Cyber Security training from QA

Cyber Security training

Explore the only end-to-end cyber security curriculum in the UK.

Cyber Body Of Knowledge – CyBOK

A project called the Cyber Security Body of Knowledge has been set up with the long-term aim of contributing to the development of the cyber security profession.

Top Cyber Courses

View our latest and most popular cyber security training courses.

Cyber Security at QA

Watch this short video outlining QA's Cyber Security offering.

Cyber Assessments and Talent Profiling Tools

QA Partner with industry experts to offer organisations the tools assess their Cyber capabilities and talent profiles.

Approved Training | EC Council

NEW – EC-Council Certified Ethical Hacker Residential Bootcamp

QA's residential bootcamp provides a more intensive and supportive learning experience, where learners and our instructors have additional time to collaborate and share real world examples of implementing and application beyond the theory.

Cyber Security brochures

Click on the cards below to download our latest cyber security brochures and reports.

Cyber Security news

Read the latest cyber news from our cyber security experts.

Cyber Security training from QA

Cyber Pulse: Edition 63

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 62

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 61

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 60

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 59

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

QA Wins ‘Associate Award’ at the NCSC Cyber Schools Hub Awards

QA Wins 'Associate Award' at the Inaugural NCSC Cyber Schools Hub Awards

Cyber Security training from QA

Cyber Pulse: Edition 58

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 57

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 56

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 55

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security events

Find out more about our upcoming cyber security events and register to attend.

First Look
First Look - Blockchain Analysis 19/07/19

This FREE London seminar looks at Cryptocurrency, with a focus on blockchain.

Industry Partners

QA partners with the leading experts in the Cyber Security industry.

Cyber Security blogs

Read the latest blogs from our cyber security experts.

Cyber

Be holiday Cyber-savvy

QA Cyber Training Delivery Manager, Mark Amory, identifies a few things to think about before you head-off for that relaxing break. Read the full article

Cyber

Don't overlook physical security!

QA Cyber Security Technical Consultant, Graeme Batsman, explains why poor physical security often leads to easier hostile reconnaissance or social engineering. Read the full article

Cyber

Security on Office 365

QA Cyber Security Technical Consultant, Graeme Batsman, lists five tips to enhance security for Office 365 email. Read the full article

Cyber

Cyber Security Top Tips

QA Cyber Security Technical Consultant, Graeme Batsman, lists five top tips to help users stay safe online. Read the full article

Cyber

The Air-Gap Dilemma

QA Cyber Security Specialist, James Aguilan, looks at the methods through which air-gapped systems can be compromised. Read the full article

Cyber

Why email phishing persists?

QA Cyber Security Specialist, James Aguilan, looks at why soliciting personal information by employing social engineering techniques is still a successful tactic. Read the full article

Cyber

The Invisible Attack

QA Cyber Training Delivery Manager, Mark Amory, looks at the technology Microsoft is implementing in an attempt to combat the huge number of malicious URLs sent in emails. Read the full article

Cyber

Cyber Security Loopholes

QA Cyber Security Technical Consultant, Graeme Batsman, argues that just because you have invested in new 'state-of-the-art' defences it does not mean there are not ways round it. Read the full article

Cyber

Safer Internet Day 2019

QA Cyber Training Delivery Manager, Mark Amory, discusses Safer Internet Day and its goal to promote the safe and positive use of digital technology for children and young people. Read the full article

Cyber

Password security - it is not all about length and strength

QA Cyber Security Technical Consultant, Graeme Batsman, looks at simple and cheap options to prevent password cracking. Read the full article

Cyber

Cloud Security

QA Cyber Security Technical Consultant, Graeme Batsman, looks at security issues with public and private cloud infrastructures. Read the full article

Cyber Security research papers

Click on the links below to download our latest cyber security research papers.

Cyber

On Assessing the Impact of Ports Scanning on the Target Infrastructure

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, provides an in-depth analysis of port scan techniques, with extensive information of each scan technique. Read the full article

Cyber

SCADA Threats in the Modern Airport

In this research paper Dr John McCarthy, a leading authority on Cyber Security strategy and implementation, conducts a detailed study concerned with Supervisory Control and Data Acquisition (SCADA) systems that are at the heart of distributed critical infrastructures within airports. Read the full article

Cyber

A Comprehensive Security Framework for Heterogeneous IoTs

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, looks at the security challenges of using LISP as an overlay to support IoTs communications and highlights the need for a unified security framework for heterogeneous IoTs. Read the full article

Cyber

How efficient AntiViruses are: An empirical investigation of AntiViruses with RATs

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, conducts an empirical investigation of the efficiency of Antivirus programs in detecting malware. Read the full article

Cyber case studies

Find out what makes QA the trusted training provider for the world's leading organisations.

Cyber Security trainers

Meet some of our specialist Cyber Security team.

Brad Stone

Brad Stone

Head of Learning Delivery – Cyber

Spencer Collins

Spencer Collins

Cyber Training Delivery Manager

Cyber Security magazine

Read the latest cyber articles from our cyber security experts.