• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

130 Courses

EC-Council Certified Chief Information Security Officer (C|CISO)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems. In this course, students will learn in-depth content in each of the 5 CCISO Domains DOMAIN 01 - GOVERNANCE * Define, Implement, Manage, and Maintain an Information Security Governance Program * Information Security Drivers * Establishing an information security management structure * Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures * Managing an enterprise information security compliance program * Risk Management * Risk mitigation, risk treatment, and acceptable risk * Risk management frameworks * NIST * Other Frameworks and Guidance (ISO 31000, TARA, OCTAVE, FAIR, COBIT, and ITIL) * Risk management plan implementation * Ongoing third-party risk management * Risk management policies and processes * Conclusion DOMAIN 2 - SECURITY RISK MANAGEMENT, CONTROLS, & AUDIT MANAGEMENT * INFORMATION SECURITY CONTROLS * COMPLIANCE MANAGEMENT * GUIDELINES, GOOD AND BEST PRACTICES * AUDIT MANAGEMENT * SUMMARY DOMAIN 03 - SECURITY PROGRAM MANAGEMENT AND OPERATIONS * PROGRAM MANAGEMENT * OPERATIONS MANAGEMENT * Summary DOMAIN 04 - INFORMATION SECURITY CORE CONCEPTS * ACCESS CONTROL * PHYSICAL SECURITY * NETWORK SECURITY * ENDPOINT PROTECTION * APPLICATION SECURITY * ENCRYPTION TECHNOLOGIES * VIRTUALIZATION SECURITY * CLOUD COMPUTING SECURITY * TRANSFORMATIVE TECHNOLOGIES * Summary DOMAIN 05 - STRATEGIC PLANNING, FINANCE, PROCUREMENT AND VENDOR MANAGEMENT * STRATEGIC PLANNING * Designing, Developing, and Maintaining an Enterprise Information Security Program * Understanding the Enterprise Architecture (EA) * FINANCE * PROCUREMENT * VENDOR MANAGEMENT * Summary

EC-Council Certified Chief Information Security Officer (C|CISO)
Delivered Online5 days, Jul 8th, 13:00 + 1 more
£3495

SIA Security Officer Top Up & First Aid Training

5.0(15)

By SWBM ACADEMY

https://www.swbmacademy.co.uk/sotopuppayment

SIA Security Officer Top Up & First Aid Training
Delivered In-Person
Dates arranged on request
£134.99

SIA Security Officer Top Up Course Only

5.0(15)

By SWBM ACADEMY

How is SIA SO Top Up course delivered? It is a blended course. Total time is 4 hours (minimum). * Online learning – minimum 4 hrs eLearning must be done online prior to the course commencement date. You will be given access to our online portal. * Classroom learning – there is no classroom learning for this course. Learning is done online. We will give you access to our learner portal for you to get ready for the exams. * Exams - 45 minutes (2 exams) are allocated for exams, which will be done in the classroom. You would need to come to the centre and sit the exams. COURSE BENEFITS / PACKAGE DEAL ✅  UNPARALLELED VALUE! ✅ No classroom training: You will be given access to our eLearning portal for online learning to get ready for your exams, and you will only need to attend the exams. That is all. ✅ FREE Retakes of all units twice if you are unsuccessful, saving you over £90 per resit compared to other centres. ✅ TRAINING GUARANTEE: We have never postponed a course yet. You get your training or a full refund without losing a penny. ✅  BEST TRAINING:  No nonsense or bla bla bla! We have trainers with a minimum of 20 years of field experience, offering you the best possible insights and practical knowledge. You will learn from industry experts who understand the real-world challenges and nuances of security work. See Reviews! ✅ FREE reading materials. Full access to our course materials and beyond, giving you comprehensive resources for your learning journey. ✅ FREE e-certificate via email upon completion (No need for a hard copy). ✅ FREE step-by-step guidance on how to apply for the SIA license, streamlining the post-training process. ✅  FREE parking (North London Centre Only) ✅  ALL-INCLUSIVE PRICES: Our pricing is transparent and all-inclusive. Course and exam fees are included, so you won't encounter any hidden costs. ✅  FREE employment support after completing your training. ✅ Customer support - via chat-box, phone, or email for any questions or assistance. ✅  We always deliver on our promise! We pride ourselves on delivering on our promises, ensuring that you receive the highest quality training and support. ✅  Hassle-Free Booking under 60 seconds / Pick a location / Select a date / Fill in the form / Click on Go To Check Out. These basic package offers are applicable only to this training!

SIA Security Officer Top Up Course Only
Delivered In-Person
Dates arranged on request
£79.99

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jul 29th, 13:00 + 4 more
£3495

Designated Person Ashore (DPA), Company Security Officer (CSO), & Crew Management (CM)

By International Maritime Training

Certificate Details: 🌟 Designated Person Ashore (DPA): Bridge the gap between shipboard and shore-based operations, ensuring safety and compliance. 🌟 Company Security Officer (CSO): Secure vessels, crew, and cargo against threats with specialized security training. 🌟 Crew Management (CM): Efficiently manage maritime crews, enhancing operations and safety. Why Choose Our Combined Certificates? ✅ Comprehensive Expertise: Acquire a deep understanding of maritime safety, security, and crew management in one program. ✅ Industry-Recognized: Our training aligns with international regulations and industry best practices. ✅ Exceptional Value: Enjoy a discount for a limited time, making this offer unbeatable. Ready to Get Started? To seize this incredible opportunity and enroll at an unprecedented discount, please visit our website and fill out the registration form

Designated Person Ashore (DPA), Company Security Officer (CSO), & Crew Management (CM)
Delivered Online & In-Person
Dates arranged on request
£500

ISO 27005 Lead Risk Manager

By Training Centre

  Delivered in either Live Online (4 days) or in our Classroom (5 days), the ISO/IEC 27005 Lead Risk Manager training enables you to acquire the necessary expertise to support an organization in the risk management process related to all assets of relevance for Information Security using the ISO 27005 standard as a reference framework. During this training course, you will gain a comprehensive knowledge of a process model for designing and developing an Information Security Risk Management program. The training will also contain a thorough understanding of best practices of risk assessment methods such as OCTAVE, EBIOS, MEHARI and harmonized TRA. This training course supports the implementation process of the ISMS framework presented in the ISO/IEC 27001 standard. ABOUT THIS COURSE   After mastering all the necessary concepts of Information Security Risk Management based on ISO/IEC 27005, you can sit for the exam and gain the "Certified ISO/IEC 27005 Lead Risk Manager' credential. By holding this credential, you will be able to demonstrate that you have the practical knowledge and professional capabilities to support and lead a team in managing Information Security Risks.   LEARNING OBJECTIVES * MASTER THE CONCEPTS, APPROACHES, METHODS AND TECHNIQUES THAT ENABLE AN EFFECTIVE RISK MANAGEMENT PROCESS BASED ON ISO/IEC 27005 * ACKNOWLEDGE THE CORRELATION BETWEEN INFORMATION SECURITY RISK MANAGEMENT AND SECURITY CONTROLS * LEARN HOW TO INTERPRET THE REQUIREMENTS OF ISO/IEC 27001 IN INFORMATION SECURITY RISK MANAGEMENT * ACQUIRE THE COMPETENCE AND SKILLS TO EFFECTIVELY ADVISE ORGANIZATIONS ON INFORMATION SECURITY RISK MANAGEMENT BEST PRACTICES * ACQUIRE THE KNOWLEDGE NECESSARY FOR THE IMPLEMENTATION, MANAGEMENT AND MAINTENANCE OF AN ONGOING RISK MANAGEMENT PROGRAM EDUCATIONAL APPROACH * THIS TRAINING IS BASED ON BOTH THEORY AND BEST PRACTICES USED IN INFORMATION SECURITY RISK MANAGEMENT * LECTURE SESSIONS ARE ILLUSTRATED WITH EXAMPLES BASED ON CASES STUDIES * PRACTICAL EXERCISES ARE BASED ON A CASE STUDY WHICH INCLUDES ROLE PLAYING AND DISCUSSIONS * PRACTICE TESTS ARE SIMILAR TO THE CERTIFICATION EXAM WHO SHOULD ATTEND?   * Information Security risk managers * Information Security team members * Individuals responsible for Information Security, compliance, and risk within an organization * Individuals implementing ISO/IEC 27001, seeking to comply with ISO/IEC 27001 or individuals who are involved in a risk management program * IT consultants * IT professionals * Information Security officers * Privacy officers WHAT'S INCLUDED?   Official Course Slide decks Candidate pack Exam fees PREREQUISITES   A foundational understanding of ISO/IEC 27005 and knowledge of Risk Assessment and Information Security. OUR GUARANTEE     * We are an approved IECB Training Partner. * You can learn wherever and whenever you want with our robust classroom and interactive online training courses. * Our courses are taught by qualified practitioners with commercial experience. * We strive to give our delegates the hands-on experience. * Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. * Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. * Our Promise: Pass first time or 'train' again for FREE. *FREE training and exam retake offered ACCREDITATION ASSESSMENT   The exam for this course is a 12 question essay type. The pass mark is 70% and should be achieved within the allotted 150 minute exam timeframe. Exam results are provided within 24 hours. PROVIDED BY   This course is Accredited by NACS [http://www.nacs.ee]and Administered by the IECB [https://www.iecb.org]

ISO 27005 Lead Risk Manager
Delivered Online
Dates arranged on request
£1450

Network Cyber Security Engineer Job Ready Program - Career Support & Money Back Guarantee

4.8(12)

By Academy for Health and Fitness

Start your career as a Network Cybersecurity Engineer and earn up to £34,000 per month. In an era where digital threats are evolving rapidly, the demand for skilled cybersecurity professionals has never been higher. You can easily earn around £100,000 if you are good at your job. Our Network Cyber Security Engineer Job Ready Program is expertly made to equip you with the knowledge, skills, and certifications required to succeed in this vital industry. We will work with you and for you until you get the job you want. This complete Network Cyber Security Engineer Job Ready program is more than just a learning experience; it's a career transformation journey that guarantees you're ready for the job market and a standout in it. Our mission is simple - to be your trusted partner every step of the way, from Training to Employment. Enrol in the Network Cyber Security Engineer Job Ready Program today and take the first step towards a secure, successful, and fulfilling career. With our comprehensive training, ongoing career support, and a money-back guarantee, your journey to becoming a cybersecurity expert is just a click away. In addition to teaching you the technical skills you need, we will also provide you with career mentoring and support. We will help you build your resume, prepare for interviews, and land your dream job. We also have partnerships with many companies that are hiring Data Analysts, so we can help you get the job you want. If you are not happy with our service, we also offer a 100% money-back guarantee. So what are you waiting for? Enrol in our Network Cyber Security Engineer Job Ready Program today and start your journey to becoming a successful Network Cyber Security Engineer! If you have any questions, you can contact us. We will be happy to provide you with all the information you need. Get Unlimited Access to Entire Library: Enjoy unlimited access to our entire course library for a year. Seize this golden opportunity to advance your skills and achieve new heights! Why this is the Perfect Package for You! * Grow and Boost Your Career: Drive your career forward by receiving a regulated qualification recognised by the British Government. * Upgrade Your Knowledge and Skills: Upgrade your knowledge and refine your skills for better professional success. * Be More Credible and Qualified: Enhance your credibility and qualifications, making you a standout candidate in your field. * Get Unlimited Access to Entire Library: Enjoy unlimited access to our entire course library for a year. Seize this golden opportunity to advance your skills and achieve new heights! * Support and Consultation from Experts: Receive valuable support and expert consultation to navigate challenges and opportunities in your career. * 100% Money-Back Guarantee: Be confident with a 100% money-back guarantee, ensuring your investment in self-improvement is risk-free. Courses we will provide once you enrol in the program: * Course 01: Cyber Security Incident Handling and Incident Response * Course 02: Cyber Security Advanced Training * Course 03: Linux File System * Course 04: Cyber Security * Course 05: Functional Skills IT * Course 06: CompTIA Security+ (SY0-601) * Course 07: CompTIA A+ (220-1001) * Course 08: CompTIA A+ (220-1002) * Course 09: Cloud Computing / CompTIA Cloud+ (CV0-002) * Course 10: Learning Computers and Internet * Course 11: CompTIA CySA+ Cybersecurity Analyst (CS0-002) * Course 12: CompTIA IT Fundamentals ITF+ (FCO-U61) * Course 13: CompTIA Network+ Certification (N10-007) * Course 14: Diploma in CompTIA Network+ Training at QLS Level 7 * Course 15: CompTIA PenTest+ (Ethical Hacking) * Course 16: Cryptography * Course 17: IT Support Technician * Course 18: Cyber Security Law How Can We Offer Job Guarantees? HF Online provides consultancy, professional and educational services to many of the companies in the UK. During our intense exclusive training program, you will not just gain and complete the industry valuable certification but will gain industry experience as well, which is imperative to get your 1st job in the sector. The Network Cyber Security Engineer Job Ready Program - Career Support & Money Back Guarantee Job Ready Program is completed in 9 easy steps: Step 1: Enrol in the Programme Begin your exciting journey with us by enrolling in the Data and Business Intelligence Analyst Job Ready Program. Complete your registration and make a secure online payment. Remember, we offer a 14-day money-back guarantee if you're not completely satisfied. After you enrol in the Program, you will get lifetime access to 6 premium courses related to Web Development. These courses will teach you the knowledge and skills required to become a successful Data and Business Intelligence Analyst. Our customer service team will help you and keep in contact with you every step of the way. So you won't have to worry about a thing! Step 2: Initial One-On-One Counselling Session Once enrolled, you will be paired with a dedicated career mentor. Schedule your first one-on-one session to discuss your career aspirations, skills, experience, and any areas for potential growth. This conversation will shape your learning and development path. Step 3: Certification upon Course Completion After learning from the courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 4: CV Revamping Our team of professionals will build you a compelling CV and LinkedIn profile. We'll ensure it presents your skills and qualifications effectively and is tailored to the needs and expectations of the finance industry. With these powerful tools in hand, you'll be fully prepared to tackle job interviews confidently. Step 5: Building Network and Submitting CV We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. We will also make connections with many high-profile individuals and companies through your LinkedIn profile. Step 6: Interview Preparation With your CV ready, we'll move on to interview preparation. Gain exclusive access to our database of potential interview questions. Through simulated interviews with your mentor, you'll practice your responses and receive valuable feedback to further refine your skills. Step 7: Securing Job Interviews Leveraging our partnerships with leading companies, we'll secure job interviews for you. We'll ensure you get the opportunity to showcase your skills to potential employers and get the dream job you want. Step 8: Post-Interview Support Post-interview, we'll provide a debriefing session to reflect on your performance and identify areas of improvement for future interviews if necessary. Remember, our commitment extends until you land your dream job. Step 9: Celebrate Your New Job! Once you've secured your dream job in web development, it's time to celebrate! However, our support doesn't end there. We'll provide you with ongoing career advice to ensure you continue to thrive in your new role. We're excited to accompany you on this journey to success. Enrol today, and let's get started! Your path to a successful Data and Business Intelligence Analyst career begins with us. CPD 100 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? This Network Cyber Security Engineer Job Ready Program is perfect for: * Aspiring cybersecurity professionals looking for comprehensive training and a job. * Individuals looking to transition into the cybersecurity field from other IT or technical roles. * Recent graduates or students who want to get a job with practical, real-world cybersecurity skills. * Tech enthusiasts eager to deepen their understanding of network security, ethical hacking, and cyber law. * Professionals aiming for career advancement or specialisation in cybersecurity and network engineering. CAREER PATH After completing this Network Cyber Security Engineer Job Ready Program, you can get different jobs with high-paying salaries like: * Entry-Level Cybersecurity Analyst: £25,000 - £40,000 * Cyber Security Specialist/Technician: £35,000 - £60,000 * IT Security Consultant: £50,000 - £80,000 * Cyber Security Manager: £70,000 - £100,000 * Chief Information Security Officer (CISO): £90,000 - £150,000 CERTIFICATES CPD ACCREDITED E-CERTIFICATE Digital certificate - Included CPD ACCREDITED FRAMED (HARDCOPY) CERTIFICATE Hard copy certificate - Included ENROLMENT LETTER Digital certificate - Included QLS ENDORSED HARD COPY CERTIFICATE Hard copy certificate - Included STUDENT ID CARD Digital certificate - Included

Network Cyber Security Engineer Job Ready Program - Career Support & Money Back Guarantee
Delivered Online On Demand
£1299

The SIA Door Supervision course

5.0(43)

By Knight Training (UK) Ltd

Anyone who wishes to gain employment within the security industry, this is your course! Come to train with us at Knight Training and get your SIA Door Supervision course now! https://knight.training/products/sia-door-supervision-course

The SIA Door Supervision course
Delivered on-request, onlineDelivered Online
£329.99

Security Officer Training Course

5.0(1)

By Course Gate

Enroll in our Security Officer Training course to become a proficient security professional. Learn essential skills such as risk management, crime prevention, and effective security strategies. Complete the course to earn your certification and advance your career in the security field.

Security Officer Training Course
Delivered Online On Demand
£11.99

SIA Security Guard Course London

By London Construction College

Take The SIA CCTV Course This Will Take You 3 Days To Complete. Enroll Now On To The Course! -------------------------------------------------------------------------------- WHAT IS THE SIA SECURITY GUARD COURSE? The SIA Security Guard Course is a comprehensive 4-day training program meticulously designed to equip individuals with the essential knowledge and skills needed to obtain a security guard license in the UK. This course delves into a diverse array of subjects, encompassing the roles and responsibilities of security guards, honing customer service skills, effective conflict management, physical intervention awareness, emergency procedures, and much more. Practical training sessions are also integrated to enable participants to apply their learning in real-world scenarios. Course Overview: 4 Days Course | Course Fee: £250 Payment Structure: £70 deposit and £180 payment in the office -------------------------------------------------------------------------------- WHAT ARE THE DUTIES OF AN SIA SECURITY GUARD? PROVIDING A VISIBLE SECURITY PRESENCE Security guards are frequently tasked with patrolling an area or stationed at a specific location to discourage criminal activity and offer reassurance to the public. RESPONDING TO INCIDENTS The event of an incident, such as a fire or a security breach, security guards are required to respond promptly and efficiently to reduce harm and prevent additional damage. CONDUCTING SEARCHES Security guards may need to conduct searches of people or vehicles entering premises to ensure that prohibited items are not brought in. MONITORING CCTV AND ALARMS Security guards may have the responsibility of overseeing CCTV systems and alarm systems to identify and address potential security threats. -------------------------------------------------------------------------------- Who Is The SIA Security Guard Course For? The SIA Security Guard Course is tailored for individuals aspiring to establish a career in the security industry within the UK. This comprehensive course caters to those who aim to work as security guards or in related roles within the private security sector, excluding door supervision. -------------------------------------------------------------------------------- SIA SECURITY GUARD COURSE CONTENT DO I NEED FIRST AID TO RENEW MY SECURITY GUARD TOP UP TRAINING? Obtaining an emergency first aid certificate is a mandatory requirement for renewing your Security Guard license. To renew your SIA security guard license, you must complete both the Emergency First Aid and the Security Guard Top-Up training, which can be accomplished in a single day. Please note that the SIA has introduced changes in the license renewal process for Security Guard and Door Supervisor Licenses, effective from the 1st of October. We offer a 1-Day SIA Security Guard Top-Up Training + First Aid course in Stratford, East London. This course is essential for renewing your security guard license and consists of half a day of training, concluding with multiple-choice exams. The results may take up to two weeks to be released. UNIT 1: PRINCIPLES OF WORKING IN THE PRIVATE SECURITY INDUSTRY 1. Acquire knowledge of the key characteristics and objectives of the Private Security Industry. 2. Comprehend the application of relevant legislation to security operatives. 3. Familiarize with arrest procedures pertinent to security operatives. 4. Recognize the significance of adhering to safe work practices. 5. Grasp the workplace fire procedures. 6. Comprehend emergencies and the significance of emergency protocols. 7. Learn effective communication skills as a security operative. 8. Understand the importance of record-keeping in the role of a security operative. 9. Recognize the aspects of handling terror threats and the role of a security operative in response to such threats. 10. Learn how to ensure the safety of vulnerable individuals. 11. Understand best practices for post-incident management. UNIT 2: PRINCIPLES OF WORKING AS A SECURITY OFFICER IN THE PRIVATE SECURITY INDUSTRY 1. Understand the roles and responsibilities of security officers. 2. Understand the control of access and egress. 3. Know the different types of electronic and physical protection systems in the security environment. 4. Know how to minimize risk to personal safety at work. 5. Understand drug-misuse legislation, issues, and procedures relevant to the role of a security officer. 6. Know how to conduct effective search procedures. 7. Understand how to patrol designated areas safely. UNIT 3: APPLICATION OF CONFLICT MANAGEMENT IN THE PRIVATE SECURITY INDUSTRY 1. Understand the principles of conflict management appropriate to the role. 2. Understand how to recognize, assess, and reduce risk in conflict situations. 3. Understand the use of problem-solving techniques when resolving conflict. 4. Be able to communicate to de-escalate conflict.

SIA Security Guard Course London
Delivered In-Person
Dates arranged on request
£250

Educators matching "security officer top up"

Show all 3