• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4916 Security courses

CCSE Check Point Certified Security Expert

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance. Articulate how utilizing multiple traffic queues can make traffic handling more efficient. Discuss Site-to-Site VPN basics, deployment and communities. Describe how to analyze and interpret VPN tunnel traffic. Explain Link Selection and ISP Redundancy options. Explain tunnel management features. Discuss Check Point Remote Access solutions and how they differ from each other. Describe how client security can be provided by Remote Access . Explain authentication methods including machine authentication. Explain Multiple Entry Point (MEP). Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent

CCSE Check Point Certified Security Expert
Delivered OnlineFlexible Dates
Price on Enquiry

L 3: SIA Trainer (Combined) Course

5.0(2)

By Learn More Academy Ltd

Level 3 SIA Trainer Course is combined of Level 3 Award in Education and Training (former PTLLS) Course, Level 3: Conflict Management Course and Level 3 Award for Physical Intervention Trainers in the Private Security Industry Course. These courses are specifically designed for individuals wishing to become trainers for SIA compliant courses such as: SIA Door Supervision, Security Guarding, CCTV (Public space surveillance), Conflict Management, Vehicle Immobilisation etc courses.  ABOUT THIS COURSE: This course consists of following aspects: Introduction to Adult Learning Lesson planning Delivering a lesson Teaching adults Practical teaching sessions How to vary teaching techniques How to recognise and deal with potential problems Assessing how well pupils are learning Teaching equipment and aids Conflict management Physical Intervention COURSE DURATION: It has been designed to be completed by 6 days and assignment afterwards. COURSE ASSESSMENT: For AET / PTLLS, No formal examination is required for this course, but at the end of the course you need to submit portfolio. For level 3 Conflict Management Course; showcase 2 scenario based role in the class, end of the course you need to submit portfolio and they will get assessed. For Level 3 Award for Physical Intervention Trainers in the Private Security Industry Course; demonstrate the PI techniques, they will be recorded, short MCQ Test and end of the course you need to submit portfolio and they will get assessed. If you have a busy life style, you also can spread out this course in two weeks or more to meet your personal commitment. HOW MUCH THIS COURSE COST? Online Course: (AET Online) is £1100.00 (All inclusive no hidden charges). This includes AET Online course, 1 Day CM and 2 days PI training. After successful completion you will receive 3 certificates and PI Licence Agreement which is called PI Master Trainer Licence. Zoom course: (AET Zoom class) is £1150.00 (All inclusive no hidden charges). This includes 3 days AET Zoom course, 1 Day CM and 2 days PI training. After successful completion you will receive 3 certificates and PI Licence Agreement which is called PI Master Trainer Licence. Face to Face Class: (AET Face to Face) is £1200.00 (All inclusive no hidden charges). This includes 3 days AET Class, 1 Day CM and 2 days PI training. After successful completion you will receive 3 certificates and PI Licence Agreement which is called PI Master Trainer Licence.

L 3: SIA Trainer (Combined) Course
Delivered In-PersonFlexible Dates
£1,200

Cisco Implementing Cisco Unified Communications Security v1.0 (UCSEC)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Channel Partner/Reseller Customer Employee Overview To provide learners with the necessary knowledge and skills that are common in all Cisco Unified Communications Manager deployments and additionally, those that are required to fully implement a single site solution. Implementing Cisco Unified Communications Security (UCSEC) v1.0 is a new 5-day ILT class designed to provide students with the necessary knowledge and skills to implement security features in a Cisco Unified Communications environment. Cisco Unified Communications support several features and mechanisms to secure voice signaling and communications and to mitigate attacks against Cisco Unified Communications networks. The Implementing Cisco Unified Communications Security (UCSEC) v1.0 course introduces security mechanisms and describes different implementation scenarios that increase the security level of Cisco Unified Communications networks. Course Outline Course Overview Module 1 - Vulnerabilities of Cisco Unified Communications Networks and Security Fundamentals Module 2 - Network Infrastructure Security Module 3 - Cisco Unified Communications Manager and Endpoint Security Features Module 4 - Secure Cisco Unified Communications Integration and Features

Cisco Implementing Cisco Unified Communications Security v1.0 (UCSEC)
Delivered OnlineFlexible Dates
Price on Enquiry

NCSP Digital Business Risk Awareness Training

By IIL Europe Ltd

Accredited through APMG International, certified in the UK by the National Cyber Security Centre (NCSC) and listed as qualified cyber training by Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) in the USA, the NIST Cyber Security Professional (NCSP®) training program teaches individuals and organizations how to engineer, operationalize, and continually improve a NIST Cybersecurity Framework program. This introductory level, non-examinable NCSP® Digital Business Risk Awareness Certificate course takes learners on a journey to understand how the ever-changing cyber threat landscape impacts an organization's ability to secure the value of its digital business services. The course will allow participants to apply what they learn in a real-world environment.

NCSP Digital Business Risk Awareness Training
Delivered OnlineFlexible Dates
£200 to £695

Close Protection, Threat Mitigation & Security Management with Lifeguard Training

By Training Tale

Close Protection: Close Protection Do you want to become an authority in close protection and security guarding? We have created a special course just to help you gain a deeper grasp of Close Protection. The introduction of close protection as well as all of its ethical and legal ramifications have been thoroughly discussed in our Close Protection: Close Protection course. The Close Protection: Close Protection training will also teach you about awareness, personal security, surveillance, and reconnaissance for your Close Protection. Threat mitigation is also covered in this Close Protection course, which is beneficial for improving knowledge of the related subjects. Enrol In the Close Protection: Close Protection course, in order to acquire the fundamental abilities and information required to become proficient in Close Protection. Special Offers of this Close Protection Course This Close Protection: Close Protection Course includes a FREE PDF Certificate. Lifetime access to this Close Protection: Close Protection Course Instant access to this Close Protection: Close Protection Course Get FREE Tutor Support from Monday to Friday in this Close Protection: Close Protection Course Main Course: Close Protection Courses Included with this Close Protection Course Close Protection Course offers free Security Management Course. Close Protection Course offers free Criminology & Profiling Course. Close Protection Course offers free Lifeguard Training Course. [ Note: Free PDF certificate as soon as completing the Close Protection: Close Protection course] Close Protection: Close Protection Industry Experts Designed This Close Protection course into 14 detailed modules. Course Curriculum of Close Protection Course Module 01: Introduction to Close Protection Module 02: Personal Security and Awareness Module 03: Surveillance and Reconnaissance Module 04: Threat Mitigation Module 05. Operational Planning Module 06: Vehicle Operations Module 07: Firearms and Defensive Equipment Module 08: Physical Fitness and Self-Defense Module 09: Tactical Skills for Close Protection Module 10: Communication Skills for Close Protection Module 11: Public Relations and Etiquette Module 12: Close Protection Operations Module 13: Crisis Management Module 14: Legal and Ethical Considerations Assessment Method of Close Protection Course After completing each module of the Close Protection: Close Protection Course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification of Close Protection Course After completing the MCQ/Assignment assessment for this Close Protection: Close Protection course, you will be entitled to a Certificate of Completion from Training Tale. Who is this course for? Close Protection: Close Protection Aspiring professionals who wish to learn the information and acquaint themselves with the skill sets to pursue a career in close protection and security guard are assisted by the course. Requirements Close Protection: Close Protection Students who intend to enrol in this Close Protection: Close Protection course must meet the following requirements: Close Protection: Good command of the English language Close Protection: Must be vivacious and self-driven Close Protection: Basic computer knowledge Close Protection: A minimum of 16 years of age is required Career path Close Protection: Close Protection You are to launch your career or go on to the next stage of your profession after finishing this Close Protection course. Certificates Digital Certificate Digital certificate - Included

Close Protection, Threat Mitigation & Security Management with Lifeguard Training
Delivered Online On Demand15 hours
£12

Digital Forensics and Cyber Investigations Diploma - CPD Certified

4.5(3)

By Studyhub UK

24 Hour Flash Deal **25-in-1 Digital Forensics and Cyber Investigations Diploma Mega Bundle** Digital Forensics and Cyber Investigations Diploma Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Digital Forensics and Cyber Investigations Diploma package online with Studyhub through our online learning platform. The Digital Forensics and Cyber Investigations Diploma bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Digital Forensics and Cyber Investigations Diploma course provides complete 360-degree training on Digital Forensics and Cyber Investigations Diploma. You'll get not one, not two, not three, but twenty-five Digital Forensics and Cyber Investigations Diploma courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Digital Forensics and Cyber Investigations Diploma courses are yours for as long as you want them once you enrol in this course This Digital Forensics and Cyber Investigations Diploma Bundle consists the following career oriented courses: Course 01: Digital Forensic Science: Unraveling Cybercrime Mysteries Course Course 02: CompTIA CySA+ Cybersecurity Analyst Course Course 03: Cyber Security Incident Handling and Incident Response Course 04: Cyber Security Awareness Training Course 05: Web Application Penetration Testing Course 06: CEH: Learn Ethical Hacking From A-Z: Beginner To Expert Course 07: Computer Networks Security from Scratch to Advanced Course 08: CompTIA Network+ Certification (N10-007) Course 09: CompTIA Security+ Course 10: CompTIA Cloud+ (CV0-002) Course 11: Security Analyst Course 12: CompTIA PenTest+ (Ethical Hacking) course Course 13: Data Protection and Data Security (GDPR) Training Certification Course 14: GDPR Training Course 15: Cyber Security Law Course 16: Network Security and Risk Management Course 17: Forensic Engineering Investigator Course 18: SQL for Data Science, Data Analytics and Data Visualization Course 19: Data Analytics with Tableau Course 20: Data Science and Visualisation with Machine Learning Course 21: CompTIA ITF+ (FCO-U61) Course 22: Ransomware Uncovered Specialist Certificate Course 23: Digital Product Management Course 24: Computer Workstation Safety Training Course 25: Foundations of IT Security: Protecting Digital Assets The Digital Forensics and Cyber Investigations Diploma course has been prepared by focusing largely on Digital Forensics and Cyber Investigations Diploma career readiness. It has been designed by our Digital Forensics and Cyber Investigations Diploma specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Digital Forensics and Cyber Investigations Diploma Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Digital Forensics and Cyber Investigations Diploma bundle course has been created with twenty-five premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Digital Forensics and Cyber Investigations Diploma Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Digital Forensics and Cyber Investigations Diploma Elementary modules, allowing our students to grasp each lesson quickly. The Digital Forensics and Cyber Investigations Diploma course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. In this exclusive Digital Forensics and Cyber Investigations Diploma bundle, you really hit the jackpot. Here's what you get: Step by step Digital Forensics and Cyber Investigations Diploma lessons One to one assistance from Digital Forensics and Cyber Investigations Diplomaprofessionals if you need it Innovative exams to test your knowledge after the Digital Forensics and Cyber Investigations Diplomacourse 24/7 customer support should you encounter any hiccups Top-class learning portal Unlimited lifetime access to all twenty-five Digital Forensics and Cyber Investigations Diploma courses Digital Certificate, Transcript and student ID are all included in the price PDF certificate immediately after passing Original copies of your Digital Forensics and Cyber Investigations Diploma certificate and transcript on the next working day Easily learn the Digital Forensics and Cyber Investigations Diploma skills and knowledge you want from the comfort of your home CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Digital Forensics and Cyber Investigations Diploma training is suitable for - Students Recent graduates Job Seekers Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Digital Forensics and Cyber Investigations Diploma Requirements To participate in this Digital Forensics and Cyber Investigations Diploma course, all you need is - A smart device A secure internet connection And a keen interest in Digital Forensics and Cyber Investigations Diploma Career path You will be able to kickstart your Digital Forensics and Cyber Investigations Diploma career because this course includes various courses as a bonus. This Digital Forensics and Cyber Investigations Diploma is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Digital Forensics and Cyber Investigations Diploma career opportunities. Certificates CPD Accredited Certificate Digital certificate - Included CPD Accredited e-Certificate - Free CPD Accredited Hardcopy Certificate - Free Enrolment Letter - Free Student ID Card - Free

Digital Forensics and Cyber Investigations Diploma - CPD Certified
Delivered Online On Demand6 days
£279

CompTIA Server+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals such as PC, desktop, and help desk technicians who have experience supporting PC hardware who wish to make the transition to become server hardware and support specialists. This course is also designed for existing server managers who are preparing to take the CompTIA Server+ Exam SKO-005. Overview Upon successful completion of this course, you will be able to perform the duties of a server administrator. In this course, you will: - Manage server hardware. - Install server hardware and operating systems. - Configure networking hardware and protocols. - Perform basic server configuration tasks. - Create a virtual server environment. - Administer servers. - Implement server storage solutions. - Secure the server. - Plan and test disaster recovery. - Troubleshoot server issues. This course can also benefit you if you are preparing to take the CompTIA Server+ examination (Exam SK0-004). This course builds on existing professional experience with personal computer hardware support to present the next tier of skills & concepts students will use on the job when administering any type of network server. 1 - Outline Lesson 1: Understanding Server Administration Concepts Lesson 2: Understanding Virtualization and Cloud Computing Lesson 3: Understanding Physical and Network Security Concepts Lesson 4: Managing Physical Assets Lesson 5: Managing Server Hardware Lesson 6: Configuring Storage Management Lesson 7: Installing and Configuring an Operating System Lesson 8: Troubleshooting OS, Application, and Network Configurations Lesson 9: Managing Post-Installation Administrative Tasks Lesson 10: Managing Data Security Lesson 11: Managing Service and Data Availability Lesson 12: Decommissioning Servers Additional course details: Nexus Humans CompTIA Server Plus Certification (Exam SKO-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Server Plus Certification (Exam SKO-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Server+
Delivered OnlineFlexible Dates
£2,475

CompTIA Security+ SY0-601 Course

4.8(9)

By Skill Up

Are you interested in a career in cybersecurity? If so, the CompTIA Security+ SY0-601 Course is the perfect place to start!

CompTIA Security+ SY0-601 Course
Delivered Online On Demand10 hours 50 minutes
£25

GDPR with Security Management QLS Training

By Imperial Academy

Level 3 & 5 Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access

GDPR with Security Management QLS Training
Delivered Online On Demand
£199

Certified Information Systems Auditor (CISA)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - The Process of Auditing Information Systems ISACA Information Systems Auditing Standards and Guidelines Fundamental Business Processes Develop and Implement an Information Systems Audit Strategy Plan an Audit Conduct an Audit The Evidence Life Cycle Communicate Issues, Risks, and Audit Results Support the Implementation of Risk Management and Control Practices 2 - IT Governance and Management Evaluate the Effectiveness of IT Governance Evaluate the IT Organizational Structure and HR Management Evaluate the IT Strategy and Direction Evaluate IT Policies, Standards, and Procedures Evaluate the Effectiveness of Quality Management Systems Evaluate IT Management and Monitoring of Controls IT Resource Investment, Use, and Allocation Practices Evaluate IT Contracting Strategies and Policies Evaluate Risk Management Practices Performance Monitoring and Assurance Practices Evaluate the Organizations Business Continuity Plan 3 - Information Systems Acquisition, Development, and Implementation Evaluate the Business Case for Change Evaluate Project Management Frameworks and Governance Practices Development Life Cycle Management Perform Periodic Project Reviews Evaluate Control Mechanisms for Systems Evaluate Development and Testing Processes Evaluate Implementation Readiness Evaluate a System Migration Perform a Post-Implementation System Review 4 - Information Systems Operations, Maintenance, and Support Perform Periodic System Reviews Evaluate Service Level Management Practices Evaluate Third-Party Management Practices Evaluate Operations and End User Management Practices Evaluate the Maintenance Process Evaluate Data Administration Practices Evaluate the Use of Capacity and Performance Monitoring Methods Evaluate Change, Configuration, and Release Management Practices Evaluate Problem and Incident Management Practices Evaluate the Adequacy of Backup and Restore Provisions 5 - Protection of Information Assets Information Security Design Encryption Basics Evaluate the Functionality of the IT Infrastructure Evaluate Network Infrastructure Security Evaluate the Design, Implementation, and Monitoring of Logical Access Controls Risks and Controls of Virtualization Evaluate the Design, Implementation, and Monitoring of Data Classification Process Evaluate the Design, Implementation, and Monitoring of Physical Access Controls Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Certified Information Systems Auditor (CISA)
Delivered OnlineFlexible Dates
£3,250