Cyber Security training from QA

Cyber Security training

Explore the only end-to-end cyber security curriculum in the UK through the QA 10 cyber domains.

Top Cyber Courses

View our latest and most popular cyber security training courses.

Cyber Assessments and Talent Profiling Tools

QA Partner with industry experts to offer organisations the tools assess their Cyber capabilities and talent profiles.

State-of-the-art Cyber Labs

International House is home to the QA Cyber Labs, where companies can simulate real-life cyber attacks on their infrastructure, helping them to prevent & combat breaches without risking their own network.

Cyber Security courses

With over 75 public cyber courses, from the QA 10 cyber domains, we offer cyber certifications, cyber assurance and cyber defence training for the whole organisation. In a supportive, hands-on learning environment, our public, private and bespoke training courses meet the needs of individuals, employers and enterprise.

Cyber Awareness

Cyber Awareness

Cyber Security training courses for staff of all levels.

HMG Information Assurance

HMG Info Assurance

For government information security practitioners.

Cyber Compliance

Cyber Compliance

For those required to maintain regulatory security standards.

Cyber Security Operations

Cyber Security Ops

For those working in security management & operational roles.

Cyber Incident Response

Cyber Incident Response

For those responsible for crisis management & communications.

Cyber Secure Developer

Cyber Secure Developer

For security project managers, software developers & test teams.

Cyber Intelligence

Cyber Intelligence

For security professionals, IT risk management & government.

Digital Forensics

Digital Forensics

For security professionals, law enforcement & government.

Cyber Offensive Defence

Cyber Offensive Defence

For defending IT networks, applications & infrastructure.

Capture the Flag

Cyber Games

Challenges for 'Cyber Defenders' from foundation to advanced.

Cyber Consultancy

Cyber Consultancy

For organisations that want to test their current cyber controls.

Video learning

Cyber Online Courses

Digital training that can be accessed from anywhere.

Cyber Security brochures

Click on the cards below to download our latest cyber security brochures and reports.

Cyber Security news

Read the latest cyber news from our cyber security experts.

Cyber Security training from QA

Cyber Pulse: Edition 49

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 48

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 47

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 46

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 45

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 44

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 43

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

QA is pleased to announce a partnership with The CyberFish Company

QA is pleased to announce a partnership with The CyberFish Company

Cyber Security training from QA

Cyber Pulse: Edition 42

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 41

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 40

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security events

Find out more about our upcoming cyber security events and register to attend.

How to Reduce Human Cyber Risk 29/01/19

This FREE 1-hour webinar introduces the CybSafe platform that reduces human cyber risk.

First Look
First Look - Advanced Social Engineering 19/03

This FREE Manchester seminar introduces our new social engineering course.

First Look
First Look - Build your own Phishing Platform 19/03

This FREE Manchester seminar introduces our new phishing campaigns course.

First Look
First Look - Hands-on Crypto 01/04/19

This FREE London seminar covers high-level theory & the tools & techniques of cryptography.

First Look
First Look - Blockchain Analysis 02/05/19

This FREE London seminar looks at Cryptocurrency, with a focus on blockchain.

Industry Partners

QA partners with the leading experts in the Cyber Security industry.

Cyber Security blogs

Read the latest blogs from our cyber security experts.

Cyber

Cloud Security

QA Cyber Security Technical Consultant, Graeme Batsman, looks at security issues with public and private cloud infrastructures. Read the full article

Cyber

Drones - what are they, and what are the Cyber Security Risks?

QA Cyber Security Specialist, James Aguilan, looks at the rise of commercial drones and the associated security risks. Read the full article

Cyber

Christmas Phishing

QA Cyber Training Delivery Manager, Mark Amory, looks at why phishing attacks are particularly effective over the festive period. Read the full article

Cyber

Tips to help reduce phishing success

QA Cyber Security Technical Consultant, Graeme Batsman, offers five lesser known cyber defence tips to help reduce phishing success. Read the full article

Cyber

How should employees address application layer attacks?

QA Cyber Security Trainer, James Aguilan, emphasises that understanding the risk to information assets is imperative. Read the full article

Cyber

Top Malware as of 2018 and Top Tips for Cyber Security

QA Cyber Security Trainer, James Aguilan, gives some top tips to prevent the latest malware from causing havoc. Read the full article

Cyber

Denial of Service attack for iOS devices

QA Cyber Training Delivery Manager, Mark Amory, looks at a new raft of Denial of Service attacks that use little more than a child's balloon! Read the full article

Cyber

Black Friday Phishing Warning

In this blog QA's Director of Cyber Security, Richard Beck, looks at the dangers of succumbing to phishing attacks during the Black Friday weekend. Read the full article

Cyber

Who you gonna call?

QA Cyber Training Delivery Manager, Mark Amory, looks at the behind-the-scenes organisations working tirelessly to help stop cyber attacks. Read the full article

Cyber

How businesses can address the threat of the dark web

QA Cyber Security Trainer, James Aguilan, discusses what moves small businesses can make to push back against the threat of the dark web. Read the full article

Cyber

5 Social Engineering scams you should know!

QA Cyber Security Trainer, James Aguilan, breaks down five Social Engineering attacks everyone should be aware of. Read the full article

Cyber Security research papers

Click on the links below to download our latest cyber security research papers.

Cyber

Analysis, recovery and visualization of encoded Google Fit geo-location forensic artefacts from an Android Wear smartwatch

In this research paper George Seba, Cyber Security Technical Consultant, summarises the findings of advanced research into how Google Fit structures geo-location data, where it is stored on the smartwatch, how it is encoded and how synchronization and interaction with a paired phone impacts on the storage of geo-location data on the wearable device. Read the full article

Cyber

On Assessing the Impact of Ports Scanning on the Target Infrastructure

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, provides an in-depth analysis of port scan techniques, with extensive information of each scan technique. Read the full article

Cyber

SCADA Threats in the Modern Airport

In this research paper Dr John McCarthy, a leading authority on Cyber Security strategy and implementation, conducts a detailed study concerned with Supervisory Control and Data Acquisition (SCADA) systems that are at the heart of distributed critical infrastructures within airports. Read the full article

Cyber

A Comprehensive Security Framework for Heterogeneous IoTs

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, looks at the security challenges of using LISP as an overlay to support IoTs communications and highlights the need for a unified security framework for heterogeneous IoTs. Read the full article

Cyber

How efficient AntiViruses are: An empirical investigation of AntiViruses with RATs

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, conducts an empirical investigation of the efficiency of Antivirus programs in detecting malware. Read the full article

Cyber case studies

Find out what makes QA the trusted training provider for the world's leading organisations.

Cyber Security trainers

Meet some of our specialist Cyber Security team.

Brad Stone

Brad Stone

Head of Learning Delivery – Cyber

Spencer Collins

Spencer Collins

Cyber Training Delivery Manager

Cyber Security magazine

Read the latest cyber articles from our cyber security experts.