• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4526 Security courses in Whickham delivered Online

NSE 5 Bundle

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for networking and security professionals involved in the day-to-day management of a FortiAnalyzer appliance and FortiGate security information. Overview Describe key features and concepts of FortiAnalyzer Deploy an appropriate architecture Manage ADOMs on both FortiAnalyzer and the devices that log to it Configure RAID Register supported devices Encrypt log transmission (SSL / IPSec) View & analyze current and historical logs (FortiView) Monitor events Apply disk quotas to log data from devices Backup, restore, and forward log data Use content archiving (summary and full) Understand the different stages of data processing, from receiving logs to compiling reports Understand SQL queries and datasets used by FortiAnalyzer reports Design datasets, charts, and custom reports Generate reports by schedule or on demand In this 3-day NSE 5 Bundle, you will learn the fundamentals of using FortiManager and FortiAnalyzer for centralized network administration of many FortiGate devices. In this 3-day NSE 5 Bundle, you will learn the fundamentals of using FortiManager and FortiAnalyzer for centralized network administration of many FortiGate devices. Additional course details: Nexus Humans NSE 5 Bundle training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the NSE 5 Bundle course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

NSE 5 Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

Bodyguard Training

4.9(27)

By Apex Learning

Overview This comprehensive course on Bodyguard Training will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Bodyguard Training comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Bodyguard Training. It is available to all students, of all academic backgrounds. Requirements Our Bodyguard Training is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 18 sections • 18 lectures • 08:33:00 total length •Introduction to Bodyguard Training: 00:31:00 •Personal Security: 00:19:00 •Laws and Legislation: 00:25:00 •Threat Assessment and Risk Management: 00:34:00 •Operational Planning: 00:25:00 •Behavioural Intelligence: 00:17:00 •Anti-Ambush Drills: 00:41:00 •Searching Techniques: 00:35:00 •On Foot Protection: 00:48:00 •Physical Intervention: 00:24:00 •Vehicle Escort Procedures: 00:34:00 •Route Reconnaissance: 00:27:00 •Surveillance and Basic Anti Surveillance Techniques: 00:44:00 •Firearms and Explosive Handling: 00:28:00 •Protectee Variations: 00:18:00 •Medical Emergency Assistance: 00:40:00 •How COVID-19 Affected Close Protection Services: 00:23:00 •Assignment - Bodyguard Training: 00:00:00

Bodyguard Training
Delivered Online On Demand8 hours 33 minutes
£12

Amazon VPC Mastery for AWS Certifications

By Packt

Learning AWS VPC would be your stepping stone into an AWS career. A good understanding of VPC and its components is a MUST going into any AWS certification. Get started with Amazon VPC and prepare for certification with the help of this comprehensive course. There are no prerequisite requirements for this course.

Amazon VPC Mastery for AWS Certifications
Delivered Online On Demand5 hours 11 minutes
£41.99

ICA Professional Postgraduate Diploma in Financial Crime Compliance (FCC)

By International Compliance Association

ICA Professional Postgraduate Diploma in Financial Crime Compliance (FCC) Course This leadership programme has been designed to sharpen the strategic skills of senior practitioners and those aspiring to hold the highest anti-money laundering/financial crime position within a firm. This expert qualification offers: Specialist knowledge - the highest level in the field Strategic thinking - helps your leadership ambitions Innovation - explores new ideas, best practice, and future developments from a global perspective Fellowship of ICA - become automatically eligible for the highest grade of membership Networking - grow with other like-minded, senior professionals. With a focus on anti-money laundering, managing fraud and anti-bribery, and corruption, this qualification has helped hundreds of senior financial crime compliance professionals from all over the world unlock career growth opportunities. This course is awarded in association with Alliance Manchester Business School, the University of Manchester. How will the course be delivered This course is delivered online with materials delivered for you to study in your own time and at your own pace. There will be eight 3-hour virtual masterclasses over four weekends and seven live virtual classrooms spread over the duration of the course. Upon successful completion of the course, course materials and assessment, you will be awarded the ICA Professional Postgraduate Diploma in Financial Crime Compliance (FCC). This qualification is awarded in association with Alliance Manchester Business School, the University of Manchester. Assessment This course will be assessed via: The production of 8 x 1000-1500 word masterclass commentaries: these are summaries of the key learning points outlined in the masterclasses and its impact on your own practice, which forms the reflective journal. A three hour competency-based interview, using information describing your career to date and other evidence you wish to submit to map your knowledge, skills and experience against the National Occupational Standards The syllabus covers a variety of key issues relevant at a senior level and is designed to provide an insight into risks and potential hurdles faced by your organisation. The syllabus is delivered by an exclusive series of high-profile masterclasses covering relevant topics. Standards, research and assessment Financial crime risks: science or art? Ethics, corporate governance & responsibility Managing the internal AML enemy Cyber security: threats to the organisation FinTech and financial crime compliance Fraud and internal threat Risk based approach: too busy or too afraid Sanctions: a changing landscape.

ICA Professional Postgraduate Diploma in Financial Crime Compliance (FCC)
Delivered Online On Demand12 months
£8,000

Diploma in Information Technology

4.3(43)

By John Academy

Description: Our Diploma in Information Technology establishes frameworks in figuring, computer equipment and engineering, web and multimedia technologies, operating frameworks and database advances. It is delivered as a hands-on practical experience and learning course with different computer technologies, in both individual and community oriented modes. It likewise gives appropriate section focuses on working in the IT business or entry into the second year of a relevant Bachelor course. In this course you will learn the necessary skills, knowledge and information about Information Technology.  Who is this course for? This course would be ideal for people who want be ideal for people who want to work in IT business. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career path: The Diploma In Information Technology course will be very beneficial and helpful, especially to the following professionals: Software Specialists Project Managers Technopreneurs IT Consultants IT Analyst Software Developer System and Network Administrator Technical Support Engineer Cloud Operation Engineer. Computer Fundamentals Basic Computer Terms 00:15:00 Advanced Terms 00:15:00 Networking Basics 00:15:00 Basic Internet Concepts 00:30:00 Internet Security 00:30:00 Computers in the Workplace 00:15:00 Tele-Commuting 00:15:00 The Electronic World 00:15:00 Ergonomics 00:15:00 Safety and the Environment 00:15:00 Being Proactive 00:15:00 Identifying Yourself 00:15:00 Protecting your Data 00:15:00 Understanding Malware 00:15:00 Protecting Against Malware 00:15:00 Computer Maintenance Introduction 00:15:00 Understanding The Components Of A PC 01:30:00 Do You Need To Upgrade Your PC? 01:00:00 Essential Softwares You Must Have On Your PC 01:00:00 Installing And Organizing Your PC 01:00:00 Troubleshooting Guidelines 01:00:00 How To Speak To A Technician 00:30:00 Summary 00:30:00 Computer Programming COMPUTER PROGRAMMING 101 01:00:00 WHAT IS COMPUTER PROGRAMMING AND WHY SHOULD I CARE? 00:30:00 What a Programmer Does 01:00:00 SOFTWARE LESSONS FOR BEGINNERS 01:00:00 Other Places to Find Computer Instruction 00:30:00 Comprehensive Computer Training for the Beginner 01:00:00 A Course in Computer Literacy 01:00:00 COMPUTER PROGRAMMING AT A GLANCE 01:00:00 UNDERSTANDING THE LANGUAGE OF THE COMPUTER 00:30:00 Computer Program Definitions 00:30:00 Choosing a Language 00:30:00 Computer Programming 01:00:00 Employment Outlook 00:15:00 How to Find A Great Job After Graduation 01:00:00 Computer Networking Basics Introduction to Computer Networking 00:30:00 Types of Computer Networks 01:00:00 Types of Network Equipment 00:30:00 Ethernet 00:30:00 Wireless Local Area Networking 01:00:00 Internet Service 01:00:00 TCP/IP and Other Internet Protocols 01:00:00 Network Routing, Switching and Bridging 01:00:00 IT Communication Basics of Computer Networking 00:30:00 Computer Networking Design and Solutions 00:30:00 Getting the Right Computer Network Hardware 00:30:00 Setting Up Your Computer Network 00:30:00 Wireless vs Wired 00:30:00 Cable Management for Wired Computer Network 01:00:00 Managing Your Network With Network Monitoring Tools 00:30:00 Computer Network Maintenance and Repair 00:30:00 Troubleshooting Computer Network Wrapping Up 01:00:00 Internet Security Internet Security- The Truth About Identify Theft 01:00:00 Internet Security for Teens- What You Need to Do 01:00:00 Internet Security-Downloading Email Attachments 00:15:00 Internet Security- 5 Tips for Using Facebook 00:30:00 Internet Security- 8 Tips to Protect Yourself When Dating Online 00:30:00 Internet Security for Teens and Tweens- 10 Tips to Keep You Protected 00:15:00 Internet Security- Parental Control Software 00:30:00 Internet Security- Online Safety for Your Children 00:30:00 Cyber Bullying- Another Aspect of Breaking Internet Security 00:30:00 Tips to Ensure Internet Security 00:30:00 Internet Security- Downloading Music off the Internet 01:00:00 Internet Security- Protect Your Wireless Connection 00:30:00 Internet Security- How to Deal with Spyware 00:15:00 Internet Security- Protecting Yourself When You Shop Online 00:15:00 Internet Security- Make Sure Your Passwords Protect You 00:15:00 Make Sure Your Emails Are Safe: Tips for Internet Security 01:00:00 Internet Security- Why Should You Use a Firewall? 01:00:00 Internet security-Signs That Your Child's Safety Might Be Compromised 01:00:00 Internet Security- Safety When Using Public Computers 01:00:00 Internet Security- Storing Your Password on Your Computer 01:00:00 Internet Security-Using Social Utility Sites 00:30:00 Recommended Reading Recommended Reading: Diploma in Information Technology 00:00:00 Mock Exam Mock Exam- Diploma In Information Technology 00:30:00 Final Exam Final Exam- Diploma In Information Technology 00:30:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Diploma in Information Technology
Delivered Online On Demand48 hours
£25

VMware Carbon Black Cloud Endpoint Standard

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Endpoint Standard Identify the architecture and data flows for Carbon Black Cloud Endpoint Standard communication Perform searches across endpoint data to discover suspicious behavior Manage the Carbon Black Cloud Endpoint Standard rules based on organizational requirements Configure rules to address common threats Evaluate the impact of rules on endpoints Process and respond to alerts Describe the different response capabilities available from VMware Carbon Black CloudTM This course teaches you how to use the VMware Carbon Black Cloud Endpoint? Standard product and leverage the capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Searching Data Creating searches Analyzing events Search operators Advanced queries Policy Components Rules Local scanner Sensor capabilities Prevention Capabilities Using Rules Rule types Rule creation Reputation priority Configuring rules Evaluating rule impact Processing Alerts Alert triage Alert actions Response Capabilities Using quarantine Using live response Hash banning

VMware Carbon Black Cloud Endpoint Standard
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Network Security Operations Workload Application Administrators Security Operations Field Engineers Network Engineers Systems Engineers Technical Solutions Architects Cisco Integrators and Partners Overview After taking this course, you should be able to: Define the Cisco telemetry and analytics approach. Explore common scenarios that Cisco Tetration Analytics can solve. Describe how the Cisco Tetration Analytics platform collects telemetry and other context information. Discuss how relative agents are installed and configured. Explore the operational aspects of the Cisco Tetration Analytics platform. Describe the Cisco Tetration Analytics support for application visibility or application insight based on the Application Dependency Mapping (ADM) feature. List the concepts of the intent-based declarative network management automation model. Describe the Cisco Tetration policy enforcement pipeline, components, functions, and implementation of application policy. Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data. Describe Cisco Tetration Analytics platform use cases in the modern heterogeneous, multicloud data center. List the options for the Cisco Tetration Analytics platform enhancements. Explain how to perform the Cisco Tetration Analytics administration. This course teaches how to deploy, use, and operate Cisco© Tetration Analytics? platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. You will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. Exploring Cisco Tetration Data Center Challenges Define and Position Cisco Tetration Cisco Tetration Features Cisco Tetration Architecture Cisco Tetration Deployment Models Cisco Tetration GUI Overview Implementing and Operating Cisco Tetration Explore Data Collection Install the Software Agent Install the Hardware Agent Import Context Data Describe Cisco Tetration Operational Concepts Examining Cisco Tetration ADM and Application Insight Describe Cisco Tetration Application Insight Perform ADM Interpret ADM Results Application Visibility Examining Cisco Tetration Intent-Based Networking Describe Intent-Based Policy Examine Policy Features Implement Policies Enforcing Tetration Policy Pipeline and Compliance Examine Policy Enforcement Implement Application Policy Examine Policy Compliance Verification and Simulation Examining Tetration Security Use Cases Examine Workload Security Attack Prevention Attack Detection Attack Remediation Examining IT Operations Use Cases Key Features and IT Operations Use Cases Performing Operations in Neighborhood App-based Use Cases Examining Platform Enhancement Use Cases Integrations and Advanced Features Third-party Integration Examples Explore Data Platform Capabilities Exploring Cisco Tetration Analytics Administration Examine User Authentication and Authorization Examine Cluster Management Configure Alerts and Syslog Additional course details: Nexus Humans Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Tetration Analytics v1.0 (DCITET)
Delivered OnlineFlexible Dates
Price on Enquiry

Level 7 Diploma in Criminal Intelligence Researcher - QLS Endorsed

By Kingston Open College

QLS Endorsed + CPD QS Accredited - Dual Certification | Instant Access | 24/7 Tutor Support | All-Inclusive Cost

Level 7 Diploma in Criminal Intelligence Researcher - QLS Endorsed
Delivered Online On Demand11 hours
£105

CompTIA CySA+ (CS0-002) Cyber Analyst

4.8(9)

By Skill Up

Are you looking for a career in cybersecurity? Take a leap in your IT career with our CompTIA CySA+ Cyber Analyst course - a trove of knowledge for conquering cybersecurity threats!

CompTIA CySA+ (CS0-002) Cyber Analyst
Delivered Online On Demand11 hours 47 minutes
£25

Jamf 200 Course

By Influential Training

The Jamf 200 course offers a core understanding of Jamf Pro. It also provides enterprise-level knowledge of macOS and iOS platforms. Rely on our expert trainers to help you pass the Jamf 200 certification first time. Topics: Introduction to the Jamf Pro server. Building and managing content (.pkg, .mpkg, and .dmg packages) for deployment to macOS devices. Enrolling macOS and iOS devices using automated MDM enrollment. Setup and configuration of macOS and iOS devices. Configuring the user environment (Configuration Profiles, .plist). Security for macOS and iOS devices. Purchasing and distributing App Store apps using Apple Business Manager or Apple School Manager. Scripting overview (Bash). Initial setup and refreshing/reimaging macOS and iOS devices. Ownership and permissions (POSIX, ACE/ACL) on macOS devices. Prerequisites: Abundant hands-on experience with macOS and iOS. What’s Included: Four days (9am-5pm each day) of lab-style interaction. Proctored certification exam during the afternoon of the fourth day. All hardware and software required for the course. Printed course materials. Jamf Certified Tech badge on your Jamf Nation profile (upon successfully completing the exam with a passing score). Free £100 Apple technical training credit

Jamf 200 Course
Delivered OnlineFlexible Dates
£1,900