Data Privacy Courses
Learning Tree's Data Privacy Courses offer a range of certifications and training, focusing on information privacy, technology, and management. Learners can pursue globally recognised certifications such as IAPP's CIPP/US, CIPT, and CIPM, gaining essential knowledge and skills in privacy programme management. Additionally, courses like Cyber Security Success Factors and ISACA CDPSE training provide insights into cyber security measures and efficient compliance strategies for organisations.
-
ISACA
The cloud audit certification training teaches the essential principles needed to successfully obtain the Certificate of Cloud Auditing Knowledge (CCAK).
cloud audit, cloud computing, CCAK, certificate of cloud auditing knowledge, auditing principles, cloud security, ISACA, IT audit, cybersecurity, risk, privacy, governance, cloud security alliance, certification training, cloud auditing, cloud security best practices, cloud auditing knowledge, cloud security certification, cloud security training, cloud security principles, cloud security governance claud audit, claud computing, CCAK certification, certificate of claud auditing knowledge, auditing principls, claud security, ISACA certification, IT auditing, cyber security, risks, privcy, goverance, claud security alliance, certification trining, claud auditing, claud security best practices, claud auditing knowledge, claud security certification, claud security trining, claud security principls, claud security goverance cloud audit, cloud computing, CCAK certification, certificate of cloud auditing knowledge, auditing principles, cloud security, ISACA certification, IT auditing, cybersecurity, risk, privacy, governance, cloud security alliance, certification training, cloud auditing, cloud security best practices, cloud auditing knowledge, cloud security certification, cloud security training, cloud security principles, cloud security governance
Intermediate3 daysOnline or In-classStarts from £2,650 -
Microsoft
Get certified in Microsoft Azure Security with Learning Tree's AZ-500 course. Enhance your IT security skills and protect your organisation's data.
AZ-500, AZ500, AZ-50, AZ-500T, 8530AZ-500, AZ-500, AZ500, AZ, 500, security controls, security posture, security vulnerabilities, identity and access, platform protection, data protection, application security, security operations, defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, zero trust model, Virtual Private Networks, VPN, Internet Security Protocol, IPSec, Secure Socket Layer, SSL, disk encryption, data encryption, Azure administration, Windows operating system, Linux operating system, scripting languages, PowerShell, CLI, Azure Security Engineer, certification exam, Microsoft Azure Security Technologies, securty, acess, platfrom, securtiy, opetartions, virtaul, IPSek, encription, sccurity, administraton
Intermediate4 daysOnline or In-classStarts from £2,415 -
Microsoft
Learn about security, compliance, and identity concepts with Microsoft solutions. Perfect for SC-900 exam prep.
sc900, Microsoft Security, Compliance, Identity, Cloud-based Solutions, Networking, Cloud Computing, General IT Knowledge, Microsoft Azure, Microsoft 365, Familiarisation, Fundamentals, SCI, SC-900 Exam, Objective Domain, End-to-end Solution, Holistic Solution, Cloud Services, Cloud Security, Compliance Concepts, Identity Concepts, Security Concepts, Microsoft Tools, Microsoft Security Solutions, Identity Management, Access Management, Risk Management, Governance, Certification, Authentication, Authorisation, Misconfigurations, Cybersecurity, Threats, Vulnerabilities, Policies, Best Practices, sc900, Microsoft Security, Compliance, Identity, Fundamentals Training, SC-900, networking, cloud computing, IT, Microsoft Azure, Microsoft 365, security, compliance, identity solutions, cloud-based, SC-900 exam, objective domain, end-to-end solution, Microsft, Securty, Complience, Identiy, Azur, Msft 365 Microsoft Security, Compliance, Identity, Fundamentals Training, SC-900, nätverk, molntjänster, IT, Microsoft Azure, Microsoft 365, säkerhet, efterlevnad, identitetslösningar, molnbaserade, SC-900-examen, måldomän, helhetslösning, stavfel Microsft, Securty, Complience, Identiy, Azur, Msft 365.
Foundation1 dayOnline or In-classStarts from £835 -
Microsoft
Prepare for the SC-200 exam with this course for Security Operations professionals people who work in a Security Operations job role.
sc200, Microsoft Security Operations Analyst Training, SC-200, investigate, respond, hunt for threats, Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, mitigate cyber threats, configure, Kusto Query Language, KQL, detection, analysis, reporting, security operations role, exam prep, Microsfot Security Operations Analyst, Azure Snetinel, Kusto Query Langauge, sc200, Microsoft Security Operations Analyst Training, SC-200, investigate, respond, hunt, threats, Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, mitigate, cyber threats, technologies, configure, Kusto Query Language, detection, analysis, reporting, security operations role, exam, Microsoft Securty Operations Analyst Training, SC200, Azure Defendar, Kusto Query Languge Microsoft Security Operations Analyst Training, SC-200, undersöka, svara, jaga, hot, Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, mildra, cyberhot, teknologier, konfigurera, Kusto Query Language, detektion, analys, rapportering, säkerhetsoperationsroll, examen, Microsoft Securty Operations Analyst Training, SC200, Azure Defendar, Kusto Query Languge.
Intermediate4 daysOnline or In-classStarts from £2,415 -
Microsoft
This course includes identity content for Microsoft Entra, enterprise application registration, conditional access, identity governance, and other identity tools.
SC300, Microsoft, Identity, Access, Administrator, Training, SC-300, Azure AD, Microsoft Entra, design, implement, operate, organisation, identity management, access management, secure authentication, authorization, enterprise applications, seamless experiences, self-service management, users, adaptive access, governance, troubleshooting, monitoring, reporting, environment, team, collaboration, strategic identity projects, modernize identity solutions, hybrid identity solutions, identity governance, identiy, adimnistrator, authenticaion, authoriztion, enterpise, experieces, managemnt, adaptie, govrenance, truobleshooting, monioring, reporing, envirnoment, SC300, Microsoft, Identity, Access, Administrator, Training, SC-300, Azure AD, design, implement, operate, organisation, management systems, secure authentication, authorisation, enterprise applications, seamless experiences, self-service management, users, adaptive access, governance, troubleshoot, monitor, report, environment, individual, team, collaborate, strategic identity projects, modernise, hybrid identity solutions, identity governance. Micorsoft, Identy, Acces, Administator, Trainig, SC300, Azur AD, authentification, authorization, enterprize, experinces, self servise, adaptiv, goverance, trubleshoot, moniter, enviorment, indvidual, collabrate, strategik, identy solutins, hybrid identy solutins, identy govornance. Microsoft, Identitet, Åtkomst, Administratör, Utbildning, SC-300, Azure AD, design, implementera, driva, organisation, hanteringssystem, säker autentisering, auktorisation, företagsapplikationer, sömlösa upplevelser, självbetjäning, användare, anpassad åtkomst, styrning, felsökning, övervaka, rapportera, miljö, individ, team, samarbeta, strategiska identitetsprojekt, modernisera, hybrididentitetslösningar, identitetsstyrning. Micorsoft, Identy, Acces, Administator, Trainig, SC300, Azur AD, authentification, authorization, enterprize, experinces, self servise, adaptiv, goverance, trubleshoot, moniter, enviorment, indvidual, collabrate, strategik, identy solutins, hybrid identy solutins, identy govornance, SC300, Microsoft, Identity, Access, Administrator, Training, SC-300, Azure AD, design, implement, operate, organization, identity management, access management, secure authentication, authorization, enterprise applications, seamless experiences, self-service management, users, adaptive access, governance, troubleshooting, monitoring, reporting, environment, team, collaboration, strategic identity projects, modernize identity solutions, hybrid identity solutions, identity governance, identiy, adimnistrator, authenticaion, authoriztion, enterpise, experieces, managemnt, adaptie, govrenance, truobleshooting, monioring, reporing, envirnoment, SC300, Microsoft, Identity, Access, Administrator, Training, SC-300, Azure AD, design, implement, operate, organisation, management systems, secure authentication, authorisation, enterprise applications, seamless experiences, self-service management, users, adaptive access, governance, troubleshoot, monitor, report, environment, individual, team, collaborate, strategic identity projects, modernise, hybrid identity solutions, identity governance. Micorsoft, Identy, Acces, Administator, Trainig, SC300, Azur AD, authentification, authorization, enterprize, experinces, self servise, adaptiv, goverance, trubleshoot, moniter, enviorment, indvidual, collabrate, strategik, identy solutins, hybrid identy solutins, identy govornance. Microsoft, Identitet, Åtkomst, Administratör, Utbildning, SC-300, Azure AD, design, implementera, driva, organisation, hanteringssystem, säker autentisering, auktorisation, företagsapplikationer, sömlösa upplevelser, självbetjäning, användare, anpassad åtkomst, styrning, felsökning, övervaka, rapportera, miljö, individ, team, samarbeta, strategiska identitetsprojekt, modernisera, hybrididentitetslösningar, identitetsstyrning. Micorsoft, Identy, Acces, Administator, Trainig, SC300, Azur AD, authentification, authorization, enterprise, experinces, self servise, adaptiv, goverance, trubleshoot, moniter, enviorment, indvidual, collabrate, strategik, identy solutins, hybrid identy solutins, identy govornance.
Intermediate4 daysOnline or In-classStarts from £2,415 -
Microsoft
This course helps learners prepare for Information Protection and Compliance in Microsoft 365 exam (SC-400).
Microsoft Information Protection Administrator Training (SC-400), Microsoft Information Protection Administrator Training, SC400, Microsoft, Information Protection, Administrator, Training, SC-400, data governance, data loss prevention, sensitive information types, sensitivity labels, data retention policies, Office 365, message encryption, exam preparation, data security, information security, data protection, security policies, data classification, access control, compliance, risk management, threat detection, incident response, vulnerability management, cybersecurity, privacy, confidentiality, misconfigurations, audit logs, security assessments, security awareness, security training, encryption, decryption, key management, identity and access management, authentication, authorisation, network security, endpoint security, cloud security, application security, mobile security, device management, data backup, disaster recovery, business continuity, legal and regulatory requirements, industry standards, best practices, mistakes, troubleshooting. Microsft, Infrmation, Prtection, Adminstrator, Traning, SC400, data goverance, data loss prevntion, sensetive, information types, sensivity, lables, data rentention, polices, Ofice 365, mesage, encrytion, exam prep, data secuirty, information secuirty, data protecton, secuirty polices, data clasification, access contol, complience, risk managment, threat detection, incident responce, vulnarability managment, cyberscurity, privicy, confidntiality, misconfigurations, audit logs, secuirty asssessments, secuirty awarness, secuirty traning, encrytion, decrytion, key managment, identity and access managment, athentication, authorisation, network secuirty, endpoint secuirty, cloud secuirty, application secuirty, mobile secuirty, device managment, data bakup, disaster recovery, business continuty, legal and regulatry requirments, industry standards, best pratices, commen mistakes, troubleshootin, SC400, SC-400, Microsoft Information Protection Administrator, SC-400, data governance, information protection, data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Office 365 message encryption, exam preparation, data security, data privacy, data protection, information security, information privacy, information protection policies, data encryption, data classification, data leakage prevention, data protection regulations, compliance, risk management, data handling, data auditing, data compliance, data governance policies, data protection standards, information management, information governance, information classification, information leakage prevention, information protection regulations, information compliance, information risk management, information handling, information auditing, information governance policies, information protection standards, sensitive data protection, sensitive information management, sensitive data handling, sensitive data compliance, sensitive data auditing, sensitive data governance policies, sensitive data protection standards, SC400, Microsoft Information Protection, Microsoft 365 security, Microsoft 365 compliance, Microsoft 365 data protection, Microsoft 365 information protection, Microsoft 365 data governance, Microsoft 365 information governance, Microsoft 365 data classification, Microsoft 365 information classification, Microsoft 365 data risk management, Microsoft 365 information risk management, Microsoft 365 data leakage prevention, Microsoft 365 information leakage prevention, Microsoft 365 data retention policies, Microsoft 365 information retention policies, Microsoft 365 message encryption, Microsoft 365 data privacy, Microsoft 365 information privacy. Microsoft Information Protecion Administrator, SC400, data goverance, information protecion, data loss prevetion policies, sensetive information types, sensitivity lables, data retension policies, Office365 message encryption, exam preperation, data secutiry, data privicy, data protecion, information secutiry, information privicy, information protecion policies, data encrytion, data clasification, data leakage prevetion, data protecion regulations, compliance, risk managment, data handeling, data auditing, data compliance, data goverance policies, data protecion standards, information managment, information goverance, information clasification, information leakage prevetion, information protecion regulations, information compliance, information risk managment, information handeling, information auditing, information goverance policies, information protecion standards, sensetive data protecion, sensetive information managment, sensetive data handeling, sensetive data compliance, sensetive data auditing, sensetive data goverance policies, sensetive data protecion standards, Microsoft Information Protecion, Microsoft 365 secutiry, Microsoft 365 compliance, Microsoft 365 data protecion, Microsoft 365 information protecion, Microsoft 365 data goverance, Microsoft 365 information goverance, Microsoft 365 data Microsoft Information Protection Administrator, SC-400, datagovernance, informationskydd, förebyggande av dataläckage, känsliga informationsklasser, känslighetsmärkning, datalagringspolicyer, Office 365-meddelande-kryptering, examensförberedelse, dataskydd, datasekretess, dataskydd, informationsäkerhet, informationssekretess, informationskyddspolicyer, datakryptering, dataklassificering, förebyggande av dataläckage, dataskyddsregler, efterlevnad, riskhantering, datahantering, datarevision, dataskyddsöverensstämmelse, datagovernancepolicyer, dataskyddsstandarder, informationshantering, informationsstyrning, informationsklassificering, förebyggande av informationsläckage, informationskyddsregler, informationsöverensstämmelse, informationsriskhantering, informationshantering, informationsrevision, informationsstyrningspolicyer, informationskyddsstandarder, skydd av känslig information, hantering av känslig information, efterlevnad av känslig information, revision av känslig information, känslig datagovernancepolicy, känsliga dataskyddsstandarder, SC400, Microsoft Information Protection, Microsoft 365-säkerhet, Microsoft 365-efterlevnad, Microsoft 365-dataskydd, Microsoft 365-informationskydd, Microsoft 365-datagovernance, Microsoft 365-informationsstyrning, Microsoft 365-dataklassificering, Microsoft 365-informationsklassificering, Microsoft 365-datriskhantering, Microsoft 365-informationsriskhantering, Microsoft 365-förebyggande av dataläckage, Microsoft 365-förebyggande av informationsläckage, Microsoft 365-datalagringspolicyer, Microsoft 365-informationslagringspolicyer, Microsoft 365-meddelandekryptering, Microsoft 365-dataskydd, Microsoft 365-informationssekretess. Microsoft Information Protecion Administrator, SC400, data goverance, information protecion, data loss prev
Intermediate4 daysOnline or In-classStarts from £2,415 -
CompTIA
This CompTIA Cloud+® certification training will prepare you to pass the CompTIA Cloud+ CV0-003 exam and earn the corresponding certification.
plus, cloudplus, CompTIA Cloud+ Certification, Cloud+ CV0-003 exam, cloud technologies, workload migrations, cloud vendors, automation, orchestration, cybersecurity, cloud implementations, U.S. DoD Directive 8140/8570.01, IAM Level-I, CSSP Analyst, CSSP Infrastructure Support, cloud solutions, cloud deployments, cloud security, cloud management, cloud training, cloud computing, cloud infrastructure, cloud architecture, cloud services, cloud providers, cloud networking, cloud storage, cloud backup, cloud disaster recovery, cloud virtualization, cloud automation, cloud orchestration, cloud monitoring, cloud optimization, cloud cost control, cloud compliance, cloud governance, cloud performance, cloud scalability, cloud reliability, cloud availability, cloud migration, cloud consulting, cloud support, cloud administration, cloud development CompTIA Cloud+ Certification CompTIA Cloud Certification, CompTIA Cloud+ Certificiation, CompTIA Cloud+ Certifcation Cloud+ CV0-003 exam Cloud+ CV0-003 eam, Cloud+ CV0-003 exm, Cloud+ CV0-003 exma, Cloud+ CV0-003 exame Cloud solutions Cloud solutinos, Cloud solutons, Cloud soltuions Cloud deployments Cloud deplyoments, Cloud deployemnts, Cloud deployements Cloud security Cloud secruity, Cloud securtiy, Cloud secrity Cloud management Cloud managment, Cloud managemet, Cloud manageemnt Cloud training Cloud traning, Cloud trainig, Cloud traing Cloud computing Cloud computng, Cloud computin, Cloud compuitng Cloud infrastructure Cloud infrastrcture, Cloud infrastucture, Cloud infratructure Cloud services Cloud servcies, Cloud servcies, Cloud serivces Cloud providers Cloud providors, Cloud providres, Cloud providerrs Cloud networking Cloud netwokring, Cloud netwokring, Cloud networing Cloud storage Cloud stoarge, Cloud storae, Cloud storag Cloud backup Cloud bakup, Cloud backp, Cloud bckup Cloud disaster recovery Cloud disater recovery, Cloud disaster recovrey, Cloud disater recovry Cloud virtualization Cloud virtualiztion, Cloud virtualizaton, Cloud virtulization Cloud automation Cloud automtion, Cloud automaion, Cloud autmation Cloud orchestration Cloud orchetration, Cloud orchistration, Cloud orcehstration Cloud monitoring Cloud monitroing, Cloud montioring, Cloud monitorng Cloud optimization Cloud optmization, CompTIA Cloud+ Certification, Cloud+ CV0-003 exam, cloud technologies, workload migrations, cloud vendors, automation, orchestration, cybersecurity, cloud implementations, UK MoD Directive 8140/8570.01, IAM Level-I, CSSP Analyst, CSSP Infrastructure Support, cloud solutions, cloud deployments, cloud security, cloud management, cloud training, cloud computing, cloud infrastructure, cloud architecture, cloud services, cloud providers, cloud networking, cloud storage, cloud backup, cloud disaster recovery, cloud virtualisation, cloud automation, cloud orchestration, cloud monitoring, cloud optimisation, cloud cost control, cloud compliance, cloud governance, cloud performance, cloud scalability, cloud reliability, cloud availability, cloud migration, cloud consulting, cloud support, cloud administration, cloud development CompTIA Cloud+ Certification CompTIA Cloud Certification, CompTIA Cloud+ Certificiation, CompTIA Cloud+ Certifcation Cloud+ CV0-003 exam Cloud+ CV0-003 eam, Cloud+ CV0-003 exm, Cloud+ CV0-003 exma, Cloud+ CV0-003 exame Cloud solutions Cloud solutinos, Cloud solutons, Cloud soltuions Cloud deployments Cloud deplyoments, Cloud deployemnts, Cloud deployements Cloud security Cloud secruity, Cloud securtiy, Cloud secrity Cloud management Cloud managment, Cloud managemet, Cloud manageemnt Cloud training Cloud traning, Cloud trainig, Cloud traing Cloud computing Cloud computng, Cloud computin, Cloud compuitng Cloud infrastructure Cloud infrastrcture, Cloud infrastucture, Cloud infratructure Cloud services Cloud servcies, Cloud servcies, Cloud serivces Cloud providers Cloud providors, Cloud providres, Cloud providerrs Cloud networking Cloud netwokring, Cloud netwokring, Cloud networing Cloud storage Cloud stoarge, Cloud storae, Cloud storag Cloud backup Cloud bakup, Cloud backp, Cloud bckup Cloud disaster recovery Cloud disater recovery, Cloud disaster recovrey, Cloud disater recovry Cloud virtualization Cloud virtualiztion, Cloud virtualizaton, Cloud virtulization Cloud automation Cloud automtion, Cloud automaion, Cloud autmation Cloud orchestration Cloud orchetration, Cloud orchistration, Cloud orcehstration Cloud monitoring Cloud monitroing, Cloud montioring, Cloud monitorng Cloud optimization Cloud optmization,
Foundation5 daysOnline or In-classStarts from £2,350 -
ISC2
The CCSP Training and Certification course teaches the knowledge & skills needed to pass the certification & become a Certified Cloud Security Professional.
8140/8570, 8140, 8570, CCSP, Certified Cloud Security Professional, training, certification,ISC2®;, security professionals, knowledge, cloud security, data security, cloud infrastructure security, information security, secure data centers, cloud environments, cloud-based data access, cloud security solutions, detecting, responding, security incidents, cloud computing technologies, Microsoft Azure, security practices, physical infrastructure, cloud resource access control, protection, sensitive data, load balancers, security operations centers, SOCs, cloud environment security, exam, industry standard, U.S. DoD Directive 8140/8570.01, Technical IAT Level-III, Information Assurance Security Architect/Engineer IASAE Level-III, CSP, CCPS, CCSP certification, CCSP exam
Intermediate5 daysOnline or In-classStarts from £3,245 -
Cloud Security Alliance
Earn your Certification of Cloud Security Knowledge (CCSK Plus) on AWS. Get hands-on training to master cloud security best practices on AWS.
data security for cloud computing, cloud network security, identity and access management, cloud data storage, security and identity management, certificate of cloud security knowledge, cyber security, cloud security risk, data security lifecycle, cloud security operations, data center, access management iam, real time, gain access, security teams, security measures, data encryption, role based access control, shared responsibility model, human error, information security, continuous monitoring, securing data, cloud platform, storing data, general data protection regulation, security standards, risk assessments, authentication and authorisation, data accessible, CCSK Plus, AWS, cloud security, training, certification, course, CCSK Plus, AWS, molnsäkerhet, utbildning, certifiering, kurs
Intermediate3 daysOnline or In-classStarts from £1,960 -
Cloud Security Alliance
Achieve Certification of Cloud Security Knowledge (CCSK Plus) on Azure. Hands-on course on implementing cloud security in Azure environments. Register today!
data security for cloud computing, identity and access management, cloud network security, cloud data storage, security and identity management, certificate of cloud security knowledge, cyber security, cloud security risk, certified cloud security professional, data security lifecycle, access controls, data center, access management iam, gain access, real time, security measures, information security, security teams, role based access control, security professionals, securing data, data encryption, human error, authentication and authorisation, cloud platform, storing data, data accessible, authorise users, general data protection regulation, shared responsibility model
Intermediate3 daysOnline or In-classStarts from £1,960 -
Cloud Security Alliance
Dive into Zero Trust principles for secure cloud computing. Earn your CCZT and showcase your skills in implementing Zero Trust architecture.
zero trust architecture, certificate of cloud security knowledge, team training, architecture study guide, cyber security, cloud security alliance, zero trust knowledge, zero trust strategy, learning tree, zero trust use cases, real time, security control, user devices, security posture, data breaches, gain access, cloud service, trust always verify, security access, trust framework, network security, security strategy, security professionals, cloud environment, threat intelligence, data centers, security teams, cloud computing, security framework, continuously monitored, Certifiering i Zero Trust-arkitektur, certifikat i Cloud Security Knowledge, teamutbildningsprogram, studieguide för arkitektur, kurser i cybersäkerhet, certifieringar från Cloud Security Alliance, kunskapsförbättring i Zero Trust, strategisk planering för Zero Trust, utbildningsprogram från Learning Tree, realtidsfallstudier i Zero Trust, avancerad säkerhet för användarenheter, stark säkerhetsställning, förebyggande av dataintrång i cybersäkerhet, säkra molntjänster, säkerhetstillgång med Trust-but-Verify, omfattande förtroenderamverk, professionell nätverkssäkerhet, säkerhetsstrategier för IT-professionella, säkerhet i molnmiljö, metodiker för hotintelligens, säkrade datacenter, förberedelser för säkerhetsteam, säkerhetsramverk för molnberäkning, kontinuerlig övervakning och kontroll, CCZT, zero trust, cybersecurity, training, certification, course, CCZT, zero trust, cybersäkerhet, utbildning, certifiering, kurs
Intermediate2 daysOnline or In-classStarts from £1,960 -
CertNexus
CertNexus CyberSAFE Training: Avoid phishing, social engineering, viruses, ransomware & malware.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, CyberSAFE, cybersecurity, training, awareness, technology, risks, protection, organisation, vulnerabilities, breaches, data security, computers, mobile devices, networks, Internet, cloud, cybersec, trainning, awarness, technolgy, vulnarabilities, breeches, data secutiry. CyberSAFE, cyber security, training, awareness, technology, risks, protection, organisation, vulnerabilities, breaches, data security, computers, mobile devices, networks, Internet, cloud, cybersec, training, awareness, technology, vulnerabilities, breaches, data security.
FoundationLess than a dayOnline or In-classStarts from £219 -
Learning Tree
In this Vulnerability Assessment course, you learn how to create a network security vulnerability assessment checklist to prevent network exploitation.
Vulnerability Assessment, security breaches, evaluate risk, network security, checklist, exposed infrastructure, server vulnerabilities, desktop vulnerabilities, reports, vulnerability scanners, detect points of exposure, prevent network exploitation, vulnerabilty, assesssment, secuirty, breahces, netowrk, exposd, infrastructer, desktop vulnarabilities, vulnirability, scannars, exploitatoin.
Intermediate4 daysOnline or In-classStarts from £2,195 -
Learning Tree
Learn to defend your organisation from cyber attacks and protect your data with our course on securing communications and information.
Defending the Perimeter from Cyber Attacks, cyber security, confidentiality, integrity, availability, organization's information, communications, data, security principles, secure firewalls, Virtual Private Network VPN , network perimeter, malicious attacks, TCP/IP, client server architecture Defending the Peremeter from Cyber Attacks cyber secuirty confidenciality intergrity availablility communcations datat security princples secure firewals Virtual Private Networking VPN malicious attaks TCP/IP protocol client-server architechture Defending the Perimeter from Cyber Attacks, cyber security, confidentiality, integrity, availability, organisation's information, communications, data, security principles, secure firewalls, Virtual Private Network VPN , network perimeter, malicious attacks, TCP/IP protocol, client-server architecture. Defending the Perimeter from Cyber Attacks cyber security confidentiality integrity availability communications data security principles secure firewalls Virtual Private Networking VPN malicious attacks TCP/IP protocol client-server architecture
Intermediate4 daysOnline or In-classStarts from £2,650 -
Learning Tree
This Cyber Security Risk Assessment Training course teaches how to protect your organisation by employing a standards-based risk management process.
Cybersecurity, risk assessment, training, laws, regulations, compliance, assessment plan, risk management, security posture, UK, 2013, cyber security, cyber-security, risk asessment, trainning, complience, managment, secutiry posture, United Kingdom, twenty thirteen. Cybersecurity, risk assessment, training, laws, regulations, compliance, assessment plan, risk management, security posture, UK, 2013, cyber security, cyber-security, risk assessment, training, compliance, management, security posture, United Kingdom, twenty thirteen.
Foundation4 daysOnline or In-classStarts from £2,650 -
EC-Council
Attend this computer hacking forensic investigator certification course to get prepped to successfully pass the EC-Council ECO-312-49.
v11, CHFI Certification | Computer Hacking Forensic Investigator Course CHFI v11, CHFI Certification, Computer Hacking Forensic Investigator Course CHFI v11, 8140/8570, 8140, 8570, CHFI Certification, Computer Hacking Forensic Investigator Training, CHFI v11, Digital forensics, evidence analysis, cyber forensics, computer forensic, computer security, incident response, infrastructure support, DoD Directive 8140, DoD Directive 8570.01, CSSP Incident Responder, CSSP Infrastructure Support, searching and seizing, chain-of-custody, acquisition, preservation, analysis, reporting, digital evidence, EC-Council, certification course. CFI Certification Computer Hacking Forensic Investigator Training with variations of capitalization CHFIv11 Digital forensics with variations of spelling Cyber forensics with variations of spelling Forensic computer investigation Incident response with variations of capitalization Infrastructure support with variations of spelling DoD Directive 8140 with variations of capitalization and spelling DoD Directive 8570.01 with variations of capitalization and spelling CSSP Incident Responder with variations of capitalization and spelling CSSP Infrastructure Support with variations of capitalization and spelling Searching and seizing with variations of spelling Chain of custody with variations of capitalization and spelling Acquisition with variations of spelling Preservation with variations of spelling Analysis with variations of spelling Reporting with variations of spelling Digital evidence with variations of spelling EC-Council with variations of capitalization and spelling
Intermediate5 daysOnline or In-classOn-DemandStarts from £1,595 -
EC-Council
Get certified in ECIH with EC-Council's course. Learn to handle security incidents & pass the exam. Includes voucher.
EC-Council, Certified Incident Handler, ECIH, programme, computer security incidents, information system, incident response training, underlying principles, techniques, detecting, responding, emerging computer security threats, incident handling, response policies, information security experience, Learning Tree, certification prep course. CE-Council Incedent Handeler ECHI response training, incident handeling
Intermediate3 daysOnline or In-classOn-DemandStarts from £1,695 -
EC-Council
Get CEH certified with our training course! Learn to protect your network with hands-on labs and tools. Pass the EC-Council CEH v12 exam.
CEH training, CEH certification, ethical hacking, cybersecurity, network security, penetration testing, vulnerability assessment, security tools, DoD Directive 8140, CSSP Analyst, CSSP Infrastructure Support, CSSP Auditor, CSSP Incident Responder, real-life scenarios, hands-on labs, exam preparation, security techniques, security protocols, security measures, CEH traning, CEH certifcation, ehtical hacking, cibersecurity, network secutiry, penatration testing, vulnerability asessment, DoD Directive 8140, CSSP Analist, CSSP Infrastructur Support, CSSP Aditor, CSSP Incident Responser. CEH training, CEH certification, ethical hacking, cybersecurity, network security, penetration testing, vulnerability assessment, security tools, DoD Directive 8140, CSSP Analyst, CSSP Infrastructure Support, CSSP Auditor, CSSP Incident Responder, real-life scenarios, hands-on labs, exam preparation, security techniques, security protocols, security measures, CEH training, CEH certification, ethical hacking, cybersecurity, network security, penetration testing, vulnerability assessment, DoD Directive 8140, CSSP Analyst, CSSP Infrastructure Support, CSSP Auditor, CSSP Incident Responder.
Intermediate5 daysOnline or In-classStarts from £3,146 -
EC-Council
In EC-Council's CTIA v2, learn a holistic approach to organisational threat intelligence in this course. Build effective defences against future attacks.
CTIA, Certified Threat Intelligence Analyst, C|TIA, EC-Council, training programme, organisational threat intelligence, business risks, unknown threats, known threats, mitigate, method-driven, holistic approach, effective threat intelligence, secure, future threats, attacks, concepts, internal threats, external threats, Certified Threat Intellgence Analyst, C|TIA, CIA, CTIA.
Advanced3 daysOnline or In-classStarts from £1,865 -
CompTIA
This CASP+® Training course prepares you for the CASP+ exam certifying your knowledge and skills in enterprise security and risk management.
plus, caspplus, ADVANCED SECURITY PRACTITIONER, ADVANCED CYBERSECURITY PRACTITIONER, ADVAN, ADVANCED CYBER SECURITY PRACTITIONER, CASP+, CompTIA, training, exam, certification, enterprise security, risk management, research, analysis, computing, communications, business disciplines, DoD Directive 8140/8570.01, Technical IAT Level-III, Management IAM Level-II, Information Assurance Security Architect/Engineer IASAE Level-I, Level II, CASP, CompTIAA, enterprize security, risk managment, anlysis, computting, communcations, busines, DoD Directive 8140/8570.1, Technical IAT Level 3, Management IAM Level 2, Information Assurance Security Architect/Engineer IASAE Level 1, Level 2. CASP+, CompTIA, training, exam, certification, enterprise security, risk management, research, analysis, computing, communications, business disciplines, DoD Directive 8140/8570.01, Technical IAT Level-III, Management IAM Level-II, Information Assurance Security Architect/Engineer IASAE Level-I, Level II, CASP, CompTIAA, enterprise security, risk management, analysis, computing, communications, business, DoD Directive 8140/8570.1, Technical IAT Level 3, Management IAM Level 2, Information Assurance Security Architect/Engineer IASAE Level 1, Level 2.
Advanced5 daysOnline or In-classStarts from £2,690 -
CompTIA
This official CompTIA CySA+® certification training preps you to successfully pass the CS0-003 exam & be ready to meet advanced persistent threats head on.
CS0-002, CS0002, CS0-003, CS0003, plus, cysaplus, 8140/8570, 8140, 8570, CompTIA, CySA+, certification, training, exam, cybersecurity, analyst, APTs, scenario-based, foundational, knowledge, network security, tools, techniques, threats, DoD, directive, Technical, IAT, Level-II, CSSP, Auditor, Infrastructure, Support, Incident Responder, comptia, cysa, analyist, csa+, CySA, certification, traning, exame, cyber security, aps, networksecutriy, dirctive, technicall, cspp, infustracture, insident, responser, plus, cysaplus, CompTIA CySA+, cybersecurity analyst, APTs, scenario-based training, CS0-002, intermediate certification, Network+, CASP, analytical approach, network security, tools, techniques, threats, U.S. DoD Directive 8140/8570.01, Technical IAT Level-II, CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, CSSP Auditor, CompTIA CySA, cyber security analyst, advanced persistent threads, scenario based training, network security tools and tecniques. CompTIA CySA+, cybersäkerhetsanalytiker, APT er, scenario-baserad träning, CS0-002, mellanliggande certifiering, Network+, CASP, analytiskt tillvägagångssätt, nätverkssäkerhet, verktyg, tekniker, hot, U.S. DoD Directive 8140/8570.01, Teknisk IAT Nivå-II, CSSP-analytiker, CSSP-infrastrukturstöd, CSSP-incidenthanterare, CSSP-revisor, stavfel CompTIA CySA, cybersäkerhetsanalytiker, avancerade ihållande trådar, scenario-baserad träning, nätverkssäkerhetsverktyg och tekniker.
Intermediate5 daysOnline or In-classStarts from £2,855 -
CompTIA
This CompTIA PenTest+® course introduces the general concept and methodologies related to penetration testing & preps you for the PT0-002 exam.
plus, pentestplus, CompTIA PenTest+, training, certification, exam, concepts, methodologies, penetration testing, simulated pen test, DoD Directive 8140/8570.01, CSSP Analyst, CSSP Incident Responder, CSSP Auditor, CSSP Infrastructure Support, comptia pentest, pentest+ certification, pen test, cssp analyst, cssp incident responder, cssp auditor, cssp infrastructure support. CompTIA PenTest+, training, certification, exam, concepts, methodologies, penetration testing, simulated pen test, DoD Directive 8140/8570.01, CSSP Analyst, CSSP Incident Responder, CSSP Auditor, CSSP Infrastructure Support, CompTIA PenTest, PenTest+ certification, pen test, CSSP analyst, CSSP incident responder, CSSP auditor, CSSP infrastructure support.
Intermediate5 daysOnline or In-classStarts from £2,350 -
Learning Tree
This identity & access management course will teach you to protect your IT resources. Learn Single Sign-On, PKI, Federated Identity Management & more!
Identity management, access management, IAM, IdM, single sign-on, SSO, PKI, federated identity management, security, Windows operating system, identity managment, access managment, IAD, IDM, single sign on, public key infrustructure, federated identity managment, secutiry, windows operating systm. Identity management, access management, IAM, IdM, single sign-on, SSO, PKI, federated identity management, security, Windows operating system, identity management, access management, IAD, IDM, single sign on, public key infrastructure, federated identity management, security, Windows operating system.
Intermediate4 daysOnline or In-classStarts from £2,650 -
CertNexus
Get certified in CyberSec First Response with CertNexus. Learn to detect, analyze, and respond to network threats for the new CFR-410 exam.
CyberSec First Responder, certification, training, IT professionals, analyse threats, secure networks, problem-solving, protect organization, detect, analyse, respond, recover, attacks, potential threats, CFR Certification Exam, U.S. DoD Directive 8140/8570.01, CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, CSSP Auditor, CyberSec First Respondor, CyberSec First Responce, CyberSec First Responder Certification, CyberSec First Respondent, certification training, IT profesional, anaylse threats, secure network, problem solving, protect organisation, dectect, anaylse, resond, attaks, potential threts, CFR Certification Exam, US DoD Directive 8140/8570.01, CSSP Analist, CSSP Infrastrcture Support, CSSP Incident Responder, CSSP Auditer. CyberSec First Responder, certification, training, IT professionals, analyse threats, secure networks, problem-solving, protect organisation, detect, analyse, respond, recover, attacks, potential threats, CFR Certification Exam, UK MoD Directive 8140/8570.01, CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, CSSP Auditor, CyberSec First Responder, CyberSec First Response, CyberSec First Responder Certification, CyberSec First Respondent, certification training, IT professional, analyse threats, secure network, problem solving, protect organisation, detect, analyse, respond, attacks, potential threats, CFR Certification Exam, UK MoD Directive 8140/8570.01, CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, CSSP Auditor.
Intermediate5 daysOnline or In-classStarts from £2,890 -
EC-Council
CYBRScore Ethical Hacking Essentials Labs include 22 hands-on labs to prepare you to exploit networks to discover how to protect your system from attackers.
FoundationMulti-WeekOn-Demand -
Learning Tree
CYBRScore Digital Media Forensics Essentials Labs include 19 hands-on labs that provide an introduction to media collection, imaging and analysis.
FoundationMulti-WeekOn-Demand -
Learning Tree
CYBRScore Pentesting & Network Exploitation Labs include 4 hands-on labs on reconnaissance, scanning, enumeration, exploitation & pillaging for 802.3 networks.
FoundationMulti-WeekOn-Demand -
Learning Tree
Detect security vulnerabilities in web-based apps, networks & systems with CYBRScore's 19 hands-on labs on tools & techniques.
security, techniques, Internet, professionals, vulnerability, assessment, management, labs, hands-on, detect, exploit, web-based, applications, networks, computer systems, Windows, Linux, OS, mitigation, countermeasures, learning objectives, National Cybersecurity Workforce Framework, NIST SP-800-181, course content, Vulnerability Assessment Analyst, Course 589 securty, techniqes, internt, profssionals, vulnurability, asesment, managment, lab, hnds-on, detct, explot, web-basd, applcations, netwroks, computr systms, Winows, Linx, operatig system, mitgation, countremeasures, learning objctives, Nationl Cybersecurity Workforce Framewrk, NIST SP-800-181, coure cntent, Vulnerability Asessment Analyst, Coure 589
FoundationMulti-WeekOn-Demand -
Learning Tree
In this Penetration Testing course, you will learn to discover weaknesses in your own network by using the mindset and methods of a hacker.
Penetration Testing, Pen Testing, hacking, cybersecurity, vulnerability assessment, network security, cyber defense, exploit, countermeasures, risk reduction, antivirus evasion, ethical hacking, security testing, OS security, network weaknesses, enterprise security, offensive security, defensive security, computer security, system security, IT security, cyber threat, cyber attack, security assessment, security training, security tools, hacker mindset, security measures, digital security, security seminar, cyber security certification, Penetration testing, ethical hacking, network security, vulnerability assessment, exploit development, risk management, cyber security, intrusion testing, security assessment, penetration testing tools, hacking techniques, antivirus evasion, network defense, security countermeasures, vulnerability testing, security testing, penetration testing certification, cyber defense, penetration testing course, ethical hacking training, network penetration testing, security auditing, vulnerability scanning, security consulting, cyber risk assessment, penetration testing services, web application penetration testing, wireless network security, penetration testing methodology, security hardening, security testing tools, security awareness training, security incident response, security operations center, security testing services, security testing methodologies, penetration testing companies, security assessment services, security testing certification, security testing courses, security testing methodology, security testing techniques, security testing tools and techniques Penatration testing, pentration testing, penitration testing, penetration testingt, peneration testing, penetration teting, penetration testin, penatration testing tools, pentration testing techniques, penitration testing course, penetration testing certifcation, ethcal hacking training, securty testing, secuirty testing, penatration testing certification, pentration testing course, penitration testing tools, penitration testing techniques, penetraion testing, penetraion testing tools, penetraion testing techniques Penetrationstestning, etiskt hackande, nätverkssäkerhet, sårbarhetsbedömning, exploit-utveckling, riskhantering, cybersäkerhet, intrångstestning, säkerhetsbedömning, verktyg för penetrationstestning, hackningstekniker, antivirusundvikande, nätverksförsvar, säkerhetsåtgärder, sårbarhetstestning, säkerhetstestning, certifiering för penetrationstestning, cybersäkerhet, kurs i penetrationstestning, utbildning i etiskt hackande, nätverkspenetrationstestning, säkerhetsrevision, sårbarhetsskanning, säkerhetskonsultation, bedömning av cyberrisker, tjänster för penetrationstestning, penetrationstestning av webbapplikationer, trådlös nätverkssäkerhet, metodik för penetrationstestning, säkerhetshärdning, verktyg för säkerhetstestning, utbildning i säkerhetsmedvetenhet, incidenthantering, säkerhetsoperationscenter, tjänster för säkerhetstestning, metodik för säkerhetstestning, företag som utför penetrationstestning, tjänster för säkerhetsbedömning, certifiering för säkerhetstestning, kurser i säkerhetstestning, metodik för säkerhetstestning, tekniker för säkerhetstestning, verktyg och tekniker för säkerhetstestning Penatration testning, pentration testning, penitration testning, penetration testingt, peneration testning, penetration teting, penetration testin, penatration testning tools, pentration testning techniques, penitration testning course, penetration testing certifcation, ethcal hacking training, securty testing, secuirty testing, penatration testing certification, pentration testing course, penitration testing tools, penitration testing techniques, penetraion testing, penetraion testing tools, penetraion testing techniques
Intermediate4 daysOnline or In-classStarts from £2,515 -
Cisco
Enroll in Securing Email w/ Cisco Email Security. Prep for exam 300-710 & earn CCNP Security & Cisco Cert Specialist - Network Security Firepower.
Securing Networks, Cisco Firepower, Threat Defence, NGFW, NGIPS, Network Address Translation, VPN, SSL decryption, CCNP Security, Network Security Firepower, TCP/IP networking, firewall, IPS, security administrators, security consultants, network administrators, system engineers, technical support personnel, channel partners, resellers, Securing Network, Cisco Firepower Next Gen Firewall, NG Firewall, Next Gen Intrusion Prevention System, Network Address Transalation, SSL decryption Securing Networks, Cisco Firepower, Threat Defence, Next Generation Firewall NGFW , Next Generation Intrusion Prevention System NGIPS , Network Address Translation NAT , Virtual Private Network VPN , Secure Sockets Layer SSL decryption, Cisco Certified Network Professional CCNP Security, Network Security Firepower, Transmission Control Protocol/Internet Protocol TCP/IP networking, firewall, Intrusion Prevention System IPS , security administrators, security consultants, network administrators, system engineers, technical support personnel, channel partners, resellers, Securing Network, Cisco Firepower Next Generation Firewall, NG Firewall, Next Generation Intrusion Prevention System, Network Address Translation, SSL decryption.
Intermediate5 daysOnline or In-classStarts from £3,470 -
APMG International
This course will enable you to prepare a defined and managed approach when responding to a data breach or attack of an information asset.
Organisations continue to suffer from external and internal attacks, yet Cyber Incident Management is an afterthought in most companies. This course will enable you to prepare a defined and managed approach when responding to a data breach or attack on an information asset. The content is intended for senior management and business executives who wish to understand incident response better or are responsible for helping organisations plan and prepare for potential cyber threats and effectively deal with actual cyber-attacks. This course is not technical; therefore, there are no prerequisites.
Foundation1 dayOnline or In-classStarts from £449 -
APMG International
This NCSC Certified Training Cyber Fundamentals training will provide essential knowledge and understanding to drive information security awareness across the business.
Foundation1 dayTeam Training -
In this module you learn what to expect in the upcoming CHFI version 9 series, including the intended audience, the scope of the series, and specific topics that will be addressed.
CHFI V9, CHFI version 9, CHFI 9, CHFI certification, CHFI course, CHFI training, CHFI online, CHFI overview, CHFI scope, CHFI topics, CHFI audience, CHFI consultants, CHFI series, CHFI duration, CHFI modules, CHFI syllabus, CHFI exam, CHFI preparation, CHFI materials, CHFI resources, CHFI guide, CHFI curriculum, CHFI content, CHFI objectives, CHFI skills, CHFI knowledge, CHFI tools, CHFI techniques, CHFI investigation, CHFI forensics, CHFI cybersecurity, CHFI digital forensics, CHFI computer forensics, CHFI CHIF V9, CHFI 9, CHIF 9, CHIF certification, CHIF course, CHIF training, CHIF online, CHIF overview, CHIF scope, CHIF topics, CHIF audience, CHIF consultants, CHIF series, CHIF duration, CHIF modules, CHIF syllabus, CHIF exam, CHIF preparation, CHIF materials, CHIF resources, CHIF guide, CHIF curriculum, CHIF content, CHIF objectives, CHIF skills, CHIF knowledge, CHIF tools, CHIF techniques, CHIF investigation, CHIF forensics, CHIF cybersecurity, CHIF digital forensics, CHIF computer forensics. CHFI V9, CHFI version 9, CHFI 9, CHFI certification, CHFI course, CHFI training, CHFI online, CHFI overview, CHFI scope, CHFI topics, CHFI audience, CHFI consultants, CHFI series, CHFI duration, CHFI modules, CHFI syllabus, CHFI exam, CHFI preparation, CHFI materials, CHFI resources, CHFI guide, CHFI curriculum, CHFI content, CHFI objectives, CHFI skills, CHFI knowledge, CHFI tools, CHFI techniques, CHFI investigation, CHFI forensics, CHFI cybersecurity, CHFI digital forensics, CHFI computer forensics, CHFI CHIF V9, CHFI 9, CHIF 9, CHIF certification, CHIF course, CHIF training, CHIF online, CHIF overview, CHIF scope, CHIF topics, CHIF audience, CHIF consultants, CHIF series, CHIF duration, CHIF modules, CHIF syllabus, CHIF exam, CHIF preparation, CHIF materials, CHIF resources, CHIF guide, CHIF curriculum, CHIF content, CHIF objectives, CHIF skills, CHIF knowledge, CHIF tools, CHIF techniques, CHIF investigation, CHIF forensics, CHIF cybersecurity, CHIF digital forensics, CHIF computer forensics.
On-Demand -
In this on-demand training, you will learn how to secure infrastructure, such as wireless access points, firewalls, and servers.
cybersecurity, endpoint defense, security fundamentals, secure infrastructure, wireless access points, firewalls, servers, working examples, helpful advice, security concepts, applications and data, users, security posture, maximum impact, cyber security, end point defense, security fundementals, infrastructure security, wireless access point, firewall, server, helpful advise, security conceps, mispelling, cyber secutiry, endpoint defence, secuirty fundamentals, secure infrastucture, wireless access ponts, firewals, serfers, helpfull advice, secuirty concepts, aplications and data, mispeling, users, secuirty posture, maxum impact. cyber security, endpoint defence, security fundamentals, secure infrastructure, wireless access points, firewalls, servers, practical examples, useful advice, security principles, applications and data, users, security stance, greatest impact, cyber security, endpoint defence, security fundamentals, infrastructure security, wireless access point, firewall, server, useful advice, security concepts, , cyber security, endpoint defence, security fundamentals, secure infrastructure, wireless access points, firewalls, servers, helpful advice, security concepts, applications and data, , users, security posture, maximum impact.
On-Demand -
In this on-demand series, you explore the topics necessary to prepare for the CySA+ exam.
CySA+ exam, computer security, threats, threat management, reconnaissance, countermeasures, vulnerabilities, penetration testing, incident response, security architectures, tool sets, CySA exam, CySA+, compter security, threts, thret management, reconaissance, counter measures, vunerabilities, penatration testing, insident response, secutiry architectures, toolsets CySA+ exam, computer security, threats, threat management, reconnaissance, countermeasures, vulnerabilities, penetration testing, incident response, security architectures, tool sets, CySA exam, CySA+, computer security, threats, threat management, reconnaissance, countermeasures, vulnerabilities, penetration testing, incident response, security architectures, toolsets.
On-Demand -
In this module you learn the differences between single, dual, and multi-factor authentication and how to set up Windows Hello on a stand alone Windows 10 machine.
single factor authentication, dual factor authentication, multi factor authentication, Windows Hello, Windows 10, set up, security, IT security, practical security, singel factor authentication, duall factor authentication, mulit factor authentication, Windwos Hello, Windwos 10, set-up, secutiry, IT secutiry, practical secutiry single factor authentication, dual factor authentication, multi factor authentication, Windows Hello, Windows 10, set up, security, IT security, practical security, single factor authentication, dual factor authentication, multi factor authentication, Windows Hello, Windows 10, set-up, security, IT security, practical security.
On-Demand -
In this on-demand training, you’ll build a solid base around the entire vulnerability management process including the understanding of vulnerabilities, identifying and ranking the security issues, and recommending solutions to remediate the security issues.
Threat assessment, vulnerability assessment, security issues, defensive strategy, information security, vulnerabilities, security breaches, cyber-attacks, remediation solutions, security personnel, comprehensive assessment, security policies, sophisticated attacks, Ransomware, hands-on instruction, midsize organizations, large organizations, security management, security tools, security methods, security examples, security explanations, security instruction, security training, security course, security modules, security duration, security breaches. Threat assessment Threat assessement, Threat asessment, Threat assessmant, Threat assessmen Vulnerability assessment Vulnerability assessement, Vulnerability asessment, Vulnerability assessmant, Vulnerability assessmen Security issues Secuirty issues, Security isues, Security issu, Secutiry issue Defensive strategy Defensive stratgy, Defensive stragey, Defensive strtegy Information security Information secuirty, Information sercurity, Information securtiy Vulnerabilities Vulnerabilites, Vulnerabilties, Vulnerabilty Security breaches Security breeches, Security breches, Security breahce Cyber-attacks Cyberattacks, Cyber attaks, Cyber atack Remediation solutions Remediation solutios, Remediation solutins, Remediation solutino Security personnel Security personel, Security perssonel, Security peronnel Comprehensive assessment Comprehensive assesment, Comprehensive asessment, Comprehensive assessmant Sophisticated attacks Sophisticated atacks, Sophisticated attaks, Sophisticated attacke Ransomware Ransom ware, Ransome ware, Ransomeware Threat assessment, vulnerability assessment, security issues, defensive strategy, information security, vulnerabilities, security breaches, cyber-attacks, remediation solutions, security personnel, comprehensive assessment, security policies, sophisticated attacks, Ransomware, hands-on instruction, medium-sized organisations, large organisations, security management, security tools, security methods, security examples, security explanations, security instruction, security training, security course, security modules, security duration, security breaches. Threat assessment Threat assessment, Threat assessment, Threat assessment, Threat assessment Vulnerability assessment Vulnerability assessment, Vulnerability assessment, Vulnerability assessment, Vulnerability assessment Security issues Security issues, Security issues, Security issues, Security issues Defensive strategy Defensive strategy, Defensive strategy, Defensive strategy Information security Information security, Information security, Information security Vulnerabilities Vulnerabilities, Vulnerabilities, Vulnerabilities Security breaches Security breaches, Security breaches, Security breaches Cyber-attacks Cyber-attacks, Cyber-attacks, Cyber-attacks Remediation solutions Remediation solutions, Remediation solutions, Remediation solutions Security personnel Security personnel, Security personnel, Security personnel Comprehensive assessment Comprehensive assessment, Comprehensive assessment, Comprehensive assessment Sophisticated attacks Sophisticated attacks, Sophisticated attacks, Sophisticated attacks Ransomware Ransomware, Ransomware, Ransomware
On-Demand -
Learning Tree
This course provides a comprehensive introduction to zero trust concepts, principles, and deployment models.
Zero Trust Architecture, Training, Delivery Methods, Online, Training Information, Course Benefits, Understand, Limitations, Traditional Network Security, Core Concepts, Guiding Tenets, Reference Models, NIST 800-207, Key Technologies, Micro-Segmentation, Software-Defined Perimeters, Multi-Factor Authentication, Continuous Authorisation, Use Cases, Applications, Data, Infrastructure, People, Deployment, Adoption, Maintenance, Training Prerequisites, Enterprise Security Concepts, Network Infrastructure, Authentication, Access Controls, Training Outline, Fundamentals, Definition, Protections, Design Principles, Discover, Users, Devices, Cloud Asset API, Identities, AWS, IAM Dashboard, IAM Access Management, Identity Life Cycle, User and Service Accounts, GCP Roles, Windows Device Security, Security Processor, Verified Access, DoD Strategy, CISA Maturity Model, Policies, Authenticate, Authorize, GCP IAM Permissions, Shielded VMs, Monitoring Strategy, BYOD, Guest Devices, Rogue Device Detection, Web Server Logs, Network Monitoring, SIEM Dashboard, Amazon CloudWatch, Monitoring User and Entity Behaviours, Determine Device and Service Health, Linux, Cloud Providers, Kubernetes, Zero Trust Achitecture, Traning, Delivey Methods, Onine, Trainin Information, Course Benifits, Undestand, Limitatins, Traditonal Network Securty, Core Concets, Guding Tenets, Referene Models, NIST 800-207, Key Tecnologies, Micro-Segmantation, Sotware-Defined Perimetres, Multi-Fator Authentication, Continuos Authorisation, Use Cases, Apllications, Dta, Infrastucture, Peple, Deployent, Adopton, Maintenace, Training Prequisites, Enterprize Security Conecpts, Netwok Infrastructure, Authntication, Acces Controls, Traning Outline, Fundmentals, Defintion, Protectons, Desing Principles, Discver, Uers, Devies, Cloud Assest API, Identites, AWZ, IAM Dashbord, IAM Acces Management, Identiy Life Cycle, User and Servce Accounts, GCP Rols, Windos Device Secrity, Security Procssor, Verifed Access, DoD Srategy, CISA Maturiy Model, Polices, Authnticate, Autorize, GCP IAM Permisions, Shelded VMs, Monitorng Strategy, BYD, Gues Devices, Roge Device Detction, Web Serve Logs, Networ Monitoring, SIEM Dashbord, Amazon ClouWatch, Monitorng User and Entiy Behaviours, Detemine Device and Servce Health, Linx, Clod Providers, Kuberetes, Zero Trust Architecture, Utbildning, Leveransmetoder, Online, Utbildningsinformation, Kursfördelar, Förstå, Begränsningar, Traditionell Nätverkssäkerhet, Grundläggande Begrepp, Styrande Principer, Referensmodeller, NIST 800-207, Nyckelteknologier, Mikrosegmentering, Mjukvarudefinierade Gränser, Flerfaktorsautentisering, Kontinuerlig Auktorisering, Användningsfall, Applikationer, Data, Infrastruktur, Människor, Implementering, Adoption, Underhåll, Förkunskapskrav för Utbildning, Företagssäkerhetskoncept, Nätverksinfrastruktur, Autentisering, Åtkomstkontroller, Utbildningsöversikt, Grundläggande, Definition, Skydd, Designprinciper, Upptäck, Användare, Enheter, Molntillgångs-API, Identiteter, AWS, IAM-instrumentbräda, IAM-Åtkomsthantering, Identitetslivscykel, Användar- och Tjänstekonton, GCP Roller, Windows Enhetssäkerhet, Säkerhetsprocessor, Verifierad Åtkomst, DoD Strategi, CISA Mognadsmodell, Policys, Autentisera, Auktorisera, GCP IAM-behörigheter, Skärmade VM, Övervakningsstrategi, BYOD, Gästenheter, Detektion av Obehöriga Enheter, Webbserversloggar, Nätverksövervakning, SIEM-instrumentbräda, Amazon CloudWatch, Övervaka Användar- och Entitetsbeteenden, Fastställa Enhetens och Tjänstens Hälsa, Linux, Molnleverantörer, Kubernetes
Intermediate1 dayOnline or In-classStarts from £690 -
Learning Tree
Master MITRE ATT&CK Framework: Learn to map threats, apply real-world scenarios, and boost cyber defenses. Essential for security pros.
MITRE ATT&CK Framework, cybersecurity training, online course, foundation of MITRE ATT&CK, matrices, tactics, techniques, data sources, mitigations, cyber threat intelligence, defensive strategies, SolarWinds attack, threat intelligence mapping, adversary behaviours, ATT&CK Navigator, supply chain attacks, threat indicators, MITRE CAR, MITRE D3FEND, defensive recommendations, prioritizing techniques, security applications, cyber attacks, real-world case studies, cybersecurity concepts, online learning, MITRE ATT&CK Framework, cybersäkerhetsträning, onlinekurs, grundläggande MITRE ATT&CK, matriser, taktiker, tekniker, datakällor, mildringar, cyberhotunderrättelse, defensiva strategier, SolarWinds-attack, kartläggning av hotunderrättelse, fiendebeteenden, ATT&CK Navigator, leverantörskedjeattacker, hotindikatorer, MITRE CAR, MITRE D3FEND, defensiva rekommendationer, prioritering av tekniker, säkerhetstillämpningar, cyberattacker, fallstudier i verkligheten, cybersäkerhetsbegrepp, e-lärande, MITER ATT&K Framewurk, cybersicurity trainin, onlien corse, foundashun of MITER ATT&K, matrises, tactiks, tekniques, data sorses, mitigashuns, cybr thret intelligens, defensiv strategis, SolarWinds atack, thret inteligence maping, adversery behavirs, ATT&K Navigater, supply chane atacks, thret indicaters, MITER CAR, MITER D3FND, defensiv recomendations, prioritizing tecniques, securty aplications, cyber ataks, real-wurld case studis, cybersicurity concepts, onlien lerning
Intermediate1 dayOnline or In-classStarts from £690 -
Learning Tree
Master AI in cybersecurity attack and defence. Dive into AI's role in cybersecurity. Boost your skills now!
nist ai risk management framework, security information and event management, natural language processing course, team training, cyber security, machine learning, learning tree, federated learning, risk assessment and management, security automation, security teams, artificial intelligence ai, wide range, security information and event, information and event management, open source, training data, machine learning algorithms, sensitive data, volumes of data, security solutions, driving cars, data breach, deep neural networks, cyber threats, threat hunting, log data, training models, large scale, mobile devices, AI cybersecurity, attack, defend, training, course, AI cybersäkerhet, attack, försvar, utbildning, kurs
Intermediate3 daysOnline or In-classStarts from £1,780 -
ISACA
This CDPSE training course provides enterprises the ability to identify technologists who can keep the organisation compliant efficiently and cost-effectively.
CDPSE, technical privacy requirements, certification, expertise, privacy controls, systems, networks, applications, privacy by design, technology platforms, products, processes, legal professionals, compliance, IT professionals, data breaches, first-line defense, technical privacy solutions, lead software engineer, domain architect, legal care compliance, privacy, security, privacy engineer, privacy solutions architect, IT project manager, privacy data scientist, privacy analyst, lead privacy manager. CDPCE, technial privacy requirements, privicy controls, systms, netwroks, applicatons, privcy by design, technolgy platfoms, produts, proceses, legl professionals, complince, IT profssionals, data breaches, first-lin defense, technicl privcy solutons, lead sftware enginner, domain arhitect, legal cre compliance, privcy, secuity, privcy engneer, privcy solutons arhitect, IT project managr, privcy data scintist, privcy analist, lead privcy managr. CDPSE, technical privacy requirements, certification, expertise, privacy controls, systems, networks, applications, privacy by design, technology platforms, products, processes, legal professionals, compliance, IT professionals, data breaches, first-line defence, technical privacy solutions, lead software engineer, domain architect, legal care compliance, privacy, security, privacy engineer, privacy solutions architect, IT project manager, privacy data scientist, privacy analyst, lead privacy manager. CDPCE, technical privacy requirements, privacy controls, systems, networks, applications, privacy by design, technology platforms, products, processes, legal professionals, compliance, IT professionals, data breaches, first-line defence, technical privacy solutions, lead software engineer, domain architect, legal care compliance, privacy, security, privacy engineer, privacy solutions architect, IT project manager, privacy data scientist, privacy analyst, lead privacy manager.
Intermediate3 daysOnline or In-classStarts from £2,059 -
IAPP
Get Certified Information Privacy Technologist Training based on IAPP's CIPT/US certification program.
Certified Information Privacy Technologist, CIPT, privacy, data protection, IT products, IT services, development, engineering, deployment, auditing, information and communication technologies, systems, IAPP, ANSI-accredited, Certified Information Privacy Professional, US, certification program, tech pros, securing data privacy, examination prep course, key concepts, timed practice test, review, instructor, exam blueprint, potential test takers, Certified Information Privacy Technologist CIPT , privcy, dat protection, IT producs, IT servces, developmnt, enginering, deployent, audting, infrmation and communcation technologies, systms, IAPP, ANSI-accreddited, Certified Information Privacy Professional, US, certificaton program, tec pros, securng data privcy, examinaton prep course, key concpts, timed practce test, revew, instrctor, exam blueprit, pontial test takers. Certified Information Privacy Technologist, CIPT, privacy, data protection, IT products, IT services, development, engineering, deployment, auditing, information and communication technologies, systems, IAPP, ANSI-accredited, Certified Information Privacy Professional, UK, certification programme, tech pros, securing data privacy, examination prep course, key concepts, timed practice test, review, instructor, exam blueprint, potential test takers, Certified Information Privacy Technologist CIPT , privacy, data protection, IT products, IT services, development, engineering, deployment, auditing, information and communication technologies, systems, IAPP, ANSI-accredited, Certified Information Privacy Professional, UK, certification programme, tech pros, securing data privacy, examination prep course, key concepts, timed practice test, review, instructor, exam blueprint, potential test takers.
Foundation2 daysOnline or In-classStarts from £2,695 -
IAPP
This course provides exam preparation for CIPM certification — the world’s first and only certification in privacy programme management.
Certified Information Privacy Manager, CIPM, privacy training, privacy programme management, privacy programme framework, privacy programme operational lifecycle, privacy team, IAPP, ANSI-accredited, Certified Information Privacy Professional/ U.S., CIPM/US, Body of Knowledge, Certified Information Privacy Professional/Management, CIPN, privicy, program, maneger Certified Information Privacy Manager, CIPM, privacy training, privacy programme management, privacy programme framework, privacy programme operational lifecycle, privacy team, IAPP, ANSI-accredited, Certified Information Privacy Professional/UK, CIPM/UK, Body of Knowledge, Certified Information Privacy Professional/Management, CIPN, privacy, programme, manager.
Intermediate2 daysTeam Training -
In this on-demand training, you learn to clearly identify, mitigate, and report any potential cyber threats to your organization.
data security, privacy training, cyber threats, protect, organization, compromised, employees, engaging content, scenario-based, micro-learning methodology, information, module duration, potential threats, report, mitigate, attacks, data securty, privicy training, cyber threts, orginization, compromized, employes, engaing content, scenerio-based, micro-learing methdology, informashun, modul durashun, potentail threts, repport, mitagate, attaks. data security, privacy training, cyber threats, protect, organisation, compromised, employees, engaging content, scenario-based, micro-learning methodology, information, module duration, potential threats, report, mitigate, attacks, data security, privacy training, cyber threats, organisation, compromised, employees, engaging content, scenario-based, micro-learning methodology, information, module duration, potential threats, report, mitigate, attacks.
On-Demand -
Learn how zero trust security solves typical security issues, and how to implement it in your environment.
zero trust security, implementation, design considerations, technical implementation, traditional security approach, federal agencies, physical access, connectivity, remote work, authentication, authorisation, user access, application security, container networking, transaction-level controls, access rules, resource access, IP, firewall, White House, security issues, for-profit, nonprofit, government, ubiquity, Internet of Things, direct links, Chris DeRusha, Chief Information Security Officer, zero trsut security, implemntation, desgn considerations, technial implementation, traditonal security approach, federl agencies, phsical access, connetivity, remte work, authntication, authoriztion, user acess, appliction security, contaner networking, transaction-level contols, access ruls, resurce access, IP, firewal. zero trust security, implementation, design considerations, technical implementation, traditional security approach, government agencies, physical access, connectivity, remote work, authentication, authorization, user access, application security, container networking, transaction-level controls, access rules, resource access, IP, firewall, Downing Street, security issues, for-profit, non-profit, government, ubiquity, Internet of Things, direct links, Chris DeRusha, Chief Information Security Officer, zero trust security, implementation, design considerations, technical implementation, traditional security approach, government agencies, physical access, connectivity, remote work, authentication, authorization, user access, application security, container networking, transaction-level controls, access rules, resource access, IP, firewall.
Foundation3 daysOnline or In-class -
EC-Council
This CCISO Certification course from EC-Council focuses on applying information security management principles & preps you to pass the CCISO exam.
8140/8570, 8140, 8570, certification, training, information security, executives, management, principles, technical knowledge, executive management, aspiring CISO, seasoned professionals, knowledge transfer, critical areas, successful program, ISACA, CISM Certification Exam, DoD Directive 8140/8570.01, IAM Level-II, IAM Level-III, CSSP Manager, , s certfication traning execuitivemanagment prinicpletechncial knowledge exectuive management CISO aspiring knowlege tansfer crtitical aeraISACA certification CISM Certification DoD Directive 8140/8570.01 IAM Level II IAM Level III CSSP_Manager
Advanced5 daysOnline or In-classOn-DemandStarts from £1,995 -
ISACA
In this course, you will gain the knowledge needed to successfully pass the certification exam and become a CISM, ISACA Certified Information Security Manager.
CISM, Certified Information Security Manager, course, certification exam, security governance, risk management, compliance, security program development, security incident management, CAP certification exam, U.S. DoD Directive 8140/8570.01, IAM Level-I, IAM Level-II, CISIM, CISM certification, security managment, risk managment, compliance, security program, security incident, CAP certification, DoD Directive 8140/8570.01, IAM Level 1, IAM Level 2. CISM, Certified Information Security Manager, course, certification exam, security governance, risk management, compliance, security programme development, security incident management, CAP certification exam, UK MoD Directive 8140/8570.01, IAM Level-1, IAM Level-II, CISIM, CISM certification, security management, risk management, compliance, security programme, security incident, CAP certification, MoD Directive 8140/8570.01, IAM Level 1, IAM Level 2.
Intermediate4 daysOnline or In-classStarts from £2,890 -
ISACA
This official ISACA CRISC training course helps you prepare for the certification exam & provides you with in-depth coverage of the four CRISC domains.
CRISC, certification, ISACA, risk identification, IT risk assessment, risk response, mitigation, risk and control monitoring, reporting, enterprise risk management, IT professional, control professional, business analyst, project manager, compliance professional, exam, experience, risk management, IS control, prep course, exam candidate information guide, exam day rules, deadlines, ISACA certification prep training. CRIS certification ISACA certification course risk managment IT risk asessment risk and control monitering CRISC, certification, ISACA, risk identification, IT risk assessment, risk response, mitigation, risk and control monitoring, reporting, enterprise risk management, IT professional, control professional, business analyst, project manager, compliance professional, exam, experience, risk management, IS control, prep course, exam candidate information guide, exam day rules, deadlines, ISACA certification prep training. CRIS certification ISACA certification course risk management IT risk assessment risk and control monitoring No translation needed as the text is already in English UK .
Intermediate4 daysOnline or In-classStarts from £2,890 -
ISACA
This official ISACA CGEIT certification course preps you for the exam & provides you with in-depth coverage of the CGEIT Framework & its implementation.
CGEIT certification, IT governance, GEIT Framework, Senior Managers, CIOs, Compliance, IS Professionals, risk management, IT resources, benefits realization, exam preparation, ISACA certification, exam rules, exam dates, exam deadlines, CGEIT certifcation, IT governence, ISACA certifcation CGEIT certification, IT governance, GEIT Framework, Senior Managers, CIOs, Compliance, IS Professionals, risk management, IT resources, benefits realisation, exam preparation, ISACA certification, exam rules, exam dates, exam deadlines, CGEIT certification, IT governance, ISACA certification.
Intermediate4 daysOnline or In-classStarts from £2,650 -
ISACA
Get certified with our CISA training course! Covers all 5 domains on the exam, meets DoD Directive 8140/8570.01 requirements.
CISA (CERTIFIED INFORMATION SYSTEMS AUDITOR), CERTIFIED INFORMATION SYSTEMS AUDITOR), CISA CERTIFIED INFORMATION SYSTEMS AUDITOR, 8140/8570, 8140, 8570, CISA training, ISACA CISA, information systems auditing, control, information security, IT governance, management of IT, information systems acquisition, development, implementation, operations, maintenance, support, protection of information assets, CISA domains, CISA certification exam, US DoD Directive 8140/8570.01, Technical IAT Level-III, CSSP Auditor requirementCISA traning, ISACA CISAA, information system auditing, information secruity, IT governence, management or IT, information system aquisition, developement, implimentation, operation, maintenence, CISA domians, certifcation exam, DOD, DIRECTIVE 8140/8570.1, technical, IT level III, CSPP auditor
Intermediate4 daysOnline or In-classStarts from £2,890 -
ISC2
This CISSP® Training and Certification prep course provides in-depth training in the ISC2™ curriculum that will help prepare you to pass your CISSP exam.
CISSP TRAINING AND CERTIFICATION PREP (WITH EXAM VOUCHER), CISSP, CISSP TRAINING AND CERTIFICATION PREP, CISSP, certification, training, prep course, security, risk management, asset security, security framework design, network security, software development security, DoD Directive 8140/8570.01, IAT Level-III, IASAE Level-I, IASAE Level-II, IAM Level-II, IAM Level-III, information assurance, security architect, security engineer, secure communication, pass exam, become certified, UK, CISPP, CISP, CIPSS, SSCP, SISP CISSP, certification, training, preparation course, security, risk management, asset security, security framework design, network security, software development security, Ministry of Defence Directive 8140/8570.01, IAT Level-III, IASAE Level-I, IASAE Level-II, IAM Level-II, IAM Level-III, information assurance, security architect, security engineer, secure communication, pass exam, become certified, UK, CISPP, CISP, CIPSS, SSCP, SISP.
Intermediate5 daysOnline or In-classStarts from £3,475 -
ISC2
This SSCP® training and certification course prepares you to pass the exam and become a Systems Security Certified Practitioner.
SSCP, SSC, SSCPT, 8140/8570, 8140, 8570, SSCP, certification, course, exam, Systems Security Certified Practitioner, skills, concepts, domains, Access Controls, Security Operations, Administration, Incident Response, Cryptography, Network Security, DoD, Directive 8140, 8570.01, Technical, IAT, CSSP, Infrastructure, training, prepare, pass, official, ISC ², U.S., United Statesmay vary
Foundation5 daysOnline or In-classStarts from £2,890 -
ISC2
This CGRC® training and certification course prepares you for the CGRC exam plus risk management frameworks.
8140/8570, 8140, 8570, CGRC, Certified in Governance Risk and Compliance, CAP, Certified Authorization Professional, information security, risk management, security risk management, authorization, organization mission, legal requirements, regulatory requirements, DoD, IAM, Level-I, Level-II, certification exam, training, practitioner. CGRC CRCG, CRGC, CGRC® Governance Goverance Compliance Complience Authorization Authorisation Information Informtion Security Secuirty Management Managment Requirements RequirmentCertification Certificaton Training Trainning Practitioner Practicioner, 8140/8570, 8140, 8570, CGRC, Certified in Governance Risk and Compliance, CAP, Certified Authorization Professional, information security, risk management, security risk management, authorisation, organisation mission, legal requirements, regulatory requirements, DoD, IAM, Level-I, Level-II, certification exam, training, practitioner. CGRC CRCG, CRGC, CGRC® Governance Goverance Compliance Complience Authorisation Authorisation Information Informtion Security Secuirty Management Managment Requirements RequirmentCertification Certificaton Training Trainning Practitioner Practicioner
Intermediate5 daysOnline or In-classStarts from £2,890 -
ISC2
This healthcare information security course tuition includes the current Official (ISC)² Guide to the HCISPP CBK, and an exam voucher.
Intermediate3 daysOnline or In-classStarts from £2,095 -
Learning Tree
This NICE Framework workshop teaches you how to apply the NICE Cybersecurity Workforce Framework to your organization's specific cybersecurity workforce needs.
cybersecurity, workforce, framework, workshop, national initiative, education, organization, needs, interactive, instructor, advisor, environment, experience, cibersecurity, work force, fraemwork, workshp, nationl initative, eduction, organisaton, interactiv, instuctor, advisr, enviroment. cybersecurity, workforce, framework, workshop, national initiative, education, organisation, needs, interactive, instructor, advisor, environment, experience, cybersecurity, workforce, framework, workshop, national initiative, education, organisation, interactive, instructor, advisor, environment.
Foundation1 dayTeam Training -
ISC2
CYBRScore Systems Security Essentials Labs include 32 hands-on labs on risk management, network security, identity & access management & security operations.
FoundationMulti-WeekOn-Demand -
Learning Tree
In this NIST training course (Cybersecurity Framework), US government employees will learn how to meet all cyber laws & regulations in their agency.
NIST, Cybersecurity Framework, risk assessment, risk management, US Government, laws, regulations, National Institute of Standards and Technology, training, course, workshop, workbook, source documents, cybersecurity staff, organisation, losses, protect, regulations, laws, NISTt, cyberscurity, framewrok, risk asessment, risk managment, govornment, laws and regulations, Nationl Institute of Standards and Technology, tranning, cours, workshp, workbok, cyber security staff, organisaton, looses, protec, mispelling cyberscurity, organisaiton, loosses NIST, Cybersecurity Framework, risk assessment, risk management, UK Government, laws, regulations, National Institute of Standards and Technology, training, course, workshop, workbook, source documents, cybersecurity staff, organization, losses, protect, regulations, laws, NIST, cybersecurity, framework, risk assessment, risk management, government, laws and regulations, National Institute of Standards and Technology, training, course, workshop, workbook, cybersecurity staff, organization, losses, protect, cybersecurity, organization, losses.
Intermediate4 daysOnline or In-classStarts from £2,195 -
Learning Tree
2014, cybersecurity, risk management, supply chain, critical suppliers, third-party, fourth-party, mitigation strategies, hardware, software, services, external sources, analyzing, treating, monitoring, cibersecurity, risck management, suply chain, mitagation strategies, hardwear, softwear, extrenal sources. cybersecurity, risk management, supply chain, critical suppliers, third-party, fourth-party, mitigation strategies, hardware, software, services, external sources, analysing, treating, monitoring, cybersecurity, risk management, supply chain, mitigation strategies, hardware, software, external sources.
Intermediate2 daysOnline or In-classStarts from £1,645 -
Learning Tree
This Cyber Security Success Factors course provides an introduction to the 4 pillars of cyber security. Examine real cyber attacks & their countermeasures.
Cyber Security, Security Training, Success Factors, Network Security, Digital Signatures, Encryption, Authentication, Countermeasures, Cyber Attacks, Open Source Tools, Network Passwords, Confidentiality, , Mis-spellings Cyber Securty, Secuity Training, Securty Success Factors, Network Securty, Digital Signitures, Encrytion, Authentification, Countermeasures, Cyber Attaks, Open Sorce Tools, Network Passwrds, Confidentality. Cyber Security, Security Training, Success Factors, Network Security, Digital Signatures, Encryption, Authentication, Countermeasures, Cyber Attacks, Open Source Tools, Network Passwords, Confidentiality, , Mis-spellings Cyber Security, Security Training, Security Success Factors, Network Security, Digital Signatures, Encryption, Authentication, Countermeasures, Cyber Attacks, Open Source Tools, Network Passwords, Confidentiality.
Foundation1 dayTeam Training -
Learning Tree
Learn cybersecurity for managers, members of the board and senior executives to understand, assess, and take a proactive posture in cyber security.
cyber security, training, managers, boardroom, executives, risk assessment, management frameworks, security gaps, liability, certification, DoD, information assurance, United States Department of Defense, 8570.01 Directive, potential security gaps, proactive posture, fundamental knowledge, investigate, assess, mitigate dangers, cyber secutiry, trainning, manegers, bordroom, excutives, risk asesment, managment framewroks, secuirty gaps, certificatoin, DOD, informatoin assurence, United States Dept of Defense, 8570.01 Directiv, potentail secuirty gaps, proactiv postur, fundemental knowlege, investgiate, asess, migitate dangrs. cyber security, training, managers, boardroom, executives, risk assessment, management frameworks, security gaps, liability, certification, MoD, information assurance, Ministry of Defence, 8570.01 Directive, potential security gaps, proactive posture, fundamental knowledge, investigate, assess, mitigate dangers, cyber security, training, managers, boardroom, executives, risk assessment, management frameworks, security gaps, certification, MoD, information assurance, Ministry of Defence, 8570.01 Directive, potential security gaps, proactive posture, fundamental knowledge, investigate, assess, mitigate dangers.
IntermediateLess than a dayTeam Training -
Microsoft
Prepare to design and evaluate cybersecurity strategies in Zero Trust, GRC, SecOps, and data with our Microsoft Cybersecurity Architect (SC-100) course.
SC100, Microsoft, Cybersecurity, Architect, course, design, evaluate, strategies, Zero Trust, Governance Risk Compliance, GRC, security operations, SecOps, data, applications, solutions, specify, requirements, cloud infrastructure, service models, SaaS, PaaS, IaaS, Microssoft, Cybersescurity, Archtect, Zerro Trsut, Govenrance Risk Complience, Secuity Oprations, Aaplcations, Slnutions, cloud infrasturcture, misplelling, IAS, SC100, cybersecurity, architect, SC-100, course, design, evaluate, strategies, Zero Trust, Governance Risk Compliance, GRC, security operations, SecOps, data, applications, solutions, cloud infrastructure, service models, SaaS, PaaS, IaaS, specify, requirements, Microsoft, cyberscurity, architekt, SC100, strategeis, Zer Trust, Govenance Risk Compliance, SecOps, infrastrcture, Serivce models, Saas, PaaS, Iaas. cybersäkerhet, arkitekt, SC-100, kurs, design, utvärdera, strategier, Zero Trust, Governance Risk Compliance, GRC, säkerhetsoperationer, SecOps, data, applikationer, lösningar, molninfrastruktur, tjänstemodeller, SaaS, PaaS, IaaS, specificera, krav, Microsoft, stavfel cyberscurity, architekt, SC100, strategeis, Zer Trust, Govenance Risk Compliance, SecOps, infrastrcture, Serivce models, Saas, PaaS, Iaas.
Advanced4 daysOnline or In-classStarts from £2,415 -
AWS
This Security Engineering on AWS course teaches how to efficiently use Amazon Web Services security services to stay secure & compliant in the AWS Cloud.
Security Engineering, AWSSO, Security Operations, AWS security services, security best practices, data security, system security, cloud security, compute security, storage security, networking security, database security, security control objectives, regulatory compliance standards, regulated workloads, automation, continuous monitoring, AWS services, AWS tools, security operations. Securty Engineering AWSS Security OperatonAWS security servcesecutiry best practisedata secuirty system secuirty cloud secuirty compute secuirty storage secuirty networking secuirty database secuirty secuirty control objectiveregulatory complience standardregulatd workloadautomtion continous monitoring AWS servcieAWS tolsecuirty operatons Security Engineering, AWSSO, Security Operations, AWS security services, security best practices, data security, system security, cloud security, compute security, storage security, networking security, database security, security control objectives, regulatory compliance standards, regulated workloads, automation, continuous monitoring, AWS services, AWS tools, security operations. Security Engineering AWSSO Security Operations AWS security services security best practices data security system security cloud security compute security storage security networking security database security security control objectives regulatory compliance standards regulated workloads automation continuous monitoring AWS services AWS tools security operations
Intermediate3 daysOnline or In-classStarts from £2,650 -
Learning Tree
Learn to integrate strong security measures into web app development with our Securing Web Apps Training.
Web application security, web server security, web service security, cybersecurity, OWASP, web application development, security measures, secure architecture, best practices, critical security risks, remediation, hands-on experience, in-depth training, full stack cybersecurity, web-based applications, web apps and services, securing web applications, securing web servers, securing web services, cyber security, web app security, web server secruity, web service secruity, OWASP top ten. Web application security, web server security, web service security, cybersecurity, OWASP, web application development, security measures, secure architecture, best practices, critical security risks, remediation, hands-on experience, in-depth training, full stack cybersecurity, web-based applications, web apps and services, securing web applications, securing web servers, securing web services, cyber security, web app security, web server security, web service security, OWASP top ten.
Intermediate4 daysOnline or In-classStarts from £2,515 -
ISC2
This CSSLP® Training and Certification course provides you with in-depth coverage of the skills and concepts of the eight domains of software security.
8140/8570, 8140, 8570, CSSLP, Certified Secure Software Lifecycle Professional, software security, software development, certification, software concepts, requirements, design, implementation, testing, lifecycle management, DoD Directive 8140/8570.01, Information Assurance Security Architect, IASAE, Level-I, Level-II, training, exam, in-depth coverage, premier, skills, concepts, achieve, prepared, official, ISC 2, CSSLPP, CSSPL, Certified Secured Software Lifecycle Professional, Information Assurance Security Architect/Engineering, IASAE Level 1, IASAE Level 2, desing, implementaion, testing, lifecyle management, DoD Directive 8140/8570.01, Infrmation Assurance Security Architect/Engineer, IASAE, Level-1, Level-2. CSSLP, CSSLP-certifiering, mjukvarusäkerhet, säker mjukvaruutveckling, mjukvarukoncept, krav, design, implementation, testning, livscykelhantering, DoD-direktiv 8140, 8570.01, Information Assurance Security Architect/Engineer, IASAE, Nivå-I, Nivå-II, utbildning, certifiering, ISC ², stavfel CSSLP-certifcation, sofware-säkerhet, secur mjukvaruutveckling, softwre-koncept, requirments, desing, implementaion, testning, lifecyle-hantering, DoD-direktiv 8140/8570.01, Infrmation Assurance Security Architect/Engineer, IASAE, Nivå-1, Nivå-2.
Intermediate5 daysOnline or In-classStarts from £3,475 -
Microsoft
The Microsoft 365 Security course will prepare you for the MS-500 exam & achieve Microsoft 365 Certified: Security Administrator Associate designation.
ms500, ms-500, secure user access, user password protection, multi-factor authentication, Azure Identity Protection, Azure AD Connect, conditional access, threat protection technologies, threat vectors, Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, threat management, information protection technologies, information rights-managed content, message encryption, labels, policies, rules, data loss prevention, archiving, retention, data governance, content searches, investigations, data retention policies, in-place records management, SharePoint, email retention, eDiscovery investigations, Microsoft 365 Security Administrator, MS-500, secur, acsess, passwrd, mulit-factor, Azur Identity, Azur AD, conditonal, thret, Secure Scroe, Exhange, Advnced, managemnt, infrmation, rights-managed, conten, mesage, encription, labls, polices, ruls, dataloss, archivng, retenton, governence, serches, investgations, dataretention, in-place, recrds, Sharepoint, emailretention, e-Discovery. secure user access, user password protection, multi-factor authentication, Azure Identity Protection, Azure AD Connect, conditional access, threat protection technologies, threat vectors, Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, threat management, information protection technologies, information rights-managed content, message encryption, labels, policies, rules, data loss prevention, archiving, retention, data governance, content searches, investigations, data retention policies, in-place records management, SharePoint, email retention, eDiscovery investigations, Microsoft 365 Security Administrator, MS-500, secure, access, password, multi-factor, Azure Identity, Azure AD, conditional, threat, Secure Score, Exchange, Advanced, management, information, rights-managed, content, message, encryption, labels, policies, rules, data loss, archiving, retention, governance, searches, investigations, data retention, in-place, records, SharePoint, email retention, e-Discovery.
Intermediate4 daysOnline or In-class -
EC-Council
This EC-Council Certified Application Security Engineer (CASE) .NET course teaches how to create secure applications & to achieve CASE .NET certification
EC-Council, Application Security Engineer, CASE, .NET, training, software professional, hands-on, comprehensive, security skills, knowledge, software development life cycle, SDLC, secure methodologies, insecure operating environment, exam, certification, secure programming concepts, programming experience, desktop, mobile, web, cloud applications, multiple choice questions, passing score, software developers, testers, architects, high quality, security, privacy. EC-Counsil Application Secutiry Engineer CAE Net traning software profesional lifecycle methedologieinsecure opperating environment Certifiate passsing score developperarchitctprivicy
Intermediate3 daysTeam TrainingTeam Training -
EC-Council
This EC-Council Certified Application Security Engineer (CASE) Java course teaches how to create secure applications & to achieve CASE Java certification
EC-Council, Certified, Application, Security, Engineer, CASE, Java
Intermediate3 daysOnline or In-classStarts from £1,865 -
CertNexus
Prepare for the CSC-210 exam with this CertNexus Cyber Secure Coder certification training course.
Cyber Secure Coder, software security, development teams, software quality, software development lifecycle, vulnerabilities, remediate, security defects, misconfiguration, design software, human element, incorporate security, CertNexus, CSC-210 exam, cybersecurity, secure coding, secure software development, privacy, security issues, security risks, security controls, security testing, security assessment, security audit, security compliance, security policies, security standards, secure coding practices, secure coding guidelines, secure coding techniques, secure coding principles, secure coding standards, secure coding best practices, secure coding training, secure coding certification, secure coding course, secure coding education, secure coding workshop, secure coding seminar, secure coding conference, secure coding webinar, secure coding tutorial, secure coding resources, secure coding tools, secure coding software, secure coding languages, secure coding frameworks, secure coding libraries, secure coding platforms, secure coding methodologies, secure coding principles. Cyper Secure Coder secuity devlopment vunerabilities remedate misconfiguation privcy certnexis CEC-210 exam cybersecurity secure codeing secure sofware development secutity securty securiy securty secuirty securiyt securit securtiy securti securty securiity securtiity securitity securtiity securty securiyty securecoding securecodeing securecodig securecodign securecding securecdoing securecodin securecodnig securecodning secure coing secure codng secure codig secure codign secure cdong secure cdoing secure codin secure codnig secure codning secure-coding Cyber Secure Coder, software security, development teams, software quality, software development lifecycle, vulnerabilities, remediate, security defects, misconfiguration, design software, human element, incorporate security, CertNexus, CSC-210 exam, cybersecurity, secure coding, secure software development, privacy, security issues, security risks, security controls, security testing, security assessment, security audit, security compliance, security policies, security standards, secure coding practices, secure coding guidelines, secure coding techniques, secure coding principles, secure coding standards, secure coding best practices, secure coding training, secure coding certification, secure coding course, secure coding education, secure coding workshop, secure coding seminar, secure coding conference, secure coding webinar, secure coding tutorial, secure coding resources, secure coding tools, secure coding software, secure coding languages, secure coding frameworks, secure coding libraries, secure coding platforms, secure coding methodologies, secure coding principles. Cyber Secure Coder security development vulnerabilities remediate misconfiguration privacy CertNexus CSC-210 exam cybersecurity secure coding secure software development security security security security security security security security security security security security security security secure coding secure, CertNexus, Cyber Secure Coder, software security, development teams, code, delivery, software quality, privacy issues, software development lifecycle, vulnerabilities, remediate, security defects, misconfiguration, design software, human element, incorporate security, CertNexus CSC-210 exam, Cert Nexus, Cyber Secure Corder, sofware security, developement teams, desing software CertNexus, Cyber Secure Coder, mjukvarusäkerhet, utvecklingsteam, kod, leverans, mjukvarukvalitet, integritetsproblem, mjukvaruutvecklingslivscykel, sårbarheter, åtgärda, säkerhetsdefekter, felkonfiguration, designa mjukvara, mänskligt element, integrera säkerhet, CertNexus CSC-210-examen, stavfel Cert Nexus, Cyber Secure Corder, sofware security, developement teams, desing software.
Intermediate3 daysTeam Training -
DevOps Institute
This SecDevOps Practitioner® (SDOP) Certification course builds on foundational SecDevOps knowledge while providing practical, hands-on experience.
DEVOPS-GOVT, DEVOPSGOVT, DEVOP, DEVOPS-GOVT, DEV OPS GOVT, DEV OPSGOVT, DEV OP, SecDevOps, SDOP, Certification, Training, foundational practice, SDOF, techniques, pipeline architecture, effective team, best-practice processes, implementation, comprehensive understanding, optimum outcomes, practitioner-level class, foundational course, roadmap, SecDevOps Foundation, ecDevOps, SDOP, Certification, Training, foundational practice, SDOF, techniques, pipeline architecture, effective team, best-practice processes, implementation, comprehensive understanding, optimum outcomes, practitioner-level class, foundational course, roadmap, SecDevOps Foundation SecDevOps, SDOP, Certification, Training, foundational practice, SDOF, techniques, pipeline architecture, effective team, best-practice processes, implementation, comprehensive understanding, optimum outcomes, practitioner-level class, foundational course, roadmap, SecDevOps Foundation, ecDevOps, SDOP, Certification, Training, foundational practice, SDOF, techniques, pipeline architecture, effective team, best-practice processes, implementation, comprehensive understanding, optimum outcomes, practitioner-level class, foundational course, roadmap, SecDevOps Foundation.
Intermediate2 daysOnline or In-classStarts from £1,390 -
ISC2
Get ISC2 Certified in Cybersecurity (CC) for entry-level to advanced certs & leadership roles. No experience needed.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, certified in cybersecurity, entry-level certification, cybersecurity certification, no experience required, recent graduates, career changers, IT professionals, advanced cybersecurity certifications, CISSP, Information Systems Security Professional, Security+, leadership roles, cyberscurity, cybsersecurity, certifed in cybersecurity, entery-level certification, cyberscurity certification, experiece required, recent gradutes, carer changers, IT profesionals, advaced cybersecurity certifications, CISSP, Infrmation systems security profesional, security+, lideraship roles.
Foundation1 dayOnline or In-classStarts from £875 -
Learning Tree
The Information Security Training provides the knowledge and skills to analyse and assess network risks, then select & deploy appropriate countermeasures.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, Information Security, Security Training, Network Risks, Countermeasures, Cybersecurity, IT Security, Risk Assessment, Security Analysis, Data Protection, Vulnerability Assessment, Threat Detection, Risk Management, Security Controls, Security Awareness, Security Policies, Security Procedures, Security Best Practices, Access Control, Authentication, Encryption, Firewall, Intrusion Detection, Malware Protection, Phishing Protection, Social Engineering, Cybercrime, Information Assurance, Security Compliance, Security Auditing, Security Certification, Security Consulting, Security Services, Security Solutions, Security Products, Security Tools, Security Technologies, Cybersecurity Training, IT Security Training, Risk Assessment Training, Security Analysis Training, Data Protection Training, Vulnerability Assessment Training, Threat Detection Training, Risk Management Training, Security Controls Training, Security Awareness Training, Security Policies Training, Security Procedures Training, Security Best Practices Training, Access Control Training, Authentication Training, Encryption Training, Firewall Training, Intrusion Detection Training, Malware Protection Training, Phishing Protection Training, Social Engineering Training, Cybercrime Training, Information Assurance Training, Security Compliance Training, Security Auditing Training, Security Certification Training, Security Consulting Training, Security Services Training, Security Solutions Training, Security Products Training, Security Tools Training, Security Technologies Training, Cybersecurity Certification, IT Security Certification, Risk Assessment Certification, Security Analysis Certification, Data Protection Certification, Vulnerability Assessment Certification, Threat Detection Certification, Risk Management Certification, Security Controls Certification, Security Awareness Certification, Security Policies Certification, Security Procedures Certification, Security Best Practices Certification, Access Control Certification, Authentication Certification, Encryption Certification, Firewall Certification, Intrusion Detection Certification, Malware Protection Certification, Phishing Protection Certification, Social Engineering Certification, Cybercrime Certification, Information Assurance Certification, Security Compliance Certification, Security Auditing Certification, Security Consulting Certification, Security Services Certification, Security Solutions Certification, Security Products Certification, Security Tools Certification, Security Technologies Certification. Information Secutity, Secutiry, Secutiry Training, Netwrok Risks, Coutermeasures, Cyber Secutiry, IT Secutiry, Risck Assessment, Data Protecion, Vunerability Assessment, Threat Detecion, Risck Managemet, Access Contol, Authenticaion, Encrypion, Intrusion Detecion, Malware Protecion, Phishing Protecion, Social Enginering, Cybercrim, Informaion Assurance, Secutiry Compliance, Secutiry Auditing, Secutiry Cerification, Secutiry Consuling, Secutiry Services, Secutiry Soluions, Secutiry Producis, Secutiry Tools, Secutiry Technologies, Cyber Secutiry Training, IT Secutiry Training, Risck Assessment Training Information Security, Security Training, Network Risks, Countermeasures, Cybersecurity, IT Security, Risk Assessment, Security Analysis, Data Protection, Vulnerability Assessment, Threat Detection, Risk Management, Security Controls, Security Awareness, Security Policies, Security Procedures, Security Best Practices, Access Control, Authentication, Encryption, Firewall, Intrusion Detection, Malware Protection, Phishing Protection, Social Engineering, Cybercrime, Information Assurance, Security Compliance, Security Auditing, Security Certification, Security Consulting, Security Services, Security Solutions, Security Products, Security Tools, Security Technologies, Cybersecurity Training, IT Security Training, Risk Assessment Training, Security Analysis Training, Data Protection Training, Vulnerability Assessment Training, Threat Detection Training, Risk Management Training, Security Controls Training, Security Awareness Training, Security Policies Training, Security Procedures Training, Security Best Practices Training, Access Control Training, Authentication Training, Encryption Training, Firewall Training, Intrusion Detection Training, Malware Protection Training, Phishing Protection Training, Social Engineering Training, Cybercrime Training, Information Assurance Training, Security Compliance Training, Security Auditing Training, Security Certification Training, Security Consulting Training, Security Services Training, Security Solutions Training, Security Products Training, Security Tools Training, Security Technologies Training, Cybersecurity Certification, IT Security Certification, Risk Assessment Certification, Security Analysis Certification, Data Protection Certification, Vulnerability Assessment Certification, Threat Detection Certification, Risk Management Certification, Security Controls Certification, Security Awareness Certification, Security Policies Certification, Security Procedures Certification, Security Best Practices Certification, Access Control Certification, Authentication Certification, Encryption Certification, Firewall Certification, Intrusion Detection Certification, Malware Protection Certification, Phishing Protection Certification, Social Engineering Certification, Cybercrime Certification, Information Assurance Certification, Security Compliance Certification, Security Auditing Certification, Security Consulting Certification, Security Services Certification, Security Solutions Certification, Security Products Certification, Security Tools Certification, Security Technologies Certification. Information Security, Security Training, Network Risks, Countermeasures, Cybersecurity, IT Security, Risk Assessment, Security Analysis, Data Protection, Vulnerability Assessment, Threat Detection, Risk Management, Security Controls, Security Awareness, Security Policies, Security Procedures, Security Best Practices, Access Control, Authentication, Encryption, Firewall, Intrusion Detection, Malware Protection, Phishing Protection, Social Engineering, Cybercrime, Information Assurance, Security Compliance, Security Auditing, Security Certification, Security Consulting, Security Services, Security Solutions, Security Products, Security Tools, Security Technologies, Cybersecurity Training, IT Security Training, Risk Assessment Training.
Foundation4 daysOnline or In-classStarts from £2,515 -
Learning Tree
In this Introduction to Cybersecurity course, you'll learn to assess your environment, identify needs & enumerate critical elements of security awareness.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, cybersecurity, cyber security, online security, internet safety, computer safety, data protection, data privacy, network security, IT security, information security, cybersecurity awareness, cyber safety, cyber awareness, disaster recovery, continuity of operations, security assessment, security needs, security deficits, security awareness
Foundation1 dayOnline or In-classStarts from £605 -
EC-Council
CYBRScore Network Essentials Labs include 16 hands-on labs focused on security to prep you to work with a variety of hardware, software & network configurations.
FoundationMulti-WeekOn-Demand -
CompTIA
This CompTIA Security+® certification course prepares you for the CompTIA SY0-701 exam & ensures compliance & secures your organization.
SYO-701, SYO-601, 601, 701, securityplus, plus, CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, 8140/8570, 8140, 8570, CompTIA Security+, course, knowledge, certification exam, vendor-neutral, information system security, best practices, Security+ certification, systems, network security, network infrastructure, access control, assessments, audits, cryptography, organizational security, passing, U.S. DoD Directive 8140/8570.01, Technical IAT Level-II, Management IAM Level-I, requirements. Comptia Security, Comptia Security+ certification exam, Infomation system security, best practises, Security + certification, access controll, organisational security, cryptographycryptography, organisatonal. CompTIA Security+, kurs, certifiering, examen, leverantörsneutral, informationssystemssäkerhet, bästa praxis, kunskap, system, nätverkssäkerhet, nätverksinfrastruktur, åtkomstkontroll, bedömningar, revisioner, kryptografi, organisatorisk säkerhet, godkännande, U.S. DoD Directive 8140/8570.01, teknisk IAT nivå-II, ledning IAM nivå-I, krav, stavfel comptia, secutiry, ssecurity, sy, leverantörsneutral, bästa praxis, bedömningar, kryptografi, organisatorisk.
Intermediate5 daysOnline or In-classPremiumStarts from £1,995 -
EC-Council
Validate your cybersecurity skills with the C|CT Certification in network defense, ethical hacking, digital forensics, and security operations.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, Certified Cybersecurity Technician, C|CT, entry-level certification, cybersecurity technicians, foundational skills, network defense, ethical hacking, digital forensics, security operations, Cybersecurity Technitian, C|TCT, cyber security technician. Certified Cybersecurity Technician, C|CT, is an entry-level certification for cybersecurity technicians that focuses on foundational skills such as network defence, ethical hacking, digital forensics, and security operations. Cybersecurity Technician, C|TCT, and cyber security technician.
Foundation5 daysOnline or In-classStarts from £2,890 -
Learning Tree
This Disaster Recovery & Business Continuity course teaches you to identify vulnerabilities and implement a Business Continuity Management System (BCMS).
disaster recovery, business continuity, training, mission-critical, continuity needs, risk, incident response team charter, Business Continuity Management System BCMS , organisational resilience, disaster recovery plan, ICT Information and Communication Technology Service Delivery, Line management, project management, Facilities, Human Resources, finance, disater recovery, busines continuty, tranning, misson-critical, continuty neads, risck, inciddent response team charter, Business Continuity Managment System BCMS , organzational resilience, disester recovery plan, IT Information Technology Service Delivery, Line managment, project managment, Facilities, Human Resorces, finace. disaster recovery, business continuity, training, mission-critical, continuity needs, risk, incident response team charter, Business Continuity Management System BCMS , organisational resilience, disaster recovery plan, ICT Information and Communication Technology Service Delivery, Line management, project management, Facilities, Human Resources, finance, disaster recovery, business continuity, training, mission-critical, continuity needs, risk, incident response team charter, Business Continuity Management System BCMS , organisational resilience, disaster recovery plan, IT Information Technology Service Delivery, Line management, project management, Facilities, Human Resources, finance.
Foundation4 daysOnline or In-classStarts from £2,515 -
Cisco
Learning Tree's SCOR training helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles.
SCOR Course Outline, Cisco CCNP Security, CCIE Security, senior-level security roles, advanced threat protection, cybersecurity attacks, security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements, Cisco Firepower Next-Generation Firewall, Cisco ASA Firewall, access control policies, mail policies, 802.1X Authentication, Cisco Stealthwatch Enterprise, Cisco Stealthwatch Cloud, threat detection features, Implementing and Operating Cisco Security Core Technologies 350-701 SCOR exam, Cisco Certified Specialist Security Core certifications, Ethernet, TCP/IP networking, Windows operating system, Cisco IOS networking, networking security concepts, Security Engineer, Network Engineer, Network Designer, Network Administrator, Systems Engineer, Consulting Systems Engineer, Technical Solutions Architect, Cisco Integrators/Partners, Network Manager, Cisco integrators, partners. SCOR Course Outlien Cisco CCNP Secuirty CCIE Secuirty cybersecurity atacks endpoint protecton Cisco Firepowr Next-Generation Firewall Cisco ASA Fireall access contro policies Implementing and Operating Cisco Secuirty Core Technologies 350-710 SCOR exam Cisco Certifed Specialist Secuirty Core certifications TCP/PI networking Cisco IOS netowkring networking secuirty concepts Secuirty Engineer Network Desiger Netowrk Administrator System Engineer Cisco Integrator/Partners Netowrk Mnager Cisco integrator and partners SCOR Course Outline, Cisco CCNP Security, CCIE Security, senior-level security roles, advanced threat protection, cybersecurity attacks, security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcement, Cisco Firepower Next-Generation Firewall, Cisco ASA Firewall, access control policies, mail policies, 802.1X Authentication, Cisco Stealthwatch Enterprise, Cisco Stealthwatch Cloud, threat detection features, Implementing and Operating Cisco Security Core Technologies 350-701 SCOR exam, Cisco Certified Specialist Security Core certifications, Ethernet, TCP/IP networking, Windows operating system, Cisco IOS networking, networking security concepts, Security Engineer, Network Engineer, Network Designer, Network Administrator, Systems Engineer, Consulting Systems Engineer, Technical Solutions Architect, Cisco Integrators/Partners, Network Manager, Cisco integrators, partners. SCOR Course Outline Cisco CCNP Security CCIE Security cybersecurity attacks endpoint protection Cisco Firepower Next-Generation Firewall Cisco ASA Firewall access control policies Implementing and Operating Cisco Security Core Technologies 350-701 SCOR exam Cisco Certified Specialist Security Core certifications TCP/IP networking Cisco IOS networking networking security concepts Security Engineer Network Designer Network Administrator Systems Engineer Consulting Systems Engineer Technical Solutions Architect Cisco Integrators/Partners Network Manager Cisco integrators and partners.
Intermediate5 daysOnline or In-classStarts from £3,305 -
EC-Council
In this Certified Network Defender (CND) training course, you will get prepped to pass the EC-Council CND 312-38 exam and learn how to manage a secure network.
8140/8570, 8140, 8570, Certified Network Defender CND , EC-Council, CND 312-38 exam, design network security, manage network security, defensive security, handle network defense, data security, configure networking technologies, install defensive software, confidentiality, integrity, availability, cyber security war, network administrators, enterprise network, network security, tactical expertise, secure data, build defenses, U.S. DoD Directive 8140/8570.01, Technical IAT Level-I, Technical IAT Level-II, Management IAM Level-I, CSSP Infrastructure Support, CYBRScore Lab Bundles, Certified Network Defendar, EC-Council Certified Network Defender, CND training, security network design, secure network managment, data securitas, configur networking tecnologies, defansive software, confidenciality, intgregity, avalability, cyber security, cyber defence, network administrator, enterprise networking, U.S. DoD Directive 8140/8570.01 Technical certified , CSSP infrastructure suport.
Intermediate5 daysOnline or In-classOn-DemandStarts from £1,595 -
This on-demand module offers an introduction to business continuity disaster recovery.
Business continuity, disaster recovery, continuity planning, disaster preparedness, emergency management, crisis management, risk management, business resiliency, contingency planning, business continuity management, DR planning, BCP, BCM, DRP, emergency response, disaster response, disaster mitigation, business interruption, business continuity plan, business continuity strategy, disaster recovery strategy, disaster recovery plan, crisis communication, data backup, data recovery, IT disaster recovery, business continuity training, disaster recovery training, business continuity certification, disaster recovery certification, business continuity consultant, disaster recovery consultant, business continuity software, disaster recovery software, disaster recovery services, business continuity services Business continuty, disaster recover, continutiy planning, disaster prepairedness, emergency managment, crisis managment, risk managment, business resiliance, contingency planing, business continutiy managment, DR planing, BCP, BCM, DRP, emergency responce, disaster responce, disaster migation, business interuption, business continutiy plann, business continutiy stratgy, disaster recover stratgy, disaster recover plann, crisis communcation, data bakup, data recover, IT disaster recover, business continuty traning, disaster recover traning, business continuty certifcation, disaster recover certifcation, business continuty consultnt, disaster recover consultnt, business continuty softwere, disaster recover softwere, disaster recover services, business continuty services. Business continuity, disaster recovery, continuity planning, disaster preparedness, emergency management, crisis management, risk management, business resilience, contingency planning, business continuity management, DR planning, BCP, BCM, DRP, emergency response, disaster response, disaster mitigation, business interruption, business continuity plan, business continuity strategy, disaster recovery strategy, disaster recovery plan, crisis communication, data backup, data recovery, IT disaster recovery, business continuity training, disaster recovery training, business continuity certification, disaster recovery certification, business continuity consultant, disaster recovery consultant, business continuity software, disaster recovery software, disaster recovery services, business continuity services Business continuity, disaster recovery, continuity planning, disaster preparedness, emergency management, crisis management, risk management, business resilience, contingency planning, business continuity management, DR planning, BCP, BCM, DRP, emergency response, disaster response, disaster mitigation, business interruption, business continuity plan, business continuity strategy, disaster recovery strategy, disaster recovery plan, crisis communication, data backup, data recovery, IT disaster recovery, business continuity training, disaster recovery training, business continuity certification, disaster recovery certification, business continuity consultant, disaster recovery consultant, business continuity software, disaster recovery software, disaster recovery services, business continuity services.
On-Demand -
Cisco
In this course, implement and configure Cisco Secure Firewall Threat Defense for deployment as a next generation firewall at the internet edge.
Foundation5 daysOnline or In-class