiments 00:07:00 Quality Control 00:11:00 Control Charts 00:11:00 Sampling 00:11:00 Six Sigma 00:08:00 The Steps 00:10:00 The 6 Six Sigma Challenges 00:05:00 Module 07 The Basics Of Security Management 00:15:00 Security Management Planning And Implementing 00:15:00 How to Build a Security Management Team 00:15:00 The Role And Responsibilities of a Security Officer 00:30:00 Security Management Governance 00:15:00 Organizational Security Models 00:30:00 Understanding Risk, Threat, And Vulnerability 00:15:00 Information Risk Management 00:30:00 Different Types of Crimes 00:15:00 Understanding What Burglaries Are 00:15:00 Definition and Dangers of Hijacking 00:15:00 Domestic Violence in the Workplace 00:30:00 Child abuse: Identification, Reporting, and Prevention 00:30:00 Sexual Violence: Prevention Strategies 00:15:00 Module 08 Types of Security Threats 00:29:00 Social Engineering 00:31:00 Identity Theft 00:29:00 Data Classification 00:28:00 Protecting Your Digital Information 00:45:00 Malware 00:17:00 Security from End-to-End 00:27:00 Piracy 00:16:00 Security Policies 00:17:00 Moving Forward 00:12:00 Mock Exam Mock Exam- Operation and Security Management Diploma 00:30:00 Final Exam Final Exam- Operation and Security Management Diploma 00:30:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Operation and Security Management Diploma
Delivered Online On Demand48 hours
£25

ISO 27001 (2022) Lead Auditor

By Training Centre

  Delivered in either Live Online (4 days) or in our Classroom (5 days), the ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO 27001. During this training course, you will acquire the knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process. About This Course   Based on practical exercises, you will be able to master audit techniques and become competent to manage an audit program, audit team, communication with customers, and conflict resolution. After acquiring the necessary expertise to perform this audit, you can sit for the exam and gain the "ISO/IEC 27001 Lead Auditor' credential. By holding this Lead Auditor Certificate, you will demonstrate that you have the capabilities and competencies to` audit organizations based on best practices.   The training course is based on both theory and best practices used in ISMS audits Lecture sessions are illustrated with examples based on case studies Practical exercises are based on a case study which includes role playing and discussions Practice tests are similar to the Certification Exam   The course is delivered both as a Live Online or Classroom environment, as follows; Day 1: Introduction to Information Security Management Systems (ISMS) and ISO/IEC 27001 Day 2: Audit principles, preparation and launching of an audit Day 3: On-site audit activities Day 4: Closing the audit and Examination   Learning Objectives Understand the operations of an Information Security Management System based on ISO/IEC 27001 Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks Understand an auditor's role to: plan, lead and follow-up on a management system audit in accordance with ISO 19011 Learn how to lead an audit and audit team Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit Acquire the competencies of an auditor to: plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011   The exam covers the following competency domains:   Domain 1: Fundamental principles and concepts of an Information Security Management System (ISMS) Domain 2: Information Security Management System controls and best practices based on ISO/IEC 27002 Domain 3: Planning an ISMS implementation based on ISO/IEC 27001 Domain 4: Implementing an ISMS based on ISO/IEC 27001 Domain 5: Performance evaluation, monitoring and measurement of an ISMS based on ISO/IEC 27001 Domain 6: Continual improvement of an ISMS based on ISO/IEC 27001 Domain 7: Preparing for an ISMS certification audit Prerequisites   A foundational understanding of ISO/IEC 27001 and knowledge of audit principles.    What's Included?   Refreshments & Lunch (Classroom only) Course Slide Deck Official Study Materials CPD Certificate The Exam   Who Should Attend?   Auditors seeking to perform and lead Information Security Management System (ISMS) certification audits Managers or consultants seeking to master an Information Security Management System audit process Individuals responsible for maintaining conformance with Information Security Management System requirements Technical experts seeking to prepare for an Information Security Management System audit Expert advisors in Information Security Management Our Guarantee   We are an approved IECB Training Partner for all of our courses. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training and exam retake offered Accreditation Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 240 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success.   Provided by   This course is Accredited by NACS and Administered by the IECB

ISO 27001 (2022) Lead Auditor
Delivered OnlineFlexible Dates
£1,450

Professional Certificate Course in Recognizing the Legal and Security Framework of E-Commerce in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

The aim of this course is to provide a comprehensive understanding of E-commerce security fundamentals, business laws and regulations, ethical, social and political issues, basic ethical concepts, privacy and information rights, customer data collection methods, and the concept of E-Governance and its types. After the successful completion of this lecture, you will be able tolearn the following: Understand E-commerce Security Fundamentals and deal with issues arising. Understand and comply with E-commerce Business Laws and Regulations. Understand Ethics, Social and Political Issues. Learn about the Basic Ethical Concepts: Responsibility, Accountability and Liability. Understand Privacy and Information Rights. Understand What is Customer Data, the Importance of Collecting Customer Data, and Data Collection Methods. Understand the concept of E-Governance and its types. The aim of this course is to provide students with a comprehensive understanding of E-commerce Security Fundamentals and the ability to deal with the issues arising in this field. The course will also cover the E-commerce Business Laws and Regulations that apply to this field. Students will learn about the ethical, social, and political issues surrounding E-commerce, as well as the basic ethical concepts of responsibility, accountability, and liability. They will gain an understanding of privacy and information rights and learn about customer data, including its importance and methods for collecting it. Finally, the course will cover the concept of E-Governance and its various types, providing students with an understanding of how it applies to E-commerce. The aim of this course is to provide students with a comprehensive understanding of E-commerce Security Fundamentals and the ability to deal with the issues arising in this field. The course will also cover the E-commerce Business Laws and Regulations that apply to this field. Students will learn about the ethical, social, and political issues surrounding E-commerce, as well as the basic ethical concepts of responsibility, accountability, and liability. They will gain an understanding of privacy and information rights and learn about customer data, including its importance and methods for collecting it. Finally, the course will cover the concept of E-Governance and its various types, providing students with an understanding of how it applies to E-commerce. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Recognizing the Legal and Security Framework of E-commerce Self-paced pre-recorded learning content on this topic. Recognizing The Legal And Security Framework Of E-Commerce Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course.The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. E-commerce Legal and Security Consultant E-commerce Compliance Manager E-commerce Security Analyst E-commerce Legal Analyst E-commerce Privacy Officer E-commerce Compliance Analyst E-commerce Risk Management Specialist E-commerce Fraud Investigator E-commerce Contract Administrator E-commerce Data Protection Officer Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Recognizing the Legal and Security Framework of E-Commerce in London 2024
Delivered Online On Demand14 days
£37

ISO 27001: 2022 Internal Auditor

By Training Centre

  During this training course, you will acquire the knowledge and skills to plan and carry out internal audits in compliance with ISO 19011. About This Course   Based on a number of exercises, you will learn how to utilise audit techniques and become competent to manage an internal audit programme, communicate with customers, and manage conflict resolution. After acquiring the necessary expertise, you can sit for the exam and gain 'Certified ISO/IEC 27001: 2022 Internal Auditor' Certification. By holding this Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices. Learning objectives By the end of this training course, the participants will be able to: Explain the concepts and principles of an information security management system (ISMS) based on ISO/IEC 27001: 2022 Analyse the ISO/IEC 27001: 2022 requirements for an ISMS from the perspective of an auditor Evaluate the ISMS conformity requirements Plan, conduct, and close an ISO/IEC 27001: 2022 compliance audit programme Assist an organisation in transitioning from ISO 27001: 2013 Deliver an ISO/IEC 27001: 2022 Internal audit programme Our approach This training is based on both theory and best practices used in ISMS audits Lessons are illustrated with examples based on case studies Practical exercises are based on a real world case study Practice tests are similar to the Certification Exam Course Overview Module 1 Foundational Audit principles and concepts of Information Security Management System (ISMS) Module 2 The Information Security Management System (ISMS) Module 3 ISO 19011 audit concepts and principles Module 4 Preparation of an ISO/IEC 27001 audit Module 5 Providing an ISO/IEC 27001 audit Module 6 Closing an ISO/IEC 27001 audit Module 7 Managing an ISO/IEC 27001 Internal audit programme Course Agenda Day 1: Introduction to the information security management system (ISMS) and ISO/IEC 19011 Day 2: Audit principles, preparation, and initiation of an audit Day 3: Audit activities, Closing the Audit and the Certification exam Accreditation Assessment   All candidates at official training courses are tested throughout their course with quizzes and exercises, in combination with a final exam held on the last day of the course. Both elements are a part of the overall score. For this course, the final exam constitutes a 10 question essay type which should be completed within 125 minutes. A passing score is achieved at 70%. Self-study candidates can purchase an exam voucher from our Store. Exam results are returned within 24 hours, with successful candidates receiving both a digital badge and a Certificate of Achievement Prerequisites     A general understanding of ISO/IEC 27001: 2022 and knowledge of audit principles.   Provided by   This course is Accredited by NACS and Administered by the IECB What's Included?   Refreshments & Lunch (Classroom courses only) Course Slide Deck Official Study Guides CPD Certificate The Exam Who Should Attend?   Auditors seeking to perform Internal Information Security Management System (ISMS) certification audits Managers or consultants seeking to master an Information Security Management System audit process Individuals responsible for maintaining conformance with Information Security Management System requirements Technical experts seeking to prepare for an Information Security Management System audit Expert advisors in Information Security Management

ISO 27001: 2022 Internal Auditor
Delivered OnlineFlexible Dates
£1,250

Cyber Security and Digital Forensics for Pentesters - Hands-on

By Study Plex

Highlights of the Course Course Type: Online Learning Duration: 8 hours 13 minutes Tutor Support: Tutor support is included Customer Support: 24/7 customer support is available Quality Training: The course is designed by an industry expert Recognised Credential: Recognised and Valuable Certification Completion Certificate: Free Course Completion Certificate Included Instalment: 3 Installment Plan on checkout What you will learn from this course? Gain comprehensive knowledge about forensic investigation Understand the core competencies and principles of forensic investigation Explore the various areas of forensic investigation Know how to apply the skills you acquired from this course in a real-life context Become a confident and expert pentester Cyber Security and Digital Forensics for Pentesters - Hands-on Course Master the skills you need to propel your career forward in digital forensic investigation. This course will equip you with the essential knowledge and skillset that will make you a confident pentester and take your career to the next level. This comprehensive cyber security and digital forensics course is designed to help you surpass your professional goals. The skills and knowledge that you will gain through studying this cyber security and digital forensics course will help you get one step closer to your professional aspirations and develop your skills for a rewarding career. This cyber security and digital forensics course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries.  This comprehensive course will teach you the theory of effective digital forensic investigation practice and equip you with the essential skills, confidence and competence to assist you in the digital forensic investigation industry. You'll gain a solid understanding of the core competencies required to drive a successful career in digital forensic investigation. This course is designed by industry experts, so you'll gain knowledge and skills based on the latest expertise and best practices. This extensive course is designed for pentester or for people who are aspiring to specialise in digital forensic investigation. This cyber security and digital forensics course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual and is not an accredited qualification.  Enrol in this cyber security and digital forensics course today and take the next step towards your personal and professional goals. Earn industry-recognised credentials to demonstrate your new skills and add extra value to your CV that will help you outshine other candidates. Who is this Course for? This comprehensive cyber security and digital forensics course is ideal for anyone wishing to boost their career profile or advance their career in this field by gaining a thorough understanding of the subject. Anyone willing to gain extensive knowledge on this digital forensic investigation can also take this course. Whether you are a complete beginner or an aspiring professional, this course will provide you with the necessary skills and professional competence, and open your doors to a wide number of professions within your chosen sector. Entry Requirements This cyber security and digital forensics course has no academic prerequisites and is open to students from all academic disciplines. You will, however, need a laptop, desktop, tablet, or smartphone, as well as a reliable internet connection. Assessment This cyber security and digital forensics course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Advance Your Career This cyber security and digital forensics course will provide you with a fresh opportunity to enter the relevant job market and choose your desired career path. Additionally, you will be able to advance your career, increase your level of competition in your chosen field, and highlight these skills on your resume. Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Course Overview Course Overview 00:06:00 Building Your Forensics Lab Environment Using VirtualBox Video - Downloading ISO and OVA Files for VirtualBox 00:08:00 Video and lab - Create a Virtual Install of CSI Linux 2021.2 00:12:00 Video and Lab - Create a Kali Live (Forensic Mode) VM Using VirtualBox 00:06:00 Video and lab - Create a Virtual Install Kali Image Using VirtualBox 00:11:00 Video and Lab - Create Virtual Install of Windows 10 Using VirtualBox 00:08:00 Video and Lab - Create a Virtual Install of Metasploitable2 Using VirtualBox 00:10:00 Using Kali Forensic Mode and Autopsy Video and Lab -Getting Started with Autopsy 00:10:00 Video and Lab - Simulate Creating a Disk Image for a Forensic Analysis 00:11:00 Video and Lab - Examining a forensic Disk Image Using Autopsy 00:12:00 Digital Forensics Case Management Video and Lab - Installing the WebMap-Nmap Dashboard 00:12:00 Open-source Intelligence (OSINT) Video and Lab - Conducting OSINT Using CSI Linux Investigator 00:08:00 Video and Lab - Find Social Media Accounts Using Sherlock 00:07:00 Video - OSINT Framework - Overview 00:16:00 Using Shodan to Search for Vulnerable Devices Video and Lab - Preparing CSI Investigator to Use Shodan 00:05:00 Video and Lab - Using Shodan to Find Vulnerable Devices 00:16:00 Video and lab - Using Shodan to Search for Vulnerable Databases 00:08:00 Computer Forensics Video - Attaching an External USB Device in Kali 00:07:00 Video and Lab - Acquiring a Forensic Copy of the Windows Registry 00:15:00 Video and Lab - Analyzing the Windows Registry for Evidence 00:14:00 Video and Lab - Dumping Wi-Fi Credentials Using netsh 00:04:00 Video and Lab - Email Header Analysis 00:17:00 Video and Lab - Using Shellbags to View Hidden or Deleted Folders 00:06:00 Video and Lab - Extracting Thumbnail Images From a Suspects Machine 00:05:00 Video and lab - Memory Forensics Using the Volatility Framework 00:19:00 Reverse Engineering and Malware Analysis Video and Lab - Install Ghidra on CSI Linux 00:07:00 Video and Lab - Introduction to Using Ghidra 00:14:00 Video and Lab - Reverse Engineering crackme0x00 Using Ghidra 00:06:00 Video and Lab - Reverse Engineering crackme0x05 Using Ghidra 00:12:00 Video and Lab - Analyzing the WannaCry KillSwitch Using Ghidra 00:17:00 Malware Hunting with Sysinternal Tools Video - Overview of Sysinternal Tools 00:08:00 Video - Overview of Sysinternal's Process Explorer 00:00:00 Video and Lab - Finding Malware with Sysinternals Process Explorer 00:09:00 Stenography Video and Lab - Using Steghide for Hiding and Extracting Data 00:11:00 Video and Lab - Using the EXIFtool to Read and Write EXIF Tags 00:10:00 Network Forensics Using Wireshark Video - Overview of Wireshark 3.2 00:11:00 Video - Wireshark Capture Options 00:07:00 Video - Wireshark Toolbar Icons 00:03:00 Video and Lab - Installing a Wireless Adapter in Kali 00:09:00 Video and Lab - Hacking a Wireless Network Using Kali Linux 00:14:00 Video - Capturing Wireless Traffic Using Wireshark 00:05:00 Practice What You Learned Video and Lab - CTF Lab Build for HA: Forensics 00:11:00 Video and lab - Capture flag #1 00:12:00 Video and lab - Capture flag #2 00:10:00 Video and lab - Capture flag #3 00:20:00 Video and lab - Capture flag #4 00:09:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Cyber Security and Digital Forensics for Pentesters - Hands-on
Delivered Online On Demand
£19

ISO 27001 (2022) Lead Implementer

By Training Centre

  The IECB ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO 27001   During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness. About This Course   After mastering all the necessary concepts of Information Security Management Systems, you can sit for the exam and gain the 'IECB Certified ISO/IEC 27001 Lead Implementer' credential. By holding an IECB Lead Implementer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement ISO/IEC 27001 in an organization.   This official IECB course is delivered in either our Live Online or Classroom format, as follows; Day 1: Introduction to ISO/IEC 27001 and initiation of an ISMS Day 2: Plan the implementation of an ISMS Day 3: Implementation of an ISMS Day 4: ISMS monitoring, measurement, continuous improvement and preparation for a certification audit, as well as the examination.   Learning Objectives   Acknowledge the correlation between ISO/IEC 27001, ISO 27002 and other standards and regulatory frameworks Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS Acquire the expertise to advise an organization in implementing Information Security Management System best practices   The exam covers the following competency domains: Domain 1: Fundamental principles and concepts of an Information Security Management System (ISMS) Domain 2: Information Security Management System controls and best practices based on ISO/IEC 27002 Domain 3: Planning an ISMS implementation based on ISO/IEC 27001 Domain 4: Implementing an ISMS based on ISO/IEC 27001 Domain 5: Performance evaluation, monitoring and measurement of an ISMS based on ISO/IEC 27001 Domain 6: Continual improvement of an ISMS based on ISO/IEC 27001 Domain 7: Preparing for an ISMS certification audit Prerequisites   A foundational understanding of ISO/IEC 27001 and knowledge of implementation principles.  What's Included?   Refreshments & Lunch (Classroom only) Course Slide Deck Official Study Materials CPD Certificate The Exam Who Should Attend?   The course is suitable for any of the following roles; Security Analyst Network Administrator Data Architect Security Manager   Our Guarantee     We are an approved IECB Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training and exam retake offered Accreditation   Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 12 question, essay type exam on Day 4 of the course. The overall passing score is 70%, to be achieved within the 240 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success.   Provided by   This course is Accredited by NACS and Administered by theIECB.

ISO 27001 (2022) Lead Implementer
Delivered OnlineFlexible Dates
£1,450

CompTIA Advanced Security Practitioner (CASP) - Video Training Course

4.3(43)

By John Academy

Description This CompTIA Advanced Security Practitioner (CASP) - Video Training Course establishes knowledgeable professionals in the field of advanced security practices. At first you will learn about the enterprise security architecture, security technology and resource technology. Then you will learn security design and solutions, application security design, managing risk, security policies, security procedures and enterprise security integration. Finally, you will learn about security research and analysis, disaster recovery and business continuity, managing risk in projects, legal issues and judgment and decision-making. It involves applying critical thinking and judgment across a broad spectrum of security disciplines to propose and implement solutions that map to enterprise drivers. This course will prepare you to pass the exam CompTIA Advanced Security Practitioner (CASP). So, if you are interested to get this course don't delay to join now. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA Advanced Security Practitioner (CASP) - Video Training Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. The Enterprise Security Architecture The Basics of Enterprise Security FREE 01:00:00 The Enterprise Structure 00:21:00 Enterprise Security Requirements 00:09:00 The Enterprise Security Technology Common Network Security Components and Technologies 00:55:00 Communications and Collaboration Security 00:40:00 Cryptographic Tools and Techniques 00:56:00 Advanced Authentication 00:14:00 Enterprise Resource Technology Enterprise Storage Security Issues 01:18:00 Distributed, Shared, and Virtualized Computing 00:26:00 Cloud Computing and Security 00:10:00 Security Design and Solutions Network Security Design 02:22:00 Conduct a Security Assessment 00:55:00 Host Security 01:19:00 Managing Risk in Projects Create a Risk Management Plan 01:15:00 Identify Risks and Their Causes 00:11:00 Analyze Risks 00:19:00 Develop a Risk Response Plan 00:07:00 Integrating Advanced Authentication and Authorization Techniques Implement Authentication 00:19:00 Implement Advanced 00:07:00 Implementing Cryptographic Techniques Describe Cryptographic Concepts 00:19:00 Choose Cryptographic Techniques 00:31:00 Choose Cryptographic Implementation 00:07:00 Integrating Hosts, Storage, Networks, and Apps in a Secure Enterprise Architecture Implement Security Standards in the Enterprise 00:13:00 Select Technical Deployment Models 00:28:00 The Enterprise Structure 00:21:00 Secure Enterprise Application Integration Enablers 00:21:00 Security Research and Analysis Perform an Industry Trends and Impact Analysis 00:41:00 Perform an Enterprise Security Analysis 00:26:00 Disaster Recovery and Business Continuity BCP Fundamentals 00:21:00 BCP Implementation 00:10:00 DRP Fundamentals 00:18:00 DRP Implementation 00:03:00 Responding to and Recovering from Incidents Design Systems to Facilitate Incident Response 00:14:00 Conduct Incident and Emergency Responses 00:20:00 Legal Issues Computer Crime Laws and Regulations 00:16:00 Computer Crime Incident Response 00:17:00 Judgment and Decision-Making Develop Critical Thinking Skills 00:12:00 Determine the Root of a Problem 00:06:00 Use Judgment to Make Sound Decisions 00:18:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

CompTIA Advanced Security Practitioner (CASP) - Video Training Course
Delivered Online On Demand19 hours 5 minutes
£24

Spring Security Core: Beginner to Guru

By Packt

This video course teaches you how to secure Java framework applications with Spring Security. With the help of interesting activities and examples, you'll learn about using the capabilities of Spring Boot for securing web applications and you'll also delve into the Test-Driven Development approach to understand the features of Spring Security.

Spring Security Core: Beginner to Guru
Delivered Online On Demand10 hours 48 minutes
£93.99