Online Course in IT Security in United Kingdom

Find Online Courses in IT Security in United Kingdom 2017

IT Security

The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom and Britain, is a sovereign state located off the north-western coast of continental Europe.The two most famous (and oldest) universities are Oxford and Cambridge (often referred to as Oxbridge by many Britons) England also has several other world-class institutions, including several in London (notably Imperial College, the London School of Economics, University College London and King's College London, all are part of London University)

Online Course in IT Security in United Kingdom

Read More

Cyber Security & Ethical Hacker Expert - Training Package (with CISA, CISSP, CISM, CHFI & CEH)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Master the skills needed to reach the highest levels of IT security professionalism and stand out from the crowd with this all-inclusive five course Cyber Security & Ethical Hacker Expert package. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? The course includes all the materials needed to study towards obtaining the most recognised certifications in the industry: Certified Ethical Hacker (CEH) Using enumeration to catalogue system resources and potential routes to breach. Automated tools for breaching security including Trojans, backdoors, viruses, worms and Denial of Service (DOS) attacks. The role of social engineering to steal confidential information directly from employees. Using sniffers and session hijacking to mask illegal access to system resources. Web-based attacks that can take online systems down. How wireless network security can be breached. How hackers avoid protective measures like IDS, firewalls and honeypots. Using cryptography and steganography to protect data. How to use the Metasploit toolkit to assess network protection measures and apply fixes where appropriate. Computer Hacking Forensic Investigator (CHFI) How to carry out an investigation according to industry best practice principles and legal guidelines. Searching and seizing resources as required for the investigation. How to handle digital evidence to maintain legal standards. What the first responder needs to do as soon as a breach is identified to prevent loss of evidence or failing to meet legal evidence requirements. Acquiring and duplicating data Using Access Data’s Forensic Toolkit (FTK), EnCase and special steps to review data whilst leaving all evidence intact. Understanding steganography and how such techniques can be used to mask data theft. Password recovery techniques and how to circumvent basic technologies employed to hide criminal activity. Certified Information Security Manager (CISM) Information security management How to develop an information security strategy. Risk assessment methodologies How to implement an info risk assessment process Conversation of strategies into implementation plans Integrating enterprise business objectives and info security policies Security stakeholder education process Components of incident response Certified Information Systems Auditor (CISA) Internal control classifications IT strategy Information systems maintenance practices Media disposal process How to evaluate service level management practices Network security devices and network components Business continuity and disaster recovery regulations Certified Information Systems Security Professional (CISSP) Accounts and identity management Technical penetration testing Layers of protection Connectivity interfaces and applications Digital signature overview How to apply integrity controls Types of encryption Software OS and design Data backup and control Policy and program management Who is it intended for? This package is for anyone who is looking to gain extensive, expert knowledge in IT security. Requirements There are no pre-requisites for this course. In order to obtain certification for CISSP students must have at least five years of recent full-time professional work experience in at least 2 of the 8 CISSP domains. What marks this course apart? With this package the IT security world is truly your oyster. You can function in roles such as lead auditing manager, IT security architect and IT security consultant. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CEH (Certified Ethical Hacking and Countermeasures) - Training Programme

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Master the tools and techniques that hackers use to bypass security for your own corporate network defensive strategies with this Certified Ethical Hacking and Countermeasures course. [+]

What are the objectives of this course? The knowledge gained in this course can help you to harden defences and reduce the risk of compromise, saving time and money that would otherwise be spent recovering from a security breach in a corporate environment. Intro to course Footprinting & Reconnaissance Scanning Networks Enumeration System Hacking Trojans & Backdoors Viruses & Worms Denial of Service Social Engineering Sniffers Session Hijacking Hacking Webservers Hacking Web Applications SQL Injection Hacking Wireless Networks Evading IDS, Firewalls & Honeypots Buffer Overflows Cryptography Penetration Testing Who is it intended for? This course is for anyone who is looking to learn the skills and techniques required to make a change into IT security, or any network/security professionals who need a better understanding of hacking techniques. Requirements There are no pre-requisites for this course. What marks this course apart? Once you have completed this course you will be able to sit the Certified Ethical Hacking Certification 312-50 examination. Students will be able to function in roles such as ethical hacker, cyber security and penetration tester. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CompTIA Cloud+ (CV0-001)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

With the need for IT professionals who specialise in cloud computing growing, there are more and more opportunities becoming available. Be able to proactively seek these opportunities by completing this CompTIA Cloud+ course which will show your expertise in implementing and maintaining cloud technologies. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? Learn everything you need to have a good understanding of the key concepts behind cloud computing and how they can be implemented into an organisation’s IT infrastructure. Introduction to models, service and delivery models, terms and characteristics and objects storage concepts. Install, configure and manage VM and devices. Backups, virtual disks, virtual switches and virtual resource migration. Discover the benefits of virtualisation in a cloud environment before comparing and contrasting virtual environments. Infrastructure, different access protocols, storage configuration, file system types, executing storage provisioning and network sharing. Implementing appropriate network configurations and the importance of network optimisation. Troubleshooting basic network configurations and troubleshoot commands. Common network protocols and common hardware resources Resource management and establishing baselines and thresholds How to appropriately allocate physical host resources and virtual guest resources and how to use appropriate tools for remote access. Master security, including storage security concepts and methods, different encryption technologies and identifying access control methods. Systems management, how to diagnose, remediate and optimise and common performance concepts and testing techniques. Study business continuity in cloud and solutions to meet availability requirements. Who is it intended for? We recommend IT professionals with at least 24-36 months of work experience in IT networking/data centre administration to take this course. It provides solid foundational skills for the cloud infrastructure. Requirements There are no pre-requisites to take this course, but we do recommend 24-36 months of work experience in IT networking or data centre administration. What marks this course apart? Once you have passed the CompTIA Cloud+ CV0-001 exam you will be qualified to work in roles such as cloud support engineer, cloud network architect and cloud software engineer. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CompTIA A+ Technician 2015 (220-901, 220-902) with Live Labs

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Actively seek opportunities in the IT industry with the knowledge contained in the industry-leading CompTIA certifications and make a start with this CompTIA A+ course with Live Labs. [+]

What are the objectives of this course? Master fundamentals of PC hardware, networking, operating systems, troubleshooting and security with this training materials and live labs package. The live labs are an essential learning resource for students as it allows them to test their knowledge and skills in practice exercises and environments without the need to invest in a costly test lab of their own. The course covers the full syllabus for CompTIA A+ 220-901 & 220-902: Introduction to PCs and IT certification Internal hardware components and how to expand hardware capabilities Storage fundamentals Use of peripheral devices and mobile devices Managing mobile devices Hardware and network troubleshooting Applying core concepts and protocols of networking such as IPv4, IPv6, DHCP and subnet mask to set up and support wired and wireless networks. Potential network connectivity issues and how to overcome them Introduction to operating systems Installing, configuring and managing traditional operating systems including Android, iOS, Windows and Linux. Supporting and securing access to data by using authentication, access control and encryption for an organisation. Utilizing the basics of virtualization, cloud computing, desktop imaging and deployment to support IT infrastructures. Troubleshooting and operational procedures Who is it intended for? CompTIA A+ is a vendor-neutral qualification and is seen as essential training for IT engineers, technicians and support analysts. Requirements There are no pre-requisites to take the course. In order to be CompTIA A+ certified you must pass both exams. What marks this course apart? CompTIA A+ certified IT professionals can function in roles such as IT support technician, IT engineer and support analyst. The CompTIA A+ is also the entry-level course for the rest of the CompTIA Qualifications, meaning that upon completion you’ll be able to move onto the professional level depending on which speciality you wish to branch into. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CompTIA Security+ 2014 (SY0-401) with Live Labs

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Enter the IT security industry with the knowledge of the globally-recognised CompTIA best practice concepts in this course. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? Learn the fundamentals of computer security with the vendor-neutral CompTIA Security+ course and live labs package where you will have 19 comprehensive modules to guide you through everything you’ll need to know to pass your exams. The live labs are an essential learning resource for students as it allows them to test their knowledge and skills in practice exercises and environments without the need to invest in a costly test lab of their own. Network Terminology. Learn all you need to know about wireless. Introduction to security terminology. Identifying and satisfying compliance needs and policies for data security. Physical Security. Gain insight into disaster recovery, risk analysis, business continuity and business impact analysis. Introduction to Computer Forensics. Different types of attacks and system security threats and how they can be blocked. The use of encryption to protect data, even if it is intercepted by a third party. Cryptography Who is it intended for? Anyone who is looking to enter the world of IT security or any IT professional who is looking to upskill. Requirements There are no pre-requisites for this course. What marks this course apart? This qualification will provide you with all the knowledge you need to go into roles such as security architect, security administrator or security engineer. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Cisco CCNA Collaboration Courseware

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Upgrade your CV and boost employability in the IT industry by studying this course which will give you an understanding of the convergence of voice, video, data and mobile applications in a corporate environment. [+]

What are the objectives of this course? This course will help students to advance their collaboration and video skills in line with the convergence of voice, video, data and mobile applications. Cisco unified communications solutions Characteristics of Cisco unified communications solutions Cisco Unified communications manager administrator interfaces Cisco UCM end-user interfaces and call flows and call legs Component impact on call flows in unified communications manager Cisco UCM and Cisco UCM express end-users Cisco UCM and Cisco UCM express endpoint implementation options Understanding telephony features Telephony feature implementation and mobility options Unity connection and end-user and mailbox requirements Unity connection and end user and mailbox requirements Unity connection end user implementation and IM and presence service Supporting end users and understanding Cisco UCM reports Cisco UCM call detail records and reporting and monitoring tools Cisco business video solutions and video collaboration Installation and configuration of Cisco IP phones and Cisco jabber Troubleshooting Cisco IP phone, Cisco jabber and endpoint issues Describing Cisco TelePresence and endpoints Configuring Cisco TelePresence TC Troubleshooting Cisco TelePresence endpoints Configuring and monitoring Cisco conferencing and DMPs Who is it intended for? This course is for network engineers and IT professionals who are looking to develop their collaboration and video skills. Requirements There are no official pre-requisites to take this course but we recommend a good understanding of Cisco networking technologies. What marks this course apart? Once a student has taken this course they will be able to function in roles such as network engineer, network video engineer and collaboration engineer. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CIW Web Security Associate Training (1D0-571)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Explore essential security principles that every IT security professional should know with this CIW Security Associate course. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? The framework of this course will take students through crucial knowledge that is needed to counter-act any damage and successfully restore computer systems to ensure they can withstand hacker activity that may occur in the future. How hacker threat occur and learn about which security threats exist. Discover the high standard of security that is needed for modern businesses to continuously protect valuable company data against unauthorised activity. Learn how to implement access control lists so you can identify who should and shouldn’t be accessing particular networks. Uncover the most up-to-date firewall technology and study how to improve operating systems to remove the chance of unwanted hacker activity. Essential information on authentication procedures, encryption standards and actions that help to ensure proper user authentication. How to create integrated security policies, along with the most common security principles for both personal and business use. Master what it takes to respond to and report hacker activity, engage in pro-active detection and always remain on step ahead when it comes to protecting your company’s needs. Who is it intended for? This course is for IT security professionals who want to study towards an industry-recognised certification, it is also for people who want to switch industries and go into IT security. Requirements There are no pre-requisites for this course. What marks this course apart? Once students have completed this course, they are eligible to sit the 1D0-571 examination. They will be able to function in roles such as systems administrator, network server administrator and firewall administrator. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CIW Database Design Specialist Training with Exam (1D0-541)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Prove your understanding of product-focused database solutions with this CIW Database Design Specialist course and exam package that will give you the certification you need. [+]

What are the objectives of this course? This qualification will give students the necessary knowledge to plan and design product-focused database solutions for businesses and the certification to prove those skills to potential employers. The exam has a time limit of 90 minutes and there are a total of 50 questions. Candidates need to achieve a minimum score of 75% to pass. Introduction to Databases Logical Database Design Relational Database Physical Database Design Database Planning Structured Query Language (SQL) Overview of Database Design Methodology Relational Algebra Normalisation Transactions and Database Security Who is it intended for? This package is for anyone who is looking to upskill in their current workplace or looking to switch careers into database design and optimisation. Requirements There are no official pre-requisites for this course, however it is recommended that students have a basic knowledge of the purpose and function of a database and basic computer literacy. What marks this course apart? Candidates who pass this course will be able to function in roles such as database developer, database administrator and application developer. This course also goes hand-in-hand with other CIW training programmes as well as further database qualifications. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Microsoft MCTS - System Centre 2012 (70-243) with Live Labs

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Seek opportunities in the IT industry in specialist management roles by taking this Microsoft System Centre 2012 course and gain the skill validation for configuring and managing physical and virtual IT environments across data centres. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? The course is split into two modules (10747D and 10748C) and will give you all the knowledge you need to pass the Microsoft 70-243 examination. Taking you through day-to-day management tasks for System Centre 2012 R2 Configuration Manager, you will also learn how to migrate from System Centre 2012 Configuration Manager to System Centre 2012 R2 Configuration Manager. Live Labs are included in this package and are seen as an essential learning resource for students as it allows them to test their knowledge and skills in practice exercises and environments without the need to invest in a costly test lab of their own. Microsoft 70-243 TS: Administering and Deploying System Centre 2012 Configuration Manager: 10748C Describe the System Centre 2012 R2 Configuration Manager Infrastructure. Plan and Deploy a Stand-Alone primary Site. Plan and Configure Role-Based Administration. Plan and Deploy a Multiple Site Hierarchy. Replicate and Manage Content in Configuration Manager. Plan Resource Discovery and Client Deployment. Configure Internet and Cloud-based Client Management. Maintain and Monitor System Centre 2012 R2 Configuration Manager. Migrate to System Centre 2012 R2 Configuration Manager 10747D Overview of System Centre 2012 R2 Configuration Manager. Discovering and Organising Resources. Managing the Configuration Manager Client Agent. Managing Inventory and Software Metering. Querying and Reporting Data Managing Software Distribution and Deployment by Using Packages and Programs Creating and Deploying Applications Deploying Additional Application Types Deploying and Managing Software Updates Implementing Endpoint Protection by Using System Centre 2012 R2 Configuration Manager Managing Compliance Settings and Profiles Mobile Device Management Using System Centre 2012 R2 Configuration Manager Configuring Wake On LAN, Power Management and Remote Control Who is it intended for? This course is intended for IT professionals who are responsible for configuring and managing endpoints in one or more System Centre 2012 Configuration Manager sites and have one to three years experience in medium to large enterprise organisations. Requirements There are no official pre-requisites for this course but Microsoft recommend Windows Server, security and networking experience in an enterprise environment. What marks this course apart? The MCTS – System Centre 2012 qualification ties in with any other Microsoft qualification you might be interested in taking. Once you have completed this course, you will be able to function in roles such as Windows Server administrator, enterprise desktop administrator and exchange administrator. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Microsoft MCSE - Exchange Server 2013 (70-341, 70-342) with Live Labs

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Seek employment in the IT industry by validating your skillset in building and maintaining an organisation’s messaging solution with this set of techniques from the world’s biggest IT brand. [+]

What are the objectives of this course? Throughout your course duration we will also provide access to dedicated Live Labs that students can use to practice and develop their practical skills. These labs will allow you to put your knowledge to the test and recreate scenarios you come up against during your studies. The first three modules of the course consist of the MCSA Server 2012. Here students will learn the fundamentals of working with Microsoft Windows Server 2012, how to keep a Windows Server 2012 machine running in peak condition and the advanced services required to maintain an enterprise-class IT environment: Microsoft 70-410: Installing & Configuring Windows Server 2012 Microsoft 70-411: Administering Windows Server 2012 Microsoft 70-412: Configuring Advanced Windows Server 2012 Services The course then shifts focus to Microsoft Exchange 2013 and the fundamentals of the messaging platform with the Microsoft 70-341: Core Solutions of Microsoft Exchange Server 2013. Students will learn: How to deploy and manage Exchange Server 2013 and use the tools provided to monitor, maintain and troubleshoot a server instance. An introduction to the Exchange Server roles and how they are best deployed and managed. How to plan, deploy and secure a high-availability Exchange Server by mastering permissions, antivirus, antispam, backup and data recovery provisions. Implementing and securing remote email access using the Outlook Web App and third-party mobile messaging apps. Centralising and managing recipient objects, address policies and address lists to improve internal and external communications. The final module will take students through the advanced features of Exchange Server 2013 in the Microsoft 70-342: Advanced Solutions of Microsoft Exchange Server 2013 module: Building a Unified Messaging (UM) solution that improves business-wide communications and availability. Boosting security and compliance provisions to meet operational and legal requirements. Building an email archiving solution to manage an ever-increasing volume of messages. Planning Hybrid scenarios including migration and federation of messaging and data. Who is it intended for? This course is for IT administrators who need to learn messaging-specific skills to satisfy the requirement of a job role, or IT professionals who are looking to upskill. Requirements There are no pre-requisites to take this course. What marks this course apart? Professionals with the MCSE Server 2012 & 2013 Messaging qualification can function in roles such as 3rd line engineer, infrastructure support, Windows Server administrator and IT manager. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Course in Introduction to Cyber Security

FutureLearn
Online Full time Part time 8 weeks October 2017 United Kingdom London + 1 more

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life. [+]

Online Courses in IT Security in United Kingdom. Course in Introduction to Cyber Security We shop online. We work online. We play online. We live online. As our lives increasingly depend on digital services, the need to protect our information from being maliciously disrupted or misused is really important. This free online course will help you to understand online security and start to protect your digital life, whether at home or work. You will learn how to recognise the threats that could harm you online and the steps you can take to reduce the chances that they will happen to you. With cyber security often in the news today, the course will also frame your online safety in the context of the wider world, introducing you to different types of malware, including viruses and trojans, as well as concepts such as network security, cryptography, identity theft and risk management. Your guide for the course is Cory Doctorow, a visiting professor at The Open University. "If you want an introduction to the subject that provides an overview or to improve your own personal information security, it is an excellent course - enjoyable, informative, engaging and authoritative.” - Tony Morbin, Editor-in-Chief, SC Magazine Double accredited course This GCHQ Certified Training course is also accredited by the Institute of Information Security Professionals (IISP). It has been developed by The Open University with support from the UK Government’s National Cyber Security Programme and can be accessed free of charge. Requirements The course does not assume any prior knowledge of computer security and can be enjoyed by anyone interested in improving the security of their digital information. [-]

ITIL® Intermediate Level - Release, Control & Validation (RCV) Training & Exam Package

E-Careers
Online Part time 12 months Open Enrollment United Kingdom UK Online

Learn to successfully plan, test and implement new services that meet organisational needs and get certified with this ITIL® Intermediate – Release, Control and Validation training and exam package. [+]

What are the objectives of this course? The course will take students through the principles involved in controlling systems and software release, protect IT service offerings as a whole more effectively and validate the outcomes of these types of projects. Using transition planning and support to develop simplify the process of moving to new processes and systems. Using change management techniques and technology to record system/service changes to gauge effectiveness and provide a rollback reference if required. Release and deployment management techniques to assist with incremental system updates. Change evaluation guidelines to help assess the impact (positive or negative) of new system changes. Service Asset and Configuration Management (SACM), providing a centralised repository for capture of system changes. Request fulfilment – delivery the changes demanded by service users and other factors. Service validation and testing routines to verify that frameworks and policies are working as expected. Knowledge management techniques and technology to ensure that valuable lessons are captured and shared with other key stakeholders. Who is it intended for? The course is for people who are looking to take the next step in their ITIL® Service Capability route having already passed their ITIL® Foundation Exam. The course is designed for IT managers in the release, operations or security fields but can also be utilised by security and database administrators. Requirements In order to take the Release, Control and Validation exam, you must have passed the ITIL® Foundation Examination. There are no pre-requisites to take the course but we recommend you have a good knowledge of service management and have taken the ITIL® Foundation course. What marks this course apart? Once the Release, Control and Validation exam has been passed you will be able to function in roles such as security manager, security administrator and release manager. The course counts as four of the necessary 17 credits to move onto Managing Across the Lifecycle course which leads to the title of “ITIL® Expert”. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

ITIL® Intermediate Level - Planning, Protection & Optimisation (PPO) Training & Exam Package

E-Careers
Online Part time 12 months Open Enrollment United Kingdom UK Online

Specialise on the practical application of PPO practices and get certified with this complete ITIL® Planning, Protection and Optimization training and exam package. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? The ITIL® PPO course takes students through the practical application of PPO practices in order to enable capacity, availability, IT service continuity, information security and demand management while demonstrating how to implement them into a modern IT service. How to plan and provide sufficient capacity to support the changing needs of a business. How to specify and implement high availability systems to maintain service quality at all times. Using IT service continuity principles to maintain quality of service as systems and frameworks transition. How to build frameworks and systems that help support demand management. Building a PPO team and assigning roles and responsibilities. Using technology to support PPO goals and services. Who is it intended for? The course suits students who are IT professionals, have their ITIL® Foundation Qualification and work in areas such as IT operations, network support, network control and operation, security manager and security administrator. Requirements In order to take the Planning, Protection and Optimization exam, you must have passed the ITIL® Foundation Examination. There are no pre-requisites to take the course but we recommend you have a good knowledge of service management and have taken the ITIL® Foundation course. What marks this course apart? Once the Planning, Protection and Optimization exam has been passed you will be able to function in roles such as security manager, network support or change manager. The course counts as four of the necessary 17 credits to move onto Managing Across the Lifecycle course which leads to the title of “ITIL® Expert”. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Cyber Security Expert - Training Package (with CISA, CISSP & CISM)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Master the advanced techniques required to protect network resources from external threat with this Cyber Security Expert bundle. [+]

What are the objectives of this course? This comprehensive package is made up of three of the world’s foremost IT security courses and will give you the knowledge needed to build and manage effective security solutions. Certified Information Systems Auditor (CISA) Information systems audit process and how it is applied in a real-world environment. The importance of applying information technology governance principles to maintain levels of security and availability. Defining and managing the information systems and infrastructure lifecycle to better plan for upgrades and replacements. Codifying IT service delivery and support mechanisms and levels to ensure systems and users remain fully productive. Identifying critical information assets and designing systems to protect from loss, theft or unauthorised access. Building a business continuity and disaster recovery strategy that will help keep the organisation running in the event of a major system failure Certified Information Systems Security Professional (CISSP) The principles of access control and how they can be strengthened and applied to keep unauthorised users out of a system. Telecommunications and network systems that need to be hardened to prevent data loss or theft. The role that information governance and risk management play in raising security standards and how they need to be applied to corporate information systems. The importance of secure software architecture and design to help ensure that in-house systems protect data and resources. Using cryptography to protect data in transit and prevent unauthorised access of files without the correct encryption keys. Using security architecture and design principles to limit data access and potential angles of attack. Monitoring, auditing and improving operations security to keep systems secure at the point of access. Designing and implementing business continuity and disaster recovery plans to help re-establish operations as quickly as possible following a serious outage. Legal obligations of data security and obligations that must be fulfilled in the event of a criminal investigation. Physical and environmental security considerations Certified Information Security Manager (CISM) Establishing and maintaining an information security governance frameworks and processes required to support it. How to manage information risks to an acceptable level. Build, implement and operate an information security program that aligns with the wider information security strategy. Planning the correct response to information security incidents. Who is it intended for? This bundle is ideal for IT professionals who are responsible for audit, control and security of corporate computer and networking resources. It is also suitable for individuals who need to achieve an industry-recognised qualification. Requirements There are no official pre-requisites for the CISA or CISM courses but CISSP requires students to have at least five years of recent full-time professional work experience in at least 2 of the 8 domains of CISSP. What marks this course apart? Once students have taken this package they will be eligible to sit the respective examinations. When the course has been completed they will have the relevant knowledge to function in roles such as security architect, lead auditing manager and security systems engineer. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Ethical Hacker Expert - Training Package (with CHFI & CEH)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Master the science of forensic investigations and combine that mastery with the knowledge of tricks cybercriminals use to access corporate systems and how they can be stopped with this Cyber Security Forensic Investigator and Ethical Hacker Package. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? The package is split into two courses. The first of these courses is built around the Certified Ethical Hacker certification: Understanding ethics involved in white hat hacking. How cybercriminals test network protection measures and how these reconnaissance activities can be spotted and blocked. How to identify potential vulnerabilities. Enumeration Trojans, backdoors, viruses, worms and Denial of Service (DoS) attacks. The role of social engineering to steal confidential information directly from employees. Sniffers and session hijacking Web-based attacks Wireless network security How hackers avoid protective measures like IDS, firewalls and honeypots. Network forensic techniques Cryptography and steganography How to use the metasploit toolkit to assess network protection measures. The second stage of this package is the Computer Hacking Forensic Investigator course and takes students through: How to carry out an investigation according to industry best practice principles and legal guidelines. Searching and seizing resources required for the investigation. Handling Digital Evidence First Responder Procedures How to fit a forensic lab for investigations. Hard Disks and File Systems Windows Forensics Data Acquisition and Duplication Recovering Deleted Files and Partitions Using Access Data FTK and Special Steps EnCase Stenography Passwords Log Correlation Network Forensics Wireless Attacks Web Attacks Email Crimes Mobile Resource Investigation Investigation Reports Expert Witness Who is it intended for? This course is best suited to anyone who is looking to gain the necessary knowledge to make a career change in IT security. Or, it is equally able to satisfy the demands of anyone who is looking to better understand hacking techniques so that can protect their, or their clients, resources. Requirements There are no pre-requisites for this course. What marks this course apart? Once students have completed this course they will be ready to sit their CHFI EC0 312-49 & 312-50 exams. You will have the knowledge to function in roles such as ethical hacker, cyber security, penetration tester and information security analyst. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]