Filter
Courses

Best Online Courses in IT Security 2019

Courses are individual units of study that can be taken singly or as a series of classes concentrated in a specific area of study. Individual classes can vary in length, cost, and number of sessions per week.

IT security is concerned with ensuring that electronic systems, such as computers, phones, and smart devices, are protected from disruption. It involves preventing and combating theft, cyber attacks, and accidents that can damage computer systems.

Online Course in IT Security

Read More Read Less
Other options within this field of study:

23 Results in IT Security

Distance Learning Centre

The European Computer Driving Licence (ECDL) is a relevant and internationally recognised qualification for computer users. ECDL improves your understanding and efficient ... [+]

The European Computer Driving Licence (ECDL) is a relevant and internationally recognised qualification for computer users.

ECDL improves your understanding and efficient use of computers. This distance learning course opens up a variety of opportunities through the broad range of skills it provides.

The qualification is widely recognised by employers as proof of ability and competence when working with IT. The ECDL is designed for novice and intermediate computer users. It assumes no prior expertise and offers a flexible working programme.

ECDL Test Options

The ECDL qualification can be completed in the following formats:

ECDL Essentials is a Level 1 ITQ Award and consists of modules 1, 2 & 7. ECDL Extra is a Level 2 ITQ Award and consists of modules 3, 4, 6 and the new Improving Productivity Using IT Module. ECDL 7 Unit consists of Modules 1 to 7 and excludes the Productivity in IT module. The qualification is widely recognised by employers as proof of ability and competence when working with computers. ... [-]
United Kingdom UK Online
Open Enrollment
English
Part-time
80 hours
Online
Read more in English
E-Careers

Learn to successfully plan, test and implement new services that meet organizational needs and get certified with this ITIL® Intermediate – Release, Control and Validatio ... [+]

What are the objectives of this course?

The course will take students through the principles involved in controlling systems and software release, protect IT service offerings as a whole more effectively and validate the outcomes of these types of projects.

Using transition planning and support to develop simplify the process of moving to new processes and systems. Using change management techniques and technology to record system/service changes to gauge effectiveness and provide a rollback reference if required. Release and deployment management techniques to assist with incremental system updates. Change evaluation guidelines to help assess the impact (positive or negative) of new system changes. Service Asset and Configuration Management (SACM), providing a centralized repository for the capture of system changes. Request fulfillment – delivery the changes demanded by service users and other factors. Service validation and testing routines to verify that frameworks and policies are working as expected. Knowledge management techniques and technology to ensure that valuable lessons are captured and shared with other key stakeholders. Who is it intended for? ... [-]
United Kingdom UK Online Slough
Open Enrollment
English
Part-time
12 months
Online
Read more in English
E-Careers

Master the skills needed to reach the highest levels of IT security professionalism and stand out from the crowd with this all-inclusive five course Cyber Security & ... [+]

What are the objectives of this course?

The course includes all the materials needed to study towards obtaining the most recognized certifications in the industry: Certified Ethical Hacker (CEH)

Using enumeration to catalog system resources and potential routes to breach. Automated tools for breaching security including Trojans, backdoors, viruses, worms, and Denial of Service (DOS) attacks. The role of social engineering to steal confidential information directly from employees. Using sniffers and session hijacking to mask illegal access to system resources. Web-based attacks that can take online systems down. How wireless network security can be breached. How hackers avoid protective measures like IDS, firewalls, and honeypots. Using cryptography and steganography to protect data. How to use the Metasploit toolkit to assess network protection measures and apply fixes where appropriate. ... [-]
United Kingdom UK Online Slough
Open Enrollment
English
Part-time
Online
Read more in English
E-Careers

Master the advanced techniques required to protect network resources from the external threat with this Cyber Security Expert bundle. ... [+]

What are the objectives of this course?

This comprehensive package is made up of three of the world’s foremost IT security courses and will give you the knowledge needed to build and manage effective security solutions.

Certified Information Systems Auditor (CISA)

Information systems audit process and how it is applied in a real-world environment. The importance of applying information technology governance principles to maintain levels of security and availability. Defining and managing the information systems and infrastructure lifecycle to better plan for upgrades and replacements. Codifying IT service delivery and support mechanisms and levels to ensure systems and users remain fully productive. Identifying critical information assets and designing systems to protect from loss, theft or unauthorised access. Building a business continuity and disaster recovery strategy that will help keep the organisation running in the event of a major system failure ... [-]
United Kingdom UK Online Slough
Open Enrollment
English
Part-time
Online
Read more in English
E-Careers

Master the science of forensic investigations and combine that mastery with the knowledge of tricks cybercriminals use to access corporate systems and how they can be sto ... [+]

What are the objectives of this course?

The package is split into two courses. The first of these courses are built around the Certified Ethical Hacker certification:

Understanding ethics involved in white hat hacking. How cybercriminals test network protection measures and how these reconnaissance activities can be spotted and blocked. How to identify potential vulnerabilities. Enumeration Trojans, backdoors, viruses, worms, and Denial of Service (DoS) attacks. The role of social engineering to steal confidential information directly from employees. Sniffers and session hijacking Web-based attacks Wireless network security How hackers avoid protective measures like IDS, firewalls, and honeypots. Network forensic techniques Cryptography and steganography How to use the Metasploit toolkit to assess network protection measures. ... [-]
United Kingdom UK Online Slough
Open Enrollment
English
Part-time
Online
Read more in English
E-Careers

Master information systems security and get on your way to earning a globally recognised qualification which is seen as a benchmark in the industry with this Certified In ... [+]

What are the objectives of this course?

The CISSP course will provide you with the knowledge to manage, operate, develop and plan an effective network security infrastructure in an enterprise environment.

The principles of access control and how they can be strengthened and applied to keep unauthorised users out of a system. Telecommunications and network systems that need to be hardened to prevent data loss or theft. The role that information governance and risk management play in raising security standards and how they need to be applied to corporate information systems. The importance of secure software architecture and design to help ensure that in-house systems protect data and resources. Using cryptography to protect data in transit and prevent unauthorised access to files without the correct encryption keys. Using security architecture and design principles to limit data access and potential angles of attack. Monitoring, auditing and improving operations security to keep systems secure at the point of access. Designing and implementing business continuity and disaster recovery plans to help re-establish operations as quickly as possible following a serious outage. Legal obligations of data security and obligations that must be fulfilled in the event of a criminal investigation. Physical and environmental security considerations Who is it intended for? ... [-]
United Kingdom UK Online Slough
Open Enrollment
English
Part-time
Online
Read more in English
E-Careers

Demonstrate excellence in IT systems auditing by completing the industry-leading ISACA Certified Information Systems Auditor (CISA) course. ... [+]

What are the objectives of this course?

In this training programme, you will learn the theories and practical skills necessary with this course designed to meet the rigorous requirements of ISACA.

The information systems audit process and how it is applied in a real-world environment. The importance of applying information technology governance principles to maintain levels of security and availability. Defining and managing the information systems and infrastructure lifecycle to better plan for upgrade and replacements. Codifying IT service delivery and support mechanisms and levels to ensure that systems and users remain fully productive and issues are properly prioritised. Identifying critical information assets and designing systems to protect each from loss, theft or unauthorised access. Building a business continuity and disaster recovery strategy that will help keep the organisation running in the event of a major system failure. Who is it intended for? ... [-]
United Kingdom UK Online Slough
Open Enrollment
English
Part-time
Online
Read more in English
E-Careers

Master the tools and techniques that hackers use to bypass security for your own corporate network defensive strategies with this Certified Ethical Hacking and Countermea ... [+]

What are the objectives of this course?

The knowledge gained in this course can help you to harden defenses and reduce the risk of compromise, saving time and money that would otherwise be spent recovering from a security breach in a corporate environment.

Intro to course Footprinting & Reconnaissance Scanning Networks Enumeration System Hacking Trojans & Backdoors Viruses & Worms Denial of Service Social Engineering Sniffers Session Hijacking Hacking Web servers Hacking Web Applications SQL Injection Hacking Wireless Networks Evading IDS, Firewalls & Honeypots Buffer Overflows Cryptography Penetration Testing Who is it intended for?

This course is for anyone who is looking to learn the skills and techniques required to make a change into IT security, or any network/security professionals who need a better understanding of hacking techniques.... [-]

United Kingdom UK Online Slough
Open Enrollment
English
Part-time
Online
Read more in English
E-Careers

Master the processes and tools required to investigate a serious security breach using industry-standard principles with this Computer Hacking Forensic Investigator (CHFI ... [+]

What are the objectives of this course?

This course covers everything needed to investigate, document and prosecute a malicious security breach.

How to carry out an investigation according to industry best practice principles and legal guidelines. Searching and seizing resources required for the investigation. Handling Digital Evidence First Responder Procedures How to fit a forensic lab for investigations. Hard Disks and File Systems Windows Forensics Data Acquisition and Duplication Recovering Deleted Files and Partitions Using Access Data FTK and Special Steps EnCase Stenography Passwords Log Correlation Network Forensics Wireless Attacks Web Attacks Email Crimes Mobile Resource Investigation Investigation Reports Expert Witness Who is it intended for? ... [-]
United Kingdom UK Online Slough
Open Enrollment
English
Part-time
Online
Read more in English
E-Careers

Stay ahead of the competition in the job market by gaining the knowledge in the latest mobility trends and the ability to work with an extensive variety of existing and e ... [+]

What are the objectives of this course?

Learn all the knowledge you need to pass the CompTIA Mobility+ (MB0-001) examination with this expertly designed course.

Learn about over-the-air technologies with a section devoted to WIMAX, radio frequency, RF power fun, antennas, governing bodies and regulations. All you need to know about network infrastructure including network foundations, OSI model review, wireless terms and technology, wireless media and communication, unified wireless architecture and SSIDs and VLANs. Mobile device management, profiles and policies, enterprise mail and messaging, wireless site surveys and wireless device management. Master the crucial area of security including mobile device security, network security, security protocols, EAP overview, encryption overview, common security troubleshooting and potential risks Wireless troubleshooting Who is it intended for? ... [-]
United Kingdom UK Online Slough
Open Enrollment
English
Part-time
Online
Read more in English
E-Careers

With the need for IT professionals who specialise in cloud computing growing, there are more and more opportunities becoming available. Be able to proactively seek these ... [+]

What are the objectives of this course?

Learn everything you need to have a good understanding of the key concepts of cloud computing and how they can be implemented into an organisation’s IT infrastructure.

Introduction to models, service and delivery models, terms and characteristics and objects storage concepts. Install, configure and manage VM and devices. Backups, virtual disks, virtual switches and virtual resource migration. Discover the benefits of virtualisation in a cloud environment before comparing and contrasting virtual environments. Infrastructure, different access protocols, storage configuration, file system types, executing storage provisioning and network sharing. Implementing appropriate network configurations and the importance of network optimisation. Troubleshooting basic network configurations and troubleshooting commands. Common network protocols and common hardware resources Resource management and establishing baselines and thresholds How to appropriately allocate physical host resources and virtual guest resources and how to use appropriate tools for remote access. Master security, including storage security concepts and methods, different encryption technologies and identifying access control methods. Systems management, how to diagnose, remediate and optimise and common performance concepts and testing techniques. Study business continuity in cloud and solutions to meet availability requirements. Who is it intended for? ... [-]
United Kingdom UK Online Slough
Open Enrollment
English
Part-time
Online
Read more in English
E-Careers

Actively seek opportunities in the IT industry with the knowledge contained in the industry-leading CompTIA certifications and make a start with this CompTIA A+ course wi ... [+]

What are the objectives of this course?

Master fundamentals of PC hardware, networking, operating systems, troubleshooting and security with this training materials and live labs package. The live labs are an essential learning resource for students as it allows them to test their knowledge and skills in practice exercises and environments without the need to invest in a costly test lab of their own.

The course covers the full syllabus for CompTIA A+ 220-901 & 220-902:

Introduction to PCs and IT certification Internal hardware components and how to expand hardware capabilities Storage fundamentals Use of peripheral devices and mobile devices Managing mobile devices Hardware and network troubleshooting Applying core concepts and protocols of networking such as IPv4, IPv6, DHCP and subnet mask to set up and support wired and wireless networks. Potential network connectivity issues and how to overcome them Introduction to operating systems Installing, configuring and managing traditional operating systems including Android, iOS, Windows, and Linux. Supporting and securing access to data by using authentication, access control and encryption for an organization. Utilizing the basics of virtualization, cloud computing, desktop imaging and deployment to support IT infrastructures. Troubleshooting and operational procedures Who is it intended for? ... [-]
United Kingdom UK Online Slough
Open Enrollment
English
Part-time
Online
Read more in English
E-Careers

Enter the IT security industry with the knowledge of the globally-recognised CompTIA best practice concepts in this course. ... [+]

What are the objectives of this course?

Learn the fundamentals of computer security with the vendor-neutral CompTIA Security+ course and live labs package where you will have 19 comprehensive modules to guide you through everything you’ll need to know to pass your exams. The live labs are an essential learning resource for students as it allows them to test their knowledge and skills in practice exercises and environments without the need to invest in a costly test lab of their own.

Network Terminology. Learn all you need to know about wireless. Introduction to security terminology. Identifying and satisfying compliance needs and policies for data security. Physical Security. Gain insight into disaster recovery, risk analysis, business continuity and business impact analysis. Introduction to Computer Forensics. Different types of attacks and system security threats and how they can be blocked. The use of encryption to protect data, even if it is intercepted by a third party. Cryptography Who is it intended for? ... [-]
United Kingdom UK Online Slough
Open Enrollment
English
Part-time
Online
Read more in English
E-Careers

Boost your knowledge of network security to increase chances of success in the IT security field using Cisco’s industry-leading concepts and technologies with this Cisco ... [+]

What are the objectives of this course?

This course teaches the fundamentals of IP technology implementations, before showing delegates how to boost security. The course also includes 12 months access to Live Labs where students will be able to practice every technique covered throughout the course. This dedicated hardware resource grants access to Cisco routers and switches that can be used to replicate and resolve real-world scenarios without the need to purchase and maintain labs of your own.

Using the Cisco Router SDM security audit feature to identify unauthorised network resource usage. Locking down router security to prevent hackers from gaining access to key network resources. The Authentication, Authorisation and Accounting philosophy – key to implement security solutions that work. Using Access Control Lists to mitigate threats and minimise attack surfaces. Implementing stateful firewalls using Cisco IOS to identify and block low-level hacking attempts. Securing inter-site VPNs and data transfer using SDM on Cisco routers. Who is it intended for? ... [-]
United Kingdom UK Online Slough
Open Enrollment
English
Part-time
Online
Read more in English
E-Careers

Upgrade your CV and boost employability in the IT industry by studying this course which will give you an understanding of the convergence of voice, video, data and mobil ... [+]

What are the objectives of this course?

This course will help students to advance their collaboration and video skills in line with the convergence of voice, video, data and mobile applications.

Cisco unified communications solutions Characteristics of Cisco unified communications solutions Cisco Unified communications manager administrator interfaces Cisco UCM end-user interfaces and call flows and call legs Component impact on call flows in unified communications manager Cisco UCM and Cisco UCM express end-users Cisco UCM and Cisco UCM express endpoint implementation options Understanding telephony features Telephony feature implementation and mobility options Unity connection and end-user and mailbox requirements Unity connection and end user and mailbox requirements Unity connection end-user implementation and IM and presence service Supporting end users and understanding Cisco UCM reports Cisco UCM call detail records and reporting and monitoring tools Cisco business video solutions and video collaboration Installation and configuration of Cisco IP phones and Cisco Jabber Troubleshooting Cisco IP phone, Cisco Jabber and endpoint issues Describing Cisco TelePresence and endpoints Configuring Cisco TelePresence TC Troubleshooting Cisco TelePresence endpoints Configuring and monitoring Cisco conferencing and DMPs Who is it intended for? ... [-]
United Kingdom UK Online Slough
Open Enrollment
English
Part-time
Online
Read more in English