Online Course in IT Security in United Kingdom

Compare Online Courses in IT Security in United Kingdom 2017

IT Security

Courses are individual classes that can be taken at universities, colleges, junior colleges, and trade schools worldwide. For even greater flexibility, many schools also offer online classes. Students can take individual classes or pursue degree programs.

One rapidly growing technological field is IT security. This involves keeping computers and other devices safe from unauthorized access, cyber attacks, theft, or damage. Students may learn about programming, user education, and hardware design.

UK, United Kingdom is more than 300 years old and comprises four constituent nations: England, Scotland, Wales, and Northern Ireland. The UK has been a centre of learning for the past 1,000 years and possesses many ancient and distinguished universities. Foreign students make up a significant proportion of the student body at UK universities.

Online Course in IT Security in United Kingdom

Read More

ITIL® Intermediate Level - Release, Control & Validation (RCV) Training & Exam Package

E-Careers
Online Part time 12 months Open Enrollment United Kingdom UK Online Langley Marish + 1 more

Learn to successfully plan, test and implement new services that meet organisational needs and get certified with this ITIL® Intermediate – Release, Control and Validation training and exam package. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? The course will take students through the principles involved in controlling systems and software release, protect IT service offerings as a whole more effectively and validate the outcomes of these types of projects. Using transition planning and support to develop simplify the process of moving to new processes and systems. Using change management techniques and technology to record system/service changes to gauge effectiveness and provide a rollback reference if required. Release and deployment management techniques to assist with incremental system updates. Change evaluation guidelines to help assess the impact (positive or negative) of new system changes. Service Asset and Configuration Management (SACM), providing a centralised repository for capture of system changes. Request fulfilment – delivery the changes demanded by service users and other factors. Service validation and testing routines to verify that frameworks and policies are working as expected. Knowledge management techniques and technology to ensure that valuable lessons are captured and shared with other key stakeholders. Who is it intended for? The course is for people who are looking to take the next step in their ITIL® Service Capability route having already passed their ITIL® Foundation Exam. The course is designed for IT managers in the release, operations or security fields but can also be utilised by security and database administrators. Requirements In order to take the Release, Control and Validation exam, you must have passed the ITIL® Foundation Examination. There are no pre-requisites... [-]

ITIL® Intermediate Level - Planning, Protection & Optimisation (PPO) Training & Exam Package

E-Careers
Online Part time 12 months Open Enrollment United Kingdom UK Online Langley Marish + 1 more

Specialise on the practical application of PPO practices and get certified with this complete ITIL® Planning, Protection and Optimization training and exam package. [+]

What are the objectives of this course? The ITIL® PPO course takes students through the practical application of PPO practices in order to enable capacity, availability, IT service continuity, information security and demand management while demonstrating how to implement them into a modern IT service. How to plan and provide sufficient capacity to support the changing needs of a business. How to specify and implement high availability systems to maintain service quality at all times. Using IT service continuity principles to maintain quality of service as systems and frameworks transition. How to build frameworks and systems that help support demand management. Building a PPO team and assigning roles and responsibilities. Using technology to support PPO goals and services. Who is it intended for? The course suits students who are IT professionals, have their ITIL® Foundation Qualification and work in areas such as IT operations, network support, network control and operation, security manager and security administrator. Requirements In order to take the Planning, Protection and Optimization exam, you must have passed the ITIL® Foundation Examination. There are no pre-requisites to take the course but we recommend you have a good knowledge of service management and have taken the ITIL® Foundation course. What marks this course apart? Once the Planning, Protection and Optimization exam has been passed you will be able to function in roles such as security manager, network support or change manager. The course counts as four of the necessary 17 credits to move onto Managing Across the Lifecycle course... [-]

Ethical Hacker Expert - Training Package (with CHFI & CEH)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Master the science of forensic investigations and combine that mastery with the knowledge of tricks cybercriminals use to access corporate systems and how they can be stopped with this Cyber Security Forensic Investigator and Ethical Hacker Package. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? The package is split into two courses. The first of these courses is built around the Certified Ethical Hacker certification: Understanding ethics involved in white hat hacking. How cybercriminals test network protection measures and how these reconnaissance activities can be spotted and blocked. How to identify potential vulnerabilities. Enumeration Trojans, backdoors, viruses, worms and Denial of Service (DoS) attacks. The role of social engineering to steal confidential information directly from employees. Sniffers and session hijacking Web-based attacks Wireless network security How hackers avoid protective measures like IDS, firewalls and honeypots. Network forensic techniques Cryptography and steganography How to use the metasploit toolkit to assess network protection measures. The second stage of this package is the Computer Hacking Forensic Investigator course and takes students through: How to carry out an investigation according to industry best practice principles and legal guidelines. Searching and seizing resources required for the investigation. Handling Digital Evidence First Responder Procedures How to fit a forensic lab for investigations. Hard Disks and File Systems Windows Forensics Data Acquisition and Duplication Recovering Deleted Files and Partitions Using Access Data FTK and Special Steps EnCase Stenography Passwords Log Correlation Network Forensics Wireless Attacks Web Attacks Email Crimes Mobile Resource Investigation Investigation Reports Expert Witness Who is it intended for? This course is best suited to anyone who is looking to gain the necessary knowledge to make a career change in IT security. Or, it is... [-]

CISA (ISACA Certified Information Systems Auditor) - Trainng Programme

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Demonstrate excellence in IT systems auditing by completing the industry-leading ISACA Certified Information Systems Auditor (CISA) course. [+]

What are the objectives of this course? In this training programme, you will learn the theories and practical skills necessary with this course designed to meet the rigorous requirements of ISACA. The information systems audit process and how it is applied in a real-world environment. The importance of applying information technology governance principles to maintain levels of security and availability. Defining and managing the information systems and infrastructure lifecycle to better plan for upgrade and replacements. Codifying IT service delivery and support mechanisms and levels to ensure that systems and users remain fully productive and issues are properly prioritised. Identifying critical information assets and designing systems to protect each from loss, theft or unauthorised access. Building a business continuity and disaster recovery strategy that will help keep the organisation running in the event of a major system failure. Who is it intended for? This course is for you if you are an IT professional responsible for audit, control and security of corporate computer and networking resources or if you are a member of an IT security team member. In both cases it can give an industry-recognised qualification to prove their competence. Requirements There are no pre-requisites to take this course. There is a requirement of five years IT auditing, control or security work experience to certify. What marks this course apart? Upon completion of this course and subsequent achievement of the qualification, you will be able to function in roles such as IT auditor, IT security architect and IT audit... [-]

CHFI (Computer Hacking Forensic Investigator) - Training Programme

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Master the processes and tools required to investigate a serious security breach using industry-standard principles with this Computer Hacking Forensic Investigator (CHFI) course. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? This course covers everything needed to investigate, document and prosecute a malicious security breach. How to carry out an investigation according to industry best practice principles and legal guidelines. Searching and seizing resources required for the investigation. Handling Digital Evidence First Responder Procedures How to fit a forensic lab for investigations. Hard Disks and File Systems Windows Forensics Data Acquisition and Duplication Recovering Deleted Files and Partitions Using Access Data FTK and Special Steps EnCase Stenography Passwords Log Correlation Network Forensics Wireless Attacks Web Attacks Email Crimes Mobile Resource Investigation Investigation Reports Expert Witness Who is it intended for? This course is ideal for anyone who has looking to build on their foundational ethical hacking skills. Requirements There are no official pre-requisites for this course but we recommend students have a basic knowledge of computer security and ethical hacking. What marks this course apart? Once students have completed this course they will be ready to sit their CHFI EC0 312-49 exam. Candidates will be able to function in roles such as forensic analyst, security analyst and information security analyst. These jobs usually average a salary of £27,000 a year. Source: PayScale What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CompTIA Cloud+ (CV0-001)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

With the need for IT professionals who specialise in cloud computing growing, there are more and more opportunities becoming available. Be able to proactively seek these opportunities by completing this CompTIA Cloud+ course which will show your expertise in implementing and maintaining cloud technologies. [+]

What are the objectives of this course? Learn everything you need to have a good understanding of the key concepts behind cloud computing and how they can be implemented into an organisation’s IT infrastructure. Introduction to models, service and delivery models, terms and characteristics and objects storage concepts. Install, configure and manage VM and devices. Backups, virtual disks, virtual switches and virtual resource migration. Discover the benefits of virtualisation in a cloud environment before comparing and contrasting virtual environments. Infrastructure, different access protocols, storage configuration, file system types, executing storage provisioning and network sharing. Implementing appropriate network configurations and the importance of network optimisation. Troubleshooting basic network configurations and troubleshoot commands. Common network protocols and common hardware resources Resource management and establishing baselines and thresholds How to appropriately allocate physical host resources and virtual guest resources and how to use appropriate tools for remote access. Master security, including storage security concepts and methods, different encryption technologies and identifying access control methods. Systems management, how to diagnose, remediate and optimise and common performance concepts and testing techniques. Study business continuity in cloud and solutions to meet availability requirements. Who is it intended for? We recommend IT professionals with at least 24-36 months of work experience in IT networking/data centre administration to take this course. It provides solid foundational skills for the cloud infrastructure. Requirements There are no pre-requisites to take this course, but we do recommend 24-36 months of work experience in IT networking or data centre administration. What marks this... [-]

CompTIA Security+ 2014 (SY0-401) with Live Labs

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Enter the IT security industry with the knowledge of the globally-recognised CompTIA best practice concepts in this course. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? Learn the fundamentals of computer security with the vendor-neutral CompTIA Security+ course and live labs package where you will have 19 comprehensive modules to guide you through everything you’ll need to know to pass your exams. The live labs are an essential learning resource for students as it allows them to test their knowledge and skills in practice exercises and environments without the need to invest in a costly test lab of their own. Network Terminology. Learn all you need to know about wireless. Introduction to security terminology. Identifying and satisfying compliance needs and policies for data security. Physical Security. Gain insight into disaster recovery, risk analysis, business continuity and business impact analysis. Introduction to Computer Forensics. Different types of attacks and system security threats and how they can be blocked. The use of encryption to protect data, even if it is intercepted by a third party. Cryptography Who is it intended for? Anyone who is looking to enter the world of IT security or any IT professional who is looking to upskill. Requirements There are no pre-requisites for this course. What marks this course apart? This qualification will provide you with all the knowledge you need to go into roles such as security architect, security administrator or security engineer. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to... [-]

Cisco CCNA Security Courseware

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Boost your knowledge of network security to increase chances of success in the IT security field using Cisco’s industry-leading concepts and technologies with this Cisco CCNA Security course. [+]

What are the objectives of this course? This course teaches the fundamentals of IP technology implementations, before showing delegates how to boost security. The course also includes 12 months access to Live Labs where students will be able to practice every technique covered throughout the course. This dedicated hardware resource grants access to Cisco routers and switches that can be used to replicate and resolve real-world scenarios without the need to purchase and maintain labs of your own. Using the Cisco Router SDM security audit feature to identify unauthorised network resource usage. Locking down router security to prevent hackers from gaining access to key network resources. The Authentication, Authorisation and Accounting philosophy – key to implement security solutions that work. Using Access Control Lists to mitigate threats and minimise attack surfaces. Implementing stateful firewalls using Cisco IOS to identify and block low-level hacking attempts. Securing inter-site VPNs and data transfer using SDM on Cisco routers. Who is it intended for? This course bundle is for network managers, administrators and engineers responsible for implementing network security for small to medium businesses. Requirements There are no pre-requisites to sit the course. In order to sit the CCNA Security exams, students must pass the CCNA exams. What marks this course apart? Candidates will be able to function in roles such as senior network engineer, security analyst and network security engineer. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be... [-]

Cisco CCNA Collaboration Courseware

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Upgrade your CV and boost employability in the IT industry by studying this course which will give you an understanding of the convergence of voice, video, data and mobile applications in a corporate environment. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? This course will help students to advance their collaboration and video skills in line with the convergence of voice, video, data and mobile applications. Cisco unified communications solutions Characteristics of Cisco unified communications solutions Cisco Unified communications manager administrator interfaces Cisco UCM end-user interfaces and call flows and call legs Component impact on call flows in unified communications manager Cisco UCM and Cisco UCM express end-users Cisco UCM and Cisco UCM express endpoint implementation options Understanding telephony features Telephony feature implementation and mobility options Unity connection and end-user and mailbox requirements Unity connection and end user and mailbox requirements Unity connection end user implementation and IM and presence service Supporting end users and understanding Cisco UCM reports Cisco UCM call detail records and reporting and monitoring tools Cisco business video solutions and video collaboration Installation and configuration of Cisco IP phones and Cisco jabber Troubleshooting Cisco IP phone, Cisco jabber and endpoint issues Describing Cisco TelePresence and endpoints Configuring Cisco TelePresence TC Troubleshooting Cisco TelePresence endpoints Configuring and monitoring Cisco conferencing and DMPs Who is it intended for? This course is for network engineers and IT professionals who are looking to develop their collaboration and video skills. Requirements There are no official pre-requisites to take this course but we recommend a good understanding of Cisco networking technologies. What marks this course apart? Once a student has taken this course they will be able to function... [-]

Cisco CCNA Wireless Courseware

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Add further understanding of the Cisco networking environment to your CV with this Cisco CCNA Wireless course that will give you the skills to configure, implement and support Wireless Local Area Networks (WLANs). [+]

What are the objectives of this course? This course will provide students with the fundamental knowledge needed to prepare them for their CCNA Wireless exam. Candidates will learn how to design, install, configure, monitor and troubleshoot Cisco WLANs in a corporate network. WLAN Fundamentals Basics of spreading spectrum technology Wireless regulatory bodies, standards and policies WLAN RF principles Networking technologies used in wireless Wireless topologies Install, configure and manage a Cisco WLAN Implement WLAN Security with authentication and encryption methods Conduct WLAN maintenance and Troubleshooting Who is it intended for? This course is for anyone who has studied the CCNA course and is looking to get a more in-depth knowledge of WLANs in a Cisco network. We recommend that students have 24 months’ work experience in a networking role. Requirements There are no official pre-requisites for this course but we do recommend students have a basic knowledge of IT networking and 24 months work experience in a networking role. What marks this course apart? Taking this course then completing and passing the CCNA Wireless examination will qualify students to work in roles such as network engineer, wireless engineer and network specialist. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

Cisco CCNA & CCNP Routing & Switching Package (with Live Labs)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Study the Associate and Professional levels of the leading Cisco qualifications and be able to demonstrate your understanding of the techniques used with this all-inclusive package that includes Live Labs. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? The CCNA & CCNP bundle gives students access to all materials they need to prepare for the Cisco CCNA & CCNP exams. Candidates will also gain access to the Live Labs. This dedicated hardware resource allows students to practice each scenario shown to them in the course materials with live Cisco routers and switches. You will also be able to free-roam in the Live Labs to further your own knowledge and model real-world scenarios for troubleshooting without risking the system. CCNA Implement Variable Length Subnet Masks (VLSM) to improve IP addressing efficiency. Understand the importance of IPv6, how to implement it within a corporate network and the use of Open Shortest Path First (OPSF) routing. Implement VLANs and Trunks to route and segment traffic for improved network performance. Build a scalable network using NAT and PAT to meet the need of a growing business. Configure network switches and routers for SNMP, Syslog, Netflow, OSPF and EIGRP. Troubleshoot IPv4 and IPv6 networks. Use Spanning Tree protocol and Etherchannel to add further network functionality. Apply Layer 3 redundancy protocols to improve network resilience. Cisco IP Routing and Switching Implement VLANs to segment network traffic and improve bandwidth management. Use Layer 2 and Layer 3 security extensions to protect corporate systems. Configure hardware to support advanced networking services like VoIP and video on a corporate network. Design and build high availability network infrastructure using a set of requirements.... [-]

CIW Web Security Associate Training with Exam (1D0-571)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Learn the importance of network security, how to do it and get certified with an industry-recognised qualification from CIW with this CIW Security Associate course with the official exam. [+]

What are the objectives of this course? The framework of this course will take students through crucial knowledge that is needed to counter-act any damage and successfully restore computer systems to ensure they can withstand hacker activity that may occur in the future. The examination is the 1D0-571 exam and consists of 62 questions that must be answered in a 90 minute time limit. In order to pass the course, candidates must achieve a minimum pass mark of 76%. Understand how hacker threats occur and learn about which security threats exist. Discover the high standard of security that is needed for modern businesses to continuously protect valuable company data against unauthorised activity. Learn how to implement access control lists so you can identify who should and shouldn’t be accessing particular networks. Uncover the most up-to-date firewall technology and study how to improve operating systems to remove the chance of unwanted hacker activity. Essential information on authentication procedures, encryption standards and actions that help to ensure proper user authentication. How to create integrated security policies, along with the most common security principles for both personal and business use. Master what it takes to respond to and report hacker activity, engage in pro-active detection and always remain on step ahead when it comes to protecting your company’s needs. Who is it intended for? This course is designed for anyone who works within the network security field or anyone who is looking to go into the industry with a certification to back up... [-]

CIW Web Security Associate Training (1D0-571)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Explore essential security principles that every IT security professional should know with this CIW Security Associate course. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? The framework of this course will take students through crucial knowledge that is needed to counter-act any damage and successfully restore computer systems to ensure they can withstand hacker activity that may occur in the future. How hacker threat occur and learn about which security threats exist. Discover the high standard of security that is needed for modern businesses to continuously protect valuable company data against unauthorised activity. Learn how to implement access control lists so you can identify who should and shouldn’t be accessing particular networks. Uncover the most up-to-date firewall technology and study how to improve operating systems to remove the chance of unwanted hacker activity. Essential information on authentication procedures, encryption standards and actions that help to ensure proper user authentication. How to create integrated security policies, along with the most common security principles for both personal and business use. Master what it takes to respond to and report hacker activity, engage in pro-active detection and always remain on step ahead when it comes to protecting your company’s needs. Who is it intended for? This course is for IT security professionals who want to study towards an industry-recognised certification, it is also for people who want to switch industries and go into IT security. Requirements There are no pre-requisites for this course. What marks this course apart? Once students have completed this course, they are eligible to sit the 1D0-571 examination. They... [-]

CIW Database Design Specialist Training with Exam (1D0-541)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Prove your understanding of product-focused database solutions with this CIW Database Design Specialist course and exam package that will give you the certification you need. [+]

What are the objectives of this course? This qualification will give students the necessary knowledge to plan and design product-focused database solutions for businesses and the certification to prove those skills to potential employers. The exam has a time limit of 90 minutes and there are a total of 50 questions. Candidates need to achieve a minimum score of 75% to pass. Introduction to Databases Logical Database Design Relational Database Physical Database Design Database Planning Structured Query Language (SQL) Overview of Database Design Methodology Relational Algebra Normalisation Transactions and Database Security Who is it intended for? This package is for anyone who is looking to upskill in their current workplace or looking to switch careers into database design and optimisation. Requirements There are no official pre-requisites for this course, however it is recommended that students have a basic knowledge of the purpose and function of a database and basic computer literacy. What marks this course apart? Candidates who pass this course will be able to function in roles such as database developer, database administrator and application developer. This course also goes hand-in-hand with other CIW training programmes as well as further database qualifications. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]

CIW Database Design Specialist Training (1D0-541)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Langley Marish

Get an in-depth understanding of product-focused databases and how they help business operations run smoothly with this CIW Database Design Specialist course. [+]

Online Courses in IT Security in United Kingdom. What are the objectives of this course? Learn the ins and outs of planning and designing database solutions for a corporate environment using different products with this Database Design Specialist course. Introduction to Databases Logical Database Design Relational Database Physical Database Design Database Planning Structured Query Language (SQL) Overview of Database Design Methodology Relational Algebra Normalisation Transactions and Database Security Who is it intended for? This course is for anyone who is looking to upskill to be given more responsibility in their current IT job role or anyone who is looking to get into a career in database design and optimisation. Requirements There are no official pre-requisites for this course, however it is recommended that students have a basic knowledge of the purpose and function of a database. What marks this course apart? Once students have completed this course they will be fully prepared to sit the 1D0-541 examination. They will be able to function in roles such as database developer, database administrator and application developer. What happens after requesting information? Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require. [-]