• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1091 Courses

Security Management & IT Security with Cyber Security Level 5

5.0(3)

By School Of Health Care

Security Management & IT Security with Cyber Security Level 5 Introducing the Ultimate Cyber Security Course: Safeguard Your Digital World! Are you concerned about the rising threats in the digital landscape? Do you want to protect yourself and your organisation from cyber attacks? Look no further! Our cutting-edge Cyber Security Course is here to equip you with the skills and knowledge you need to defend against the ever-evolving threats lurking in cyberspace. In today's interconnected world, cyber attacks pose a significant risk to individuals, businesses, and governments. The need for skilled professionals who can combat these threats has never been greater. Our comprehensive Cyber Security course is designed to empower you with the expertise needed to mitigate risks and secure your digital assets. Our Cyber Security course is crafted by industry experts with extensive experience in the field of cyber security. You will learn from professionals who have battled against real-world threats and can provide you with practical insights and strategies. The Cyber Security course covers a wide range of topics, from the fundamentals of cyber security to advanced techniques used by seasoned professionals. Whether you are a beginner or an experienced IT professional, our Cyber Security course has something to offer everyone. Upon successful completion of the Cyber Security course, you will receive a prestigious certification that demonstrates your expertise in the field of cyber security. This credential will enhance your professional profile and open doors to exciting career opportunities. The Cyber Security course offers flexible learning options. You can learn the Cyber Security course that best suits your schedules and learn at your own pace. Invest in your future and gain the knowledge and skills to protect yourself and your organisation from cyber threats. Enrol in our Cyber Security Course today and join the ranks of skilled professionals safeguarding the digital world. Don't let cybercriminals take advantage of your vulnerabilities. Take control of your digital destiny with our comprehensive Cyber Security Course. Courses Are Included In This Team Management, Leadership, and Time Management Skills for Admin and Document Control Bundle: Security Management IT Security Level 5 Diploma in Cyber Security Special Offers of this Cyber Security: Cyber Security Course: This Cyber Security: Cyber Security Course includes a FREE PDF Certificate. Lifetime access to this Cyber Security: Cyber Security Course Instant access to this Cyber Security: Cyber Security Course 24/7 Support Available to this Cyber Security: Cyber Security Course [ Note: Free PDF certificate as soon as completing the Cyber Security: Cyber Security Course] Security Management & IT Security with Cyber Security Level 5 Unlock your potential with our Cyber Security course, designed for flexible learning to fit your schedule and pace. This Cyber Security course empowers you with the critical knowledge and skills to protect both yourself and your organization from evolving cyber threats. By enrolling in this Cyber Security course, you're investing in a future where you join the elite ranks of skilled professionals dedicated to safeguarding the digital world. Don’t wait—secure your path to expertise in Cyber Security today and make a meaningful impact in a field that’s more essential than ever. Requirements Security Management & IT Security with Cyber Security Level 5 To enrol in this Cyber Security: Cyber Security Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Cyber Security: Cyber Security Course. Be energetic and self-motivated to complete our Cyber Security: Cyber Security Course. Basic computer Skill is required to complete our Cyber Security: Cyber Security Course. If you want to enrol in our Cyber Security: Cyber Security Course, you must be at least 15 years old.

Security Management & IT Security with Cyber Security Level 5
Delivered Online On Demand4 hours 48 minutes
£12

Cyber Security Awareness

By Course Cloud

Dive into the digital world safely with our Cyber Security course! In today's fast-paced world, staying safe online is more important than ever.

Cyber Security Awareness
Delivered Online On Demand24 hours
£4.99 to £5.99

Diploma in Security Management at QLS Level 5

4.5(3)

By Studyhub UK

Embark on a comprehensive journey into the realm of security management with our Diploma in Security Management at QLS Level 5 course. This in-depth program starts with an introduction to the core concepts of security management, offering a broad perspective on the roles and responsibilities involved in this critical field. As you progress, the course unfolds the complexities of organisational security management, equipping you with the knowledge to safeguard assets and people in various environments. This course is tailored for those looking to make significant strides in their security management career, providing a perfect blend of theoretical foundations and practical applications. Dive further into the curriculum to master security risk analysis and reduction strategies, crucial for today's increasingly unpredictable global landscape. The course also covers vital aspects of physical and information security, ensuring a well-rounded approach to protection. You'll gain insights into business resilience and crisis management, preparing you to respond effectively in emergency situations. The inclusion of modules on cyber security and fraud prevention reflects the ever-evolving nature of security threats, while the study of security investigations and threat awareness sharpens your skills in identifying and mitigating potential risks. Concluding with an overview of relevant laws and regulations, this course ensures that you are well-versed in the legal and ethical considerations of security management. Learning Outcomes Solid understanding of security management principles and organisational security. Skills in conducting security risk analysis and implementing risk reduction measures. Knowledge of physical and information security protection strategies. Proficiency in business resilience, crisis management, and cyber security. Awareness of legal frameworks and regulations in security management. Why choose this Diploma in Security Management at QLS Level 5 course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Diploma in Security Management at QLS Level 5 course for? Security professionals aiming to advance their career in security management. Individuals seeking to enter the field of security and risk management. Corporate managers responsible for overseeing organisational security. Law enforcement officers looking to transition into security management roles. IT professionals interested in expanding their expertise into cyber security and fraud prevention. Career path Security Manager: £30,000 - £45,000 Risk Analyst: £27,000 - £40,000 Corporate Security Officer: £25,000 - £35,000 Crisis Manager: £32,000 - £50,000 Cyber Security Specialist: £35,000 - £55,000 Fraud Prevention Analyst: £28,000 - £42,000 Prerequisites This Diploma in Security Management at QLS Level 5 does not require you to have any prior qualifications or experience. You can just enrol and start learning. This course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Endorsed Certificate of Achievement from the Quality Licence Scheme Learners will be able to achieve an endorsed certificate after completing the course as proof of their achievement. You can order the endorsed certificate for only £115 to be delivered to your home by post. For international students, there is an additional postage charge of £10. Endorsement The Quality Licence Scheme (QLS) has endorsed this course for its high-quality, non-regulated provision and training programmes. The QLS is a UK-based organisation that sets standards for non-regulated training and learning. This endorsement means that the course has been reviewed and approved by the QLS and meets the highest quality standards. Please Note: Studyhub is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses. Course Curriculum Diploma in Security Management at QLS Level 5 Module 01: Introduction to Security Management 00:30:00 Module 02: Organisational Security Management 00:26:00 Module 03: Security Risk Analysis and Risk Reduction 00:23:00 Module 04: Physical and Information Security Protection 00:32:00 Module 05: Business Resilience and Crisis Management 00:17:00 Module 06: Cyber Security and Fraud Prevention 00:25:00 Module 07: Security Investigations and Threat Awareness 00:24:00 Module 08: Laws and Regulations 00:25:00 Order your QLS Endorsed Certificate Order your QLS Endorsed Certificate 00:00:00

Diploma in Security Management at QLS Level 5
Delivered Online On Demand3 hours 22 minutes
£10.99

Security Management

By The Teachers Training

Enhance your expertise in security management with our comprehensive course. Dive into strategies for risk assessment, threat mitigation, and crisis response to safeguard assets and personnel effectively. Whether you're a security professional looking to advance your career or a business owner aiming to bolster protection measures, this course equips you with essential skills and knowledge. Enroll now and take proactive steps towards ensuring safety and security in any environment.

Security Management
Delivered Online On Demand4 hours
£15

Web Application Penetration Testing Course

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Web Application Penetration Testing Course
Delivered Online On Demand19 hours 38 minutes
£25

Safety & Security Advisor

4.7(160)

By Janets

Register on the Safety & Security Advisor today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a digital certificate as a proof of your course completion. The Safety & Security Advisor is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Safety & Security Advisor Receive an e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Safety & Security Advisor, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Module 01: Definition and Importance of Security Definition and Importance of Security 00:18:00 Module 02: Introduction to Security Management Introduction to Security Management 00:35:00 Module 03: Organisational Security Management Organisational Security Management 00:28:00 Module 04: Security Risk Analysis and Risk Reduction Security Risk Analysis and Risk Reduction 00:27:00 Module 05: Physical and Information Security Protection Physical and Information Security Protection 00:38:00 Module 06: Cyber Security and Fraud Prevention Cyber Security and Fraud Prevention 00:27:00 Module 07: Criminal Intelligence Analysis Criminal Intelligence Analysis 00:23:00 Module 08: Understanding Criminal Psychology Understanding Criminal Psychology 00:38:00 Module 09: Counterterrorism and Criminal Intelligence Analysis Counterterrorism and Criminal Intelligence Analysis 00:23:00 Module 10: Security Investigations and Threat Awareness Security Investigations and Threat Awareness 00:26:00 Module 11: The Use of Technology for Managing Security The Use of Technology for Managing Security 00:27:00 Module 12: General Patrol Tactics and Techniques General Patrol Tactics and Techniques 00:27:00 Module 13: Public Relations and Traffic Control Public Relations and Traffic Control 00:23:00 Mock Exam Mock Exam- Safety & Security Advisor 00:20:00 Final Exam Final Exam- Safety & Security Advisor 00:20:00 Order your Certificates & Transcripts Order your Certificates & Transcripts 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Safety & Security Advisor
Delivered Online On Demand6 hours 40 minutes
£25

Symantec ProxySG 6.6 Basic Administration (BCCPA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG. Overview Describe the major Secure Web Gateway functions of the ProxySG.License and configure a ProxySG.Deploy a ProxySG in either explicit or transparent mode.Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management.Use ProxySG access logs to generate reports. The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. Introduction to the Symantec ProxySG Secure Web Gateway Describe the functions of a proxy server Differentiate proxy servers from firewalls Describe the key features and benefits of the ProxySG List the various ProxySG models Access online Symantec community resources ProxySG Security Deployment Options Describe the three network deployment methods Describe the three possible roles of the ProxySG ProxySG Management Console Describe the relationship between the Management Console and the ProxySG CLI Describe the primary function of the major areas of the Management Console Use the Management Console to access on-box help and Symantec product documentation Traffic Interception Using Proxy Services Understand the functions of proxy services, listeners, and proxy types Describe the three most common proxy services Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG Explain the function of common global proxy service settings Hypertext Transfer Protocol Understand how a connection is initiated over the transport layer Identify the components of an HTTP URL Explain the two types of HTTP messages: request and response Identify common response codes Introduction to the Visual Policy Manager Describe the relationship among the VPM, CPL, and the Management Console Describe the default processing order for policy layers and rules Describe triggers and actions that can be used in writing policy Identify the types of objects that the VPM supports Describe some of the best practices to be followed when using the VPM to create policy Filtering Web Content Describe the main concepts of web filtering Describe the primary category databases Describe the category types available to policy Describe how WebFilter and WebPulse work together Using Threat Intelligence to Defend the Network Understand Intelligence Services as provided by the Global Intelligence Network Understand Geolocation and Threat Risk Levels and how they can be used in policy Ensuring Safe Downloads Describe how malware can be transmitted via HTTP Explain the methods, advantages, and disadvantages of file type detection Describe some of the considerations in deciding what content to block as possible malware sources Notifying User of Internet Usage Policies Explain the function and various components of built-in and custom exception pages Describe the function of Notify User objects Identify the types of pages that can be sent to users by using Notify User objects Describe splash pages and coaching pages using Notify User objects in the VPM Access Logging on the ProxySG Describe, at a high level, how the ProxySG performs access logging Describe the components of a ProxySG access log facility Identify default log facilities and log formats Describe common use cases for periodic and continuous uploading of access logs

Symantec ProxySG 6.6 Basic Administration (BCCPA)
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Endpoint Protection 12.X - Manage And Administer

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the configuration and day-to-day management of Symantec Endpoint Protection in a variety of network environments. Overview By the completion of this course, you will be able to: Manage Virus and Spyware Protection policies. Manage SONAR scans. Manage Firewall and Intrusion Prevention policies. Manage Application and Device Control policies. Manage System Lockdown. Manage Host Integrity. Manage Virtualized clients. This course is designed for the network, IT security, and systems administration professional tasked with implementing and monitoring virus and spyware protection, zero-day protection, and network threat protection solutions. Introduction Course overview The classroom lab environment Introducing Antivirus, Insight, and SONAR Virus and spyware protection needs and solutions Reputation and Insight Administrator-defined scans Auto-Protect Download Insight SONAR Included Virus and Spyware Protection policies Managing Virus and Spyware Protection Policies for Windows Configuring administrator-defined scans Configuring protection technology settings and scans Configuring e-mail scans Configuring advanced options Managing scanned clients Managing Virus and Spyware Protection Policies for Mac and Linux Configuring Virus and Spyware settings for Mac Configuring Virus and Spyware settings for Linux Configuring advanced options Managing Exception Policies Exceptions and exclusions Configuring the Exceptions policy Introducing Network Threat Protection The OSI model and network threats Network threat tools and attack methods Attack and mitigation Managing Firewall Policies Firewall policy overview Defining rule components Modifying firewall rules Configuring built-in rules Configuring protection and stealth settings Configuring Windows integration settings Managing Intrusion Prevention Policies Configuring network and browser intrusion prevention Managing custom signatures Compliance Management Application and Device Control System Lockdown Host Integrity Virtualization Introducing virtualization features Virtual image exception Network and vShield Shared Insight Cache Virtual client tagging Offline image scanner Windows Azure support Additional course details: Nexus Humans Symantec Endpoint Protection 12.X - Manage And Administer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Endpoint Protection 12.X - Manage And Administer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Endpoint Protection 12.X - Manage And Administer
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Cisco Networks with Snort Rule Writing Best Practices v2.1 (SSFRULES)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort

Cisco Securing Cisco Networks with Snort Rule Writing Best Practices v2.1 (SSFRULES)
Delivered OnlineFlexible Dates
Price on Enquiry

Data Protection

By RapidEDX

Master GDPR and data protection with our comprehensive course, learning essential regulations and security measures to safeguard organizational data. Equip yourself to manage personal information effectively, ensuring compliance and building trust.

Data Protection
Delivered Online On Demand2 hours 20 minutes
£15