Skip to main content

Security Training: All Listings 

Results 21 - 40 of 249 This Category
All Listings
Kingston University
Open Source

3 years Full Time

McAfee
Commercial

What Will You Learn? Understand the key security features of the C++ language, the common security pitfalls developers make and how to build secure and reliable enterprise applications using C++. Students are lead through hands on code examples that highl ...

Carnegie Mellon SEI

This five-day course is designed for computer security incident response team (CSIRT) technical personnel with several months of incident-handling experience. Building on the methods and tools discussed in the fundamentals course, this course focuses on p ...

University of Glamorgan, Cardiff and Pontypridd
Open Source

3 years Full Time / 4 years Sandwich Course

SANS
Commercial

DEV522: Defending Web Applications Security Essentials is intended for anyone tasked with implementing, managing, or protecting Web applications. It is particularly well suited to application security analysts, developers, application architects, pen test ...

Manchester Metropolitan University
Open Source

4 years Full Time / 5 years Sandwich Course

Orange Cyberdefense
Commercial

An introductory course for those starting the journey into penetration testing or those working in environments where understanding how hackers think and the tools, tactics and techniques they use. The course presents the background information, technical ...

Category Ethical Hacking
Hands-on Hacking Fundamentals
InfoSec Institute
Commercial

Discover vulnerabilities before cybercriminals do! Our most popular information security and hacking training goes in-depth into the techniques used by malicious actors with attention-getting lectures and hands-on labs. Earn your CEH and PenTest+, guaran ...

Category Ethical Hacking
Ethical Hacking Dual Certification Boot Camp (CEH and PenTest+)
Nottingham Trent University
Open Source

3 years Full Time / 4 years Sandwich Course

Security University
Commercial

Earn your CWSP™ certification and master the fundamentals of wireless and how to secure your wireless infrastructures. This course targets experienced networking professionals who wish to gain critical skills in wireless networking security, incl ...

SANS
Commercial

This popular course explores malware analysis tools and techniques in depth. FOR610 training has helped forensic investigators, incident responders, security engineers, and IT administrators acquire the practical skills to examine malicious programs that ...

Teeside University
Open Source

3 years Full Time / 4 years Sandwich Course

De Montfort University
Open Source

3 years Full Time / 4 years Sandwich Course

University of Westminster
Commercial

The Cyber Security and Forensics MSc is is fully certified by the National Cyber Security Centre (NCSC), marking it as a program of national excellence. The course focuses on two key areas: Cyber Security, where you will learn to analyse and mitigate ris ...

University of Glamorgan

This specialist course focuses on the technical aspects of computer system security and systems management. The award is designed to provide up-to-date, relevant and practical information on the technical aspects of computer security. This field is becomi ...

Staffordshire University
Open Source

3 years Full Time / 4 years Sandwich Course

SANS
Commercial

SEC617 will give you the skills you need to understand the security strengths and weaknesses in wireless systems. In this course, you will learn how to evaluate the ever-present cacophony of Wi-Fi networks and identify the Wi-Fi access points and client d ...

Category Ethical Hacking
Wireless Penetration Testing and Ethical Hacking: SEC617
Phished
Commercial

The Phished security awareness training platform combines automated phishing simulations with interactive cybersecurity education and threat intelligence.   Fully Automated Phishing Simulations AI-driven phishing simulations are based on individua ...

Phished
SP Hailey Enterprises

Packet Analysis and Intrusion Detection 5 Day You'll learn how to properly read and interpret packets and packet headers including IP, TCP, ICMP, and UDP. You will learn how to distinguish between normal, abnormal, and malicious traffic. You will also c ...

PTR Associates Ltd

This hands-on course is intended for auditors and security specialists who are aware their businesses use Oracle based products, but do not understand the database platform and therefore the risks it may carry. You will learn how Oracle is built and a con ...