• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

532 Courses

Security Officer Training Course

4.7(160)

By Janets

Learn how to establish and enforce security policies and procedures in the workplace with the Security Officer Training Course. This security risk management program is ideal for beginners who are new to this field. You will get a complete overview of the role and responsibilities of a security officer, and on completion, will be equipped with the skills and knowledge to kick-start your career. Throughout this security management course, you will explore the basic principles of security and the fundamental principles of security governance. You will also develop your understanding of the different types of crimes, prevention strategies and organisation security models. Learning Outcomes of The Security Officer Training Course:  Understand the basics of security management, planning and implementing Explore the fundamental principles of security governance and the accountability framework Expand your knowledge of the different types of crimes and crime prevention tactics Familiarise with the role and responsibilities of a security office Learn about the different types of organisational security models Get a detailed overview of security risk management and how to conduct a risk assessment Understand how to effectively manage and report cases of domestic and sexual violence in the workplace Explore prevention strategies for domestic and violent abuse Why choose this course Earn an e-certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full Tutor Support on Weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certification After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post.

Security Officer Training Course
Delivered Online On Demand4 hours 45 minutes
£5.99

Content Management System Training

4.7(160)

By Janets

Content Management System is now the most popular computer software that is used to create and modify digital contents. This course has been illustrated to educate you on how it functions. It discusses the fundamental aspects of CMS. Hit the course to enter into the digital world. Start learning Content Management System Training that will give you enough knowledge and skills to build your dream career. About this course This Content Management System Training helps to grow your skills faster through the power of relevant content and world-class tutors. In this industry-leading bite-sized course, you will learn up-to-date knowledge in the relevant field within a few hours and get certified immediately. The modules of this course are very easy to understand and all of the topics are split into different sections. You will easily grasp and use the knowledge gained from this course in your career and go one step ahead of your competitors. The course is designed to improve your employability and provide you with the tools you need to succeed. Enrol today and start learning your essential skills. Why choose this course Earn a digital Certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Get 24/7 help or advice from our email and live chat teams Get full tutor support on weekdays (Monday to Friday) Course Design The Content Management System Training is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Who Is This Course For:​ This Content Management System Training is ideal for those who want to be skilled in this field or who wish to learn a new skill to build their dream career. If you want to gain extensive knowledge, potential experience, and be an expert in the related field then this is a great course for you to grow your career. Requirements This course is for anyone who would like to learn Content Management System Training related skills to aid his/her career path. No formal entry prerequisites are required Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Course Content Module 1: Content Management Basics Module 2: Introduction to Content Management System (CMS) Module 3: Fundamentals of Content Management System Course Content Content Management Basics Module 1: Content Management Basics 00:18:00 Module 2: Introduction to Content Management System (CMS) 00:09:00 Module 3: Fundamentals of Content Management System 00:17:00 Order your Certificates & Transcripts Order your Certificates & Transcripts 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Content Management System Training
Delivered Online On Demand44 minutes
£5.99

Diploma in Security Management

By Compete High

Security management opens a lot of doors for your career. You may not have considered security management as a career choice but with the lucrative and flexible jobs you can find in it, it's definitely an option you should consider. Check out our course for more information.

Diploma in Security Management
Delivered Online On Demand8 hours
£5

PC Security Fundamentals

By Compete High

Overview With the ever-increasing demand for PC Security Fundamentals in personal & professional settings, this online training aims at educating, nurturing, and upskilling individuals to stay ahead of the curve - whatever their level of expertise in PC Security Fundamentals may be. Learning about PC Security Fundamentals or keeping up to date on it can be confusing at times, and maybe even daunting! But that's not the case with this course from Compete High. We understand the different requirements coming with a wide variety of demographics looking to get skilled in PC Security Fundamentals . That's why we've developed this online training in a way that caters to learners with different goals in mind. The course materials are prepared with consultation from the experts of this field and all the information on PC Security Fundamentals is kept up to date on a regular basis so that learners don't get left behind on the current trends/updates. The self-paced online learning methodology by compete high in this PC Security Fundamentals course helps you learn whenever or however you wish, keeping in mind the busy schedule or possible inconveniences that come with physical classes. The easy-to-grasp, bite-sized lessons are proven to be most effective in memorising and learning the lessons by heart. On top of that, you have the opportunity to receive a certificate after successfully completing the course! Instead of searching for hours, enrol right away on this PC Security Fundamentals course from Compete High and accelerate your career in the right path with expert-outlined lessons and a guarantee of success in the long run. Who is this course for? While we refrain from discouraging anyone wanting to do this PC Security Fundamentals course or impose any sort of restrictions on doing this online training, people meeting any of the following criteria will benefit the most from it: Anyone looking for the basics of PC Security Fundamentals , Jobseekers in the relevant domains, Anyone with a ground knowledge/intermediate expertise in PC Security Fundamentals , Anyone looking for a certificate of completion on doing an online training on this topic, Students of PC Security Fundamentals , or anyone with an academic knowledge gap to bridge, Anyone with a general interest/curiosity Career Path This PC Security Fundamentals course smoothens the way up your career ladder with all the relevant information, skills, and online certificate of achievements. After successfully completing the course, you can expect to move one significant step closer to achieving your professional goals - whether it's securing that job you desire, getting the promotion you deserve, or setting up that business of your dreams.  Course Curriculum Chapter 1_ Spam and Malware Chapter 1_ Spam and Malware 00:00 Chapter 2_ Phishing and Viruses Chapter 2_ Phishing and Viruses 00:00 Chapter 3_ Software Protection Chapter 3_ Software Protection 00:00

PC Security Fundamentals
Delivered Online On Demand3 hours
£4.99

Security and Risk Management

By Compete High

Overview With the ever-increasing demand for Security and Risk Management in personal & professional settings, this online training aims at educating, nurturing, and upskilling individuals to stay ahead of the curve - whatever their level of expertise in Security and Risk Management may be. Learning about Security and Risk Management or keeping up to date on it can be confusing at times, and maybe even daunting! But that's not the case with this course from Compete High. We understand the different requirements coming with a wide variety of demographics looking to get skilled in Security and Risk Management . That's why we've developed this online training in a way that caters to learners with different goals in mind. The course materials are prepared with consultation from the experts of this field and all the information on Security and Risk Management is kept up to date on a regular basis so that learners don't get left behind on the current trends/updates. The self-paced online learning methodology by compete high in this Security and Risk Management course helps you learn whenever or however you wish, keeping in mind the busy schedule or possible inconveniences that come with physical classes. The easy-to-grasp, bite-sized lessons are proven to be most effective in memorising and learning the lessons by heart. On top of that, you have the opportunity to receive a certificate after successfully completing the course! Instead of searching for hours, enrol right away on this Security and Risk Management course from Compete High and accelerate your career in the right path with expert-outlined lessons and a guarantee of success in the long run. Who is this course for? While we refrain from discouraging anyone wanting to do this Security and Risk Management course or impose any sort of restrictions on doing this online training, people meeting any of the following criteria will benefit the most from it: Anyone looking for the basics of Security and Risk Management , Jobseekers in the relevant domains, Anyone with a ground knowledge/intermediate expertise in Security and Risk Management , Anyone looking for a certificate of completion on doing an online training on this topic, Students of Security and Risk Management , or anyone with an academic knowledge gap to bridge, Anyone with a general interest/curiosity Career Path This Security and Risk Management course smoothens the way up your career ladder with all the relevant information, skills, and online certificate of achievements. After successfully completing the course, you can expect to move one significant step closer to achieving your professional goals - whether it's securing that job you desire, getting the promotion you deserve, or setting up that business of your dreams.  Course Curriculum Chapter 01 Introduction to Security Management Introduction to Security Management 00:00 Chapter 02 Security Risk Analysis and Risk Reduction Security Risk Analysis and Risk Reduction 00:00 Chapter 03 Managing Security Managing Security 00:00 Chapter 04 Physical Security Management Physical Security Management 00:00 Chapter 05 Information Security Management Information Security Management 00:00 Chapter 06 Cybersecurity Cybersecurity 00:00 Chapter 07 Organisational Security Management Organisational Security Management 00:00 Chapter 08 Home Security Management Home Security Management 00:00

Security and Risk Management
Delivered Online On Demand8 hours
£5

Compliance and Risk Management

By Compete High

Overview With the ever-increasing demand for Compliance and Risk Management in personal & professional settings, this online training aims at educating, nurturing, and upskilling individuals to stay ahead of the curve - whatever their level of expertise in Compliance and Risk Management may be. Learning about Compliance and Risk Management or keeping up to date on it can be confusing at times, and maybe even daunting! But that's not the case with this course from Compete High. We understand the different requirements coming with a wide variety of demographics looking to get skilled in Compliance and Risk Management . That's why we've developed this online training in a way that caters to learners with different goals in mind. The course materials are prepared with consultation from the experts of this field and all the information on Compliance and Risk Management is kept up to date on a regular basis so that learners don't get left behind on the current trends/updates. The self-paced online learning methodology by compete high in this Compliance and Risk Management course helps you learn whenever or however you wish, keeping in mind the busy schedule or possible inconveniences that come with physical classes. The easy-to-grasp, bite-sized lessons are proven to be most effective in memorising and learning the lessons by heart. On top of that, you have the opportunity to receive a certificate after successfully completing the course! Instead of searching for hours, enrol right away on this Compliance and Risk Management course from Compete High and accelerate your career in the right path with expert-outlined lessons and a guarantee of success in the long run. Who is this course for? While we refrain from discouraging anyone wanting to do this Compliance and Risk Management course or impose any sort of restrictions on doing this online training, people meeting any of the following criteria will benefit the most from it: Anyone looking for the basics of Compliance and Risk Management , Jobseekers in the relevant domains, Anyone with a ground knowledge/intermediate expertise in Compliance and Risk Management , Anyone looking for a certificate of completion on doing an online training on this topic, Students of Compliance and Risk Management , or anyone with an academic knowledge gap to bridge, Anyone with a general interest/curiosity Career Path This Compliance and Risk Management course smoothens the way up your career ladder with all the relevant information, skills, and online certificate of achievements. After successfully completing the course, you can expect to move one significant step closer to achieving your professional goals - whether it's securing that job you desire, getting the promotion you deserve, or setting up that business of your dreams.  Course Curriculum Module 1 Introduction to Compliance Introduction to Compliance 00:00 Module 2 Five Basic Elements of Compliance Five Basic Elements of Compliance 00:00 Module 3 Compliance Management System (CMS) Compliance Management System (CMS) 00:00 Module 4 Compliance Audit Compliance Audit 00:00 Module 5 Compliance and Ethics Compliance and Ethics 00:00 Module 6 Risk and Types of Risk Risk and Types of Risk 00:00 Module 7 Introduction to Risk Management Introduction to Risk Management 00:00 Module 8 Risk Management Process Risk Management Process 00:00

Compliance and Risk Management
Delivered Online On Demand8 hours
£5

Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Define the use and placement IDS/IPS components. Identify Snort features and requirements. Compile and install Snort. Define and use different modes of Snort. Install and utilize Snort supporting software. Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 is a 4-day course that shows you how to deploy Snort© in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You?ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more. The course qualifies for 32 Cisco Continuing Education credits (CE) towards recertification.This course will help you:Learning how to implement Snort, an open-source, rule-based, intrusion detection and prevention system. Gain leading-edge skills for high-demand responsibilities focused on security. Module 1: Detecting Intrusions with Snort 3.0 History of Snort IDS IPS IDS vs. IPS Examining Attack Vectors Application vs. Service Recognition Module 2: Sniffing the Network Protocol Analyzers Configuring Global Preferences Capture and Display Filters Capturing Packets Decrypting Secure Sockets Layer (SSL) Encrypted Packets Module 3: Architecting Nextgen Detection Snort 3.0 Design Modular Design Support Plug Holes with Plugins Process Packets Detect Interesting Traffic with Rules Output Data Module 4: Choosing a Snort Platform Provisioning and Placing Snort Installing Snort on Linux Module 5: Operating Snort 3.0 Start Snort Monitor the System for Intrusion Attempts Define Traffic to Monitor Log Intrusion Attempts Actions to Take When Snort Detects an Intrusion Attempt License Snort and Subscriptions Module 6: Examining Snort 3.0 Configuration Introducing Key Features Configure Sensors Lua Configuration Wizard Module 7: Managing Snort Pulled Pork Barnyard2 Elasticsearch, Logstash, and Kibana (ELK) Module 8: Analyzing Rule Syntax and Usage Anatomy of Snort Rules Understand Rule Headers Apply Rule Options Shared Object Rules Optimize Rules Analyze Statistics Module 9: Use Distributed Snort 3.0 Design a Distributed Snort System Sensor Placement Sensor Hardware Requirements Necessary Software Snort Configuration Monitor with Snort Module 10: Examining Lua Introduction to Lua Get Started with Lua

Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing an Integrated Threat Defense Solution (SECUR201) v1.2

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco Integrated Threat Defense solution in their network environment. Cisco integrators and partners Systems and network engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Understand the network security landscape and the Cisco Integrated Threat Defense (ITD) solutions Describe the key components of the ITD solution and their use in the network Configure the Cisco Identity Services Engine (ISE) for a baseline of operation in the ITD solution Configure the integration between the Cisco Stealthwatch and Cisco ISE platforms Configure the integration between the Cisco Firepower and ISE platforms Configure the integration between Cisco Firepower and Cisco Advanced Malware Protection (AMP) for Endpoints The Implementing an Integrated Threat Defense Solution (SECUR201) v1.2 course provides an analysis of the cybersecurity landscape with an emphasis on the importance of an integrated threat defense architecture. Through a combination of lessons and hands-on practice, you will learn to deploy and integrate Cisco©?s Integrated Threat Defense solutions which include: Cisco Identity Services Engine (ISE), Cisco Stealthwatch, Cisco Firepower NGFW, and Cisco AMP for Endpoints. This course provides you with the knowledge and skills to implement and integrate solution components with existing network services, integrate solution components with the pxGrid (Platform Exchange Grid) framework, integrate network and endpoint-based malware protection, and observation of security dataflow after the introduction of malware. Course Outline Integrated Threat Defense Introduction ITD Products Identity Services Engine Setup Integration of Stealthwatch with Identity Services Engine Integration of Firepower with Identity Services Engine Integration of Firepower with AMP for Endpoints Lab outline Connecting to the Lab Environment Integrating ISE and Active Directory Integrating ISE and Cisco Adaptive Security Appliance (ASA) Configuring pxGrid and Client Certificates Integrating Stealthwatch with Identity Services Engine Integrating Network Visibility Module (NVM) with AnyConnect Integrating Firepower with Identity Services Engine Integrating AMP for Endpoints with Firepower

Cisco Implementing an Integrated Threat Defense Solution (SECUR201) v1.2
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec ProxySG 6.6 Basic Administration (BCCPA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG. Overview Describe the major Secure Web Gateway functions of the ProxySG.License and configure a ProxySG.Deploy a ProxySG in either explicit or transparent mode.Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management.Use ProxySG access logs to generate reports. The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. Introduction to the Symantec ProxySG Secure Web Gateway Describe the functions of a proxy server Differentiate proxy servers from firewalls Describe the key features and benefits of the ProxySG List the various ProxySG models Access online Symantec community resources ProxySG Security Deployment Options Describe the three network deployment methods Describe the three possible roles of the ProxySG ProxySG Management Console Describe the relationship between the Management Console and the ProxySG CLI Describe the primary function of the major areas of the Management Console Use the Management Console to access on-box help and Symantec product documentation Traffic Interception Using Proxy Services Understand the functions of proxy services, listeners, and proxy types Describe the three most common proxy services Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG Explain the function of common global proxy service settings Hypertext Transfer Protocol Understand how a connection is initiated over the transport layer Identify the components of an HTTP URL Explain the two types of HTTP messages: request and response Identify common response codes Introduction to the Visual Policy Manager Describe the relationship among the VPM, CPL, and the Management Console Describe the default processing order for policy layers and rules Describe triggers and actions that can be used in writing policy Identify the types of objects that the VPM supports Describe some of the best practices to be followed when using the VPM to create policy Filtering Web Content Describe the main concepts of web filtering Describe the primary category databases Describe the category types available to policy Describe how WebFilter and WebPulse work together Using Threat Intelligence to Defend the Network Understand Intelligence Services as provided by the Global Intelligence Network Understand Geolocation and Threat Risk Levels and how they can be used in policy Ensuring Safe Downloads Describe how malware can be transmitted via HTTP Explain the methods, advantages, and disadvantages of file type detection Describe some of the considerations in deciding what content to block as possible malware sources Notifying User of Internet Usage Policies Explain the function and various components of built-in and custom exception pages Describe the function of Notify User objects Identify the types of pages that can be sent to users by using Notify User objects Describe splash pages and coaching pages using Notify User objects in the VPM Access Logging on the ProxySG Describe, at a high level, how the ProxySG performs access logging Describe the components of a ProxySG access log facility Identify default log facilities and log formats Describe common use cases for periodic and continuous uploading of access logs

Symantec ProxySG 6.6 Basic Administration (BCCPA)
Delivered OnlineFlexible Dates
Price on Enquiry

Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES) v2.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based intrusion detection systems (IDS) and intrusion prevention systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.0 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort Lab outline Connecting to the Lab Environment Introducing Snort Rule Development Basic Rule Syntax and Usage Advanced Rule Options OpenAppID Tuning Snort

Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES) v2.0
Delivered OnlineFlexible Dates
Price on Enquiry