Cyber Security training from QA

Cyber Security training

Explore the only end-to-end cyber security curriculum in the UK though the QA 10 cyber domains.

State-of-the-art Cyber Labs

International House is home to the QA Cyber Labs, where companies can simulate real-life cyber attacks on their infrastructure, helping them to prevent & combat breaches without risking their own network.

Cyber Security courses

With over 75 public cyber courses, from the QA 10 cyber domains, we offer cyber certifications, cyber assurance and cyber defence training for the whole organisation. In a supportive, hands-on learning environment, our public, private and bespoke training courses meet the needs of individuals, employers and enterprise.

Cyber Awareness

Cyber Awareness

Cyber Security training courses for staff of all levels.

HMG Information Assurance

HMG Info Assurance

For government information security practitioners.

Cyber Compliance

Cyber Compliance

For those required to maintain regulatory security standards.

Cyber Security Operations

Cyber Security Ops

For those working in security management & operational roles.

Cyber Incident Response

Cyber Incident Response

For those responsible for crisis management & communications.

Cyber Secure Developer

Cyber Secure Developer

For security project managers, software developers & test teams.

Cyber Intelligence

Cyber Intelligence

For security professionals, IT risk management & government.

Digital Forensics

Digital Forensics

For security professionals, law enforcement & government.

Cyber Offensive Defence

Cyber Offensive Defence

For defending IT networks, applications & infrastructure.

Capture the Flag

Capture the Flag

Challenges for 'Cyber Defenders' from foundation to advanced.

Cyber Security spotlight

View our latest and most popular cyber security training courses.

Advanced Infrastructure Hacking
The Art of Hacking

Learn about the techniques used to compromise the security of the web and infrastructure.

Advanced Infrastructure Hacking
Cyber Defender Foundation - CTF

Learn and practice Cyber Defender 'trade craft' skills to protect your organisation.

Advanced Infrastructure Hacking
CyberSec First Responder

Learn how to monitor and detect security incidents in information systems and networks.

Cyber Essentials for End Users

A unique test to determine whether your staff is cyber aware or susceptible to phishing.

Cyber Security brochures

Click on the cards below to download our latest cyber security brochures and reports.

Cyber Security statistics

 


of businesses surveyed admit suffering an attack in the last year


feel they don't have the right skills balance to protect themselves


feel the cyber threat landscape is "much worse" in recent years


£600k - £1.15m is the cost of a large business' worst annual cyber attack

Cyber Security events

Find out more about our upcoming cyber security events and register to attend.

Cyber Threat 'What's the risk?' 13/01/17

This FREE half-day seminar looks at identifying cyber threats and risk management.

Cyber training by vendor

We offer a wide range of fully-accredited cyber security courses from the leading vendors.

Cyber Security blogs

Read the latest blogs from our cyber security experts.

Cloud computing and security

Is security the reason you’re not moving to the Cloud?

Cloud services are gaining in popularity but research suggests businesses still have concerns about security. So how do cloud providers keep data safe? Read the full article

Cyber Security: Protect yourself from the Dark Web

10 Practical Cyber Security Tips for Your Business

With the ever-increasing threat of a cyber-attack, there is a growing need for all businesses to be able to detect, deter and defend against them. We give you 10 top tips on how to ensure your business stays cyber-secure Read the full article

Cyber Security: Protect yourself from the Dark Web

Sale online: Cheap Guns!

For 19 year old Liam Lyburd buying a Glock semi-automatic pistol on the Dark Web was as easy “as buying chocolate”. So what exactly is the Dark Web, how is it used and how can you protect yourself from it? Read the full article

Cyber security courses

How secure is your password?

How long would it take someone to crack your password? For decades they’ve been a headache, a weak link in security. So what is the solution? Read the full article

Cyber Security protecting your data

Protecting your online footprint

With companies like Facebook and Google knowing more and more about you, isn't it time to understand a bit more about where the data goes and what it is used for? Read the full article

cyber security training

It’s not just an IT problem but who should be responsible for Information Security?

Cyber Security, has traditionally been the responsibility of the IT department. However, as the threats have become more sophisticated it makes sense to include other parts of the business. Read the full article

Cyber

TalkTalk Hack

Now the dust has settled from the TalkTalk hack, what can be learnt to help other companies prevent a similar situation? Read the full article

A day in the life of an Ethical Hacker

A day in the life of an Ethical Hacker

What does an ethical hacker do? It’s a vocation that is ever-changing, so you need to stay ahead of the game at all times. Read the full article

Cyber

TalkTalk hit again with cyber attack

Last week’s cyber attack on TalkTalk underlines the fact that cyber crime is a clear and present danger to all businesses. Read the full article

Cyber

Staying safe online

We have to accept that we will never be 100% safe whilst online, but we can take many steps to limit our exposure to others. Read the full article

AWS

Introducing Security Operations on AWS course

This is the fifth blog post in a series about AWS. During this part of the series I'll discuss the latest AWS course, Security Operations on AWS. Read the full article

Ashley Madison

Lessons from the Ashley Madison hack

This episode shows the power that a motivated and advanced hacker group can have over the future of a company. No matter what happens to Ashley Madison, there will be even bigger hacks in the future exposing more user data. Read the full article

Cyber

The ideal IT Security Analyst

Interested in what a job as a IT Security Analyst entails? Or what key skills a good candidate will hold? Take a look at what makes the ideal IT Security Analyst and the processes an organisation should adhere to. Read the full article

Cyber

Open Source Intelligence Techniques and the Dark Web

We all know and use the surface web, but did you know that this is only 4% of the internet itself? Max Vetter discusses what businesses should be doing to minimize Cyber Security threats through the Dark Web. Read the full article

Cyber

The ideal Chief Information Security Officer

Interested in what a job as a Chief Information Security Officer (CISO) entails? Or what key skills a good candidate will hold? Take a look at what makes the ideal CISO and the processes an organisation should adhere to. Read the full article

Cyber

The human element of cyber security

Key thoughts and findings from my two days at 'The Cyber Security Show 2015' in London. Read the full article

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.