There is much more to
this 2002 Act than
Section 404 assessment
and reporting on
internal
A 3-day course which
is considered essential
for anyone who will be
administering a
Managed
This course provides
the necessary background
knowledge required to
administer users and
Walking around any end
user or technical
department, auditors
always find
developments
Elements of this
syllabus may be subject
to change.
This
five-day
instructor-led
This course provides
an understanding of basic
concepts and skills
necessary to
configure
Do you know what to do
if your organisation's
security is compromised?
Threats of computer
This
course will provide
delegates with a sound
understanding of current
Payment
This three-day
instructor-led course
prepares you to design
and deploy remote access
solutions
The Check Point
Security Expert course
provides an understanding
of advanced concepts
and
CompTIA Security+
validates knowledge of
communication security,
infrastructure
security,
This one-day
instructor-led course
provides students with
the knowledge and skills
to
This two-day
instructor-led course
provides students with
the knowledge and skills
to
Security+ is the
primary course you will
need to take if your job
responsibilities
include
Check
Point Certified Security
Administrator (CCSA) is a
four day
instructor-led
This
comprehensive, two-day
training course covers
how to design,
install,
This course provides
you with an overview of
the management theory for
SmartCenter for
This
hands-on lab allows
students to apply
information and guidance
that can
This hands-on lab
allows students to apply
information and guidance
that can help in
implementing
This
hands-on lab allows
students to apply
information that can help
in implementing
On this 3-day
practical ISO 27001
course, you will learn
the component parts of
the standard,
This 3 day course
provides a detailed
review of McAfee Email
Gateway configuration,
explanation
The course
has been designed so that
the delegate can plan,
install, deploy,
This upgrade course
provides an understanding
of the advanced concepts
and skills necessary
Check
Point Security Expert is
a five-day instructor-led
hands-on course,
Check Point Security
Expert is a rapid two-day
instructor-led, all-lab
course delivering
Implementing Advanced
Cisco Unified Wireless
Security (IAUWS) v1.0 is
a five-day day
instructor-led
This course is a
bundle of the following
courses:
Check Point Security
Administration I NGX
(R65) is a foundation
course for Check
Point's
This five day course
is a foundation for Check
Point's Security
Management Systems,
Security
Advanced Services
Service Control
Application Suite for
Broadband (SCAS-BB,
previously
This course provides
an understanding of basic
concepts and skills
necessary to
configure
This course introduces
administrators and IT
professionals to Citrix
Password Manager 4.5
This 5-day course is
designed for IT
professionals who want to
learn the fundamentals
of
This is a
five-day instructor-led
class that is aimed at
providing network
security
In this
class, you will learn to
provide secure access to
network resources
using
The Cisco Secure
Access Control System
(CSACS) training course
teaches students how
to
The Certified
Information System
Security Professional
(CISSP) credential is the
global
This course will
provide you with an
understanding of key
concepts and skills
necessary
This course shows you
how to follow best
practices for secure
design, deployment,
and
This is a security
class like no other!
Providing real world
hands on experience, it
is
Rapid growth in online
commerce has brought
increasing sophistication
of Internet fraud.
This five-day
instructor-led course
addresses the MCSA and
MCSE skills path for IT
Pro security
This two-day course
discusses the
configuration of Secure
Access (SA) products in a
typical
This
two-day class discusses
the basic operations of
Network Security
Manager.
In this three-day
course delegates will
learn to configure Blue
Coat Proxy
appliances.
Check Point Endpoint
Security is a unified
approach to protecting
endpoints from
unauthorised
This two-day course
discusses the advanced
configuration of Secure
Access (SA) products.
This two-day
training course provides
a thorough foundation for
how to successfully
install,
This
course teaches you how to
provide secure access to
your network using
the
Given an example of
Cisco's defence in depth,
delegates will be taught
how Cisco IPS
This course teaches
you how to configure and
manage an Endpoint
Security FDE
protected
Implementing Unified
Communications Security
(IUCS) v1.0 prepares you
for installing,
Attackers today are
targeting Web application
vulnerabilities more than
operating systems
This course has been
prepared specifically to
cover all of ISACA's 2008
CISM(R) exam
objectives
Advanced Services
Service Control
Application Suite for
Broadband (SCAS-BB,
previously
Multi-Domain
Management with Check
Point Provider-1 R70 is
an advanced course for
Check
This three day Boot
Camp provides advanced
information for
successful configuration
and
The Solaris
Operating System Network
Intrusion Detection
course provides students
with
Within this course,
students will learn
methods to properly plan,
deploy, configure,
This one-day course
meets the business need
of customers who are
deploying the attack
prevention
This intense course
is designed to prepare
CCIE candidates for the
one-day Security
"hands-on"
This Instructor-led,
classroom based course
will introduce you to the
administration
This ILT course covers
claims and evidence
identified for the new
Advanced Security FE
Specialization.
Within this course,
students will learn
methods to properly plan,
deploy, configure,
This is a Bundle
course consisting of
three topics - Attack
Prevention with Juniper
Networks
This 3-day workshop
is designed to give
delegates a broad
overview of both the
technical
This one day
training course provides
advanced information for
successful
configuration
Everyone and anyone
that has a connection to
the internet has a
firewall, everyone
needs
This two-day course
is intended for those
that wish to master the
fundamentals of Blue
The UNIX family of
operating systems,
including the Linux
versions, is prized by
IT professionals
This course covers
network technology and
the business objectives
and risks. In
particular,
This two-day course
discusses the basic
operations of Network
Security Manager. Key
topics
This course provides
students with the
knowledge and skills to
deploy and administer
Microsoft
The course will
allow the delegate to
perform the following
tasks within their
organisation.
This seminar discusses
the security options that
form part of the Oracle
database. These
In Oracle Database
11g: Security course
students learn how they
can use Oracle
database
The aim of this
course is to enable
delegates to conduct both
high level and detailed
audits
The Configuring
Security on the Solaris
10 Operating System
course provides students
with
The Cisco Secure
Access Control System
(CSACS) training course
teaches students how to
provide
This four-day,
instructor-led course
provides students with
the knowledge and skills
to
This hands-on lab
allows students to apply
information and guidance
that can help in
implementing
ISO/IEC 27000 is a
globally-recognised set
of standards that
outlines best practices
in
On this 3 day
practical computer
forensics training
course, gain an
understanding of
static
It is essential that a
properly managed security
service is both
cost-effective and
succeeds
The course introduces
delegates to commercial
penetration testing
software and
exploitation
This 5 day course is
a bundle of two courses:
This
course provides a
comprehensive overview of
information security
concepts
This hands-on lab
allows students to apply
information and guidance
that can help in
implementing
Organisations can lose
valuable time and
resources when PC systems
fail or are poorly
maintained.