• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4701 Courses

Security Engineering on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for security engineers, security architects, and information security professionals. Overview Identify security benefits and responsibilities of using the AWS Cloud Build secure application infrastructures Protect applications and data from common security threats Perform and automate security checks Configure authentication and permissions for applications and resources Monitor AWS resources and respond to incidents Capture and process logs Create and configure automated and repeatable deployments with tools such as AMIs and AWS CloudFormation This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents. Prerequisites We recommend that attendees of this course have: Working knowledge of IT security practices and infrastructure concepts Familiarity with cloud computing concepts Completed AWS Security Essentials and Architecting on AWS courses 1 - Security on AWS Security in the AWS cloud AWS Shared Responsibility Model Incident response overview DevOps with Security Engineering 2 - Identifying Entry Points on AWS Identify the different ways to access the AWS platform Understanding IAM policies IAM Permissions Boundary IAM Access Analyzer Multi-factor authentication AWS CloudTrail 3 - Security Considerations: Web Application Environments Threats in a three-tier architecture Common threats: user access Common threats: data access AWS Trusted Advisor 4 - Application Security Amazon Machine Images Amazon Inspector AWS Systems Manager 5 - Data Security Data protection strategies Encryption on AWS Protecting data at rest with Amazon S3, Amazon RDS, Amazon DynamoDB Protecting archived data with Amazon S3 Glacier Amazon S3 Access Analyzer Amazon S3 Access Points 6 - Securing Network Communications Amazon VPC security considerations Amazon VPC Traffic Mirroring Responding to compromised instances Elastic Load Balancing AWS Certificate Manager 7 - Monitoring and Collecting Logs on AWS Amazon CloudWatch and CloudWatch Logs AWS Config Amazon Macie Amazon VPC Flow Logs Amazon S3 Server Access Logs ELB Access Logs 8 - Processing Logs on AWS Amazon Kinesis Amazon Athena 9 - Security Considerations: Hybrid Environments AWS Site-to-Site and Client VPN connections AWS Direct Connect AWS Transit Gateway 10 - Out-Of-Region Protection Amazon Route 53 AWS WAF Amazon CloudFront AWS Shield AWS Firewall Manager DDoS mitigation on AWS 11 - Security Considerations: Serverless Environments Amazon Cognito Amazon API Gateway AWS Lambda 12 - Threat Detection and Investigation Amazon GuardDuty AWS Security Hub Amazon Detective 13 - Secrets Management on AWS AWS KMS AWS CloudHSM AWS Secrets Manager 14 - Automation and Security by Design AWS CloudFormation AWS Service Catalog 15 - Account Management and Provisioning on AWS AWS Organizations AWS Control Tower AWS SSO AWS Directory Service

Security Engineering on AWS
Delivered OnlineFlexible Dates
£2,025

Security Management and Fraud Prevention Training

4.5(3)

By Studyhub UK

In an unpredictable world, the need for adept security and fraud prevention strategies is paramount. Our 'Security Management and Fraud Prevention Training' serves as a beacon of enlightenment, illuminating the intricate nuances of comprehensive security. Journey through a meticulously crafted curriculum, traversing the landscapes of organisational security, cyber resilience, and insightful risk analysis. Dive into the multifaceted domains of both physical and digital realms, and emerge equipped with strategies to fortify and safeguard businesses from looming threats. Learning Outcomes Understand the foundational principles and nuances of security management. Gain proficiency in organisational security measures and risk reduction methodologies. Develop expertise in implementing physical and information security protection. Grasp the intricacies of business resilience, crisis management, and cyber threat counteraction. Delve into the legal frameworks guiding security protocols and measures. Why choose this Security Management and Fraud Prevention Training? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Security Management and Fraud Prevention Training Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Security Management and Fraud Prevention Training for? Aspiring security consultants looking to solidify their expertise. Business owners keen to enhance their organisation's protection. IT professionals aiming to broaden their horizon into cyber security and fraud prevention. Management personnel responsible for crisis and resilience protocols. Law enthusiasts focusing on security regulations and compliance. Career path Security Consultant: £30,000 - £60,000 Risk Analyst: £35,000 - £70,000 Cyber Security Specialist: £40,000 - £80,000 Fraud Prevention Analyst: £28,000 - £55,000 Crisis Management Expert: £37,000 - £65,000 Compliance Officer: £32,000 - £68,000 Prerequisites This Security Management and Fraud Prevention Training does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Security Management and Fraud Prevention Training was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Security Management and Fraud Prevention Training Module 01: Introduction to Security Management 00:30:00 Module 02: Organisational Security Management 00:26:00 Module 03: Security Risk Analysis and Risk Reduction 00:23:00 Module 04: Physical and Information Security Protection 00:32:00 Module 05: Business Resilience and Crisis Management 00:17:00 Module 06: Cyber Security and Fraud Prevention 00:25:00 Module 07: Security Investigations and Threat Awareness 00:24:00 Module 08: Laws and Regulations 00:25:00 Mock Exam Mock Exam - Security Management and Fraud Prevention Training 00:20:00 Final Exam Final Exam - Security Management and Fraud Prevention Training 00:20:00

Security Management and Fraud Prevention Training
Delivered Online On Demand4 hours 2 minutes
£10.99

Computer Networks Security from Scratch to Advanced

4.5(3)

By Studyhub UK

In a world where our lives are increasingly online, network security is more important than ever. This Computer Network Security from Scratch to Advanced course will teach you everything you need to know about computer network security, from the basics of how networks work to the most advanced security technologies. In this course, you will learn about the ISO/OSI model and TCP/IP protocols, gaining a solid foundation in understanding how data is transmitted across networks. You will then explore wireless networks, learning about their vulnerabilities and how to secure them effectively.  Our expert instructors will guide you through the complex world of network security, covering essential concepts such as firewalls, intrusion detection and prevention systems, and incident handling. Overall, You will develop practical skills in securing computer networks.  By the end of this course, you will have the confidence and knowledge to safeguard networks against potential threats. This will make you an invaluable asset to any organisation. So don't miss out on this opportunity to enhance your coding prowess and become a master in computer network security. Enrol today and unlock a world of exciting possibilities! Learning Outcomes: Upon successful completion of the Computer Network Security course, you will be able to: Understand the fundamentals of computer networks and their components. Gain in-depth knowledge of the ISO/OSI model and TCP/IP protocols. Identify and mitigate security vulnerabilities in wireless networks. Implement effective network security measures, including firewalls and honeypots. Utilise intrusion detection and prevention systems to safeguard networks. Develop expertise in securing wireless networks against unauthorised access. Acquire skills in physical security and incident handling for network protection. Apply comprehensive network security strategies to ensure data integrity and confidentiality. Who is this course for? This Computer Network Security course is ideal for: IT professionals seeking to enhance their knowledge of network security. Students pursuing a career in cybersecurity or network administration. Software developers interested in understanding the intricacies of computer networks. Network engineers aiming to specialise in network security. Individuals responsible for maintaining the security of organisational networks. Career Path Our Computer Network Security course will prepare you for a range of careers, including: Network Security Analyst: £35,000 - £60,000 per year. Cybersecurity Specialist: £45,000 - £80,000 per year. Network Administrator: £30,000 - £50,000 per year. IT Security Consultant: £40,000 - £80,000 per year. Information Security Manager: £50,000 - £100,000 per year. Network Security Engineer: £40,000 - £70,000 per year. Certification After studying the course materials of the Computer Networks Security from Scratch to Advanced there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Prerequisites This Computer Networks Security from Scratch to Advanced does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Computer Networks Security from Scratch to Advanced was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Course Curriculum Introduction Introduction 00:10:00 Section 01: An Introduction to Computer Networks 1.1 Computer Network 00:11:00 1.2 Computer Network Topologies 00:11:00 1.3 Categories of Computer Network 00:10:00 1.4 Computer Network Devices 00:11:00 1.5 Transmission Media 00:09:00 Section 02: ISO/OSI Model 2.1 ISO/OSI Model 00:10:00 2.2 Application, Presentation, and Session Layers 00:12:00 2.3 Transport and Network Layers 00:11:00 2.4 Data Link and Physical Layers 00:09:00 2.5 ISO/OSI Model in Action 00:10:00 Section 03: TCP/IP Protocols 3.1 Introduction to Computer Networks Protocols 00:11:00 3.2 IP Protocol 00:13:00 3.3 TCP and UDP Protocols 00:12:00 3.4 Application Protocols 00:12:00 3.5 TCP/IP Characteristics and Tools 00:11:00 Section 04: Wireless Networks 4.1 Wireless Networks Benefits 00:09:00 4.2 Types of Wireless Networks 00:12:00 4.3 Wireless Networks Protocol (Wi-Fi) 00:07:00 4.4 Wireless Networks Devices 00:10:00 4.5 Wireless Networks Drawbacks 00:09:00 Section 05: Network Security 5.1 Security Goals 00:09:00 5.2 Securing the Network Design 00:10:00 5.3 TCP/IP Security and Tools 00:12:00 5.4 Port Scanning and Tools 00:11:00 5.5 Sniffing and Tools 00:10:00 Section 06: Firewalls and Honeypots 6.1 Reasons to Use Firewall 00:13:00 6.2 Firewalls Rules 00:11:00 6.3 Firewalls Filtering 00:09:00 6.4 Honeypots 00:07:00 6.5 Bypassing Firewalls 00:08:00 Section 07: Intrusion Detection and Prevention System 7.1 Intrusion Detection System: IDS 00:11:00 7.2 Network IDS: NIDS 00:06:00 7.3 NIDS Challenges 00:09:00 7.4 Snort as NIDS 00:08:00 7.5 Intrusion Prevention Systems: IPS 00:07:00 Section 08: Wireless Network Security 8.1 Wired Equivalent Privacy WEP Attacking 00:11:00 8.2 WPA and AES Protocols 00:09:00 8.3 Wireless Security Misconceptions 00:09:00 8.4 Wireless Attacks and Mitigation 00:09:00 8.5 Secure Network Design with Wireless 00:09:00 Section 09: Physical Security and Incident Handling 9.1 Physical Security Objectives 00:11:00 9.2 Physical Threats and Mitigation 00:11:00 9.3 Defense in Depth (DiD) 00:07:00 9.4 Incident 00:06:00 9.5 Incident Handling 00:14:00 Section 10: Network Security: Conclusion 10.1 Confidentiality, Integrity, and Availability (CIA) 00:06:00 10.2 Assets, Threats, and Vulnerabilities 00:04:00 10.3 Risks and Network Intrusion 00:06:00 10.4 Common Attacks 00:09:00 10.5 Security Recommendations 00:06:00 Assignment Assignment - Computer Networks Security from Scratch to Advanced 00:00:00

Computer Networks Security from Scratch to Advanced
Delivered Online On Demand8 hours 8 minutes
£10.99

Diploma in Cyber Security - CPD Certified

By Compliance Central

Are you looking to enhance your Cyber Security skills? If yes, then you have come to the right place. Our comprehensive course on Cyber Security will assist you in producing the best possible outcome by mastering the Cyber Security skills. The Cyber Security course is for those who want to be successful. In the Cyber Security course, you will learn the essential knowledge needed to become well versed in Cyber Security. Our Cyber Security course starts with the basics of Cyber Security and gradually progresses towards advanced topics. Therefore, each lesson of this Cyber Security course is intuitive and easy to understand. Why would you choose the Cyber Security course from Compliance Central: Lifetime access to Cyber Security course materials Full tutor support is available from Monday to Friday with the Cyber Security course Learn Cyber Security skills at your own pace from the comfort of your home Gain a complete understanding of Cyber Security course Accessible, informative Cyber Security learning modules designed by expert instructors Get 24/7 help or advice from our email and live chat teams with the Cyber Security bundle Study Cyber Security in your own time through your computer, tablet or mobile device. A 100% learning satisfaction guarantee with your Cyber Security Course Improve your chance of gaining in demand skills and better earning potential by completing the Cyber Security Cyber Security Curriculum Breakdown of the Cyber Security Course Module 01: Cyber Security and Fraud Prevention Module 02: Security Investigations and Threat Awareness Module 03: Laws and Regulations CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Cyber Security course helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in Cyber Security. It is also great for professionals who are already working in Cyber Security and want to get promoted at work. Requirements To enrol in this Cyber Security course, all you need is a basic understanding of the English Language and an internet connection. Career path The Cyber Security course will enhance your knowledge and improve your confidence in exploring opportunities in various sectors related to Cyber Security. Certificates CPD Accredited PDF Certificate Digital certificate - Included CPD Accredited PDF Certificate CPD Accredited Hard Copy Certificate Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Diploma in Cyber Security - CPD Certified
Delivered Online On Demand1 hour
£12

Cyber Security Advanced Diploma

3.0(2)

By Alpha Academy

Are you worried how to secure your data? Enrol the Cyber Security Advanced Diploma course and learn the practical techniques for securing your information. In recent time, cybersecurity becomes mandatory because of the risk of unauthorised use and criminal activity by the hackers. Throughout the Cyber Security Advanced Diploma course, you will learn to protect and secure your company's data through the proper use of internet security management along with the IT Security knowledge. The course teaches you the up to date procedures for securing your data. Course Highlights The price is for the whole course including final exam - no hidden fees Accredited Certificate upon successful completion at an additional cost Efficient exam system with instant results Track progress within own personal learning portal 24/7 customer support via live chat Cyber Security Advanced Diploma has been given CPD accreditation and is one of the best-selling courses available to students worldwide. This valuable course is suitable for anyone interested in working in this sector or who simply wants to learn more about the topic. If you're an individual looking to excel within this field then Cyber Security Advanced Diploma is for you. We've taken this comprehensive course and broken it down into several manageable modules which we believe will assist you to easily grasp each concept - from the fundamental to the most advanced aspects of the course. It really is a sure pathway to success. All our courses offer 12 months access and are designed to be studied at your own pace so you can take as much or as little time as you need to complete and gain the full CPD accredited qualification. And, there are no hidden fees or exam charges. We pride ourselves on having friendly and experienced instructors who provide full weekday support and are ready to help with any of your queries. So, if you need help, just drop them an email and await a speedy response. Furthermore, you can check the validity of your qualification and verify your certification on our website at anytime. So, why not improve your chances of gaining professional skills and better earning potential. Assessment and Certification At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at an additional cost of £19 for a PDF copy and £29 for an original print copy sent to you by post or for both £39. Career Path Not only does our CPD and CiQ accredited course look good on your CV, setting you apart from the competition, it can be used as a stepping stone to greater things. Further advance your learning, launch a new career or reinvigorate an existing one. On successful completion of this course, you have the potential to achieve an estimated salary of £30,000. The sky really is the limit. Course Curriculum Cyber Security Basics Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Internet Security Management Internet Security- The Truth About Identify Theft 01:00:00 Internet Security for Teens- What You Need to Do 01:00:00 Internet Security-Downloading Email Attachments 00:15:00 Internet Security- 5 Tips for Using Facebook 00:30:00 Internet Security- 8 Tips to Protect Yourself When Dating Online 00:30:00 Internet Security for Teens and Tweens- 10 Tips to Keep You Protected 00:15:00 Internet Security- Parental Control Software 00:30:00 Internet Security- Online Safety for Your Children 00:30:00 Cyber Bullying- Another Aspect of Breaking Internet Security 00:30:00 Tips to Ensure Internet Security 00:30:00 Internet Security- Downloading Music off the Internet 01:00:00 Internet Security- Protect Your Wireless Connection 00:30:00 Internet Security- How to Deal with Spyware 00:15:00 Internet Security- Protecting Yourself When You Shop Online 00:15:00 Internet Security- Make Sure Your Passwords Protect You 00:15:00 Make Sure Your Emails Are Safe: Tips for Internet Security 01:00:00 Internet Security- Why Should You Use a Firewall? 01:00:00 Internet security-Signs That Your Child's Safety Might Be Compromised 01:00:00 Internet Security- Safety When Using Public Computers 01:00:00 Internet Security- Storing Your Password on Your Computer 01:00:00 Internet Security-Using Social Utility Sites 00:30:00 IT Security Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 Recommended Reading Recommended Reading : Cyber Security Advanced Diploma 00:00:00 Mock Exam Mock Exam - Cyber Security Advanced Diploma 00:30:00 Final Exam Final Exam - Cyber Security Advanced Diploma 00:30:00

Cyber Security Advanced Diploma
Delivered Online On Demand
£10.99

JSEC - Junos Security

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audiences for this course are the following: • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview After successfully completing this course, you should be able to: Identify security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain SRX Series session management. Explain Junos ALG functions and when to use them. Describe policy logging on the SRX series device. Explain security policy scheduling. Describe application security theory. Explain application signature usage in AppID. Describe the AppTrack service. Describe the AppFW service. Describe the AppQoS service. Configure security policies using the AppSecure suite of services. Explain unified security policies. Describe IPS signatures. Configure an IPS policy using pre-defined templates. Describe how to update the IPS attack object database. Describe IPS rules and rule bases. Configure custom attack objects. Describe Junos Space and Security Director. Configure policy management using Security Director. Describe Security Director objects. Explain the different licensing options for Sky ATP List Sky ATP's features and benefits. Configure Sky ATP profiles and enroll an SRX Series device. Configure file scanning on Sky ATP. Configure Sky ATP to scan email Configure GeoIP on Sky ATP. Describe the JATP features and benefits List the JATP device options. Explain the JATP architecture. List 3rd party support options for JATP. Explain JATP SmartCore analytics processes. Describe Policy Enforcer configuration options. Describe Policy Enforcer integration with Sky ATP. Configure Policy Enforcer to block lateral malware movement. Explain Juniper Secure Analytics features and benefits. Describe JSA log collection. Describe JSA network flow collection. Describe the JSA Offense Management workspace. Explain the JSA Risk Manager features. Configure JSA to collect network and log collection. Explain the features of JIMS. Describe JIMS integration into the current AD network. Describe the Sky Enterprise service and how it can save resources. Explain the Sky Enterprise monitoring service. Explain the vSRX Series device benefits. Describe use cases for the vSRX. Explain the cSRX Series device benefits. Describe use cases for the cSRX. Describe SSL Proxy Concepts. Explain Forward and Reverse Proxy and the limitations of each. Configure both Forward and Reverse Proxy. This five-day course uses the Junos J-Web, CLI, Junos Space, and other user interfaces to introduce students to the concept of Juniper Connected Security. Chapter 1: Course Introduction Course Introduction Chapter 2: CLI Overview User Interface Options Command-Line Interface Initial Configuration Interface Configuration Lab 1: CLI Overview Chapter 3: Advanced Security Policy Session Management Junos ALGs Policy Scheduling Policy Logging Lab 2: Advanced Security Policy Chapter 4: Application Security Theory Application ID Application Signatures App Track App Firewall App QoS App QoE Chapter 5: Application Security Implementation AppTrack Implementation AppFW Implementation AppQos Implementation APBR Implementation Lab 3: Application Security Chapter 6: Intrusion Detection and Prevention IPS Overview IPS Policy Attack Objects IPS Configuration IPS Monitoring Lab 4: Implementing IPS Chapter 7: Security Director Overview Security Director Objects Security Director Policy Management Lab 5: Security Director Chapter 8: Sky ATP Implementation Architecture and Key Components Features and Benefits Configuration Compromised Hosts Command and Control File Scanning E-mail Scanning Geo IP Security Policy Integration Troubleshooting Lab 6: Sky ATP Implementation Chapter 9: Policy Enforcer Policy Enforcer Concepts Configuration Options Policy Enforcer Installation Lab 7: Policy Enforcer Chapter 10: JATP Overview Traffic Inspection Threat Detection Threat Analysis JATP Architecture Chapter 11: JATP Implementation Data Collectors Configure SmartCore Analytics Engine Log Ingestion Incident Management SRX Threat Prevention 3rd Party support for Threat Prevention Reporting Lab 8: JATP Chapter 12: Juniper Secure Analytics (JSA) JSA Overview Data Collection Log Analytics Threat Analytics Vulnerability Management Risk Management Lab 9: JSA Chapter 13: JIMS JIMS Overview JIMS Integration Lab 10: JIMS Chapter 14: vSRX and cSRX vSRX Overview vSRX Supported Features vSRX Use Cases cSRX Overview Lab 11: vSRX Installation Chapter 15: SSL Proxy SSL Proxy Overview SSL Concepts SSL Proxy Configurations Troubleshooting Lab 12: SSL Proxy Chapter 16: Cluster Concepts Chassis Cluster Concepts Chassis Cluster Operation Chapter 17: Chassis Cluster Implementation Chassis Cluster Configuration Chassis Cluster Advanced Options Lab 13: Chassis Cluster Implementation Chapter 18: Chassis Cluster Troubleshooting Chassis Cluster Case Studies Troubleshooting Examples Lab 14: Chassis Cluster Troubleshooting Additional course details: Nexus Humans JSEC - Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JSEC - Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JSEC - Junos Security
Delivered OnlineFlexible Dates
Price on Enquiry

IT Security for IT Professionals

4.3(43)

By John Academy

Explore the world of cybersecurity with our "IT Security for IT Professionals" course. Gain expertise in fundamental areas such as network security, cryptography, web security, and emerging trends. Equip yourself with the skills needed to protect against evolving cyber threats. Enroll now for a comprehensive journey into IT security and fortify your role as a vigilant IT professional.

IT Security for IT Professionals
Delivered Online On Demand
£23.99

Certified Information Systems Security Professional (CISSP)

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Certified Information Systems Security Professional (CISSP)
Delivered Online On Demand2 hours 12 minutes
£25

Cyber Security Training - Online Course

By i2Comply

Cyber Security Training - Online Course This online Cyber Security training course will help you to understand the potential impact of common cyber threats. It outlines safe behaviour on the Internet and also identifies what steps you can take to protect yourself and your organisation from cyber attacks. Almost everyone spends some portion of their day online. Criminals target mobile and desktop devices and networks for illegal gains in various ways. This criminal activity, cyber-crime , is constantly changing and growing. This online course keeps you up to date with the latest developments in personal cyber security. To stay safe online, you need to understand the main types of cyber-crime, how you can be targeted and what you can do to protect yourself. What is Cyber Security? Cyber security is the application of technologies, processes, and controls to protect computers and networks from potential cyber-attacks. It aims to reduce the risk of these attacks and protect against the unauthorised exploitation of computer systems. Sound knowledge and understanding of cyber security will help protect you against malicious attacks to access, change or delete sensitive data. Cyber security is used as a tool to prevent attacks that aim to disable or tamper with a computer system's operations. What are the learning outcomes for the Cyber Security course? At the end of the cyber security course, you will be able to: Recognise and understand the potential impact of common cyber threats. Outline safe behaviour on the Internet. Take steps to protect yourself and your organisation from cyber attacks. Introduction to Cyber Security The first topic introduces you to cyber security. It identifies who can be a target and who commits this type of crime. You will learn about how human behaviour creates risks and specific risks associated with the Internet of Things. Lastly, the topic explains how data protection laws affect you with respect to cyber-crime. Brute Force Attacks The second topic is about brute force attacks. You will also learn about secure passwords and how social media is used by hackers. Internet Cookies The third topic explains why cookies are important and what they do. It also identifies risks of allowing cookies and what you can do to minimise these risks. Social Engineering Attacks Topic 4 describes four kinds of social engineering - tailgating, phishing, baiting and chat-in-the-middle. You will also learn how to protect yourself from phishing attacks. Malware Topic 5 describes malware - viruses, worms, Trojans, logic bombs and ransomware. It also covers ways you can defend against malware attacks. Grayware Topic 6 explains how grayware works - For example, adware, keyloggers, bots and botnets - and how to reduce grayware on your device. Identity theft Finally, the topic explains how criminals steal identities and what they do with them. It also identifies the warning signs that indicate you may be a victim of identity theft and explains what to do if your identity is stolen.

Cyber Security Training - Online Course
Delivered Online On Demand
£15

Foundations of IT Security: Protecting Digital Assets

4.5(3)

By Studyhub UK

Dive deep into the realm of cyber safety with 'Foundations of IT Security: Protecting Digital Assets'. This curriculum ensures you grasp the essentials of IT defence, from understanding the rudiments to grasping advanced techniques. Chart your journey through crucial subjects such as network safety, OS safeguarding and the profound world of cryptography. In an era where digital threats loom large, this comprehensive programme equips you with the knowledge to defend the vast expanse of digital assets effectively. Learning Outcomes Understand the core principles of IT security and its significance. Develop insights into setting up and managing robust security policies and procedures. Master the intricacies of network, operating system, and web protection. Delve into the art of cryptography and familiarise with advanced encryption methods. Stay abreast with the latest and upcoming shifts in IT security paradigms. Why buy this Foundations of IT Security: Protecting Digital Assets? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Foundations of IT Security: Protecting Digital Assets for? Individuals keen on delving into the digital protection domain. IT professionals aiming to bolster their security knowledge. Entrepreneurs wishing to safeguard their digital assets. Technical enthusiasts curious about evolving IT security trends. Organisations aspiring to upgrade their digital defence mechanisms. Career path IT Security Analyst: £40,000 - £60,000 Network Security Specialist: £45,000 - £65,000 Cryptographer: £50,000 - £70,000 Web Security Administrator: £42,000 - £58,000 Wireless Security Consultant: £47,000 - £68,000 Digital Protection Strategist: £52,000 - £75,000 Prerequisites This Foundations of IT Security: Protecting Digital Assets does not require you to have any prior qualifications or experience. You can just enrol and start learning. This course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Module 1: Introduction to IT Security Introduction to IT Security 00:16:00 Module 2: Security Policies and Procedures Security Policies and Procedures 00:16:00 Module 3: Network Security Network Security 00:13:00 Module 4: Operating System Security Operating System Security 00:14:00 Module 5: Cryptography and Encryption Cryptography and Encryption 00:15:00 Module 6: Web Security Web Security 00:14:00 Module 7: Wireless Security Wireless Security 00:13:00 Module 8: Emerging Trends in IT Security Emerging Trends in IT Security 00:15:00

Foundations of IT Security: Protecting Digital Assets
Delivered Online On Demand1 hour 56 minutes
£10.99