Skip to main content

Security Training: All Listings 

Results 21 - 40 of 250 This Category
All Listings
Kingston University

4 years Full Time

What Will You Learn? Understand the key security features of the C++ language, the common security pitfalls developers make and how to build secure and reliable enterprise applications using C++. Students are lead through hands on code examples that highl ...

Carnegie Mellon SEI

This five-day course is designed for computer security incident response team (CSIRT) technical personnel with several months of incident-handling experience. Building on the methods and tools discussed in the fundamentals course, this course focuses on p ...

University of Glamorgan, Cardiff and Pontypridd

3 years Full Time / 4 years Sandwich Course

DEV522: Defending Web Applications Security Essentials is intended for anyone tasked with implementing, managing, or protecting Web applications. It is particularly well suited to application security analysts, developers, application architects, pen test ...

Canterbury Christ Church University

4 years Full Time

Orange Cyberdefense

An introductory course for those starting the journey into penetration testing or those working in environments where understanding how hackers think and the tools, tactics and techniques they use. The course presents the background information, technical ...

Category Ethical Hacking
Hands-on Hacking Fundamentals
InfoSec Institute

Discover vulnerabilities before cybercriminals do! Our most popular information security and hacking training goes in-depth into the techniques used by malicious actors with attention-getting lectures and hands-on labs. Earn your CEH and PenTest+, guaran ...

Category Ethical Hacking
Ethical Hacking Dual Certification Boot Camp (CEH and PenTest+)
University of Greenwich

3 years Full Time

Security University

Earn your CWSP™ certification and master the fundamentals of wireless and how to secure your wireless infrastructures. This course targets experienced networking professionals who wish to gain critical skills in wireless networking security, incl ...

PentesterLab

PentesterLab is an easy and great way to learn penetration testing. PentesterLab provides vulnerable systems that can be used to test and understand vulnerabilities. Hands-on There is only one way to properly learn web penetration testing: by getting y ...

Category Ethical Hacking
PentesterLab
University of Portsmouth

3 years Full Time / 4 years Sandwich Course

University of Central Lancashire

3 years Full Time / 4 years Sandwich Course

Harrow School of Computer Science, University of Westminster

This innovative and flexible course aims to equip those responsible for the development and implementation of IT security policy to:

University of Glamorgan

This specialist course focuses on the technical aspects of computer system security and systems management. The award is designed to provide up-to-date, relevant and practical information on the technical aspects of computer security. This field is becomi ...

Staffordshire University

3 years Full Time / 4 years Sandwich Course

SEC617 will give you the skills you need to understand the security strengths and weaknesses in wireless systems. In this course, you will learn how to evaluate the ever-present cacophony of Wi-Fi networks and identify the Wi-Fi access points and client d ...

Category Ethical Hacking
Wireless Penetration Testing and Ethical Hacking: SEC617

Simulate Email Threats Teach your users to identify and respond to potential security risks. Select from a selection of real-world threat templates, taken directly from Barracuda’s threat database, and expose your users to the latest email thre ...

Barracuda Security Awareness Training
SP Hailey Enterprises

Packet Analysis and Intrusion Detection 5 Day You'll learn how to properly read and interpret packets and packet headers including IP, TCP, ICMP, and UDP. You will learn how to distinguish between normal, abnormal, and malicious traffic. You will also c ...

PTR Associates Ltd

This hands-on course is intended for auditors and security specialists who are aware their businesses use Oracle based products, but do not understand the database platform and therefore the risks it may carry. You will learn how Oracle is built and a con ...