Cyber Security training from QA

Cyber Security training

Protect your organisation from cyber attacks and the increasing threat landscape.

At a glance

When it comes to cyber security there isn't a one-size-fits-all training programme. At QA, we have the breadth and expertise to create and deliver the learning solution you need. From individual courses to company-wide programmes, in the classroom or at your desk, QA's options ensure a flexible and quality learning experience.

CISSP
CISSP training course

A detailed look at information security concepts and industry best practices.

CISMP
CISMP training course

Provides the skills required to manage information security, assurance and risk.

Certified Ethical Hacker v8
Certified Ethical Hacker

Learn to assess the security of computer systems using penetration testing techniques.

Cyber Security training courses

Not found what you are looking for?

or

Make an enquiry

Speak to our team today

To contact our friendly advisers, call, email, or make a quick enquiry

UK

03450 747 999


International

+44 (0) 1753 898320


Ireland

01 284 6796


Email

info@qa.com


Cyber Security statistics

 


of businesses suffered from a security incident in the last year


of businesses with unclear security policies had staff-related breaches


of the worst security breaches in 2014 were caused by staff


£600k - £1.15m is the cost of a large business' worst annual cyber attack

Importance of staff training

94% of businesses suffered from a security incident in the last year*

Educating employees will reduce the chances of your business becoming a victim of today's cyber security threats.

As we look at these security incidents in detail, we can identify one common factor - the human element. In almost all reported security incidents, the actions - either intentional or accidental - by staff in the compromised organisations led to a security breach. Security reports and surveys continue to show how the human element is a major contributor in successful cyber attacks.

At QA, we are passionate about security training. We want to demonstrate the importance of educating security professionals and business users to help everyone detect, deter and defend against the cyber threats that every business faces through a supportive, hands-on learning environment.

*Source – Kaspersky 2014 Security Survey

Cyber Security blogs

 

Cyber

The ideal IT Security Analyst

Interested in what a job as a IT Security Analyst entails? Or what key skills a good candidate will hold? Take a look at what makes the ideal IT Security Analyst and the processes an organisation should adhere to. Read the full article

Cyber

Open Source Intelligence Techniques and the Dark Web

We all know and use the surface web, but did you know that this is only 4% of the internet itself? Max Vetter discusses what businesses should be doing to minimize Cyber Security threats through the Dark Web. Read the full article

Cyber

The ideal Chief Information Security Officer

Interested in what a job as a Chief Information Security Officer (CISO) entails? Or what key skills a good candidate will hold? Take a look at what makes the ideal CISO and the processes an organisation should adhere to. Read the full article

Cyber

The human element of cyber security

Key thoughts and findings from my two days at 'The Cyber Security Show 2015' in London. Read the full article

Computing Interview (Part one)

QA's Cyber Security Director Greg Newton-Ingham explains which skills are at the top of businesses' wish lists.

A much-talked about cyber-security skills gap has left enterprises on the hunt for technical attributes and leadership qualities. In this interview, QA's Cyber Security Director, Greg Newton-Ingham, explains which cyber security skills are currently the most sought after by businesses.

Computing Interview (Part two)

QA's Greg Newton-Ingham explains how the importance businesses place on thwarting cyber attacks has transformed the role of the Chief Information Security Officer (CISO).

In this interview, QA's cyber security director, Greg Newton-Ingham, explains how the increasing amount of pressure on businesses to thwart cyber attacks has led to a transformation in the role of the chief information security officer (CISO).

Trusted, awarded and accredited

Fully accredited learning services to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.