Online Course in IT Security in United Kingdom

Find Online Courses in IT Security in United Kingdom 2017

IT Security

The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom and Britain, is a sovereign state located off the north-western coast of continental Europe.The two most famous (and oldest) universities are Oxford and Cambridge (often referred to as Oxbridge by many Britons) England also has several other world-class institutions, including several in London (notably Imperial College, the London School of Economics, University College London and King's College London, all are part of London University)

Online Course in IT Security in United Kingdom

Read More

Data Protection in the Workplace - Certified

New Skills Academy
Online Part time 2 hours Open Enrollment United Kingdom UK Online

If you or your organisation handles personal information about individuals you have legal obligations to protect that information. The benefits of good data safety are numerous and include, good business practice, the protection of people’s rights and the protection of your organisations reputation. [+]

Apply Now - Special Offer

If you or your organisation handles personal information about individuals you have legal obligations to protect that information. The benefits of good data safety are numerous and include, good business practice, the protection of people’s rights and the protection of your organisations reputation. In recent years some companies and individuals have experienced serious legal consequences for data protection breaches and this highlights why it is so important to get it right. Training should be a vital part of any company’s data protection policy. What you will Learn / Course Modules Benefits of Good Data Safety Rights and Conditions The Data Protection Act Data Sharing and Security Creating a Data Protection Policy Putting it into Practice Handling the Requests for Personal Data [-]

Data Protection in the Workplace - Certified

New Skills Academy
Online Part time 2 hours Open Enrollment United Kingdom UK Online

If you or your organisation handles personal information about individuals you have legal obligations to protect that information. The benefits of good data safety are numerous and include, good business practice, the protection of people’s rights and the protection of your organisations reputation. [+]

Apply Now - Special Offer

If you or your organisation handles personal information about individuals you have legal obligations to protect that information. The benefits of good data safety are numerous and include, good business practice, the protection of people’s rights and the protection of your organisations reputation. In recent years some companies and individuals have experienced serious legal consequences for data protection breaches and this highlights why it is so important to get it right. Training should be a vital part of any company’s data protection policy. What you will Learn / Course Modules Benefits of Good Data Safety Rights and Conditions The Data Protection Act Data Sharing and Security Creating a Data Protection Policy Putting it into Practice Handling the Requests for Personal Data [-]

ITIL® Intermediate Level - Planning, Protection & Optimisation (PPO) Training & Exam Package

E-Careers
Online Part time 12 months Open Enrollment United Kingdom UK Online

Specialise on the practical application of PPO practices and get certified with this complete ITIL® Planning, Protection and Optimization training and exam package. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? The ITIL® PPO course takes students through the practical application of PPO practices in order to enable capacity, availability, IT service continuity, information security and demand management while demonstrating how to implement them into a modern IT service. How to plan and provide sufficient capacity to support the changing needs of a business. How to specify and implement high availability systems to maintain service quality at all times. Using IT service continuity principles to maintain quality of service as systems and frameworks transition. How to build frameworks and systems that help support demand management. Building a PPO team and assigning roles and responsibilities. Using technology to support PPO goals and services. Who is it intended for? The course suits students who are IT professionals, have their ITIL® Foundation Qualification and work in areas such as IT operations, network support, network control and operation, security manager and security administrator. Requirements In order to take the Planning, Protection and Optimization exam, you must have passed the ITIL® Foundation Examination. There are no pre-requisites to take the course but we recommend you have a good knowledge of service management and have taken the ITIL® Foundation course. What marks this course apart? Once the Planning, Protection and Optimization exam has been passed you will be able to function in roles such as security manager, network support or change manager. The course counts as four of the necessary 17 credits to move onto Managing Across the Lifecycle course which leads to the title of “ITIL® Expert”. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CHFI (Computer Hacking Forensic Investigator) - Training Programme

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Master the processes and tools required to investigate a serious security breach using industry-standard principles with this Computer Hacking Forensic Investigator (CHFI) course. [+]

What are the objectives of this course? This course covers everything needed to investigate, document and prosecute a malicious security breach. How to carry out an investigation according to industry best practice principles and legal guidelines. Searching and seizing resources required for the investigation. Handling Digital Evidence First Responder Procedures How to fit a forensic lab for investigations. Hard Disks and File Systems Windows Forensics Data Acquisition and Duplication Recovering Deleted Files and Partitions Using Access Data FTK and Special Steps EnCase Stenography Passwords Log Correlation Network Forensics Wireless Attacks Web Attacks Email Crimes Mobile Resource Investigation Investigation Reports Expert Witness Who is it intended for? This course is ideal for anyone who has looking to build on their foundational ethical hacking skills. Requirements There are no official pre-requisites for this course but we recommend students have a basic knowledge of computer security and ethical hacking. What marks this course apart? Once students have completed this course they will be ready to sit their CHFI EC0 312-49 exam. Candidates will be able to function in roles such as forensic analyst, security analyst and information security analyst. These jobs usually average a salary of £27,000 a year. Source: PayScale What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CompTIA Mobility+ (MB0-001)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Stay ahead of the competition in the job market by gaining the knowledge in the latest mobility trends and the ability to work with an extensive variety of existing and emerging mobile technologies. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? Learn all the knowledge you need to pass the CompTIA Mobility+ (MB0-001) examination with this expertly designed course. Learn about over-the-air technologies with section devoted to WIMAX, radio frequency, RF power fun, antennas, governing bodies and regulations. All you need to know about network infrastructure including network foundations, OSI model review, wireless terms and technology, wireless media and communication, unified wireless architecture and SSIDs and VLANs. Mobile device management, profiles and policies, enterprise mail and messaging, wireless site surveys and wireless device management. Master the crucial area of security including mobile device security, network security, security protocols, EAP overview, encryption overview, common security troubleshooting and potential risks Wireless troubleshooting Who is it intended for? This course is for any IT professional who is looking to specialise in the mobile environment in a world where the knowhow is much in-demand. Requirements There are no pre-requisites for this course but we do recommend at least 18 months of work experience in administration of mobile devices in enterprise. What marks this course apart? Over 70% of all companies have already made an investment to build mobility solutions. You could get into this rapidly rising part of the ever-growing IT and telecommunications industries. Source: Indeed What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Cisco CCNA Security Courseware

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Boost your knowledge of network security to increase chances of success in the IT security field using Cisco’s industry-leading concepts and technologies with this Cisco CCNA Security course. [+]

What are the objectives of this course? This course teaches the fundamentals of IP technology implementations, before showing delegates how to boost security. The course also includes 12 months access to Live Labs where students will be able to practice every technique covered throughout the course. This dedicated hardware resource grants access to Cisco routers and switches that can be used to replicate and resolve real-world scenarios without the need to purchase and maintain labs of your own. Using the Cisco Router SDM security audit feature to identify unauthorised network resource usage. Locking down router security to prevent hackers from gaining access to key network resources. The Authentication, Authorisation and Accounting philosophy – key to implement security solutions that work. Using Access Control Lists to mitigate threats and minimise attack surfaces. Implementing stateful firewalls using Cisco IOS to identify and block low-level hacking attempts. Securing inter-site VPNs and data transfer using SDM on Cisco routers. Who is it intended for? This course bundle is for network managers, administrators and engineers responsible for implementing network security for small to medium businesses. Requirements There are no pre-requisites to sit the course. In order to sit the CCNA Security exams, students must pass the CCNA exams. What marks this course apart? Candidates will be able to function in roles such as senior network engineer, security analyst and network security engineer. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Cisco CCNA Wireless Courseware

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Add further understanding of the Cisco networking environment to your CV with this Cisco CCNA Wireless course that will give you the skills to configure, implement and support Wireless Local Area Networks (WLANs). [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? This course will provide students with the fundamental knowledge needed to prepare them for their CCNA Wireless exam. Candidates will learn how to design, install, configure, monitor and troubleshoot Cisco WLANs in a corporate network. WLAN Fundamentals Basics of spreading spectrum technology Wireless regulatory bodies, standards and policies WLAN RF principles Networking technologies used in wireless Wireless topologies Install, configure and manage a Cisco WLAN Implement WLAN Security with authentication and encryption methods Conduct WLAN maintenance and Troubleshooting Who is it intended for? This course is for anyone who has studied the CCNA course and is looking to get a more in-depth knowledge of WLANs in a Cisco network. We recommend that students have 24 months’ work experience in a networking role. Requirements There are no official pre-requisites for this course but we do recommend students have a basic knowledge of IT networking and 24 months work experience in a networking role. What marks this course apart? Taking this course then completing and passing the CCNA Wireless examination will qualify students to work in roles such as network engineer, wireless engineer and network specialist. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Cisco CCNA & CCNP Routing & Switching Package (with Live Labs)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Study the Associate and Professional levels of the leading Cisco qualifications and be able to demonstrate your understanding of the techniques used with this all-inclusive package that includes Live Labs. [+]

What are the objectives of this course? The CCNA & CCNP bundle gives students access to all materials they need to prepare for the Cisco CCNA & CCNP exams. Candidates will also gain access to the Live Labs. This dedicated hardware resource allows students to practice each scenario shown to them in the course materials with live Cisco routers and switches. You will also be able to free-roam in the Live Labs to further your own knowledge and model real-world scenarios for troubleshooting without risking the system. CCNA Implement Variable Length Subnet Masks (VLSM) to improve IP addressing efficiency. Understand the importance of IPv6, how to implement it within a corporate network and the use of Open Shortest Path First (OPSF) routing. Implement VLANs and Trunks to route and segment traffic for improved network performance. Build a scalable network using NAT and PAT to meet the need of a growing business. Configure network switches and routers for SNMP, Syslog, Netflow, OSPF and EIGRP. Troubleshoot IPv4 and IPv6 networks. Use Spanning Tree protocol and Etherchannel to add further network functionality. Apply Layer 3 redundancy protocols to improve network resilience. Cisco IP Routing and Switching Implement VLANs to segment network traffic and improve bandwidth management. Use Layer 2 and Layer 3 security extensions to protect corporate systems. Configure hardware to support advanced networking services like VoIP and video on a corporate network. Design and build high availability network infrastructure using a set of requirements. Troubleshooting and maintaining Cisco infrastructure Maintaining and monitoring performance using IOS tools. Troubleshooting complex, multi-protocol networks. Correcting issues identified as part of the troubleshooting process. Who is it intended for? Anyone looking to study up to the Professional standard set by Cisco in their set of world-renowned qualifications. Requirements There are no pre-requisites to take the course. If you would like to sit the CCNP exams, you must have passed the CCNA exams first. What marks this course apart? People who have the CCNP Qualification are able to function in roles such as networking engineer, network consultant and IT security specialist. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CIW Web Security Associate Training (1D0-571)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Explore essential security principles that every IT security professional should know with this CIW Security Associate course. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? The framework of this course will take students through crucial knowledge that is needed to counter-act any damage and successfully restore computer systems to ensure they can withstand hacker activity that may occur in the future. How hacker threat occur and learn about which security threats exist. Discover the high standard of security that is needed for modern businesses to continuously protect valuable company data against unauthorised activity. Learn how to implement access control lists so you can identify who should and shouldn’t be accessing particular networks. Uncover the most up-to-date firewall technology and study how to improve operating systems to remove the chance of unwanted hacker activity. Essential information on authentication procedures, encryption standards and actions that help to ensure proper user authentication. How to create integrated security policies, along with the most common security principles for both personal and business use. Master what it takes to respond to and report hacker activity, engage in pro-active detection and always remain on step ahead when it comes to protecting your company’s needs. Who is it intended for? This course is for IT security professionals who want to study towards an industry-recognised certification, it is also for people who want to switch industries and go into IT security. Requirements There are no pre-requisites for this course. What marks this course apart? Once students have completed this course, they are eligible to sit the 1D0-571 examination. They will be able to function in roles such as systems administrator, network server administrator and firewall administrator. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CIW Database Design Specialist Training (1D0-541)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Get an in-depth understanding of product-focused databases and how they help business operations run smoothly with this CIW Database Design Specialist course. [+]

What are the objectives of this course? Learn the ins and outs of planning and designing database solutions for a corporate environment using different products with this Database Design Specialist course. Introduction to Databases Logical Database Design Relational Database Physical Database Design Database Planning Structured Query Language (SQL) Overview of Database Design Methodology Relational Algebra Normalisation Transactions and Database Security Who is it intended for? This course is for anyone who is looking to upskill to be given more responsibility in their current IT job role or anyone who is looking to get into a career in database design and optimisation. Requirements There are no official pre-requisites for this course, however it is recommended that students have a basic knowledge of the purpose and function of a database. What marks this course apart? Once students have completed this course they will be fully prepared to sit the 1D0-541 examination. They will be able to function in roles such as database developer, database administrator and application developer. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Microsoft MCTS - System Centre 2012 (70-243) with Live Labs

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Seek opportunities in the IT industry in specialist management roles by taking this Microsoft System Centre 2012 course and gain the skill validation for configuring and managing physical and virtual IT environments across data centres. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? The course is split into two modules (10747D and 10748C) and will give you all the knowledge you need to pass the Microsoft 70-243 examination. Taking you through day-to-day management tasks for System Centre 2012 R2 Configuration Manager, you will also learn how to migrate from System Centre 2012 Configuration Manager to System Centre 2012 R2 Configuration Manager. Live Labs are included in this package and are seen as an essential learning resource for students as it allows them to test their knowledge and skills in practice exercises and environments without the need to invest in a costly test lab of their own. Microsoft 70-243 TS: Administering and Deploying System Centre 2012 Configuration Manager: 10748C Describe the System Centre 2012 R2 Configuration Manager Infrastructure. Plan and Deploy a Stand-Alone primary Site. Plan and Configure Role-Based Administration. Plan and Deploy a Multiple Site Hierarchy. Replicate and Manage Content in Configuration Manager. Plan Resource Discovery and Client Deployment. Configure Internet and Cloud-based Client Management. Maintain and Monitor System Centre 2012 R2 Configuration Manager. Migrate to System Centre 2012 R2 Configuration Manager 10747D Overview of System Centre 2012 R2 Configuration Manager. Discovering and Organising Resources. Managing the Configuration Manager Client Agent. Managing Inventory and Software Metering. Querying and Reporting Data Managing Software Distribution and Deployment by Using Packages and Programs Creating and Deploying Applications Deploying Additional Application Types Deploying and Managing Software Updates Implementing Endpoint Protection by Using System Centre 2012 R2 Configuration Manager Managing Compliance Settings and Profiles Mobile Device Management Using System Centre 2012 R2 Configuration Manager Configuring Wake On LAN, Power Management and Remote Control Who is it intended for? This course is intended for IT professionals who are responsible for configuring and managing endpoints in one or more System Centre 2012 Configuration Manager sites and have one to three years experience in medium to large enterprise organisations. Requirements There are no official pre-requisites for this course but Microsoft recommend Windows Server, security and networking experience in an enterprise environment. What marks this course apart? The MCTS – System Centre 2012 qualification ties in with any other Microsoft qualification you might be interested in taking. Once you have completed this course, you will be able to function in roles such as Windows Server administrator, enterprise desktop administrator and exchange administrator. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Microsoft MCSE - Exchange Server 2013 (70-341, 70-342) with Live Labs

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Seek employment in the IT industry by validating your skillset in building and maintaining an organisation’s messaging solution with this set of techniques from the world’s biggest IT brand. [+]

What are the objectives of this course? Throughout your course duration we will also provide access to dedicated Live Labs that students can use to practice and develop their practical skills. These labs will allow you to put your knowledge to the test and recreate scenarios you come up against during your studies. The first three modules of the course consist of the MCSA Server 2012. Here students will learn the fundamentals of working with Microsoft Windows Server 2012, how to keep a Windows Server 2012 machine running in peak condition and the advanced services required to maintain an enterprise-class IT environment: Microsoft 70-410: Installing & Configuring Windows Server 2012 Microsoft 70-411: Administering Windows Server 2012 Microsoft 70-412: Configuring Advanced Windows Server 2012 Services The course then shifts focus to Microsoft Exchange 2013 and the fundamentals of the messaging platform with the Microsoft 70-341: Core Solutions of Microsoft Exchange Server 2013. Students will learn: How to deploy and manage Exchange Server 2013 and use the tools provided to monitor, maintain and troubleshoot a server instance. An introduction to the Exchange Server roles and how they are best deployed and managed. How to plan, deploy and secure a high-availability Exchange Server by mastering permissions, antivirus, antispam, backup and data recovery provisions. Implementing and securing remote email access using the Outlook Web App and third-party mobile messaging apps. Centralising and managing recipient objects, address policies and address lists to improve internal and external communications. The final module will take students through the advanced features of Exchange Server 2013 in the Microsoft 70-342: Advanced Solutions of Microsoft Exchange Server 2013 module: Building a Unified Messaging (UM) solution that improves business-wide communications and availability. Boosting security and compliance provisions to meet operational and legal requirements. Building an email archiving solution to manage an ever-increasing volume of messages. Planning Hybrid scenarios including migration and federation of messaging and data. Who is it intended for? This course is for IT administrators who need to learn messaging-specific skills to satisfy the requirement of a job role, or IT professionals who are looking to upskill. Requirements There are no pre-requisites to take this course. What marks this course apart? Professionals with the MCSE Server 2012 & 2013 Messaging qualification can function in roles such as 3rd line engineer, infrastructure support, Windows Server administrator and IT manager. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

ITIL® Intermediate Level - Release, Control & Validation (RCV) Training & Exam Package

E-Careers
Online Part time 12 months Open Enrollment United Kingdom UK Online

Learn to successfully plan, test and implement new services that meet organisational needs and get certified with this ITIL® Intermediate – Release, Control and Validation training and exam package. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? The course will take students through the principles involved in controlling systems and software release, protect IT service offerings as a whole more effectively and validate the outcomes of these types of projects. Using transition planning and support to develop simplify the process of moving to new processes and systems. Using change management techniques and technology to record system/service changes to gauge effectiveness and provide a rollback reference if required. Release and deployment management techniques to assist with incremental system updates. Change evaluation guidelines to help assess the impact (positive or negative) of new system changes. Service Asset and Configuration Management (SACM), providing a centralised repository for capture of system changes. Request fulfilment – delivery the changes demanded by service users and other factors. Service validation and testing routines to verify that frameworks and policies are working as expected. Knowledge management techniques and technology to ensure that valuable lessons are captured and shared with other key stakeholders. Who is it intended for? The course is for people who are looking to take the next step in their ITIL® Service Capability route having already passed their ITIL® Foundation Exam. The course is designed for IT managers in the release, operations or security fields but can also be utilised by security and database administrators. Requirements In order to take the Release, Control and Validation exam, you must have passed the ITIL® Foundation Examination. There are no pre-requisites to take the course but we recommend you have a good knowledge of service management and have taken the ITIL® Foundation course. What marks this course apart? Once the Release, Control and Validation exam has been passed you will be able to function in roles such as security manager, security administrator and release manager. The course counts as four of the necessary 17 credits to move onto Managing Across the Lifecycle course which leads to the title of “ITIL® Expert”. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CISSP® (Certified Information Systems Security Professional) - Training Programme

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Master information systems security and get on your way to earning a globally recognised qualification which is seen as a benchmark in the industry with this Certified Information System Security Professional (CISSP) course. [+]

What are the objectives of this course? The CISSP course will provide you with the knowledge to manage, operate, develop and plan an effective network security infrastructure in an enterprise environment. The principles of access control and how they can be strengthened and applied to keep unauthorised users out of a system. Telecommunications and network systems that need to be hardened to prevent data loss or theft. The role that information governance and risk management play in raising security standards and how they need to be applied to corporate information systems. The importance of secure software architecture and design to help ensure that in-house systems protect data and resources. Using cryptography to protect data in transit and prevent unauthorised access of files without the correct encryption keys. Using security architecture and design principles to limit data access and potential angles of attack. Monitoring, auditing and improving operations security to keep systems secure at the point of access. Designing and implementing business continuity and disaster recovery plans to help re-establish operations as quickly as possible following a serious outage. Legal obligations of data security and obligations that must be fulfilled in the event of a criminal investigation. Physical and environmental security considerations Who is it intended for? This course is for IT professionals who need to improve their practical skills and attain a professional qualification or those who would like to specialise in IT security. Requirements Students must have at least five years of recent full-time professional work experience in at least 2 of the 8 domains of CISSP: Security and Risk Management Asset Security Security Engineering Communications and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security What marks this course apart? When students have taken the CISSP course they are then able to sit the examination through the International Information Systems Security Certification Consortium (ISC)². Once you have completed this exam you will be able to function in roles such as security architect, security analyst and security systems engineer. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CEH (Certified Ethical Hacking and Countermeasures) - Training Programme

E-Careers
Online Part time Open Enrollment United Kingdom UK Online

Master the tools and techniques that hackers use to bypass security for your own corporate network defensive strategies with this Certified Ethical Hacking and Countermeasures course. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? The knowledge gained in this course can help you to harden defences and reduce the risk of compromise, saving time and money that would otherwise be spent recovering from a security breach in a corporate environment. Intro to course Footprinting & Reconnaissance Scanning Networks Enumeration System Hacking Trojans & Backdoors Viruses & Worms Denial of Service Social Engineering Sniffers Session Hijacking Hacking Webservers Hacking Web Applications SQL Injection Hacking Wireless Networks Evading IDS, Firewalls & Honeypots Buffer Overflows Cryptography Penetration Testing Who is it intended for? This course is for anyone who is looking to learn the skills and techniques required to make a change into IT security, or any network/security professionals who need a better understanding of hacking techniques. Requirements There are no pre-requisites for this course. What marks this course apart? Once you have completed this course you will be able to sit the Certified Ethical Hacking Certification 312-50 examination. Students will be able to function in roles such as ethical hacker, cyber security and penetration tester. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]