Select course by Certification/Exam Body or by Topic Below

Blank
What Facilities can you provide?

Other facilities

As a Net Security Customer at our centre you’ll always benefit from the following feature

  • Air-conditioned classrooms.
  • Comfortable, ergonomic, adjustable seating.
  • High performance networks.
  • One high-spec laptop per delegate (practical courses)
  • Top of the range AV equipment.
  • Complimentary refreshments throughout the day.
  • Clean, comfortable, well-maintained rest and recreation areas.
  • Free internet access.
  • Dedicated support staff to ensure your satisfaction.
  • Disabled access.
  • Message taking service for delegates.
  • Free access to telephone line for handling emergencies that arise when out of the office.

Lunch and Refreshments:

A light lunch or working lunch is provided as well as tea, coffee, biscuits and various refreshments throughout the day!

What Course do you Provide?

CoursesFreaturesBenefitsBenefits
ISC2 Certified Information Systems security professional CISSPCovers the 8 domains as prescribed by ISC2 in readiness for the CISSP examination.Covers the 8 domains as prescribed by ISC2 in readiness for the CISSP examination.Guaranteed pass or re-sit the course free of charge.
CISM Certified Information Security ManagerCISM certification is the globally accepted standard of achievement in Information Security ManagementIdentify critical issues and customize company-specific practices to support the governance of information and related technologiesDemonstrates your understanding of the relationship between an information security program and broader business goals and objectives
CISMP Certificate in Information Security Management PrinciplesProvides candidates with good knowledge and understanding of the wide range of subject areas that make up information security management which includes risk management, legislation, security standards (ISO 27001), business continuity and cloud computingProvide CISMP training to individuals who are thinking of moving into information security or related functionsExisting IT managers will enhance their information security knowledge to ensure that information security management and controls are adequately implemented in their organisation.
CISA Certified Information Systems AuditorCISA designation is a globally recognized certification for IS audit control, assurance and security professionals.Demonstrate competence in five domains, including standards and practices; organisation and management; processes; integrity.Helps you achieve a high professional standard through ISACA’s requirements for continuing education and ethical conduct
CRISC Certified in Risk & Information Systems ControlCRISC exam is offered during the months of June and December.Establish a common perspective and language about IT risk that can set the standard for the enterpriseGives you access to ISACA’s global community of knowledge and the most up-to-date thinking on IT risk management
CHFI EC Council- Computer Hacking Forensics InvestigatorThe CHFI 312-49 exam will be conducted on the last day of training (optional). Students need to pass the online Prometric exam to receive the CHFI certification. CHFIv9 showcases hundreds of investigation tools including EnCase, Access Data FTK, and ProDiscover.Will learn how to write investigative reportsThe CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
ECSA/LPT Certified Security Analyst and Licensed Penetration TesterThe ECSA Program is a 5-day complete hands-on training program.ECSAs learn to analyze the outcomes of security tools and security testing techniquesThe ECSA/LPT program awards two certificates to successful candidates
PCIRM Certificate in Information Risk ManagementAn accredited training course will require a minimum of 36 hours of lecture and practical work run over a minimum of five days.How the management of information risk will bring about significant business benefitsWill prepare IT and information management practitioners for a formal qualification in information risk management
CDP Certificate in Data ProtectionIt incorporates the latest changes and updates outlined in the Data Protection Act of 1998 and the way it works with the Privacy and Electronic Communications (EC Directive) Regulations 2003.Will help better tend to the responsibility for data protection within an organisation.Our certification is internationally recognised: training is delivered in over 200 countries by over 100 high quality accredited training providers
BCM Certificate in Business Continuity ManagementCan study for this certificate in two ways: by attending training courses provided by Accredited Training Organisations or by self-study.Can study for this certificate in two ways: by attending training courses provided by Accredited Training Organisations or by self-study.Each certificate is mapped to SFIA / SFIA plus and is consistent with your career path
PCIAA Practitioner Certificate in Information Assurance ArchitectureLooks at what it takes to be an IA architectAbility to Identify information risks that arise from potential solution architectures.Our certification is developed with industry experts ensuring relevance to today’s IT professional
ENSA Network Security AdministratorBacked by a curriculum designed by the best in the field, the EC CouncilEvaluate network and Internet security issues and designCompetitive advantage that will distinguish you from your peers.
COBIT 5 Business Framework for the Governance and Management of Enterprise ITProvides a comprehensive framework that assists enterprises in achieving their objectives for the governance and management of enterprise information and technology assetsEnables IT to be governed and managed in a holistic manner for the entire enterprisePromotion on the ISACA web site and exposure to more than 115,000 constituents
CGEIT Certified in the Governance of Enterprise ITCGEIT gained 10% in salary value for the quarter ending 1 July 2013 and was among the highest-paying certifications, according to Foote Partners IT Skills and Certifications Pay Index™ (ITSCPI) for 1 July 2013 – 1 October 2013.The enterprise’s IT and business systems operate with greater efficiencies and optimum effectiveness resulting in greater trust in, and value from, information systems.A global and prestigious, lifelong symbol of knowledge and expertise.
Cybersecurity FundamentalsProvide learners with principles of data and technology that frame and define cybersecurityGain insight into the importance of cybersecurity and the integral role of cybersecurity professionals.Higher earnings and greater career growth.
CCSK Certificate of Cloud Security KnowledgeThe CCSK has been adopted around the world and is the gold standard for demonstration of cloud security competency.Protect against threats with the expertise to competently design, build, and maintain a secure cloud business environmentDemonstrate your technical knowledge, skills, and abilities to effectively develop a holistic cloud security program relative to globally accepted standards
CompTIA Security +CompTIA Security+ certification covers network security, compliance and operation security, threats and vulnerabilities as well as application, data and host securityExpertise in knowledge areas such as cryptography, identity management, security systems, organizational systems, security risk identification and mitigation, network access control, security infrastructure and more.Security+ provides substantial earnings potential
PKI Implement and ManageHands-on experience implementing solutions to secure PKI-enabled applications and services? Ability to: ? Design a certification authority (CA) hierarchy to meet business requirements. ? Install Certificate Services to create a CA hierarchy. ? Perform certificate management tasks, CA management tasks, and plan for disaster recovery of Certificate Services.A global and prestigious, lifelong symbol of knowledge and expertise.
Firewall and VPN Design and ImplementationIncludes hands-on experience in installing and configuring some of the leading firewall products – from Check Point, Juniper, Microsoft and Cisco.Implement and identify best practices in building a security policy and designing firewall architectures.Validates your competence in implementing firewall architectures.

Where are you located?
How do I contact Net Security Training?