Cyber Security training from QA

Train as you fight - Building an army of New Generation “Ethical Hackers and Penetration testers"

About this course

Tech type Essentials
Course code QAWEBCEH
Duration 1 Hour

With the rise of Ransomware, Social Engineering, and Identity Theft, organisations are no longer surprised that the biggest threat to them is literally right under their nose. Given this, companies require qualified individuals with up-to-date knowledge of the latest vulnerabilities and techniques used by real attackers. To align the skills of Penetration Testers to the abilities and techniques of an advanced attacker, EC-Council has a range of programs to build better Ethical Hackers and Penetration Testers.

During this interactive webinar co-delivered by EC Councils, Philip Blake and QA’s Cyber expert Brad Stone, you will get an exclusive insight into:

  • The Certified Ethical Hacker Program (CEH) program that covers the fundamental ‘knowledge’ to understand how hackers think and operate.
  • The EC-Council Certified Security Analyst (ECSA) Program that teaches you to demonstrate the ‘skills’ based on the penetration testing framework methodology.
  • And finally, LPT (Master) that ensures that you have the ‘ability’ to use attacking techniques against a real world enterprise network.

Date: Monday 26th February

Duration: 12:00 - 13:30

Cost: FREE

Delegates will learn:

  • An introduction to the scope of the ever changing and growing threat landscape
  • An example of attack vectors that will be shown during the lab demonstrations
  • About the Cyber skills gap and that now is the time to go into the world of Cyber Security


  1. Introduction to QA and EC-Council
  2. Cyber Security Threat Landscape
  3. Certified Ethical Hacker Lab demonstrations
  4. Who is looking for Cyber Security Professionals and why
  5. EC-Council Vulnerability Assessment and Penetration Testing Track
  6. Next scheduled courses
  7. Q & A

Webinar host


Brad Stone

Brad Stone

Head of Cyber Certifications

Brad has worked across IT for many years; from installing, managing and troubleshooting systems, through coding and scripting, to running security and configuring firewall, IDS and network policies. Brad has been training tech for almost a decade and holds certifications from Microsoft, Cisco, CompTIA, ISC2 plus many more. From an electronic engineering background, Brad enjoys investigating different systems and finding new ways they can be manipulated. Brad mainly trains Offensive Security, Intelligence Gathering, Security Management and Cloud Computing. Brad is also GCT certified to deliver GCHQ certified courses.

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.