Introducing CyBOK: Attack and Defences
Let's talk about Attack and Defences, probably one of the most well-understood knowledge areas within Cyber Body of Knowledge (CyBOK). It covers forensics, attack adversarial behaviours, security operations, incident management, malware and understanding how to defend against exploits that have been chained together to take advantage of an organisation.
We're looking at incident response techniques, and how digital forensics and forensic investigations play a part. We have a wealth of Attack and Defences product courses within QA. From our ethical hacking suites to our certified digital forensics courses, taking you on that journey to better defend and respond to adversarial behaviours.
CyBOK, or Cyber Security Body Of Knowledge, is a project that aims to help professionalise the cyber profession. We at QA have aligned our entire cyber portfolio to the CyBOK knowledge areas.
To find out more about our cyber courses, click here.

Richard Beck
Richard Beck is Director of Cyber at QA. He works with customers to build effective and successful learning solutions tailored for business needs, helping to solve business problems. Richard has designed and architected numerous enterprise and nationwide cyber programmes for QA customers. Responsible for the QA cyber portfolio, products, proposition and cyber partner community. He has over 15 years' experience in senior Information Security roles.More articles by Richard
Cyber Pulse: Edition 186 | 23 June 2022
In this edition: PowerShell Advisory from National Security Agency (NSA), Ukrainian cybersecurity officials exposed two new h…
23 June 2022Cyber Pulse: Edition 185 | 23 May 2022
In this edition: Pro-Russian hackers target Italian institutions, Canada bans Huawei and ZTE 5G and 4G equipment, Greenland s…
23 May 2022Cyber Pulse: Edition 184 | 13 May 2022
In this edition: German automotive companies targeted, Docker attacks linked to cryptominers, HP & Intel announce patches for…
13 May 2022Cyber Pulse: Edition 183 | 29 April 2022
In this edition: More than $13 million in crypto stolen, cryptomining campaign has been targeting Docker APIs, Microsoft repo…
29 April 2022Cyber Pulse: Edition 182 | 22 April 2022
In this edition: APT Group targeting blockchain and crypto industry, ransomware targets ProxyShell weakness in MS Exchange Se…
22 April 2022Cyber Pulse: Edition 181 | 13 April 2022
In this edition: Hackers steal $320,000 in Cryptocurrency from NFT & Crypto community platform, ICS-capable malware targets a…
13 April 2022Cyber Pulse: Edition 180 | 04 April 2022
In this edition: Pervasive Risk for Discord as Multiple Discord Channels Hacked, Biggest Cryptocurrency Breach $540m Disclose…
04 April 2022Cyber Pulse: Edition 179 | 18 March 2022
In this edition: Anonymous cripples Russian FSB website, Russian hackers exploit multi-factor authentication flaw, additional…
18 March 2022Cyber Pulse: Edition 178 | 10 March 2022
In this edition: Ukraine cyber update, Estonia bug bounty programme in support of Ukraine, complex multilateral threat actors…
10 March 2022Cyber Pulse: Edition 177 | 4 March 2022
In this edition: NATO warns individual hackers to step down and leave cyber offensive activity to governments in order to avo…
04 March 2022