• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

399 Security courses in London

Assessing and Managing Cyber Security Risks for Essential Services Operators

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course will help participants grasp the idea of real-world risk management and how this relates to the cyber world. The VILT course will cover topics surrounding identifying cyber risks and vulnerabilities, guidance on applying administrative actions, and comprehensive solutions to ensure your organization is adequately secure and protected. The VILT course will guide participants on how to conduct a security risk assessment for their organization, and equip them with the skills to develop a risk compliance assessment plan as well as methods to develop risk management strategies which can improve their organization's security posture. The VILT course has at least a 30% hands-on approach through the use of Table Top Exercises. The VILT course will cover the following modules: Introduction to Risk Assessments (RA) Threat Actors and Their Motivations Threat and Risk Assessment Critical Controls Identification Maturity Assessment Treated Cyber Risk Profile Target Cyber Risk Profile and Strategy Target Audience The VILT course is intended for professionals responsible for organizational information and security system and those involved in operating and maintenance of critical information and IT network & sotware systems. Professionals who are designated as the Single Point of Accountability (SPoA) as well as system auditors will find this course useful. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 3 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). This VILT course is delivered in partnership with ENGIE Laborelec. Trainer Your expert course leader is a is specialized in cybersecurity risk management. Before joining ENGIE, she worked for The National Cybersecurity Agency of France (ANSSI) based in Paris (France) and for Deloitte Belgium located in Zaventem (Belgium). She has been involved in cybersecurity projects focusing on the principle of protecting critical infrastructures. Her different experiences in Cyber Security, Anti-Money Laundering and Global Trade Compliance (including Export Control and Customs) gave her the opportunity to use methodologies tackling strategic, operational and financial control issues at all levels of an organization: people, business processes, IT applications and infrastructure, legal and regulatory compliance. She was an EBIOS Risk Manager (RM) trainer while she worked for the French government; EBIOS RM is the French method for assessing and treating digital risks. She also had the opportunity to represent France towards European institutions and other relevant stakeholders for topics related to cybersecurity risk management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Assessing and Managing Cyber Security Risks for Essential Services Operators
Delivered in Internationally or OnlineFlexible Dates
£1,324 to £2,499

SIA CCTV Course London

By London Construction College

Take The SIA CCTV Course This Will Take You 3 Days To Complete. Enroll Now On To The Course! What is the SIA CCTV Course? If you are employed as a CCTV operator or provide services under a contract that involves monitoring the activities of the public in either public or private spaces using closed circuit television (CCTV) equipment, you are required to complete the SIA CCTV Course. Course Overview: 3 Days Course | Timing | 09:00 – 18:30  Why Choose A Career In CCTV? Before delving into the specifics of the SIA CCTV course, let’s explore some compelling reasons why a career in CCTV can be a wise and fulfilling choice: Growing Demand The increasing need for security and surveillance has created a consistent demand for trained professionals in the CCTV industry, providing abundant job opportunities and career stability. Diverse Work Settings CCTV systems are now ubiquitous in various sectors, from retail stores and banks to public spaces and corporate offices. As a CCTV operator, you’ll have the chance to work in a wide range of settings. Crime Prevention and Public Safety CCTV operators play a crucial role in deterring criminal activities, ensuring public safety, and supplying vital evidence for investigations. Career Progression Starting as a CCTV operator can serve as a stepping stone to more advanced roles within the security sector. Launching Your Career In Surveillance And Security The SIA CCTV Course is a comprehensive training program designed for individuals interested in pursuing a career as a Closed-Circuit Television (CCTV) operator. This course is a fundamental requirement for those seeking to obtain the SIA CCTV License, which allows them to work in front-line roles related to surveillance and security. FAQ SIA CCTV Course Who is this course for? This course is tailored for individuals seeking to obtain the SIA CCTV License, opening the doors to various front-line roles in security and surveillance. Upon successful completion, you’ll be eligible for positions such as: Corporate CCTV Controller Retail CCTV Controller Music or Sporting Event CCTV Security Officer Shopping Centre CCTV Controller Office Building CCTV Officer When will I receive my examination result? Our examination results will be made available online within 10-14 working days following your examination date. We will ensure you are promptly informed of their availability through SMS and email notifications. In the unlikely event of any result delays, we are committed to keeping you informed and updated throughout the process. How can I book and pay for the course? ou have the flexibility to book and securely pay for the course using your credit card or debit card, either online or over the phone. Additionally, we offer the convenience of bank transfers as a payment method. If you prefer to make your payment via bank transfer, please don’t hesitate to get in touch with us. Booking Your Course: Discover and book the nearest available course effortlessly using our course finder tool on our website. Alternatively, you can reach out to us directly by calling 0208 050 4108 to secure your spot in the course. We’re here to assist you throughout the booking process and answer any questions you may have. When will I receive my certificate? Typically, certificates are dispatched within 7 days after successful course completion. In case more than 14 days have elapsed without receiving your certificate, please get in touch with us. We will promptly verify your address and arrange for a replacement. Important Note: It’s essential to understand that you do not require your certificate to apply for the SIA License. Your course completion details are automatically forwarded to the SIA upon your successful course completion.

SIA CCTV Course London
Delivered In-PersonFlexible Dates
£250

SIA Door Supervisor Full & First Aid Training

5.0(15)

By SWBM ACADEMY

https://www.swbmacademy.co.uk/dsfullcoursepayment

SIA Door Supervisor Full & First Aid Training
Delivered In-PersonFlexible Dates
£259.99

Essential Lawful Intercept

5.0(3)

By Systems & Network Training

Lawful Intercept training course description Packet based networks require a different approach to Lawful Intercept (LI) than that used in circuit switched networks. This course focuses on what Lawful Interception and Data Retention (DR) means to communications service providers in the IP and NGN areas. The course assumes a basic knowledge of IP networking (i.e. DNS, TCP/UDP, IP, RTP) and the building of services on an IP platform (e.g. SIP, SDP, FTP, HTTP). The course first looks at the regulatory context for LI and DR and how this is translated to a practical architecture. What will you learn Recognise the legal and regulatory obligations to provide LI and DR. Identify the components of the handover architecture for each of LI and DR. Identify the preferred location of points of interception and points of retention in the IP network. Map intercepted material to handover protocols. Understand the data mapping defined in the available standards for both LI and DR. Lawful Intercept training course details Who will benefit: Technical and managerial staff needing to implement public networks. Prerequisites: TCP/IP Foundation Duration 1 day Lawful Intercept training course contents What is meant by LI and DR? Review of regulation: Data protection Directive; Data Retention Directive; RIPA. LI architectures Handover and Interception: ETSI standards ES 201 671 and TS 102 232. LI handover protocol IRI and CC handover; correlation; manual interfaces. DR architectures Handover of query results; points of retention. DR query command set Retrieval of retained records. Security concerns Operation privacy; target privacy; storage and transmission integrity. Implementation Identifying PoI and PoR for provided services. LI and DR wrap up Interaction with other services, storage obligations (volume, time, availability).

Essential Lawful Intercept
Delivered in Internationally or OnlineFlexible Dates
£1,397

ISM,ISPS,MLC Maritime Internal Auditor

By International Maritime Training

The course approaches the audit process in the context of international standards and therefore, it is equally suitable for sea-going and office-based staff and its benefits are as following: Individuals will have a good understanding of the ISM Code, its importance, and their role within it, including ISM, ISO and MLC auditing requirements Individuals will be actively involved in the ongoing evaluation and development of a Company Safety, Environmental and Quality Management System Providing the Company and its auditors with the ability to establish the effectiveness of a Company Management System ahead of external verification by Administrations or Port State Control Delivered by experts with International safety and security management, compliance and verification experience in an engaging interactive style with a variety of security and safety related scenario case study workshops exercises during the training course

ISM,ISPS,MLC Maritime Internal Auditor
Delivered Online & In-PersonFlexible Dates
£200

Designated Person Ashore (DPA), Company Security Officer (CSO), & Crew Management (CM)

By International Maritime Training

Certificate Details: 🌟 Designated Person Ashore (DPA): Bridge the gap between shipboard and shore-based operations, ensuring safety and compliance. 🌟 Company Security Officer (CSO): Secure vessels, crew, and cargo against threats with specialized security training. 🌟 Crew Management (CM): Efficiently manage maritime crews, enhancing operations and safety. Why Choose Our Combined Certificates? ✅ Comprehensive Expertise: Acquire a deep understanding of maritime safety, security, and crew management in one program. ✅ Industry-Recognized: Our training aligns with international regulations and industry best practices. ✅ Exceptional Value: Enjoy a discount for a limited time, making this offer unbeatable. Ready to Get Started? To seize this incredible opportunity and enroll at an unprecedented discount, please visit our website and fill out the registration form

Designated Person Ashore (DPA), Company Security Officer (CSO), & Crew Management (CM)
Delivered Online & In-PersonFlexible Dates
£500

Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

Cyber Safe
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£30

Securing Microsoft systems

5.0(3)

By Systems & Network Training

Microsoft security training course description A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. What will you learn Use Microsoft security tools. Secure Microsoft servers. Secure Microsoft desktops. Secure Microsoft networks. Microsoft security training course details Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. Duration 3 days Microsoft security training course contents Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. Active Directory Admin authority in AD, group policy, trust and authentication. Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. Summary Microsoft security response centre, security advisories.

Securing Microsoft systems
Delivered in Internationally or OnlineFlexible Dates
£3,497

Door Supervisor with Free First Aid

By BKS Training

SIA Door Supervisor Training with Free First Aid

Door Supervisor with Free First Aid
Delivered In-PersonFlexible Dates
£300

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997