Cyber Security training from QA

Cyber Security training

Explore the only end-to-end cyber security curriculum in the UK through the QA 10 cyber domains.

Exclusive Offer

Up to 25% off the following courses running in March and April*

 

 

*Terms and conditions apply. Only valid for those attending certain events across the above courses in March and April 2019, for new bookings confirmed and attended before the 30th April 2019. Pricing has been amended to reflect this discount and courses included in the offer. Not applicable with any other offer, discount structure or bundle purchase. Offer can only be used once. Existing bookings cannot be cancelled and re-booked using the offer. Bookings transferred to dates outside the promotional terms will be charged at RRP. QA's General Terms & Conditions of Business apply.

Top Cyber Courses

View our latest and most popular cyber security training courses.

Cyber Assessments and Talent Profiling Tools

QA Partner with industry experts to offer organisations the tools assess their Cyber capabilities and talent profiles.

State-of-the-art Cyber Labs

International House is home to the QA Cyber Labs, where companies can simulate real-life cyber attacks on their infrastructure, helping them to prevent & combat breaches without risking their own network.

Cyber Security courses

With over 75 public cyber courses, from the QA 10 cyber domains, we offer cyber certifications, cyber assurance and cyber defence training for the whole organisation. In a supportive, hands-on learning environment, our public, private and bespoke training courses meet the needs of individuals, employers and enterprise.

Cyber Awareness

Cyber Awareness

Cyber Security training courses for staff of all levels.

HMG Information Assurance

HMG Info Assurance

For government information security practitioners.

Cyber Compliance

Cyber Compliance

For those required to maintain regulatory security standards.

Cyber Security Operations

Cyber Security Ops

For those working in security management & operational roles.

Cyber Incident Response

Cyber Incident Response

For those responsible for crisis management & communications.

Cyber Secure Developer

Cyber Secure Developer

For security project managers, software developers & test teams.

Cyber Intelligence

Cyber Intelligence

For security professionals, IT risk management & government.

Digital Forensics

Digital Forensics

For security professionals, law enforcement & government.

Cyber Offensive Defence

Cyber Offensive Defence

For defending IT networks, applications & infrastructure.

Capture the Flag

Cyber Games

Challenges for 'Cyber Defenders' from foundation to advanced.

Cyber Consultancy

Cyber Consultancy

For organisations that want to test their current cyber controls.

Video learning

Cyber Online Courses

Digital training that can be accessed from anywhere.

Cyber Security brochures

Click on the cards below to download our latest cyber security brochures and reports.

Cyber Security news

Read the latest cyber news from our cyber security experts.

Cyber Security training from QA

Cyber Pulse: Edition 58

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 57

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 56

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 55

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 54

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 53

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 52

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 51

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 50

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security training from QA

Cyber Pulse: Edition 49

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security events

Find out more about our upcoming cyber security events and register to attend.

First Look
First Look - Hands-on Crypto 01/04/19

This FREE London seminar covers high-level theory & the tools & techniques of cryptography.

Data Privacy Webinar 04/04/19

This FREE webinar looks at GDPR post implementation and how training can support compliance.

First Look
First Look - Blockchain Analysis 02/05/19

This FREE London seminar looks at Cryptocurrency, with a focus on blockchain.

Industry Partners

QA partners with the leading experts in the Cyber Security industry.

Cyber Security blogs

Read the latest blogs from our cyber security experts.

Cyber

Security on Office 365

QA Cyber Security Technical Consultant, Graeme Batsman, lists five tips to enhance security for Office 365 email. Read the full article

Cyber

Cyber Security Top Tips

QA Cyber Security Technical Consultant, Graeme Batsman, lists five top tips to help users stay safe online. Read the full article

Cyber

The Air-Gap Dilemma

QA Cyber Security Specialist, James Aguilan, looks at the methods through which air-gapped systems can be compromised. Read the full article

Cyber

Why email phishing persists?

QA Cyber Security Specialist, James Aguilan, looks at why soliciting personal information by employing social engineering techniques is still a successful tactic. Read the full article

Cyber

The Invisible Attack

QA Cyber Training Delivery Manager, Mark Amory, looks at the technology Microsoft is implementing in an attempt to combat the huge number of malicious URLs sent in emails. Read the full article

Cyber

Cyber Security Loopholes

QA Cyber Security Technical Consultant, Graeme Batsman, argues that just because you have invested in new 'state-of-the-art' defences it does not mean there are not ways round it. Read the full article

Cyber

Password security - it is not all about length and strength

QA Cyber Security Technical Consultant, Graeme Batsman, looks at simple and cheap options to prevent password cracking. Read the full article

Cyber

Cloud Security

QA Cyber Security Technical Consultant, Graeme Batsman, looks at security issues with public and private cloud infrastructures. Read the full article

Cyber

Drones - what are they, and what are the Cyber Security Risks?

QA Cyber Security Specialist, James Aguilan, looks at the rise of commercial drones and the associated security risks. Read the full article

Cyber

Christmas Phishing

QA Cyber Training Delivery Manager, Mark Amory, looks at why phishing attacks are particularly effective over the festive period. Read the full article

Cyber Security research papers

Click on the links below to download our latest cyber security research papers.

Cyber

Analysis, recovery and visualization of encoded Google Fit geo-location forensic artefacts from an Android Wear smartwatch

In this research paper George Seba, Cyber Security Technical Consultant, summarises the findings of advanced research into how Google Fit structures geo-location data, where it is stored on the smartwatch, how it is encoded and how synchronization and interaction with a paired phone impacts on the storage of geo-location data on the wearable device. Read the full article

Cyber

On Assessing the Impact of Ports Scanning on the Target Infrastructure

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, provides an in-depth analysis of port scan techniques, with extensive information of each scan technique. Read the full article

Cyber

SCADA Threats in the Modern Airport

In this research paper Dr John McCarthy, a leading authority on Cyber Security strategy and implementation, conducts a detailed study concerned with Supervisory Control and Data Acquisition (SCADA) systems that are at the heart of distributed critical infrastructures within airports. Read the full article

Cyber

A Comprehensive Security Framework for Heterogeneous IoTs

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, looks at the security challenges of using LISP as an overlay to support IoTs communications and highlights the need for a unified security framework for heterogeneous IoTs. Read the full article

Cyber

How efficient AntiViruses are: An empirical investigation of AntiViruses with RATs

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, conducts an empirical investigation of the efficiency of Antivirus programs in detecting malware. Read the full article

Cyber case studies

Find out what makes QA the trusted training provider for the world's leading organisations.

Cyber Security trainers

Meet some of our specialist Cyber Security team.

Brad Stone

Brad Stone

Head of Learning Delivery – Cyber

Spencer Collins

Spencer Collins

Cyber Training Delivery Manager

Cyber Security magazine

Read the latest cyber articles from our cyber security experts.