About this Course

Tech Type Essentials
Duration 4 Hours

Cryptography to most sums up Mi6 style counter espionage or secure communications during past wars. In reality, the people who create new encryption standards are super smart with PhDs but to defend, understanding the deep maths is far less important or even relevant at times. Encryption can be a very powerful tool against interception of data, loss or theft or data, or physical devices and can even help defend against malware.

The dreaded G word (or acronym) “General Data Protection Regulation” mandates email encryption, as did the Data Protection Act years before. Email encryption options will be covered.

This three-hour free of charge seminar held in QA’s Cyber Lab in London’s International House will cover high-level theory and more importantly the tools + techniques which go with the theory to re-enforce the message.

Date: Monday 1st April 2019

Time: 09:30 – 12:30

Location: QA International House, Cyber Lab

Cost: FREE

Target Audience

General IT people, especially those tasked with data protection (technical or theory).

Learning Outcomes

Understand what one-way encryption is used for, understand the options to protect emails and the pros/cons of encryption in transit.


09:30-09:45 – Housekeeping, trainer and delegate introduction.

09:45-10:15 – One-way encryption; what it is, what it is used for and hands on.

10:15-11:15 – Email encryption for GDPR, compliance v.s. actual security. The options for you and one product to play with.

11:15-11:30 – Fifteen-minute break.

11:30-12:15 – Encryption in transit, TLS & VPNs. A walkthrough of a TLS and see how good your TLS setup is on your website.

12:15-12:30 – Questions and thank you.

Presenter Biography


Graeme Batsman

Graeme Batsman

Cyber Security Technical Consultant

Graeme joined QA in 2017 and has worked in security on and off for 13 years. His last role was as a Senior Technical Security consultant at Capgemini covering public and private sector. From the age of 17 he was running investigations into online scams and phishing. Today his experience is in OSINT and thinking like a hacker to review + tweak settings with a fine tooth comb.

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.