• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

395 Security courses in Ewell

Principles and Practices of Cyber Security

5.0(10)

By GBA Corporate

Overview Cyber Security plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients understanding a complete, knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking including understanding the basics of Kali Operating System and its tools and techniques. It will also cover WiFi security, Website security, human factors, cyber forensics, and cyber security team management, including all other areas in relation to Cyber Security.

Principles and Practices of Cyber Security
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

The Ultimate Guide to Event Planning - 1 Day Workshop in Heathrow

By Mangates

Event Planning 1 Day Training in Heathrow

The Ultimate Guide to Event Planning - 1 Day Workshop in Heathrow
Delivered In-Person + more
£595 to £795

SIA Security Guard Course London

By London Construction College

Take The SIA CCTV Course This Will Take You 3 Days To Complete. Enroll Now On To The Course! What is the SIA Security Guard Course? The SIA Security Guard Course is a comprehensive 4-day training program meticulously designed to equip individuals with the essential knowledge and skills needed to obtain a security guard license in the UK. This course delves into a diverse array of subjects, encompassing the roles and responsibilities of security guards, honing customer service skills, effective conflict management, physical intervention awareness, emergency procedures, and much more. Practical training sessions are also integrated to enable participants to apply their learning in real-world scenarios. Course Overview: 4 Days Course | Course Fee: £250 Payment Structure: £70 deposit and £180 payment in the office What Are The Duties Of An SIA Security Guard? Providing a visible security presence Security guards are frequently tasked with patrolling an area or stationed at a specific location to discourage criminal activity and offer reassurance to the public. Responding to incidents The event of an incident, such as a fire or a security breach, security guards are required to respond promptly and efficiently to reduce harm and prevent additional damage. Conducting searches Security guards may need to conduct searches of people or vehicles entering premises to ensure that prohibited items are not brought in. Monitoring CCTV and alarms Security guards may have the responsibility of overseeing CCTV systems and alarm systems to identify and address potential security threats. Who Is The SIA Security Guard Course For? The SIA Security Guard Course is tailored for individuals aspiring to establish a career in the security industry within the UK. This comprehensive course caters to those who aim to work as security guards or in related roles within the private security sector, excluding door supervision. SIA Security Guard Course Content Do I Need First Aid To Renew My Security Guard Top Up Training? Obtaining an emergency first aid certificate is a mandatory requirement for renewing your Security Guard license. To renew your SIA security guard license, you must complete both the Emergency First Aid and the Security Guard Top-Up training, which can be accomplished in a single day. Please note that the SIA has introduced changes in the license renewal process for Security Guard and Door Supervisor Licenses, effective from the 1st of October. We offer a 1-Day SIA Security Guard Top-Up Training + First Aid course in Stratford, East London. This course is essential for renewing your security guard license and consists of half a day of training, concluding with multiple-choice exams. The results may take up to two weeks to be released. Unit 1: Principles Of Working In The Private Security Industry Acquire knowledge of the key characteristics and objectives of the Private Security Industry. Comprehend the application of relevant legislation to security operatives. Familiarize with arrest procedures pertinent to security operatives. Recognize the significance of adhering to safe work practices. Grasp the workplace fire procedures. Comprehend emergencies and the significance of emergency protocols. Learn effective communication skills as a security operative. Understand the importance of record-keeping in the role of a security operative. Recognize the aspects of handling terror threats and the role of a security operative in response to such threats. Learn how to ensure the safety of vulnerable individuals. Understand best practices for post-incident management. Unit 2: Principles Of Working As A Security Officer In The Private Security Industry Understand the roles and responsibilities of security officers. Understand the control of access and egress. Know the different types of electronic and physical protection systems in the security environment. Know how to minimize risk to personal safety at work. Understand drug-misuse legislation, issues, and procedures relevant to the role of a security officer. Know how to conduct effective search procedures. Understand how to patrol designated areas safely. Unit 3: Application Of Conflict Management In The Private Security Industry Understand the principles of conflict management appropriate to the role. Understand how to recognize, assess, and reduce risk in conflict situations. Understand the use of problem-solving techniques when resolving conflict. Be able to communicate to de-escalate conflict.

SIA Security Guard Course London
Delivered In-PersonFlexible Dates
£250

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects.

Cyber Secure Coder
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£350

Information Security Management Principle

5.0(10)

By GBA Corporate

Overview Objective Understand the requirement of Information Security Concepts and Definitions of Information Security Management Systems Deeply Analysing the policies, Standards and procedures How to deliver a balanced ISMS and following its security procedures Analysing the Information risk management Evaluating the organisational responsibilities Understanding the Information security controls Scrutinising Legal framework Techniques of Cryptographic models

Information Security Management Principle
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Definitive Kerberos for engineers

5.0(3)

By Systems & Network Training

Kerberos for engineers training course description This hands on course covers the details of Kerberos, from installation and administration through to how it all works including the protocols. What will you learn Describe what Kerberos is. Explain how Kerberos works. Install Kerberos. Configure Kerberos. Troubleshoot Kerberos. Kerberos for engineers training course details Who will benefit: Engineers interested in security. Prerequisites: TCP/IP foundation for engineers Duration 2 days Kerberos for engineers training course contents What is Kerberos? Single Sign On, The protocol, the standard, history, v4, v5, RFCs, Linux, Windows. Kerberos concepts and technology AAA, Authentication, Authorization, Accounting. Kerberos vs LDAP and directories. Privacy, integrity. Kerberos realms, principles, instances. Keys, salts, passwords. Key Distribution Centre, Authentication server, ticket granting server. Tickets. Installation and administration of Kerberos Installing Kerberos, creating realms, testing. DNS and Kerberos, Kerberos clients. Hands on Windows and Linux Kerberos. Kerberos protocols The Needham-Schroeder protocol, Kerberos v4. Authentication server, ticket granting server, Kerberos v5, encryption options, ticket options, other protocol features and extensions. Related protocols: GSSAPI, SPNEGO. Hands on Using Wireshark to 'see' Kerberos. Troubleshooting Kerberos Approach, debugging tools, errors and solutions. Hands on Kerberos troubleshooting. Kerberos security concerns Kerberos attacks, protocol security issues. Dictionary attacks, brute force attacks, replay attacks, MITM attacks, security solutions, protecting the KDC, firewalls, NAT and Kerberos. Hands on Kerberos logging. Software which uses Kerberos Kerberos logins, Kerberos and web based applications, Directory services. Advanced Kerberos issues Cross realm authentication, Windows issues, Windows and UNIX interoperability, Hands on Using a Windows DC for UNIX clients.

Definitive Kerberos for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

The Ultimate Guide to Event Planning - 1 Day Workshop in Bromley

By Mangates

Event Planning 1 Day Training in Bromley

The Ultimate Guide to Event Planning - 1 Day Workshop in Bromley
Delivered In-Person + more
£595 to £795

SIA Instructor Course London

By London Construction College

Take The SIA Instructor Course This Will Take You 7 Days To Complete. Enroll Now On To The Course! What is the SIA Instructor Course? SIA Instructor Course is a comprehensive training program designed to empower individuals with the knowledge and skills necessary to become certified instructors in the security industry. With a blend of classroom instruction and hands-on training, this program equips you to educate and guide aspiring security professionals in obtaining their SIA licenses. SIA Trainer Instructor Course LEVEL 3: SIA Trainer / Instructor Combined 7-Day Course – £1250 Embark on the SIA Trainer/Instructor course covering Security Guarding, Door Supervision, CCTV, and Conflict Management. This comprehensive 7-day program equips you to teach various SIA courses. The course is conducted weekly, concluding with a thorough examination. Combined Course Options SIA Combined AET + Conflict Management + Physical Intervention Level 3 – £1250 AET (Award in Education Training) + Conflict Management Delivery – £850 Conflict Management Delivery + Physical Intervention Delivery Level 3 – £950 SIA Instructor Course Road Map Becoming an SIA instructor is a rewarding career path that not only allows you to contribute to the growth and development of the security industry but also opens up new opportunities for personal and professional growth. Here are some compelling reasons to consider our SIA Instructor Course: 01 Make A Difference As an SIA instructor, you have the power to shape the future of security professionals. Your expertise and guidance will directly impact the knowledge and skills of individuals entering the security industry, ultimately enhancing the safety and security of our communities. 02 Professional Growth Becoming a certified SIA instructor is a mark of excellence in your career. It not only validates your expertise but also opens doors to a wide range of teaching and training opportunities in the security sector. 03 Rewarding Career Being an SIA instructor is not just a job; it’s a rewarding career where you get to see your students grow and succeed in the security industry. The satisfaction of knowing you’ve played a role in their success is immeasurable. Embark On A Fulfilling Career As An SIA-Certified Instructor Enrolling in our SIA Instructor Course is the first step toward a fulfilling career as an SIA-certified instructor. Whether you’re a seasoned security professional or just beginning your journey in the industry, this course equips you with the knowledge and skills needed to guide the next generation of security personnel. To enroll in our SIA Instructor Course or to obtain more information, please contact us at [Insert Contact Information]. We are committed to assisting you in your journey to become an SIA-certified instructor and contribute to the development of skilled security professionals. Why Choose SIA Instructor Course? Instructional Techniques You’ll learn effective instructional methods and techniques to deliver training content in a clear and engaging manner. Whether you’re teaching new security personnel or conducting refresher courses, you’ll have the tools to make learning effective and enjoyable. Adult Learning Principles Understanding how adults learn is crucial for effective teaching. Our course equips you with the principles of adult learning, enabling you to tailor your teaching to the needs of your students. Effective Communication Communication is at the heart of successful teaching. You’ll gain insight into effective communication strategies, ensuring that your students understand and retain the material you present. SIA Training Content As an SIA instructor, you’ll be responsible for delivering specific training content to prepare security personnel for their roles. Our course covers the core content required for SIA licensing, giving you a deep understanding of the subject matter.

SIA Instructor Course London
Delivered In-PersonFlexible Dates
£850 to £1,250