About this course

Tech type Essentials
Course code QASEMTTSR
Duration 1 Day

During this half-day seminar you will get insights and perspectives from Ryan Ackroyd, QA Cyber Trainer and Security Researcher. You will learn the processes and methods used to analyse applications for unknown vulnerabilities. Those in attendance will gain insights in the complex analysis techniques for both open and closed source applications. Highlighting the various tools and techniques to identify potential inputs to applications and test those inputs for vulnerabilities. Demonstrations of static analysis and various tools, techniques and procedures for identifying and researching vulnerabilities which often go undetected by vulnerability scanners.

Discussion & Demonstrations Highlights:

  • How to use online resources to identify useful information for testing
  • How to identify inputs to applications
  • How to perform static analysis of source code
  • How to analyse applications using open source tools
  • How to test applications for vulnerabilities using educated guess work and known tooling
  • How to fuzz web and system applications for vulnerabilities

Target audience

  • Security Researchers
  • Penetration Testers
  • Security Analysts
  • Malware Researchers
  • Cyber Defenders
  • Reverse Engineering Specialist

About the presenter

Ryan has a wealth of experience within the Cyber industry. Previously a known hacker Ryan has reformed and vowed to help secure, defend systems and share his knowledge through training. Ryan joined QA in 2016 as a Cyber Security Trainer and Security Researcher where he continues to educate customers and support in expanding QA’s already comprehensive suite of Cyber courses.


09.30 – Registration and Networking

10.00 – Part 1 of seminar

11.00 – Break and Networking

11.30 – Part 2 of seminar

12.30 – Q & A – Finish

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.