Skip to main content

Security Training: All Listings 

Results 61 - 80 of 250 This Category
All Listings

DEV522: Defending Web Applications Security Essentials is intended for anyone tasked with implementing, managing, or protecting Web applications. It is particularly well suited to application security analysts, developers, application architects, pen test ...

Security University

Earn your CWSP™ certification and master the fundamentals of wireless and how to secure your wireless infrastructures. This course targets experienced networking professionals who wish to gain critical skills in wireless networking security, incl ...

Kingston University

4 years Full Time

This intermediate course is intended for administrators and support personnel who wish to learn the key skills required to implement security on Linux installations. As more servers on the network move to the Linux operating system, security becomes an in ...

Argus Systems Group, Inc

This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with UNIX. * Learn how to operate your system in the Argus secure en ...

Teeside University

3 years Full Time / 4 years Sandwich Course

What Will You Learn? This course will give you an in-depth study of the computer forensics process. Starting from creating evidentiary disk images to recognizing the often-faint trail of unauthorized activity, Foundstone updates this class continuously by ...

Leeds Metropolitan University

3 years Full Time / 4 years Sandwich Course

London Metropolitan University

UMUC was named a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency and Department of Homeland Security. About the Software Development and Security Bachelor's Degree Your software d ...

Bachelor - Software Development and Security
De Montfort University

3 years Full Time / 4 years Sandwich Course

Learning Tree International

The UNIX family of operating systems, including the increasingly used Linux versions, is prized by IT professionals for its flexibility and openness. Vulnerabilities in standard configurations, however, can make UNIX systems susceptible to security threat ...

Leading Edge Business Solutions (Pty) Ltd

Linux and other operating systems face a number of threats in a networked environment. It is possible to secure Linux against these threats. The Leading Edge Linux Security course provides an understanding of the security threats as well as the techniques ...

Liverpool John Moores University

UMUC was named a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency and Department of Homeland Security. We've developed our cybersecurity policy and management degree in conjunctio ...

Bachelor - Cybersecurity Management and Policy
London Metropolitan University

3 years Full Time

PentesterLab

PentesterLab is an easy and great way to learn penetration testing. PentesterLab provides vulnerable systems that can be used to test and understand vulnerabilities. Hands-on There is only one way to properly learn web penetration testing: by getting y ...

Category Ethical Hacking
PentesterLab
James Madison University

The Five-Year Combined BS/MS Program provides an opportunity for JMU undergraduate students to complete an MS degree in only one additional year of study. Students in this program will complete all requirements of the regular BS degree in Computer Science ...

Kingston University

4 years Full Time

Middlesex University

3 years Full Time

WatchGuard Training Partners

Firewall Basics with WFS A three-day course that focuses on the design and implementation of a corporate security policy using the WatchGuard System Manager management software and the award-winning WFS appliance software. This course prepares you for th ...

Access 2 Networks, Inc.

The Check Point Secure Platform Boot Camp is an intensive 5-day instructor-led course, which introduces the security administrator to Check Point's Secure Platform and Check Point NG. The course provides the information and experience necessary to deploy ...