Cyber Security training
Explore the only end-to-end cyber security curriculum in the UK through the QA 10 cyber domains.
International House is home to the QA Cyber Labs, where companies can simulate real-life cyber attacks on their infrastructure, helping them to prevent & combat breaches without risking their own network.
This FREE London seminar covers high-level theory & the tools & techniques of cryptography.
This FREE webinar looks at GDPR post implementation and how training can support compliance.
This FREE London seminar looks at Cryptocurrency, with a focus on blockchain.
QA Cyber Security Technical Consultant, Graeme Batsman, argues that just because you have invested in new 'state-of-the-art' defences it does not mean there are not ways round it. Read the full article
QA Cyber Training Delivery Manager, Mark Amory, discusses Safer Internet Day and its goal to promote the safe and positive use of digital technology for children and young people. Read the full article
In this research paper George Seba, Cyber Security Technical Consultant, summarises the findings of advanced research into how Google Fit structures geo-location data, where it is stored on the smartwatch, how it is encoded and how synchronization and interaction with a paired phone impacts on the storage of geo-location data on the wearable device. Read the full article
In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, provides an in-depth analysis of port scan techniques, with extensive information of each scan technique. Read the full article
In this research paper Dr John McCarthy, a leading authority on Cyber Security strategy and implementation, conducts a detailed study concerned with Supervisory Control and Data Acquisition (SCADA) systems that are at the heart of distributed critical infrastructures within airports. Read the full article
In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, looks at the security challenges of using LISP as an overlay to support IoTs communications and highlights the need for a unified security framework for heterogeneous IoTs. Read the full article
In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, conducts an empirical investigation of the efficiency of Antivirus programs in detecting malware. Read the full article