• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2 Information Security courses in Kinmel Bay

Information Security Management Principle

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- Objective * Understand the requirement of Information Security  * Concepts and Definitions of Information Security Management Systems * Deeply Analysing the policies, Standards and procedures * How to deliver a balanced ISMS and following its security procedures * Analysing the Information risk management  * Evaluating the organisational responsibilities  * Understanding the Information security controls  * Scrutinising Legal framework  * Techniques of Cryptographic models

Information Security Management Principle
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

PENETRATION TESTING TRAINING COURSE DESCRIPTION An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. WHAT WILL YOU LEARN * Perform penetration tests. * Explain the technical workings of various penetration tests. * Produce reports on results of penetration tests. * Defend against hackers. PENETRATION TESTING TRAINING COURSE DETAILS * Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. * Prerequisites: IP Security IP VPNs * Duration 5 days PENETRATION TESTING TRAINING COURSE CONTENTS * Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. * Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering * Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. * Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. * Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. * Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. * Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. * Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. * DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. * SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. * Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. * Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. * Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Online Options

Show all 607

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites * CompTIA Network+ Certification 1 - SECURITY AND RISK MANAGEMENT * Security Governance Principles * Compliance * Professional Ethics * Security Documentation * Risk Management * Threat Modeling * Business Continuity Plan Fundamentals * Acquisition Strategy and Practice * Personnel Security Policies * Security Awareness and Training 2 - ASSET SECURITY * Asset Classification * Privacy Protection * Asset Retention * Data Security Controls * Secure Data Handling 3 - SECURITY ENGINEERING * Security in the Engineering Lifecycle * System Component Security * Security Models * Controls and Countermeasures in Enterprise Security * Information System Security Capabilities * Design and Architecture Vulnerability Mitigation * Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems * Cryptography Concepts * Cryptography Techniques * Site and Facility Design for Physical Security * Physical Security Implementation in Sites and Facilities 4 - INFORMATION SECURITY MANAGEMENT GOALS * Organizational Security * The Application of Security Concepts 5 - INFORMATION SECURITY CLASSIFICATION AND PROGRAM DEVELOPMENT * Information Classification * Security Program Development 6 - RISK MANAGEMENT AND ETHICS * Risk Management * Ethics 7 - SOFTWARE DEVELOPMENT SECURITY * Software Configuration Management * Software Controls * Database System Security 8 - CRYPTOGRAPHY * Ciphers and Cryptography * Symmetric-Key Cryptography * Asymmetric-Key Cryptography * Hashing and Message Digests * Email, Internet, and Wireless Security * Cryptographic Weaknesses 9 - PHYSICAL SECURITY * Physical Access Control * Physical Access Monitoring * Physical Security Methods * Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online6 days, Jun 17th, 13:00 + 8 more
£3395

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - INFORMATION SECURITY GOVERNANCE * Develop an Information Security Strategy * Align Information Security Strategy with Corporate Governance * Identify Legal and Regulatory Requirements * Justify Investment in Information Security * Identify Drivers Affecting the Organization * Obtain Senior Management Commitment to Information Security * Define Roles and Responsibilities for Information Security * Establish Reporting and Communication Channels 2 - INFORMATION RISK MANAGEMENT * Implement an Information Risk Assessment Process * Determine Information Asset Classification and Ownership * Conduct Ongoing Threat and Vulnerability Evaluations * Conduct Periodic BIAs * Identify and Evaluate Risk Mitigation Strategies * Integrate Risk Management into Business Life Cycle Processes * Report Changes in Information Risk 3 - INFORMATION SECURITY PROGRAM DEVELOPMENT * Develop Plans to Implement an Information Security Strategy * Security Technologies and Controls * Specify Information Security Program Activities * Coordinate Information Security Programs with Business Assurance Functions * Identify Resources Needed for Information Security Program Implementation * Develop Information Security Architectures * Develop Information Security Policies * Develop Information Security Awareness, Training, and Education Programs * Develop Supporting Documentation for Information Security Policies 4 - INFORMATION SECURITY PROGRAM IMPLEMENTATION * Integrate Information Security Requirements into Organizational Processes * Integrate Information Security Controls into Contracts * Create Information Security Program Evaluation Metrics 5 - INFORMATION SECURITY PROGRAM MANAGEMENT * Manage Information Security Program Resources * Enforce Policy and Standards Compliance * Enforce Contractual Information Security Controls * Enforce Information Security During Systems Development * Maintain Information Security Within an Organization * Provide Information Security Advice and Guidance * Provide Information Security Awareness and Training * Analyze the Effectiveness of Information Security Controls * Resolve Noncompliance Issues 6 - INCIDENT MANAGEMENT AND RESPONSE * Develop an Information Security Incident Response Plan * Establish an Escalation Process * Develop a Communication Process * Integrate an IRP * Develop IRTs * Test an IRP * Manage Responses to Information Security Incidents * Perform an Information Security Incident Investigation * Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered Online4 days, Jun 24th, 13:00 + 5 more
£1995

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jun 17th, 13:00 + 5 more
£3495

CompTIA Cybersecurity Analyst (CySA+)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team?everyone from help desk staff to the Chief Information Officer?understand their role in these security processes. Overview In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will: - Assess information security risk in computing and network environments. - Analyze reconnaissance threats to computing and network environments. - Analyze attacks on computing and network environments. - Analyze post-attack techniques on computing and network environments. - Implement a vulnerability management program. - Collect cybersecurity intelligence. - Analyze data collected from security and event logs. - Perform active analysis on assets and networks. - Respond to cybersecurity incidents. - Investigate cybersecurity incidents. - Address security issues with the organization's technology architecture. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. 1 - ASSESSING INFORMATION SECURITY RISK * Identify the Importance of Risk Management * Assess Risk * Mitigate Risk * Integrate Documentation into Risk Management 2 - ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS * Assess the Impact of Reconnaissance Incidents * Assess the Impact of Social Engineering 3 - ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS * Assess the Impact of System Hacking Attacks * Assess the Impact of Web-Based Attacks * Assess the Impact of Malware * Assess the Impact of Hijacking and Impersonation Attacks * Assess the Impact of DoS Incidents * Assess the Impact of Threats to Mobile Security * Assess the Impact of Threats to Cloud Security 4 - ANALYZING POST-ATTACK TECHNIQUES * Assess Command and Control Techniques * Assess Persistence Techniques * Assess Lateral Movement and Pivoting Techniques * Assess Data Exfiltration Techniques * Assess Anti-Forensics Techniques 5 - MANAGING VULNERABILITIES IN THE ORGANIZATION * Implement a Vulnerability Management Plan * Assess Common Vulnerabilities * Conduct Vulnerability Scans * Conduct Penetration Tests on Network Assets 6 - COLLECTING CYBERSECURITY INTELLIGENCE * Deploy a Security Intelligence Collection and Analysis Platform * Collect Data from Network-Based Intelligence Sources * Collect Data from Host-Based Intelligence Sources 7 - ANALYZING LOG DATA * Use Common Tools to Analyze Logs * Use SIEM Tools for Analysis 8 - PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS * Analyze Incidents with Windows-Based Tools * Analyze Incidents with Linux-Based Tools * Analyze Malware * Analyze Indicators of Compromise 9 - RESPONDING TO CYBERSECURITY INCIDENTS * Deploy an Incident Handling and Response Architecture * Mitigate Incidents * Prepare for Forensic Investigation as a CSIRT 10 - INVESTIGATING CYBERSECURITY INCIDENTS * Apply a Forensic Investigation Plan * Securely Collect and Analyze Electronic Evidence * Follow Up on the Results of an Investigation 11 - ADDRESSING SECURITY ARCHITECTURE ISSUES * Remediate Identity and Access Management Issues * Implement Security During the SDLC ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Cybersecurity Analyst (CySA+)
Delivered Online6 days, Jun 17th, 13:00 + 6 more
£2475

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. LESSON 1: SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS * Security Concepts * Security Controls LESSON 2: COMPARE THREAT TYPES * Threat Actors * Attack Surfaces * Social Engineering LESSON 3: EXPLAIN CRYPTOGRAPHIC SOLUTIONS * Cryptographic Algorithms * Public Key Infrastructure * Cryptographic Solutions LESSON 4: IMPLEMENT IDENTITY AND ACCESS MANAGEMENT * Authentication * Authorization * Identity Management LESSON 5: SECURE ENTERPRISE NETWORK ARCHITECTURE * Enterprise Network Architecture * Network Security Appliances * Secure Communications LESSON 6: SECURE CLOUD NETWORK ARCHITECTURE * Cloud Infrastructure * Embedded Systems and Zero Trust Architecture LESSON 7: EXPLAIN RESILIENCY AND SITE SECURITY CONCEPTS * Asset Management * Redundancy Strategies * Physical Security LESSON 8: EXPLAIN VULNERABILITY MANAGEMENT * Device and OS Vulnerabilities * Application and Cloud Vulnerabilities * Vulnerability Identification Methods * Vulnerability Analysis and Remediation LESSON 9: EVALUATE NETWORK SECURITY CAPABILITIES * Network Security Baselines * Network Security Capability Enhancement LESSON 10: ASSESS ENDPOINT SECURITY CAPABILITIES * Implement Endpoint Security * Mobile Device Hardening LESSON 11: ENHANCE APPLICATION SECURITY CAPABILITIES * Application Protocol Security Baselines * Cloud and Web Application Security Concepts LESSON 12: EXPLAIN INCIDENT RESPONSE AND MONITORING CONCEPTS * Incident Response * Digital Forensics * Data Sources * Alerting and Monitoring Tools LESSON 13: ANALYZE INDICATORS OF MALICIOUS ACTIVITY * Malware Attack Indicators * Physical and Network Attack Indicators * Application Attack Indicators LESSON 14: SUMMARIZE SECURITY GOVERNANCE CONCEPTS * Policies, Standards, and Procedures * Change Management * Automation and Orchestration LESSON 15: EXPLAIN RISK MANAGEMENT PROCESSES * Risk Management Processes and Concepts * Vendor Management Concepts * Audits and Assessments LESSON 16: SUMMARIZE DATA PROTECTION AND COMPLIANCE CONCEPTS * Data Classification and Compliance * Personnel Policies ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online5 days, Jun 17th, 15:00 + 23 more
£2475

BCS Foundation Certificate in Information Security Management Principles

5.0(12)

By Nemstar Ltd

This CISMP course and exam is for anyone wishing to progress their career in the rapidly expanding fields of Information Security, risk and cyber especially within the UK public sector.

BCS Foundation Certificate in Information Security Management Principles
Delivered Online
Dates arranged on request
£1914

Certified Information Security Manager (CISM)

4.8(8)

By Skill Up

Enter the CISM arena, where governance meets risk, and incident management becomes art. Pave your path to cybersecurity supremacy today!

Certified Information Security Manager (CISM)
Delivered Online On Demand
£25

Information Security Consultant (ISC) - CPD Certified

5.0(2)

By Studyhub UK

24 Hour Flash Deal **25-in-1 Information Security Consultant (ISC) Mega Bundle** Information Security Consultant (ISC) Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Information Security Consultant (ISC) package online with Studyhub through our online learning platform. The Information Security Consultant (ISC) bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Information Security Consultant (ISC) course provides complete 360-degree training on Information Security Consultant (ISC). You'll get not one, not two, not three, but twenty-five Information Security Consultant (ISC) courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Information Security Consultant (ISC) courses are yours for as long as you want them once you enrol in this course This Information Security Consultant (ISC) Bundle consists the following career oriented courses: * Course 01: CompTIA Security+ * Course 02: CompTIA CySA+ Cybersecurity Analyst Course * Course 03: Web Application Penetration Testing * Course 04: CompTIA PenTest+ (Ethical Hacking) course * Course 05: CEH: Learn Ethical Hacking From A-Z: Beginner To Expert * Course 06: Cyber Security Incident Handling and Incident Response * Course 07: CompTIA Cloud+ (CV0-002) * Course 08: Computer Networks Security from Scratch to Advanced * Course 09: GDPR Training * Course 10: Data Protection and Data Security (GDPR) Training Certification * Course 11: Cyber Security Law * Course 12: Cyber Security Awareness Training * Course 13: Information Governance and Data Management Training * Course 14: Foundations of IT Security: Protecting Digital Assets * Course 15: Security Management and Fraud Prevention Training * Course 16: Security Analyst * Course 17: Fraud Detection & Prevention: Safeguarding Against Deception * Course 18: Computer Workstation Safety Training * Course 19: Diploma in CompTIA A+ * Course 20: SQL for Data Science, Data Analytics and Data Visualization * Course 21: Python Basic Programming for Absolute Beginners * Course 22: Machine Learning Basics * Course 23: Network Security and Risk Management * Course 24: IT Administration and Networking * Course 25: Touch Typing Complete Training Diploma The Information Security Consultant (ISC) course has been prepared by focusing largely on Information Security Consultant (ISC) career readiness. It has been designed by our Information Security Consultant (ISC) specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Information Security Consultant (ISC) Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Information Security Consultant (ISC) bundle course has been created with twenty-five premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Information Security Consultant (ISC) Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Information Security Consultant (ISC) Elementary modules, allowing our students to grasp each lesson quickly. The Information Security Consultant (ISC) course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. In this exclusive Information Security Consultant (ISC) bundle, you really hit the jackpot. Here's what you get: * Step by step Information Security Consultant (ISC) lessons * One to one assistance from Information Security Consultant (ISC)professionals if you need it * Innovative exams to test your knowledge after the Information Security Consultant (ISC)course * 24/7 customer support should you encounter any hiccups * Top-class learning portal * Unlimited lifetime access to all twenty-five Information Security Consultant (ISC) courses * Digital Certificate, Transcript and student ID are all included in the price * PDF certificate immediately after passing * Original copies of your Information Security Consultant (ISC) certificate and transcript on the next working day * Easily learn the Information Security Consultant (ISC) skills and knowledge you want from the comfort of your home CPD 250 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? This Information Security Consultant (ISC) training is suitable for - * Students * Recent graduates * Job Seekers * Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Information Security Consultant (ISC) * Certified Information Security Manager (CISM) * Certified Information Security Management Principles (CISMP) * Certified Information Systems Security Professional (CISSP) REQUIREMENTS To participate in this Information Security Consultant (ISC) course, all you need is - * A smart device * A secure internet connection * And a keen interest in Information Security Consultant (ISC) CAREER PATH You will be able to kickstart your Information Security Consultant (ISC) career because this course includes various courses as a bonus. This Information Security Consultant (ISC) is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Information Security Consultant (ISC) career opportunities. CERTIFICATES CPD ACCREDITED CERTIFICATE Digital certificate - Included * CPD Accredited e-Certificate - Free * CPD Accredited Hardcopy Certificate - Free * Enrolment Letter - Free * Student ID Card - Free

Information Security Consultant (ISC) - CPD Certified
Delivered Online On Demand
£279

Complete Information Security

4.7(160)

By Janets

Register on the Complete Information Security today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Complete Information Security is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! WHAT YOU GET WITH THE COMPLETE INFORMATION SECURITY * Receive a e-certificate upon successful completion of the course * Get taught by experienced, professional instructors * Study at a time and pace that suits your learning style * Get instant feedback on assessments  * 24/7 help and advice via email or live chat * Get full tutor support on weekdays (Monday to Friday) COURSE DESIGN The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of * Video lessons * Online study materials CERTIFICATION Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. WHO IS THIS COURSE FOR: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. REQUIREMENTS: The online training is open to all students and has no formal entry requirements. To study the Complete Information Security, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. 

Complete Information Security
Delivered Online On Demand
£25

ISO 27001:2022 Lead Implementer Online Course

By Cognicert Limited

The “ISO 27001:2022 Lead Implementer ” course provides comprehensive training in the ISO 27001:2022 standard and all its requirements from the Implementer ’s point of view, as well as basic skills necessary to execute the requirements. It’s a practical-oriented training that should be considered “a must” for every ISO 27001:2022 Implementer. This intensive course is specifically designed to participants to serve as ISO 27001:2022 Lead Implementers.

ISO 27001:2022  Lead Implementer Online Course
Delivered Online5 days, Jul 8th, 08:00
£475

Educators matching "Information Security"

Show all 5
The Meee Partnership

the meee partnership

5.0(9)

LLandudno

The Magic that is the Meee Team It’s easy to look at other people’s lives and be amazed at what they’ve achieved. But success of any type is never just one heroic individual battling the odds to win. There is always magic behind the magic that we may not immediately see or be aware of. No one achieves anything alone. This amazing team of people is all the above and magic in every way. We are a sum of why we do what we do, and together we create and do truly magical things. Here are our stories as to why we do. Sid Madge, Founder, Madgician Sid Madge I absolutely love brands. And, for over 30 years, I worked for and led some of Europe’s most renowned creative agencies, supporting many of the world’s biggest companies. Then, in 2015, my life changed forever. While giving a talk to a group of teenagers I was shocked to hear how they thought about and described themselves. For many, this lack of self-esteem had spiralled into a cycle of anxiety and depression. I’d already seen how brands could transform the fortunes and futures of businesses - and that sparked an idea: what if I could use this knowledge to bring out the potential in others? That’s how Meee began. Now I use the ideas and methods of branding to inspire, educate and challenge the deep-set beliefs that hold us back. I use words, imagery, colour, numbers, music and a variety of sense-based tools to change the way people see, think and feel. Not just to transform their outlook on the world, but to help them make sense of what can seem like insurmountable life challenges. Today the purpose of Meee is to inspire everyone, everywhere, every day to find, live and give their magic. And so far, we’ve helped change the lives of over 20,000 people. My ambition is to take Meee to millions more, bringing that spark of magic to individuals, organisations and communities around the world. To spread the Meee message, I’ve built a team of (not so) like-minded individuals - from mavericks to misfits, disruptors to developers. If you’d like to join our team of magic makers and givers and help others find their spark, then please get in touch. Joss Mathieson, The people magic guy Joss Mathieson Do you know that moment when the penny drops, the lightbulb goes on and suddenly the future looks brighter? When you realise that there is opportunity, where before there seemed to be barriers? Where you feel a surge in confidence and believe this is your moment to shine? That’s what gets me out of bed every morning, helping people to experience that moment and appreciate that they are truly capable of magic. When people feel they are in a safe space, they can think boldly and build the courage to step out of their comfort zone and into their zone of genius. And it’s even better when people in a team or a whole organisation do it together, which amplifies their magic and rubs off on others. During a 25-year career working for a number of complex and diverse international companies like Barclays and GlaxoSmithKline, I’ve been lucky enough to work with lots of magical people, learning from them, driving for better and inspiring others to join in. When I first met Sid in the mid-noughties, we found a spark which has endured and got stronger to this day. It’s a joy to use that spark, the amazing tools and life-changing experience of Meee to help lots more people be their best selves.

Wrexham Foyer

wrexham foyer

Denbighshire,

In this document the expression ‘we’ refers to, ClwydAlyn Housing Limited, Tir Tai Limited, PenArian Limited and Tai Elwy Limited, that provides housing and related services across North Wales. Each entity is the controller of its own personal data although data may be processed by other Group members on its behalf This privacy notice sets out how ClwydAlyn collects and uses information about you. Please read this privacy notice carefully to understand how we will use your personal information. If you have any questions or queries in relation to this privacy notice, you can contact our Data Protection Officer at: datacontroller@clwydalyn.co.uk 72 Ffordd William Morgan, St Asaph Business Park, St Asaph, Denbighshire, LL17 0JD 0800 1835757 (freephone from a landline) or 01745 536800 This privacy notice explains: What information we may collect about you How we use your information Contacting you Sharing your information Our legal basis for collecting, holding and using your information Security and storage of your information Your rights 1.What information we may collect about you The information we collect about you depends on why we are dealing with you. For example, if you make a housing application or become one of our tenants, we will need more information from you than if you are merely making an enquiry. We may collect the information about you in the following circumstances: If you call our Contact Centre When you call our contact centre we collect Calling Line Identification (CLI) information. We use this information to help improve its efficiency and effectiveness. We record calls for training and monitoring purposes. Additionally, our call handlers will make a record of your call in order to manage your query. We may need to share information with other organisations within or outside ClwydAlyn in order to respond to your call, for example so that we can organise maintenance or repairs or other support. We will usually tell you if it is necessary for us to pass information on to other organisations. If you email us Any email sent to us, including any attachments, may be monitored and used by us for reasons of security and for monitoring compliance with office policy. Email monitoring or blocking software may also be used. Please be aware that you have a responsibility to ensure that any email you send to us is within the bounds of the law. If you make a complaint to us When we receive a complaint from a person we make up a file containing the details of the complaint. This normally contains the identity of the complainant and any other individuals involved in the complaint. We will only use the personal information we collect to process the complaint and to check on the level of service we provide. If a complainant doesn’t want information identifying him or her to be disclosed to any person that the complaint is about, we will try to respect that. However, it may not be possible to handle a complaint on an anonymous basis. Similarly, where enquiries are submitted to us we will only use the information supplied to us to deal with the enquiry and any subsequent issues and to check on the level of service we provide. If you use our services We hold the details of the people who request and use our services so that we can provide these services and for other closely related purposes. For example, we use information about our service users to develop and improve our services and to make sure we are delivering services to different groups fairly. If you apply for housing or become a tenant, there is certain information that we require in order to process your application and manage your tenancy. If you do not provide us with this information, we will not be able to progress your application. When you visit our websites We automatically collect certain information when you visit one of our websites. Please see Use of Cookies below for more information about this. When you use our customer portal, you are able to view information held in our housing management system, including personal details, account statements, tenancy information, repair history and pay your rent / service charges. Please note that we use a third party provider, Verseone to support our customer portal. Information we receive from others We work closely with other organisations, such as local councils, police forces, voluntary sector organisations, other housing providers and our contractors, and we may receive information about you from them. If you visit our premises We may ask you to sign in and out if you visit staff or residents at our premises. Access is controlled for the purposes of building and occupant security. Access is recorded to assist with fire and other evacuation procedures. Furthermore, your image may be captured on CCTV to monitor and collect visual images for the purpose of security and the prevention and detection of crime. If you use our Wi-Fi or computer to access our IT systems, access and activity may be monitored to prevent misuse of Group property, according to our IS Corporate policies. Job applicants When individuals apply to work for us, we will only use the information they supply to us to process their application and to monitor recruitment statistics. Where we want to disclose information to a third party, for example where we want to take up a reference or obtain a ‘disclosure’ from the Criminal Records Bureau we will not do so without informing them beforehand unless the disclosure is required by law. Personal information about unsuccessful candidates will be held for 12 months after the recruitment exercise has been completed; it will then be destroyed or deleted. We retain de-personalised statistical information about applicants to help inform our recruitment activities, but no individuals are identifiable from that data. Once a person has taken up employment with us, we will compile a file relating to their employment. The information contained in this will be kept secure and will only be used for purposes directly relevant to that person’s employment. Once their employment with us has ended, we will retain the file in accordance with the requirements of our retention schedule and then delete it. If you are a member of one of our Boards, Committees or Panels We may ask for personal details for managing and statistical purposes. 2.How we use your information We process your personal information primarily in connection with managing our housing services. If you are a tenant, this includes managing your tenancy and dealing with any applications, queries or complaints that you make. Examples of how we use your information include: to confirm your identity to assess your suitability to access any of our services to manage your tenancy, care or support to ensure our properties are appropriately maintained and in accordance with legal obligations, such as periodic gas safety checks to notify you about important changes to our services to let you know about other relevant services, both ours and those of other parties whose products and services we have agreed should be made available to you (see the section below on 'Contacting you' for more information about this) to update and correct our records to carry out statistical and market analyses, including benchmarking exercises, to enable us to understand you better and improve our services, and in accordance with our operating Regulations to develop, test and improve our systems to ensure that content of our website is presented in the most effective manner for you and for your computer to administer our website and for internal operations, including troubleshooting, data analysis, testing, research, statistical and survey purposes to comply with other legal obligations, such as Health and Safety laws or safeguarding vulnerable people We may combine information we receive from other sources with information you give to us for the purposes set out above (depending on the types of information we receive). 3.Contacting you We will use your contact information to send you important information via letters, emails, text messages, or otherwise to telephone you. We may record telephone calls for security and training purposes. We may use the information we hold about you in order to provide you with information about our services which we feel may interest you. You can opt out of receiving marketing communications at any time, although please note that we will continue to send you important messages about your tenancy. If you have changed your mind about being contacted for marketing purposes, please contact our Customer Services Team on 0800 1835757 (freephone from a landline) or 01745 536800 to update your preferences. 4.Sharing your information We do not sell your information to any third party, but in certain limited circumstances we may disclose your personal information to: any member of our group, which means our subsidiaries, our ultimate holding company and its subsidiaries, as defined in section 736 of the UK Companies Act 1985; and/or other third parties in the following circumstances: if we are under a duty to disclose or share your personal data in order to comply with any legal obligation; in order to enforce or apply our terms and conditions and other agreements; to protect the rights, property, or safety of ClwydAlyn, our customers, or others; to investigate or prevent a crime. This includes exchanging information with other companies and organisations for the purposes of fraud protection and credit risk reduction; to obtain any professional advice; and/or with your consent. 5.Our legal basis for collecting, holding and using your information Data protection law sets out various lawful legal bases (or ‘conditions’) which allow us to collect, hold and use your personal information: Where you have entered into a contract or contracts with us, we may need to use your information to provide you with our services. An example of this is where you have a tenancy with us. Where we are under a legal obligation which requires us to process your personal information. For example, notifications of Health and Safety incidents. We will sometimes use your personal information based upon your consent. We will always tell you where this is the case and ask you to agree before we process your information. An example of using your personal information with your consent is publishing your image as part of a photograph on our website. Finally, sometimes it is necessary to process your personal information for the purposes of our own legitimate interests. We will only do so where these interests are not overridden by the interests and fundamental rights or the freedoms of the individuals concerned. An example of this is when we may contact you about your experience of contacting our Customer Services Team or a recent repair to your property. Data protection law recognises certain "special categories" of personal information, which is information revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic information, biometric information for uniquely identifying a person, information concerning health, and information concerning a person's sex life or sexual orientation. Information about criminal offences and records is placed in a similar category. These special categories of personal information are considered particularly sensitive and so we will only collect and use this information where you have given us your explicit consent or where we consider it necessary to do so. 6.Security and storage of your personal information The information about you that we collect may be transferred to, and stored at, a destination outside the European Economic Area (EEA). It may also be processed by staff operating outside the EEA who work for one of our suppliers. We will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this privacy policy. We will generally keep personal information about you no longer than is needed for as per our Retention Policy. 7.Your rights You have the right to request from us access to your own personal information. This is sometimes known as a 'subject access request'. You also have the right to ask us not to process your personal data for direct marketing purposes. We will tell you if we intend to use your data for this purpose or if we intend to disclose your information to any third party for this purpose. You can exercise your right to prevent such processing by checking certain boxes on the forms we use to collect your data or by contacting our Customer Services Team on 0800 1835757 (freephone from a landline) or 01745 536800. From 25 May 2018, you will have additional rights to request from us: That any inaccurate information we hold about you is corrected That your information is deleted That we stop using your personal information for certain purposes That your information is provided to you in a portable format That decisions about you are not made by wholly automated means Many of the rights listed above are limited to certain defined circumstances and we may not be able to comply with your request. We will tell you if this is the case. If you choose to make a request to us, we will aim to respond to you within one month. We will not charge a fee for dealing with your request.