• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4 Security Management courses in Warlingham

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Information Security Management Principle

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- Objective * Understand the requirement of Information Security  * Concepts and Definitions of Information Security Management Systems * Deeply Analysing the policies, Standards and procedures * How to deliver a balanced ISMS and following its security procedures * Analysing the Information risk management  * Evaluating the organisational responsibilities  * Understanding the Information security controls  * Scrutinising Legal framework  * Techniques of Cryptographic models

Information Security Management Principle
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

ISM,ISPS,MLC Maritime Internal Auditor

By International Maritime Training

The course approaches the audit process in the context of international standards and therefore, it is equally suitable for sea-going and office-based staff and its benefits are as following: * Individuals will have a good understanding of the ISM Code, its importance, and their role within it, including ISM, ISO and MLC auditing requirements * Individuals will be actively involved in the ongoing evaluation and development of a Company Safety, Environmental and Quality Management System * Providing the Company and its auditors with the ability to establish the effectiveness of a Company Management System ahead of external verification by Administrations or Port State Control * Delivered by experts with International safety and security management, compliance and verification experience in an engaging interactive style with a variety of security and safety related scenario case study workshops exercises during the training course

ISM,ISPS,MLC Maritime Internal Auditor
Delivered Online & In-Person
Dates arranged on request
£200

Introduction to Java programming

5.0(3)

By Systems & Network Training

JAVA TRAINING COURSE DESCRIPTION A comprehensive introduction of the Java language and environment. It is important to note that the course will assume that the delegates are already familiar with the C language as this enables more advanced features of the Java language to be covered in the course. The course will also give an overview of areas related to programming in Java. WHAT WILL YOU LEARN * Describe the Java architecture. * Write Java applets and applications. * Debug Java programs. * Examine existing code and determine its function. * Use multimedia extensions, the awt, multithreading, exceptions within Java JAVA TRAINING COURSE DETAILS * Who will benefit: Those wishing to program in Java. * Prerequisites: Complete C programming * Duration 5 days JAVA TRAINING COURSE CONTENTS * Review of UNIX fundamentals * What is Java? What Java is, history of Java, reasons for success. The Java Virtual Machine, Bytecodes, getting up and running with Java, Java resources. Simple Java applications. * C features in Java Java data structures, Java flow control, differences from C, arrays, strings and packages. * OO features in Java Java classes and objects, inheritance, overloading, packages. Differences from C++. * Java applets Applications vs. applets, HTML, the applet tag, applet methods, life cycle, testing and debugging. * Multimedia applets Images, sounds, fonts, colours and animation. * Java products The JDK in detail, other development environments. Javabeans and JDBC overviews. * Abstract Window Toolkit JFC and Swing versus AWT. Event handling (JDK 1.1), GUIs, panels, buttons, lists, scrollbars, text areas, frames… * Exception handling and multithreading Handling exceptions. Starting, pausing, stopping threads, producers, consumers, monitoring. * More standard classes Java file I/O, Streams, The system class. The networking model, java.net classes. * Security and Java Types of attack, the security manager, craplets, securing the network. * Integrating legacy code with Java

Introduction to Java programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Safe Recruitment for Employers & Managers

By Prima Cura Training

Safer recruitment is designed to help those who are responsible for employing anyone who works with vulnerable groups, to identify and deter or reject individuals who are deemed to be at risk of abusing. It is crucial that all employers have a recruitment policy in place that takes into account safer recruitment best practices and considerations. This course covers key topics including: advertising, application forms, selecting candidates for interview based on the information they have presented, and post-interview checks - including DBS checks - before making an offer of employment. Recruitment of staff is now a complex process and there are many issues that need to be considered to ensure safe and successful recruitment, to reduce in turn the risk of harm, abuse and neglect of adults and children.

Safe Recruitment for Employers & Managers
Delivered in-person, on-requestDelivered In-Person in UK Wide
Price on Enquiry

Online Options

Show all 634

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. LESSON 1: SUMMARIZE FUNDAMENTAL SECURITY CONCEPTS * Security Concepts * Security Controls LESSON 2: COMPARE THREAT TYPES * Threat Actors * Attack Surfaces * Social Engineering LESSON 3: EXPLAIN CRYPTOGRAPHIC SOLUTIONS * Cryptographic Algorithms * Public Key Infrastructure * Cryptographic Solutions LESSON 4: IMPLEMENT IDENTITY AND ACCESS MANAGEMENT * Authentication * Authorization * Identity Management LESSON 5: SECURE ENTERPRISE NETWORK ARCHITECTURE * Enterprise Network Architecture * Network Security Appliances * Secure Communications LESSON 6: SECURE CLOUD NETWORK ARCHITECTURE * Cloud Infrastructure * Embedded Systems and Zero Trust Architecture LESSON 7: EXPLAIN RESILIENCY AND SITE SECURITY CONCEPTS * Asset Management * Redundancy Strategies * Physical Security LESSON 8: EXPLAIN VULNERABILITY MANAGEMENT * Device and OS Vulnerabilities * Application and Cloud Vulnerabilities * Vulnerability Identification Methods * Vulnerability Analysis and Remediation LESSON 9: EVALUATE NETWORK SECURITY CAPABILITIES * Network Security Baselines * Network Security Capability Enhancement LESSON 10: ASSESS ENDPOINT SECURITY CAPABILITIES * Implement Endpoint Security * Mobile Device Hardening LESSON 11: ENHANCE APPLICATION SECURITY CAPABILITIES * Application Protocol Security Baselines * Cloud and Web Application Security Concepts LESSON 12: EXPLAIN INCIDENT RESPONSE AND MONITORING CONCEPTS * Incident Response * Digital Forensics * Data Sources * Alerting and Monitoring Tools LESSON 13: ANALYZE INDICATORS OF MALICIOUS ACTIVITY * Malware Attack Indicators * Physical and Network Attack Indicators * Application Attack Indicators LESSON 14: SUMMARIZE SECURITY GOVERNANCE CONCEPTS * Policies, Standards, and Procedures * Change Management * Automation and Orchestration LESSON 15: EXPLAIN RISK MANAGEMENT PROCESSES * Risk Management Processes and Concepts * Vendor Management Concepts * Audits and Assessments LESSON 16: SUMMARIZE DATA PROTECTION AND COMPLIANCE CONCEPTS * Data Classification and Compliance * Personnel Policies ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered Online6 days, Jun 3rd, 13:00 + 25 more
£2475

CertNexus Certified Cyber Secure Coder (CSC-210)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy. This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification Overview In this course, you will employ best practices in software development to develop secure software.You will: Identify the need for security in your software projects. Eliminate vulnerabilities within software. Use a Security by Design approach to design a secure architecture for your software. Implement common protections to protect users and data. Apply various testing methods to find and correct security defects in your software. Maintain deployed software to ensure ongoing security... The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development. IDENTIFYING THE NEED FOR SECURITY IN YOUR SOFTWARE PROJECTS * Identify Security Requirements and Expectations * Identify Factors That Undermine Software Security * Find Vulnerabilities in Your Software * Gather Intelligence on Vulnerabilities and Exploits HANDLING VULNERABILITIES * Handle Vulnerabilities Due to Software Defects and Misconfiguration * Handle Vulnerabilities Due to Human Factors * Handle Vulnerabilities Due to Process Shortcomings DESIGNING FOR SECURITY * Apply General Principles for Secure Design * Design Software to Counter Specific Threats DEVELOPING SECURE CODE * Follow Best Practices for Secure Coding * Prevent Platform Vulnerabilities * Prevent Privacy Vulnerabilities IMPLEMENTING COMMON PROTECTIONS * Limit Access Using Login and User Roles * Protect Data in Transit and At Rest * Implement Error Handling and Logging * Protect Sensitive Data and Functions * Protect Database Access TESTING SOFTWARE SECURITY * Perform Security Testing * Analyze Code to find Security Problems * Use Automated Testing Tools to Find Security Problems MAINTAINING SECURITY IN DEPLOYED SOFTWARE * Monitor and Log Applications to Support Security * Maintain Security after Deployment

CertNexus Certified Cyber Secure Coder (CSC-210)
Delivered Online4 days, Jun 4th, 13:00 + 1 more
£2085

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - A. ORGANIZATIONAL GOVERNANCE * Organizational Strategy, Goals, and Objectives * Organizational Structure, Roles, and Responsibilities * Organizational Culture * Policies and Standards * Business Processes * Organizational Assets GOVERNANCE - B. RISK GOVERNANCE * Enterprise Risk Management and Risk Management Framework * Three Lines of Defense * Risk Profile * Risk Appetite and Risk Tolerance * Legal, Regulatory, and Contractual Requirements * Professional Ethics of Risk Management IT RISK ASSESSMENT - A. IT RISK IDENTIFICATION * Risk Events (e.g., contributing conditions, loss result) * Threat Modelling and Threat Landscape * Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) * Risk Scenario Development IT RISK ASSESSMENT - B. IT RISK ANALYSIS AND EVALUATION * Risk Assessment Concepts, Standards, and Frameworks * Risk Register * Risk Analysis Methodologies * Business Impact Analysis * Inherent and Residual Risk RISK RESPONSE AND REPORTING - A. RISK RESPONSE * Risk Treatment / Risk Response Options * Risk and Control Ownership * Third-Party Risk Management * Issue, Finding, and Exception Management * Management of Emerging Risk RISK RESPONSE AND REPORTING - B. CONTROL DESIGN AND IMPLEMENTATION * Control Types, Standards, and Frameworks * Control Design, Selection, and Analysis * Control Implementation * Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - C. RISK MONITORING AND REPORTING * Risk Treatment Plans * Data Collection, Aggregation, Analysis, and Validation * Risk and Control Monitoring Techniques * Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) * Key Performance Indicators * Key Risk Indicators (KRIs) * Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - A. INFORMATION TECHNOLOGY PRINCIPLES * Enterprise Architecture * IT Operations Management (e.g., change management, IT assets, problems, incidents) * Project Management * Disaster Recovery Management (DRM) * Data Lifecycle Management * System Development Life Cycle (SDLC) * Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - B. INFORMATION SECURITY PRINCIPLES * Information Security Concepts, Frameworks, and Standards * Information Security Awareness Training * Business Continuity Management * Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered Online4 days, Jun 5th, 13:00 + 2 more
£2037

Security Management Level 1 Diploma

By Empower UK Employment Training

Step into the realm of Security Management with our comprehensive course. Master risk analysis, physical and information security, legal frameworks, and the use of technology in security. Elevate your skills for a robust career in security management.

Security Management Level 1 Diploma
Delivered Online On Demand
£12.5

Security Management QLS Diploma

By Imperial Academy

Free Level 5 QLS Endorsed Certificate | CPD Accredited | 150 CPD Points | Advanced Learning Materials | Lifetime Access

Security Management QLS Diploma
Delivered Online On Demand
£100

Level 3, 4, 5 Security Management Diploma

By Imperial Academy

Level 5 QLS Endorsed Course with FREE Certificate | CPD & CiQ Accredited | 150 CPD Points | Lifetime Access

Level 3, 4, 5 Security Management Diploma
Delivered Online On Demand
£100

Security Management and Workplace Safety

By Imperial Academy

2 QLS Endorsed Course | CPD Certified | Free PDF + Hardcopy Certificates | 80 CPD Points | Lifetime Access

Security Management and Workplace Safety
Delivered Online On Demand
£150

Security Management

By The Teachers Training

Enhance your expertise in security management with our comprehensive course. Dive into strategies for risk assessment, threat mitigation, and crisis response to safeguard assets and personnel effectively. Whether you're a security professional looking to advance your career or a business owner aiming to bolster protection measures, this course equips you with essential skills and knowledge. Enroll now and take proactive steps towards ensuring safety and security in any environment.

Security Management
Delivered Online On Demand
£15

Security Management - CPD Accredited

By Apex Learning

Security Management officers not only earn a good amount of salary (£20,000 to £ 70,000) but also make people feel safe. This brings a sense of contentment. Moreover, this job is usually a shift work. This means a Security Management has the luxury of a flexible schedule. Through this job, you will come across many individuals, which will help broaden and strengthen your network. Sign up for this bundle now and find out all the other benefits! This Security Management bundle consists of 11 in-demand courses: * Course 01: Security Guard Course * Course 02: Close Protection * Course 03: Criminal Law and Criminology * Course 04: English Law and Legal System Level 3 * Course 05: Emotional Intelligence and Human Behaviour * Course 06: GDPR Data Protection Level 5 * Course 07: Workplace Confidentiality * Course 08: Cyber Security Incident Handling and Incident Response * Course 09: Functional Skills - Fitness * Course 10: Decision Making and Critical Thinking * Course 11: Online Workplace First Aid Level 3 Course From this Security Management course, you will uncover all the information and skills required to be an ideal Security Guard, including- * Discover career prospect * Get hands-on general patrol tactics and techniques * Acquire knowledge about public relations and traffic control * Get a detailed introduction to human behaviour and basic psychological process * Discover evolutionary perspective of human behaviour and self-leadership * Familiarise with emotional intelligence and Neuro-Linguistic Programming (NLP) Curriculum of Security Management Bundle Course 01: Security Guard Course * Module 01: Definition and Importance of Security * Module 02: Career Prospect of Security Guard in the UK * Module 03: Security Risk Analysis and Risk Reduction * Module 04: Physical and Information Security Protection * Module 05: Response to Immediate Crisis * Module 06: The Use of Technology for Managing Security * Module 07: General Patrol Tactics and Techniques * Module 08: Public Relations and Traffic Control * Module 09: Violence in the Workplace * Module 10: Laws and Regulations -------- 10 more Security Management related courses--------- How will I get my Security Management Certificate? After successfully completing the Security Management course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. * PDF Certificate: Free (Previously it was £6*11 = £66) * Hard Copy Certificate: Free (For The Title Course: Previously it was £10) CPD 45 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? Anyone from any background can enrol in this Security Management bundle. Persons with similar professions can also refresh or strengthen their skills by enrolling in this Security Management course. Disclaimer This Security Management course is not applicable for any professional certification. However, You will have an edge to gather deep knowledge and information about this sector. REQUIREMENTS Our Security Management is fully compatible with PC's, Mac's, laptops, tablets and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so that you can access your Security Management course on Wi-Fi, 3G or 4G. CAREER PATH Having this various Security Management expertise will increase the value of your CV and open you up to multiple job sectors CERTIFICATES CERTIFICATE OF COMPLETION Digital certificate - Included

Security Management - CPD Accredited
Delivered Online On Demand
£51

Security Management Diploma Part - 2

By iStudy UK

COURSE DESCRIPTION Get instant knowledge from this bite-sized Security Management Diploma Part - 2 course. This course is very short and you can complete it within a very short time. In this Security Management Diploma Part - 2 course you will get fundamental ideas of security management, the key strategy of security investigations, threat awareness and so on. Enrol in this course today and start your instant first step towards business resilience and crisis management. Learn faster for instant implementation. LEARNING OUTCOME * Familiarise with security investigations and threat awareness  * Understand business resilience and crisis management  * Gain in-depth knowledge of the cyber security and fraud prevention  * Learn about laws and regulations HOW MUCH DO SECURITY MANAGERS EARN? * Senior - £72,000 (Apprx.) * Average - £45,000 (Apprx.) * Starting - £29,000 (Apprx.) REQUIREMENT Our Security Management Diploma Part - 2 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Security Management Diploma Part - 2 Module 01: Business Resilience and Crisis Management 00:17:00 Module 02: Cyber Security and Fraud Prevention 00:25:00 Module 03: Security Investigations and Threat Awareness 00:24:00 Module 04: Laws and Regulations 00:29:00 Assignment Assignment - Security Management Diploma Part - 2 00:00:00

Security Management Diploma Part - 2
Delivered Online On Demand
£25

Educators matching "Security Management"

Show all 68