Cyber Security training from QA

Cyber Security training

Explore the only end-to-end cyber security curriculum in the UK through the QA 10 cyber domains.

State-of-the-art Cyber Labs

International House is home to the QA Cyber Labs, where companies can simulate real-life cyber attacks on their infrastructure, helping them to prevent & combat breaches without risking their own network.

Cyber Security courses

With over 75 public cyber courses, from the QA 10 cyber domains, we offer cyber certifications, cyber assurance and cyber defence training for the whole organisation. In a supportive, hands-on learning environment, our public, private and bespoke training courses meet the needs of individuals, employers and enterprise.

Cyber Awareness

Cyber Awareness

Cyber Security training courses for staff of all levels.

HMG Information Assurance

HMG Info Assurance

For government information security practitioners.

Cyber Compliance

Cyber Compliance

For those required to maintain regulatory security standards.

Cyber Security Operations

Cyber Security Ops

For those working in security management & operational roles.

Cyber Incident Response

Cyber Incident Response

For those responsible for crisis management & communications.

Cyber Secure Developer

Cyber Secure Developer

For security project managers, software developers & test teams.

Cyber Intelligence

Cyber Intelligence

For security professionals, IT risk management & government.

Digital Forensics

Digital Forensics

For security professionals, law enforcement & government.

Cyber Offensive Defence

Cyber Offensive Defence

For defending IT networks, applications & infrastructure.

Capture the Flag

Cyber Games

Challenges for 'Cyber Defenders' from foundation to advanced.

Cyber Consultancy

Cyber Consultancy

For organisations that want to test their current cyber controls.

Video learning

Cyber Online Courses

Digital training that can be accessed from anywhere.

Cyber Security spotlight

View our latest and most popular cyber security training courses.

Advanced Infrastructure Hacking
DevSecOps Hands-on

DevSecOps has been described as 'security as code', 'a marriage of DevOps and Security' and 'Shifting security to the left'.

Advanced Infrastructure Hacking
Secure Coding Masterclass for Financial Services

5-day course for engineers developing apps for the banking and finance sector.

ICS Security for Managers

Designed to provide those at managerial level with an understanding of today’s cyber security challenges.

Cloud Computing training from QA
Practitioner Certificate in Cloud Security

This 5-day GHCQ Certified course is focussed on cloud security principles and architecture.

Cyber Security brochures

Click on the cards below to download our latest cyber security brochures and reports.

Cyber Security news

Read the latest cyber news from our cyber security experts.

Cyber Security training from QA

Cyber Pulse: Edition 40

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 39

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 38

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

AntiSocial Engineer

QA is pleased to announce a partnership with The AntiSocial Engineer Limited

Cyber Security training from QA

Cyber Pulse: Edition 37

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 36

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 35

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

EC-Council Circle of Excellence Award

QA wins EC-Council Circle of Excellence Award

The EC-Council has recently named QA as the winner of the Circle of Excellence Award for the fourth year running (2015 - 2018). Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 34

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 33

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 32

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security events

Find out more about our upcoming cyber security events and register to attend.

Cyber Awareness Month
Cyber Awareness Month – Blockchain Challenge 15/11/18

FREE webinar about Blockchain & new EC-Council eLearning.

Cyber Security Summit & Expo 15/11/18

We are exhibiting at this London event about cyber security, data protection and securing CNI.

black hat Europe 2017
Black Hat Europe 2018 03/12/18 - 06/12/18

QA is attending this huge Information Security event in London.

OpenSource Intelligence for Recruiters 06/12/18

This FREE webinar looks at gathering information using Open Source Intelligence.

ICGS3 16/01/19 - 18/01/19

QAHE and Northumbria Uni are hosting the 12th International conference on Global Security, Safety & Sustainability.

Industry Partners

QA partners with the leading experts in the Cyber Security industry.

Cyber Security blogs

Read the latest blogs from our cyber security experts.

Cyber

5 Social Engineering scams you should know!

QA Cyber Security Trainer, James Aguilan, breaks down five Social Engineering attacks everyone should be aware of. Read the full article

Cyber

How to build an effective cyber defence against polymorphic malware

QA Cyber Security Trainer, James Aguilan, lists three key areas where security efforts should be focussed to counter polymorphic malware. Read the full article

Cyber

Who would hack a hairdresser?

QA Cyber Security Trainer, Graeme Batsman, explains why seemingly valueless targets are frequently hacked. Read the full article

Cyber

A proactive technical guide to stopping malware in its tracks

QA Cyber Security Trainer, Graeme Batsman, offers a detailed guide on how to defend against malware. Read the full article

GDPR

Weaponising GDPR

QA Cyber Training Delivery Manager, Mark Amory, discusses how GDPR regulations can make data breaches a valuable weapon to damage competitors. Read the full article

Cyber

How to protect Android from Man-in-the-Disk attacks

QA Cyber Security Trainer, James Aguilan, gives a few tips to help you avoid MiTD flaws and exploits. Read the full article

Cyber

Cryptocurrency in traditional crimes

QA Cyber Security Trainer, James Aguilan, looks at how cryptocurrency is used in crimes such as drug trafficking, money laundering and fraud. Read the full article

Cyber

Most common ways for thieves to steal your cryptocurrency

QA Cyber Security Trainer, James Aguilan, looks at how cybercriminals can steal your coins. Read the full article

Cyber Security protecting your data

Business security challenges from the IoT

QA Cyber Security Trainer, James Aguilan, details the business security challenges when it comes to the exponential growth of the Internet of Things (IoT). Read the full article

Cyber security courses

Pwned Passwords and a Python Tool

Brad Stone, QA's Head of Cyber Certifications, looks at the problems with typical password-meters and advises on the best way you can securely check the strength of your passwords. Read the full article

Cyber Security research papers

Click on the links below to download our latest cyber security research papers.

Cyber

On Assessing the Impact of Ports Scanning on the Target Infrastructure

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, provides an in-depth analysis of port scan techniques, with extensive information of each scan technique. Read the full article

Cyber

SCADA Threats in the Modern Airport

In this research paper Dr John McCarthy, a leading authority on Cyber Security strategy and implementation, conducts a detailed study concerned with Supervisory Control and Data Acquisition (SCADA) systems that are at the heart of distributed critical infrastructures within airports. Read the full article

Cyber

A Comprehensive Security Framework for Heterogeneous IoTs

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, looks at the security challenges of using LISP as an overlay to support IoTs communications and highlights the need for a unified security framework for heterogeneous IoTs. Read the full article

Cyber

How efficient AntiViruses are: An empirical investigation of AntiViruses with RATs

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, conducts an empirical investigation of the efficiency of Antivirus programs in detecting malware. Read the full article

Cyber case studies

Find out what makes QA the trusted training provider for the world's leading organisations.

Cyber Security trainers

Meet some of our specialist Cyber Security team.

Brad Stone

Brad Stone

Head of Learning Delivery – Cyber

Spencer Collins

Spencer Collins

Cyber Training Delivery Manager

Cyber Security magazine

Read the latest cyber articles from our cyber security experts.