Alternatives for Data Security Compliance

Unfortunately it is not possible to request a brochure for this training. Here you will find some alternatives for "Data Security Compliance" by STUDY365. We hope we helped you to continue your search for training information.

check_box_outline_blank

Microsoft 365 Mobility and Security | MS-101 | MS101

Logo DutchTrain
|META_INFO|

Microsoft 365 Mobility and Security | MS-101 This course covers three central elements of Microsoft 365 enterprise administration, Microsof…

check_box_outline_blank

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) | Exam 200-201 (e-learning)

Logo DutchTrain
|META_INFO|

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) | Exam 200-201 The Understanding Cisco Cybersecurity Operations Fundamen…

check_box_outline_blank

Information Security Administrator | SC-401 | SC401

Logo DutchTrain
|META_INFO|

Information Security Administrator | SC-401 | SC401 The Information Security Administrator course equips you with the skills needed to plan…

check_box_outline_blank

Systems Security Certified Practitioner | SSCP (e-learning)

Logo DutchTrain
|META_INFO|

Systems Security Certified Practitioner (SSCP) This training provides a comprehensive review of information security concepts and industry …

check_box_outline_blank

Data Security Compliance

Logo Global Edulink
|META_INFO|

Overview: This excellent online course will allow you to gain an accredited qualification, which will demonstrate a professional level of s…

check_box_outline_blank

Computer Systems (Forensic and Security), BSc (Hons)

Logo Nottingham Trent University
|META_INFO|

This exciting degree starts you on the route to becoming an IT security or digital forensic specialist. By the end of this course you will …

check_box_outline_blank

Implement information protection and data loss prevention by using Microsoft Purview (SC-5003) [M-SC5003]

Logo Global Knowledge Network Training Ltd.
|META_INFO|

OVERVIEW Gain the skills to use Microsoft Purview to improve your data security in Microsoft 365. In this training, you learn how to create…

check_box_outline_blank

OCR Employability Skills Level 1 - IT Security - FOR UNEMPLOYED ONLY

Logo Grantham College
|META_INFO|

Suitable For This course is suitable for those who wish ensure they are safe online. Course Content This course will enable you to know how…

check_box_outline_blank

Cyber Security Bundle

Logo 1TRAINING
|META_INFO|

Overview:This bundle consists of 05 courses which will give you an opportunity to earn many Official Certifications. In today’s world, indi…

check_box_outline_blank

ISTQB Certified Tester Security Tester (CT-SEC) [TSG_TS]

Logo Global Knowledge Network Training Ltd.
|META_INFO|

OVERVIEWWith the ever-increasing numbers of security breaches,both human and machine-based, significantly more understanding is required fr…

check_box_outline_blank

Securing the Cloud

Logo Focus on Training
|META_INFO|

Anyone involved in security aspects of cloud computing. Cloud computing knowledge at the level of "Cloud Computing Comprehensive Introducti…

check_box_outline_blank

CL First Steps to Shopping Online Safely

Logo Grantham College
|META_INFO|

Suitable For Adults who wish to shop online but need to know how to protect themselves against potential dangers before entering personal i…

check_box_outline_blank

Cyber Security Bundle

Logo Global Edulink
|META_INFO|

Overview:This bundle consists of 05 courses which will give you an opportunity to earn many Official Certifications. Security is a constant…

check_box_outline_blank

Cisco 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) | 365 Days Access

Logo DiviTrain
|META_INFO|

The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) CertKit teaches you security concepts, common network and applicatio…

check_box_outline_blank

Information Security Administrator (SC-401) [M-SC401]

Logo Global Knowledge Network Training Ltd.
|META_INFO|

OVERVIEW Implement information security of sensitive data by using Microsoft Purview and related services. The Information Security Adminis…