Cyber Security training from QA

Cyber Security training

Explore the only end-to-end cyber security curriculum in the UK through the QA 10 cyber domains.

State-of-the-art Cyber Labs

International House is home to the QA Cyber Labs, where companies can simulate real-life cyber attacks on their infrastructure, helping them to prevent & combat breaches without risking their own network.

Cyber Security courses

With over 75 public cyber courses, from the QA 10 cyber domains, we offer cyber certifications, cyber assurance and cyber defence training for the whole organisation. In a supportive, hands-on learning environment, our public, private and bespoke training courses meet the needs of individuals, employers and enterprise.

Cyber Awareness

Cyber Awareness

Cyber Security training courses for staff of all levels.

HMG Information Assurance

HMG Info Assurance

For government information security practitioners.

Cyber Compliance

Cyber Compliance

For those required to maintain regulatory security standards.

Cyber Security Operations

Cyber Security Ops

For those working in security management & operational roles.

Cyber Incident Response

Cyber Incident Response

For those responsible for crisis management & communications.

Cyber Secure Developer

Cyber Secure Developer

For security project managers, software developers & test teams.

Cyber Intelligence

Cyber Intelligence

For security professionals, IT risk management & government.

Digital Forensics

Digital Forensics

For security professionals, law enforcement & government.

Cyber Offensive Defence

Cyber Offensive Defence

For defending IT networks, applications & infrastructure.

Capture the Flag

Cyber Games

Challenges for 'Cyber Defenders' from foundation to advanced.

Cyber Consultancy

Cyber Consultancy

For organisations that want to test their current cyber controls.

Video learning

Cyber Online Courses

Digital training that can be accessed from anywhere.

Cyber Security spotlight

View our latest and most popular cyber security training courses.

Advanced Infrastructure Hacking
DevSecOps Hands-on

DevSecOps has been described as 'security as code', 'a marriage of DevOps and Security' and 'Shifting security to the left'.

Advanced Infrastructure Hacking
Secure Coding Masterclass for Financial Services

5-day course for engineers developing apps for the banking and finance sector.

ICS Security for Managers

Designed to provide those at managerial level with an understanding of today’s cyber security challenges.

Cloud Computing training from QA
Practitioner Certificate in Cloud Security

This 5-day GHCQ Certified course is focussed on cloud security principles and architecture.

Cyber Security brochures

Click on the cards below to download our latest cyber security brochures and reports.

Cyber Security news

Read the latest cyber news from our cyber security experts.

Cyber Security training from QA

Cyber Pulse: Edition 33

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 32

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 31

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 30

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

QA partners with CybSafe to disrupt Cyber Security awareness market

QA partners with CybSafe to disrupt Cyber Security awareness market

Cyber Security training from QA

Cyber Pulse: Edition 29

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 28

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 27

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 26

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 25

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

QA has signed a partnership agreement with PECB United Kingdom

QA has signed a partnership agreement with PECB United Kingdom

Cyber Security events

Find out more about our upcoming cyber security events and register to attend.

Security Cleared Expo
Security Cleared Expo 23/10/18

We are a Gold sponsor at this recruitment event for candidates with security clearance.

Cyber Awareness Month Cracking Passwords 25/10

This FREE webinar looks at how to improve password security.

EU - General Data Protection Regulation
Cyber Awareness Month – Data Breach Seminar 06/11/18

This FREE seminar introduces QA's full day Data Breach course.

Cyber Security Summit & Expo 15/11/18

We are exhibiting at this London event about cyber security, data protection and securing CNI.

black hat Europe 2017
Black Hat Europe 2018 03/12/18 - 06/12/18

QA is attending this huge Information Security event in London.

COMING SOON

ICGS3 16/01/19 - 18/01/19

QAHE and Northumbria Uni are hosting the 12th International conference on Global Security, Safety & Sustainability.

Cyber training by vendor

We offer a wide range of fully-accredited cyber security courses from the leading vendors.

Cyber Security blogs

Read the latest blogs from our cyber security experts.

GDPR

Weaponising GDPR

QA Cyber Training Delivery Manager, Mark Amory, discusses how GDPR regulations can make data breaches a valuable weapon to damage competitors. Read the full article

Cyber

How to protect Android from Man-in-the-Disk attacks

QA Cyber Security Trainer, James Aguilan, gives a few tips to help you avoid MiTD flaws and exploits. Read the full article

Cyber

Cryptocurrency in traditional crimes

QA Cyber Security Trainer, James Aguilan, looks at how cryptocurrency is used in crimes such as drug trafficking, money laundering and fraud. Read the full article

Cyber

Most common ways for thieves to steal your cryptocurrency

QA Cyber Security Trainer, James Aguilan, looks at how cybercriminals can steal your coins. Read the full article

Cyber Security protecting your data

Business security challenges from the IoT

QA Cyber Security Trainer, James Aguilan, details the business security challenges when it comes to the exponential growth of the Internet of Things (IoT). Read the full article

Cyber security courses

Pwned Passwords and a Python Tool

Brad Stone, QA's Head of Cyber Certifications, looks at the problems with typical password-meters and advises on the best way you can securely check the strength of your passwords. Read the full article

Cyber Security protecting your data

Top 10 free tools for digital forensic investigation

QA Cyber Security Trainer, James Aguilan, lists his favourite free tools for forensic wizardry. Read the full article

Household smart appliances

Turning an Amazon Echo into a smart home security system

QA Cyber Security Trainer, James Aguilan, looks at how an Amazon Echo can act as the control point for several home security appliances. Read the full article

Cyber

How to hack a plane...

Siker CEO, Tim Harwood, looks at how cyber security threats can affect more than just personal computers and data stored by organisations - it is possible to hack a plane! Read the full article

Household smart appliances

Cyber criminals can exploit flaws in online security and all new appliances

QA Cyber Security Trainer, James Aguilan, looks at how internet-enabled devices such as fridges, doorbells and TVs are leaving consumers exposed to hackers. Read the full article

Cyber Security research papers

Click on the links below to download our latest cyber security research papers.

Cyber

On Assessing the Impact of Ports Scanning on the Target Infrastructure

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, provides an in-depth analysis of port scan techniques, with extensive information of each scan technique. Read the full article

Cyber

SCADA Threats in the Modern Airport

In this research paper Dr John McCarthy, a leading authority on Cyber Security strategy and implementation, conducts a detailed study concerned with Supervisory Control and Data Acquisition (SCADA) systems that are at the heart of distributed critical infrastructures within airports. Read the full article

Cyber

A Comprehensive Security Framework for Heterogeneous IoTs

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, looks at the security challenges of using LISP as an overlay to support IoTs communications and highlights the need for a unified security framework for heterogeneous IoTs. Read the full article

Cyber

How efficient AntiViruses are: An empirical investigation of AntiViruses with RATs

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, conducts an empirical investigation of the efficiency of Antivirus programs in detecting malware. Read the full article

Cyber case studies

Find out what makes QA the trusted training provider for the world's leading organisations.

Cyber Security trainers

Meet some of our specialist Cyber Security team.

Scott Isaac

Scott Isaac

Head of Cyber Product Development

Spencer Collins

Spencer Collins

Cyber Training Delivery Manager

Cyber Security magazine

Read the latest cyber articles from our cyber security experts.