• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4519 Security courses delivered Online

Diploma in Cyber Security Awareness Training - Level 4 (QLS Endorsed)

By Kingston Open College

QLS Endorsed + CPD QS Accredited - Dual Certification | Instant Access | 24/7 Tutor Support

Diploma in Cyber Security Awareness Training - Level 4 (QLS Endorsed)
Delivered Online On Demand3 hours
£15

CompTIA Security+ Certification - Complete Video Course

4.3(43)

By John Academy

Description: The CompTIA Security+ (SY0-401) certification course provides information about the corporate security which is recognised as one of the fastest-growing fields in IT. Every institution even small business invests in IT security to secure their confidential data. The course covers the security fundamentals including the information security cycle, information security controls, authentication methods, cryptography fundamentals, and security policy fundamentals. Throughout the course, you will learn the Security Threats and vulnerabilities, Managing data, Application and Host Security, and the system of implementing Networking Security, implementing access control, authentication and Account Management, and implementing Compliance and Operating Security. Finally, the course will teach you how to manage certificates, how to manage risk, how to troubleshoot and manage security incidents, and the proper Business Continuity and Disaster Recovery Planning. In short, the course helps you to acquire competency in network infrastructure, system security, organizational security and access control. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA Security+ Certification - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Security Fundamentals The Information Security Cycle FREE 00:37:00 Information Security Controls 00:35:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Identifying Security Threats and Vulnerabilities Social Engineering 00:31:00 Malware 00:25:00 Software-Based Threats 00:21:00 Based Threats 00:38:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Managing Data, Application, and Host Security Manage Data Security 00:47:00 Manage Application Security 00:56:00 Manage Device and Host Security 01:07:00 Manage Mobile Security 00:10:00 Implementing Network Security Configure Security Parameters on Network Devices and Technologies 00:49:00 Network Design Elements and Components 00:26:00 Implement Networking Protocols and Services 01:09:00 Apply Secure Network Administration Principles 00:12:00 Secure Wireless Traffic 00:31:00 Implementing Access Control, Authentication, and Account Management Access Control and Authentication Services 00:42:00 Implement Account Management Security Controls 00:33:00 Managing Certificates Install a CA Hierarchy 00:25:00 Enroll Certificates 00:13:00 Secure Network Traffic by Using Certificates 00:03:00 Renew Certificates 00:01:00 Back Up and Restore Certificates and Private Keys 00:05:00 Revoke Certificates 00:07:00 Implementing Compliance and Operational Security Physical Security 00:20:00 Legal Compliance 00:10:00 Security Awareness and Training 00:11:00 Integrate Systems and Data with Third Parties 00:08:00 Risk Management A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:04:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Troubleshooting and Managing Security Incidents Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:09:00 Business Continuity and Disaster Recovery Planning Business Continuity 00:17:00 Plan for Disaster Recovery 00:17:00 Execute DRPs and Procedures 00:13:00 Mock Exam Mock Exam- CompTIA Security+ Certification - Complete Video Course 00:20:00 Final Exam Final Exam- CompTIA Security+ Certification - Complete Video Course 00:20:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

CompTIA Security+ Certification - Complete Video Course
Delivered Online On Demand17 hours 26 minutes
£24

Advanced Diploma in Cyber Security at QLS Level 7

4.7(26)

By Academy for Health and Fitness

Are you concerned about the increasing threats to cyber security? Do you want to have a comprehensive understanding of cyber law and its application in the digital world? Our Cyber Security Training course is your answer! In this course, we dive deep into the world of cyber law, exploring everything from the fundamentals to the latest developments in the field. With a focus on theoretical knowledge and academic analysis, this course equips you with the tools you need to navigate the complex world of cyber security. You'll gain a comprehensive understanding of cyber law, cyber ethics, online gambling, cyber crime, cyber security, trust in cyberspace, computer threats, cyber terrorism, fraud, and jurisdiction. Our team of experienced educators will guide you through the course, ensuring that you gain a solid understanding of the key concepts and theories in cyber law. You'll engage with a range of resources, including academic texts, case studies, and online forums, allowing you to develop a nuanced understanding of the subject matter. Courses Are Included in this Cyber Security Training Bundle Course 01: Cyber Security Law at QLS Level 7 With our Cyber Security Law Training course, you'll be equipped with the knowledge you need to tackle the challenges of the digital world. So why wait? Enrol now and join the growing community of cyber law experts! This Advanced Diploma in Cyber Security Law at QLS Level 7 course is endorsed by The Quality Licence Scheme and accredited by CPD QS (with 180 CPD points) to make your skill development & career progression more accessible than ever! Learning Outcomes of Cyber Security Training: After completing the course, you can expect to: Understand the fundamentals of cyber law and its application in the digital world. Analyse cyber ethics and its relationship with online gambling. Evaluate cybercrime and its impact on cyber security and trust in cyberspace. Identify different computer threats and assess the risks posed by cybercriminals, organised crimes, hacktivists, and nation-states. Discuss the concept of cyberterrorism and the evolving threat of the deep web. Apply jurisdiction principles to cyber law cases. Why Prefer This Cyber Security Training Course? Opportunity to earn certificate a certificate endorsed by the Quality Licence Scheme & another accredited by CPD QS after completing the Cyber Security Law Training course Get a free student ID card with Cyber Security Get instant access to this Cyber Security course. Learn cyber security essentials from anywhere in the world Cyber Security course is affordable and simple to understand Cyber Security is entirely online, interactive lesson with voiceover audio Lifetime access to the Cyber Security course materials Cyber Security course comes with 24/7 tutor support ****Course Curriculum of Cyber Security Training**** Here is the curriculum breakdown of this Cyber Security Law Training- 01 Ethical Hacking 02 Professional Hacking 03 Penetration Testing I 04 Penetration Testing II 05 Web Application Security 06 Security Leadership 07 Security Sentinel 08 Vulnerability Assessment Assessment Process of Cyber Security Training You have to complete the assignment questions given at the end of the course and score a minimum of 60% to pass each exam.Our expert trainers will assess your assignment and give you feedback after you submit the assignment. After passing the Advanced Diploma in Cyber Security Law at QLS Level 7 course exam, you will be able to request a certificate at an additional cost that has been endorsed by the Quality Licence Scheme. CPD 180 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Cyber Security Training is ideal for: Professionals seeking to enhance their understanding of cyber law and its implications in the digital world. Law students and legal practitioners interested in exploring the field of cyber law. Business owners and managers are concerned about cyber security and privacy in their organisations. Anyone interested in gaining a comprehensive understanding of cyber law. Career path Cyber Security Training Cybersecurity Lawyer Information Security Manager Data Protection Officer Cybercrime Analyst Digital Forensic Analyst Risk Analyst Please note that these salary ranges are approximate and may vary depending on qualifications, experience, and other factors. Certificates Certificate of completion Digital certificate - £10 Advanced Diploma in Cyber Security Law at QLS Level 7 Hard copy certificate - £139 Show off Your New Skills with a Certificate of Completion After successfully completing the Advanced Diploma in Cyber Security Law at QLS Level 7, you can order an original hardcopy certificate of achievement endorsed by the Quality Licence Scheme. The certificate will be home-delivered, with a pricing scheme of - £139 inside the UK £10 (including postal fees) for International Delivery Certificate Accredited by CPD QS £29 for Printed Hard Copy Certificate inside the UK £39 for Printed Hard Copy Certificate outside the UK (International Delivery)

Advanced Diploma in Cyber Security at QLS Level 7
Delivered Online On Demand4 weeks
£12

AJSEC - Advanced Junos Security

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Juniper security components. Overview After successfully completing this course, you should be able to: Demonstrate understanding of concepts covered in the prerequisite Juniper Security courses. Describe the various forms of security supported by the Junos OS. Describe the Juniper Connected Security model. Describe Junos security handling at Layer 2 versus Layer 3. Implement next generation Layer 2 security features. Demonstrate understanding of Logical Systems (LSYS). Demonstrate understanding of Tenant Systems (TSYS). Implement virtual routing instances in a security setting. Describe and configure route sharing between routing instances using logical tunnel interfaces. Describe and discuss Juniper ATP and its function in the network. Describe and implement Juniper Connected Security with Policy Enforcer in a network. Describe firewall filters use on a security device. Implement firewall filters to route traffic. Explain how to troubleshoot zone problems. Describe the tools available to troubleshoot SRX Series devices. Describe and implement IPsec VPN in a hub-and-spoke model. Describe the PKI infrastructure. Implement certificates to build an ADVPN network. Describe using NAT, CoS and routing protocols over IPsec VPNs. Implement NAT and routing protocols over an IPsec VPN. Describe the logs and troubleshooting methodologies to fix IPsec VPNs. Implement working IPsec VPNs when given configuration that are broken. Describe Incident Reporting with Juniper ATP On-Prem device. Configure mitigation response to prevent spread of malware. Explain SecIntel uses and when to use them. Describe the systems that work with SecIntel. Describe and implement advanced NAT options on the SRX Series devices. Explain DNS doctoring and when to use it. Describe NAT troubleshooting logs and techniques. This four-day course, designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. Chapter 1: Course Introduction Course Introduction Chapter 2: Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 1: Implementing Layer 2 Security Chapter 3: Firewall Filters Using Firewall Filters to Troubleshoot Routing Instances Filter-Based Forwarding Lab 2: Implementing Firewall Filters Chapter 4: Troubleshooting Zones and Policies General Troubleshooting for Junos Devices Troubleshooting Tools Troubleshooting Zones and Policies Zone and Policy Case Studies Lab 3: Troubleshooting Zones and Policies Chapter 5: Hub-and-Spoke VPN Overview Configuration and Monitoring Lab 4: Implementing Hub-and-Spoke VPNs Chapter 6: Advanced NAT Configuring Persistent NAT Demonstrate DNS doctoring Configure IPv6 NAT operations Troubleshooting NAT Lab 5: Implementing Advanced NAT Features Chapter 7: Logical and Tenant Systems Overview Administrative Roles Differences Between LSYS and TSYS Configuring LSYS Configuring TSYS Lab 6: Implementing TSYS Chapter 8: PKI and ADVPNs PKI Overview PKI Configuration ADVPN Overview ADVPN Configuration and Monitoring Lab 7: Implementing ADVPNs Chapter 9: Advanced IPsec NAT with IPsec Class of Service with IPsec Best Practices Routing OSPF over VPNs Lab 8: Implementing Advanced IPsec Solutions Chapter 10: Troubleshooting IPsec IPsec Troubleshooting Overview Troubleshooting IKE Phase 1 and 2 IPsec Logging IPsec Case Studies Lab 9: Troubleshooting IPsec Chapter 11: Juniper Connected Security Security Models Enforcement on Every Network Device Chapter 12: SecIntel Security Feed Encrypted Traffic Analysis Use Cases for SecIntel Lab 10: Implementing SecIntel Chapter 13:Advanced Juniper ATP On-Prem Collectors Private Mode Incident Response Deployment Models Lab 11: Implementing Advanced ATP On-Prem Chapter 14: Automated Threat Mitigation Identify and Mitigate Malware Threats Automate Security Mitigation Lab 12: Identifying and Mitigation of Threats Additional course details: Nexus Humans AJSEC - Advanced Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJSEC - Advanced Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AJSEC - Advanced Junos Security
Delivered OnlineFlexible Dates
Price on Enquiry

WordPress Security Masterclass - Defeat Hackers and Malware

By Packt

The objective of this course is to teach you both basic and advanced techniques that you can apply to properly secure and harden your WordPress website against hackers and cybercriminals.

WordPress Security Masterclass - Defeat Hackers and Malware
Delivered Online On Demand3 hours 6 minutes
£93.99

The SIA Door Supervision course

5.0(43)

By Knight Training (UK) Ltd

Anyone who wishes to gain employment within the security industry, this is your course! Come to train with us at Knight Training and get your SIA Door Supervision course now! https://knight.training/products/sia-door-supervision-course

The SIA Door Supervision course
Delivered OnlineFlexible Dates
£329.99

Certified Information Security Manager (CISM) - Complete Video Course

4.3(43)

By John Academy

Description: The CISM certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. CISM is globally recognized as the leading credential for information security managers. This Certified Information Security Manager (CISM) - Complete Video Course is designed to provide you with the knowledge and proficiency to prepare for the globally recognized CISM certification exam. The CISM certification combines the achievement of passing a comprehensive exam with recognition of work, management and educational experience, providing you with greater credibility in the marketplace. This course will immerse you into the subject, with in-depth coverage of the information covering the four domains that make up the 'Body of Knowledge' for the CISM exam and will provide you the tools to build your technical skills to manage, design, oversee and assess an enterprise's information security. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Information Security Manager (CISM) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Information Security Manager (CISM) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Information Security Governance Information Security Governance Overview FREE 00:25:00 Effective Information Security Governance 00:24:00 Information Security Concepts and Technologies 00:20:00 Information Security Manager 00:09:00 Scope and Charter of Information Security Governance 00:10:00 Information Security Governance Metrics 00:23:00 Information Security Strategy Overview 00:02:00 Creating Information Security Strategy 00:36:00 Determining Current State Of Security 00:06:00 Information Security Strategy Development 00:10:00 Strategy Resources 00:40:00 Strategy Constraints 00:07:00 Action Plan to Implement Strategy 00:20:00 Information Risk Management Risk Management Overview 00:16:00 Good Information Security Risk Management 00:15:00 Information Security Risk Management Concepts 00:13:00 Implementing Risk Management 00:17:00 Risk Assessment 00:39:00 Controls Countermeasures 00:23:00 Recovery Time Objectives 00:18:00 Risk Monitoring and Communication 00:04:00 Information Security Program Development Development of Information Security Program 00:11:00 Information Security Program Objectives 00:09:00 Information Security Program Development Concepts 00:14:00 Scope and Charter of Information Security Program Development 00:22:00 Information Security Management Framework 00:16:00 Information Security Framework Components 00:12:00 Information Security Program Resources 01:04:00 Implementing an Information Security Program 00:27:00 Information Infrastructure and Architecture 00:14:00 Information Security Program 00:14:00 Security Program Services and Operational Activities 00:45:00 Information Security Incident Management Incident Management Overview 00:28:00 Incident Response Procedures 00:29:00 Incident Management Organization 00:19:00 Incident Management Resources 00:36:00 Incident Management Objectives 00:14:00 Incident Management Metrics and Indicators 00:17:00 Current State of Incident Response Capability 00:11:00 Developing an Incident Response Plan 00:32:00 BCP DRP 00:36:00 Testing Response and Recovery Plans 00:10:00 Executing the Plan 00:27:00 Mock Exam Mock Exam- Certified Information Security Manager (CISM) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Information Security Manager (CISM) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Information Security Manager (CISM) - Complete Video Course
Delivered Online On Demand15 hours 24 minutes
£24

Certified Security Leadership Officer (CSLO) - Complete Video Course

4.3(43)

By John Academy

Description: This Certified Security Leadership Officer (CSLO) - Complete Video Course covers everything you need to know about becoming a Certified Security Leadership Officer. In this course, you will learn about security management, risk management, encryption, information security - access control concepts, incident handling and evidence, operations security, and knowing network security. This course will help you to become a Certified Security Leadership Officer. It will give you an essential understanding of current security issues, best practices, and technology. You will be prepared to manage the security component of a business and its information technology security projects. A C)SLO will be able to better manage IT projects in a secure manner by possessing the essential, up-to-date knowledge and skills required to supervise the security component of any information technology project. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Security Leadership Officer (CSLO) - Complete Video Course is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Security Leadership Officer (CSLO) - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Security Management Security Management FREE 00:58:00 Risk Management Risk Management 00:35:00 Encryption Encryption 00:31:00 Information Security - Access Control Concepts Information Security - Access Control Concepts 00:31:00 Incident Handling and Evidence Incident Handling and Evidence 01:01:00 Operations Security Operations Security 00:48:00 Knowing Network Security Knowing Network Security 01:12:00 Mock Exam Mock Exam- Certified Security Leadership Officer (CSLO) - Complete Video Course 00:20:00 Final Exam Final Exam- Certified Security Leadership Officer (CSLO) - Complete Video Course 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Security Leadership Officer (CSLO) - Complete Video Course
Delivered Online On Demand6 hours 16 minutes
£23

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

By Packt

This course will help you qualify for the Microsoft SC 900 exam, and this certification is targeted at those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.

SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Delivered Online On Demand7 hours 7 minutes
£26.99

CISM Certification Domain 2: Information Risk Management Video Boot Camp 2019

By Packt

Get 7.5 hours of videos and downloadable lecture slides for Certified Information Security Manager (CISM) Domain 2

CISM Certification Domain 2: Information Risk Management Video Boot Camp 2019
Delivered Online On Demand7 hours 29 minutes
£137.99