Cyber Security training from QA

Cyber Security training

Protect your organisation from cyber attacks and the increasing threat landscape.

Cyber Security courses

We provide an end-to-end offering of cyber security training courses sorted by domain.

Cyber Security statistics

 


of large businesses have suffered a cyber breach in the past year


of businesses with unclear security policies had staff-related breaches


of the worst security breaches in 2014 were caused by staff


£600k - £1.15m is the cost of a large business' worst annual cyber attack

Importance of staff training

Raise the security maturity of your organisation through specialist cyber training. Improve your ability to detect, deter & defend your organisation from the increasing cyber threat landscape.

Educating employees will reduce the chances of your business becoming a victim of today's cyber threats.

As we look at these security incidents in detail, we can identify one common factor - the human element. In almost all reported security incidents, the actions - either intentional or accidental - by staff in the compromised organisations led to a security breach. Security reports and surveys continue to show how the human element is a major contributor in successful cyber attacks.

At QA, we are passionate about security training. We want to demonstrate the importance of educating security professionals and business users to help everyone detect, deter and defend against the cyber threats that every business faces through a supportive, hands-on learning environment.

Cyber Security blogs

Read the latest blogs from our cyber security experts.

AWS

Introducing Security Operations on AWS course

This is the fifth blog post in a series about AWS. During this part of the series I'll discuss the latest AWS course, Security Operations on AWS. Read the full article

Ashley Madison

Lessons from the Ashley Madison hack

This episode shows the power that a motivated and advanced hacker group can have over the future of a company. No matter what happens to Ashley Madison, there will be even bigger hacks in the future exposing more user data. Read the full article

Cyber

The ideal IT Security Analyst

Interested in what a job as a IT Security Analyst entails? Or what key skills a good candidate will hold? Take a look at what makes the ideal IT Security Analyst and the processes an organisation should adhere to. Read the full article

Cyber

Open Source Intelligence Techniques and the Dark Web

We all know and use the surface web, but did you know that this is only 4% of the internet itself? Max Vetter discusses what businesses should be doing to minimize Cyber Security threats through the Dark Web. Read the full article

Cyber

The ideal Chief Information Security Officer

Interested in what a job as a Chief Information Security Officer (CISO) entails? Or what key skills a good candidate will hold? Take a look at what makes the ideal CISO and the processes an organisation should adhere to. Read the full article

Cyber

The human element of cyber security

Key thoughts and findings from my two days at 'The Cyber Security Show 2015' in London. Read the full article

Cyber training by vendor

We offer a wide range of fully-accredited cyber security courses from the leading vendors.

Cisco Security

Implementing Advanced Cisco ASA Security

Classroom
5 Days
TPCI-SASAA

Implementing and Configuring Cisco Identity Services Engine

Classroom
5 Days
TPCI-SISE

Implementing Cisco Secure Access Control System Version 5.6

Classroom
3 Days
TPFL-ACS

Introduction to 802.1X Operations for Cisco Security Professionals

Classroom
3 Days
TPCI-802.1X

Managing Enterprise Security with Cisco Security Manager v4.0

Classroom
5 Days
TPCI-SSECMGT

Securing Email with Cisco Email Security Appliance

Classroom
3 Days
TPCI-SESA

Securing Email with Cisco Email Security Appliance (Partner Training)

Classroom
2 Days
TPCI-PASESA

Securing the Web with Cisco Web Security Appliance

Classroom
2 Days
TPCI-SWSA

Securing the Web with Cisco Web Security Appliance (Partner Training)

Classroom
2 Days
TPCI-PASWSA

Implementing Core Cisco ASA Security

Classroom
5 Days
TPCI-SASAC

Implementing Cisco Identity Services Engine for Wireless Engineers

Classroom
2 Days
TPCI-SWISE

Juniper training courses

Advanced Juniper Networks IPSec VPN Implementations

Classroom
2 Days
TPJUN_AJNVPNI

Advanced Junos Enterprise Routing

Classroom
3 Days
TPJUN_JUNAJER

Advanced Junos Security - FINAL DATE - 05-07 JUNE

Classroom
3 Days
TPJUN_JUNAJSEC

Attack Prevention with Juniper Networks Firewalls

Classroom
1 Day
TPJUN_APJF

Configuring Juniper Networks Firewall/IPSec VPN Products

Classroom
3 Days
TPJUN_CJFV

Integrating Juniper Networks Firewalls and VPN's into High Performance N/works

Classroom
3 Days
TPJUN_JUNIFVH

Introduction to the Junos Operating System

Classroom
1 Day
TPJUN_IJOS

Juniper Implementing Intrusion Detection and Prevention

Classroom
3 Days
TPJUN_IIDP

Junos Unified Threat Management

Classroom
1 Day
TPJUN_JUTM

Junos Enterprise Switching (ELS)

Classroom
2 Days
TPJUN_JEX

Junos Intrusion Prevention Systems - FINAL DATE - 08-09 JUNE

Classroom
2 Days
TPJUN_JUNJIPS

Junos Troubleshooting in the NOC

Classroom
3 Days
TPJUN_JTNOC

Network and Security Manager Fundamentals

Classroom
2 Days
TPJUN_JUNNSMF

Symantec training courses

PGP Universal Server 3.2 and PGP Desktop 10.2: Administration

Classroom
5 Days
SYMUS3000

Symantec Data Center Security: Server Advanced 6.0

Classroom
3 Days
SYMDP0151

Symantec Messaging Gateway 9.X Administration

Classroom
3 Days
SYMSC2998

Symantec Network Access Control 11.x

Classroom
2 Days
SYMSC1440

Symantec Control Compliance Suite (CCS) 11.0: Administration

Classroom
3 Days
SYMSC1425

Please note: by submitting your details you give us permission to contact you regarding QA training in this subject area. We will not, under any circumstances, pass your details onto a third party. View our Privacy Policy for more information.

CISSP
CISSP

A detailed look at information security concepts and industry best practices.

CISMP
CISMP training course

Provides the skills required to manage information security, assurance and risk.

Certified Ethical Hacker v8
Certified Ethical Hacker

Learn to assess the security of computer systems using penetration testing techniques.

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.