• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4914 Courses

Cisco Introduction to Cisco IOS XR (IOSXR100)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Network operations center (NOC) operators System administrators System engineers Technical support personnel Channel partners, resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Cisco IOS XR general architecture Introduction to the Cisco IOS XR command line interface (CLI) Basic system configuration Tracing the switch fabric data path Monitoring the Cisco IOS XR system Working within the Cisco IOS XR configuration file system Interpreting Cisco IOS XR error messages and log file messages Creating system core dumps This 4-day course, Introduction to Cisco IOS© XR (IOSXR100), is an instructor led, lab-based, hands-on course, where you learn the fundamental concepts on which the operating system is based and Cisco IOS XR basic operations for configuration, software, file system configuration, and monitoring. Basic troubleshooting for how to troubleshoot problems relating to process failures, frozen processes, and high CPU and memory consumption is also covered. This course introduces you to the features and functions of the Cisco IOS XR Software operating system. Through a combination of lecture and hands-on lab exercises, you gain an understanding of all major aspects of the operating system, including the architecture, high-availability components, scalability features, configuration basics, switch fabric data path, basic software operations, configuration file overview, monitoring the Cisco IOS XR operating system, and working with error messages and core dumps. Module 1: Cisco IOS XR Software Overview Cisco IOS XR Architecture High Availability Scalability Module 2: Cisco IOS XR Configuration Basics Configuration Operations Initial Configuration Reviewing the Configuration Route Processor Redundancy Module 3: Switch Fabric Architecture Cisco IOS XR Architecture, High Availability, and Scalability Review Verifying the Fabric Data Path Module 4: Cisco IOS XR Software Operations Examining the Operation Basics Examining Configuration Operations Examining Configuration Rollback and Recovery Examining Process Management Module 5: Configuration File System Overview Configuration File System Module 6: Monitoring the Cisco IOS XR Operating System Cisco IOS XR Architecture System Monitoring Commands Module 7: Error Messages and Core Dumps System Error Messages Logging System Messages Cisco IOS XR Core Dumps

Cisco Introduction to Cisco IOS XR (IOSXR100)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Asset Management Professional (CAMP)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This is an entry level course, no experience necessary Overview In this course the student will learn IAITAM Best Practice Library's 12 Key Process Areas (KPAs) The roles and responsibilities that affect an ITAM program ITAM core functional areas KPA indicators ITAM strategic positioning How ITAM can be brought into other frameworks The Certified Asset Management Professional (CAMP) Course is designed to impart an extensive overview of IT Asset Management (ITAM) best practices and processes as well as ways to embrace multiple organizational frameworks such as ITAM & IT Service Management (ITSM). This course includes the comprehensive online examination necessary for achieving CAMP Certification. Course Outline The 12 IAITAM KPAs for ITAM ITAM Business Practices Find Savings Core Functional Areas Software Asset Management Hardware Asset Management ITAM Program Core Functional Components ITAM Roles and Responsibilities Program Management Acquisition Management Asset Identification Management Communication & Education Management Compliance Management Disposal Management Documentation Management Financial Management Legislation Management Policy Management Project Management Vendor Management Additional course details: Nexus Humans Certified Asset Management Professional (CAMP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Asset Management Professional (CAMP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Asset Management Professional (CAMP)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) v1.0

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is ideal for developers, engineers and others including: Cloud solution architects Cloud administrators Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview After taking this course, you should be able to: Describe what clouds are supported and how to configure clouds for Cost Optimizer Examine the Cost Optimizer snapshots of costs incurred by the various clouds installed for an organization This course, Mulitcloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) v1.0, teaches you how the reporting and analysis of consumption the cost optimizer provides, functions within a Cisco© CloudCenter Suite. The cost optimizer works together with two other primary mechanisms: a workload manager that helps users deploy applications and manage governance policies, and an action orchestrator that provides seamless integration and workflow automation. Through lessons and hands-on experiences, you will learn the functionality of the CloudCenter cost optimizer Implementing Cisco CloudCenter Suite Cost Optimizer Cisco CloudCenter Suite Cost Optimizer Examining Cost Optimizer Inventory, Reports, Rightsizing, and Troubleshooting Configure Cost and Inventory Reports in the User Interface Lab outline Create Users, User Roles, and Cloud Permissions Create Cost Group and Billing Unit Use Cisco CloudCenter Suite Cost Optimizer Representational State Transfer (REST) API Additional course details: Nexus Humans Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Multicloud Cost Optimization with Cisco CloudCenter Suite (CLDCO) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Automation for Cisco Service Provider Solutions v1.0 (SPAUI)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for Service Provider networking professionals in job roles such as: Network administrators Network architects Network designers Network engineers Network managers Network Operations Center (NOC) personnel Network supervisors Overview After taking this course, you should be able to: Use NETCONF and RESTCONF programmability protocols on Cisco devices Describe and use tools to validate YANG data models on Cisco devices Describe and configure model-driven telemetry on Cisco devices Describe and configure network traffic automation with Cisco XTC Describe and use network automation tools that utilize SSH Automate service provider network configuration with Cisco NSO Describe how to automate virtualized resources with Cisco ESC Describe how to automate service provider WAN with Cisco WAE This course prepares you to implement and support automation solutions in a Service Provider network infrastructure, using network programmability principles, protocols, tools, and mechanisms. Through a combination of lessons and hands-on labs, you will learn to deploy, configure, monitor, and operate Service Provider network environments using modern data models. These models allow you to represent operational data and new network management protocols in order to administer hundreds or thousands of devices in a single operation, replacing traditional, time-consuming, error prone, device-by-device Command Line Interface (CLI) management. The course also introduces powerful automation solutions that can streamline network operations. This course also prepares you for the CCNP-Service Provider concentration exam 300-535. Implementing Network Device Programmability Interfaces with NETCONF and RESTCONF Implement NETCONF Protocol Implement RESTCONF Protocol Implementing Model-Driven Programmability with YANG YANG Data Models YANG Tools YANG Development Kit Implementing Model-Driven Telemetry Implementing Model-Driven Telemetry with gRPC Implementing Model-Driven Telemetry with gNMI Automating Service Provider Network Traffic with Cisco XTC Cisco XTC Fundamentals Configure Cisco XTC Automating Networks with Tools That Utilize SSH Implement Device Configurations with Python Netmiko Library Implement Device Configurations with Ansible Playbooks Orchestrating Network Services with Cisco NSO Cisco NSO Fundamentals Cisco NSO Device Manager Cisco NSO Services Implement Device Configurations with Python Automating Virtualized Resources with Cisco Elastic Services Controller Cisco ESC Architecture Cisco ESC Resource Management Automating the WAN with Cisco WAE Describe the Cisco WAE Components Additional course details: Nexus Humans Cisco Implementing Automation for Cisco Service Provider Solutions v1.0 (SPAUI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Automation for Cisco Service Provider Solutions v1.0 (SPAUI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Automation for Cisco Service Provider Solutions v1.0 (SPAUI)
Delivered OnlineFlexible Dates
Price on Enquiry

Online Options

Show all 4524

International Security in a Changing World | Live Online Learning

By Gada Academy

Explore "International Security in a Changing World" through live online learning. Join expert-led sessions to understand global security dynamics, emerging threats, and strategic solutions in an interactive, real-time format. Enroll now to stay informed and engaged.

International Security in a Changing World | Live Online Learning
Delivered Online + more
€119 to €352

Global Power Shifts and China's Evolving Role in Africa | Live Online Learning

By Gada Academy

Explore China’s growing influence in Africa through this in-depth course. Weekly themes blend history, trends, and analysis to unpack the economic, political, and social layers of this evolving relationship. Gain a nuanced view of its impact on Africa’s global role

Global Power Shifts and China's Evolving Role in Africa | Live Online Learning
Delivered Online + more
€119 to €352

CONFLICT AND PEACEMAKING IN DIVIDED SOCIETIES | Live Online Learning | University-Level Course (Non-Credit)

By Gada Academy

Explore why people, groups, and states engage in conflict and why peace remains elusive. Dive into the causes of conflict, effective resolution strategies, and peacebuilding efforts worldwide. Learn how historical, cultural, and political factors shape disputes and discover insights into fostering lasting peace. #ConflictStudies #PeaceInitiatives #GlobalUnderstanding

CONFLICT AND PEACEMAKING IN DIVIDED SOCIETIES | Live Online Learning | University-Level Course (Non-Credit)
Delivered Online + more
€119 to €352

ISSUES AND TRENDS IN CONTEMPORARY AFRICAN POLITICS | Live Online Learning

By Gada Academy

Unveil Africa’s political future: Dive into colonial legacies, state-building challenges, democratization efforts, the African Union’s influence, and emerging great power rivalries. Discover sharp, insightful takes on contemporary African politics.

ISSUES AND TRENDS IN CONTEMPORARY AFRICAN POLITICS | Live Online Learning
Delivered Online + more
€119 to €352

Maryland Security Officer Initial & Renewal Course

5.0(1)

By MDSPOSA & USTASC TRAINING PORTAL

This course meets and exceeds the Maryland requirement for the security officer course of 12 hours. The course is taught over 2 days, 6 hours per day. In this course, you will learn the required curriculum for security officers prescribed by the Maryland Police and Corrections Training Commission.

Maryland Security Officer Initial & Renewal Course
Delivered Online + more
$250

C20M01 - Intruder & Hold up alarm foundation EN50131 (online)

5.0(1)

By Ember Compliance

Learners will be introduced to the design, installation, commissioning, and maintenance of intruder and hold-up alarm systems.

C20M01 - Intruder & Hold up alarm foundation EN50131 (online)
Delivered Online + more
£230

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered OnlineFlexible Dates
£2,475

Educators matching " Security"

Show all 5953
Net Security Training

net security training

3.7(6)

London

Net Security Training is an independent specialist Cyber Security training company whose total focus is the provision of specialised courses and appreticeships catering for Cyber Security and Information Assurance professionals. CyberSecurity, IT Security, Information Risk Management, Compliance and Governance training are the cornerstone of our course offerings. We have invested heavily in establishing our credentials by working with the very best certification and examination bodies. We are approved and/or endorsed by the leading players in the cyber security industry to deliver training to their exact standards. We have been pioneers in commissioning, developing and introducing high end material in to the market place for courses and apprenticeships Longest established Cyber Security Training specialist in the UK, since 2003 11000+ Trained Globally- including FTSE 250 Content developed by industry Professionals Classroom based small, highly interactive sessions – which encourages active learner participation The escalating complexity of Technology and Business needs will always result in companies being exposed to security threats, and most networks will be breached if faced with a sustained attack. The key to minimising the damage hackers do when they inevitably force their way on to corporate networks is to make sure your Cyber Security staff are knowledgeable enough to respond appropriately to minimise the harm Intruders can cause to the Organisation. Our History Net-Security Training is the first specialist Information Security training company in the United Kingdom. We have kept true to this niche market since our incorporation in 2003. In-fact we were the only independent training Partner that VeriSign ever approved in Europe. We have been pioneers in commissioning, developing and introducing high end course materials in to the market place. These include Penetration Testing, Securing Network Perimeter, Public Key Infrastructure, Firewalls, Virtual Private Networks, Computer Hacking, IT Security Principals, Security Awareness and many more. Our history is testament to why we have continued to stay ahead of the curve in our fast moving Industry.