Cyber Security training from QA

Cyber Security training

Explore the only end-to-end cyber security curriculum in the UK though the QA 10 cyber domains.

State-of-the-art Cyber Labs

International House is home to the QA Cyber Labs, where companies can simulate real-life cyber attacks on their infrastructure, helping them to prevent & combat breaches without risking their own network.

Cyber Security courses

With over 75 public cyber courses, from the QA 10 cyber domains, we offer cyber certifications, cyber assurance and cyber defence training for the whole organisation. In a supportive, hands-on learning environment, our public, private and bespoke training courses meet the needs of individuals, employers and enterprise.

Cyber Awareness

Cyber Awareness

Cyber Security training courses for staff of all levels.

HMG Information Assurance

HMG Info Assurance

For government information security practitioners.

Cyber Compliance

Cyber Compliance

For those required to maintain regulatory security standards.

Cyber Security Operations

Cyber Security Ops

For those working in security management & operational roles.

Cyber Incident Response

Cyber Incident Response

For those responsible for crisis management & communications.

Cyber Secure Developer

Cyber Secure Developer

For security project managers, software developers & test teams.

Cyber Intelligence

Cyber Intelligence

For security professionals, IT risk management & government.

Digital Forensics

Digital Forensics

For security professionals, law enforcement & government.

Cyber Offensive Defence

Cyber Offensive Defence

For defending IT networks, applications & infrastructure.

Capture the Flag

Capture the Flag

Challenges for 'Cyber Defenders' from foundation to advanced.

Cyber Security spotlight

View our latest and most popular cyber security training courses.

Advanced Infrastructure Hacking
Foundation Certificate in Cyber Security

A comprehensive overview across industry standard technology and platforms.

Advanced Infrastructure Hacking
Simulated Attack & Defence

Simulate a wide variety of real-world attacks and learn to detect and mitigate them.

EU - General Data Protection Regulation
GDPR Practitioner

4-day certified course with APMG exam looking at implementing & maintaining compliance with the new GDPR regulations.

Project Management training from QA
Complete Cyber Analyst

Hand picked by our experts, these interlocking skills enable the Complete Cyber Analyst.

Cyber Security brochures

Click on the cards below to download our latest cyber security brochures and reports.

Cyber Security statistics

 


of businesses surveyed admit suffering an attack in the last year


feel they don't have the right skills balance to protect themselves


feel the cyber threat landscape is "much worse" in recent years


£600k - £1.15m is the cost of a large business' worst annual cyber attack

Cyber Security events

Find out more about our upcoming cyber security events and register to attend.

Advanced Infrastructure Hacking
Cyber Investigator Challenge 26/05/17

Take part in a 'digital treasure hunt' challenge in our state-of-the-art cyber lab.

EU - General Data Protection Regulation
Overview on the EU GDPR 08/06/17

1-hour webinar discussing the upcoming EU General Data Protection Regulation (GDPR).

London Technology Week
LTW - Cyber Lab Challenge 12/06/17

This FREE QA Cyber Lab event invites you to take part in one of our Cyber Defender challenges.

Advanced Infrastructure Hacking
Cyber Lab Challenge Attack & Defence 20/06/17

This FREE event is designed for those responsible for defending organisations from cyber-attacks.

Advanced Infrastructure Hacking
Cyber Lab Challenge Threat Hunting 06/12/17

This FREE event simulates detecting and defending against advanced cyber-attacks.

Cyber training by vendor

We offer a wide range of fully-accredited cyber security courses from the leading vendors.

Cyber Security blogs

Read the latest blogs from our cyber security experts.

Cyber Security: Are people the main reason why security is compromised?

Are people the main reason why security is compromised?

Stuart Rance, RESILIA Best practice Author and Chief Examiner, has a slightly different view. Find out more. Read the full article

Cyber Security: What is phishing and what do hackers look for when deploying an attack?

To catch a phish...

What is phishing and what do hackers look for when deploying an attack? Jamie MacKay from NCC Group writes how to find out more. Read the full article

Cloud computing and security

Is security the reason you’re not moving to the Cloud?

Cloud services are gaining in popularity but research suggests businesses still have concerns about security. So how do cloud providers keep data safe? Read the full article

Cyber Security: Top tips for staying safe

10 Practical Cyber Security Tips for Your Business

With the ever-increasing threat of a cyber-attack, there is a growing need for all businesses to be able to detect, deter and defend against them. We give you 10 top tips on how to ensure your business stays cyber-secure Read the full article

Cyber Security: Protect yourself from the Dark Web

Sale online: Cheap Guns!

For 19 year old Liam Lyburd buying a Glock semi-automatic pistol on the Dark Web was as easy “as buying chocolate”. So what exactly is the Dark Web, how is it used and how can you protect yourself from it? Read the full article

Cyber security courses

How secure is your password?

How long would it take someone to crack your password? For decades they’ve been a headache, a weak link in security. So what is the solution? Read the full article

Cyber Security protecting your data

Protecting your online footprint

With companies like Facebook and Google knowing more and more about you, isn't it time to understand a bit more about where the data goes and what it is used for? Read the full article

cyber security training

It’s not just an IT problem but who should be responsible for Information Security?

Cyber Security, has traditionally been the responsibility of the IT department. However, as the threats have become more sophisticated it makes sense to include other parts of the business. Read the full article

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.