SlideShare uma empresa Scribd logo
1 de 17
Baixar para ler offline
SECURE.AND
SAFE
KEEPING YOU
CYBER SECURITY TRAINING
Experts in
Cyber Security training.
Hardly a day goes by without a cyber attack
being reported. With this ever-increasing
threat there is a growing need for all
organisations to be able to detect, deter
and defend against these attacks as part of
their every-day business.
With a large majority of breaches being the
result of technological compromise as well
as human error (social engineering, phishing,
etc.), todays modern businesses need to
ensure they have both the right technology
solutions and cyber skills across their
organisation.
At QA we have developed the most
comprehensive end-to-end cyber security
training portfolio providing training for the
whole of your organisation, from end user
to executive board level courses as well as
advanced programmes for your security
professionals.
Raise your
Cyber Security
defences. THE HIGHEST QUALITY
TRAINING
WHAT WE OFFER
IMMERSIVE, SCENARIO BASED
LEARNING
PROVIDING THE BEST FOR OUR
CUSTOMERS
MORE THAN COURSES
CYBER SECURITY TRAINING:
THE QA WAY
RICHARD BECK
Head of Cyber Security
NATHAN MITCHELL
Cyber Security
Technical Consultant
MARK AMORY
Cyber Security Team
Lead Trainer
MAX VETTER
Cyber Security
Technical Consultant
WE HAVE
25 TRAINERS
DEDICATED TO
TEACHING CYBER
SECURITY SKILLS
FLEXIBLE LEARNING
TRAINER EXPERTISE
More accredited professionals with
real-world experience than any other
training provider.
Authored
Our unique QA Authored courses
bridge the gap between theory and
real-world expertise.
At QA we offer learning in many
ways, with classroom, e-learning,
public, private and bespoke
programmes ensuring our
customers can learn anywhere,
any time, any way.
UNMISTAKEABLY QA
BESPOKE PROGRAMMES
Cyber security learning pathways
developed to meet your organisations
needs.
The highest quality
training.
"We often hear about patching
common application vulnerabilities,
however human weaknesses are
the vulnerabilities that are in need of
urgent patching.
Poor security practices and under
investment in security training and
awareness will continue to be at the
root for almost all data breaches until
we prioritise the human element of
the cyber threat."
Richard Beck
Head of Cyber Security, QA
Cyber
Awareness
Cyber
Compliance
HMG Information
Assurance
Cyber
Security Operations
Cyber
Secure Developer
Cyber
Incident Response
Digital
Forensics
Cyber
Intelligence
At QA, we are passionate about security training.
Recognising the importance of educating security
professionals and business users, we have developed
the most comprehensive Cyber Security training
portfolio, helping organisations to detect, deter and
defend against cyber threats, in a supportive,
hands–on learning environment.
Delivering public, private and bespoke training courses
to meet the business needs of individuals, employers
and enterprise. Our unique ‘cyber-lab’ provides an
immersive environment for security professionals to
accelerate their skills with hands-on platforms led by
experts in their field.
With over 50 public courses, we offer cyber
certifications, cyber assurance and cyber defence
training for the whole organisation from end users to
the board with specialist security training at the core.
What we
offer
O U R C Y B E R D O M A I N S
Cyber Certifications
Cyber Awareness
HMG Information Assurance
Cyber Compliance
Cyber Security Operations
Cyber Incident Response
Cyber Secure Developer
Cyber Intelligence
Digital Forensics
Cyber Offensive Defence
en
du
ser
service
d
esk
service
m
an
ag
em
en
tit
o
peratio
n
s
it
tech
n
ic
al
bu
sin
ess
an
alysis
pro
jec
t
m
an
ag
ers
so
ftw
are
d
evelo
pers
secu
rity
team
in
cid
en
t
respo
n
se
riskm
an
ag
ers
h
u
m
an
reso
u
rces
leg
al
an
d
co
m
plian
ce
in
tern
al
au
d
it
m
arketin
g
/
co
m
m
u
n
ic
atio
n
s
n
o
n
–tech
n
ic
al
m
an
ag
ers
sen
io
r
m
an
ag
ers
execu
tive
bo
ard
course areas
Current courses (March 2016).
visit
qa.com/cyber for the most up to date course list.
T H E E N D T O E N D C Y B E R S E C U R I T Y S O L U T I O N
HMG Information Assurance
If your organisation is part of the public sector or the HMG supply chain, then
you will be required to demonstrate a full understanding of security relating to
information, security threats and appropriate mitigation methods.
Our HMG information assurance (IA) training is for security professionals
(in both public and private sectors) that need to develop thorough and
practical knowledge of IA. Our courses are designed to provide processes,
methodologies and disciplines that enable risk identification, analysis and
mitigation at the highest possible standard. Reinforced using real world case
studies and constantly updated to stay ahead of the rapidly changing landscape,
you can rest assured that our HMG IA courses will deliver the skills you need.
Cyber Compliance
It doesn’t matter how robust your technology is, every business faces an element
of risk. A holistic approach to security risk ensures employees are well educated
against cyber threats and security risks and helps to illustrate the responsibility
for keeping an organisations data safe is business wide, not just IT.
Our cyber compliance training ensures that employees are clear on their
regulatory responsibilities and the current best practice and standards. Through
in-depth practitioner training we focus on enhancing and embedding knowledge
rather than just teaching ‘tick-box’ compliance like many other training
organisations.
So reduce the risk in your business and utilise the best practice security training
from QA.
Cyber Certifications
When assessing a security professional's capability and skills, prospective
employers look at their certifications as a measure of achievement and
commitment to self development.
We provide best-of-breed security certification training, leading to internationally-
recognised qualifications, from entry level CompTIA Security+ to our Certified
Information Systems Security Professional (CISSP) course.
Cyber Awareness
It’s a simple fact that the majority of security compromises in organisations
involve human error. So in today’s ‘always on’ workforce the need to inform,
influence and educate employees has never been greater. Through education
comes a reduction of risk, and that is where QA Cyber Awareness courses really
deliver.
Delivered by our highly skilled instructors, we understand the realities around
cyber security and how to embed them into people and organisations. Including
areas such as ‘the modern threat landscape’, ‘insider risks’, ‘supply chain risks’
and ‘Executive Mitigations’.
O U R C Y B E R D O M A I N S E X P L A I N E D
Cyber Security Operations
Our Security Operations Curriculum delivers security operations training
through hands-on technical experience needed to respond to security incidents
and vulnerabilities. These courses are designed to enable individuals and
organisations to improve operational security, leverage the security operations
centre (SOC) analyst and understand the specialist training techniques used in
vulnerability management and security information event management (SIEM)
platforms.
Including specific courses on malware, reverse engineering, vulnerability
management and encryption and delivered in a technology agnostic approach
means we are able to offer training that is independent to vendor or cloud
technology.
Cyber Intelligence
Open Source Cyber Intelligence (OSCI) is fast becoming an essential toolset
of the cyber security analyst and digital investigator. With the modern cyber
criminals’ ever increasing ability to utilise peoples ‘digital footprints’ to
compromise organisations, it is a vital component in cyber defence to fully
understand the extent that our cyber-enabled world leaks data which could put
you and your organisation at risk. This is the foundation of the cyber intelligence
tradecraft.
Our cyber intelligence courses provide the skills to become more effective by
utilising a highly practical approach to learning, allowing delegates the time to
explore and understand core subject areas deeply, including the Dark Web,
Cyber Crime in Business, protecting your online footprint, along-side the core
courses of Open Source Cyber Intelligence.
Cyber Incident Response
QA’s Cyber Crisis Management and Incident Response training provides the vital
skills for your business leaders and specialists to lead and manage the unique
challenges brought about by a ‘cyber crisis’.
By providing both public and closed cyber crisis management training we can
provide the skills, tools and techniques to help manage and mitigate risks across
the whole organisation. In addition, our unique ‘Cyber Labs’ provide a safe place
to simulate and role play resolution scenarios, meaning that we deliver both
theory and practice ensuring maximum learning.
Cyber Secure Developer
The majority of successful cyber-attacks depend on exploiting a few well-
known common vulnerabilities in code and systems.
With QA’s Cyber Secure Developer curriculum you can learn how to
‘design in’, rather than ‘bolt on’ security to your system development
lifecycle. Suitable for software developers, business analysts and other
professionals working across the technical development lifecycle these
courses help organisations develop with security top of mind.
Digital Forensics
It is a fundamental fact that today, nearly all businesses rely on web technologies
to operate, and with that dependency comes the reality of an increased cyber
threat. To combat that threat and/or to investigate incidents that have occurred in
order to prevent future threats, the discipline of Digital Forensics is key.
At QA we have developed a ‘digital forensics track’ that takes delegates from
forensic fundamentals, mobile forensics through to advanced topics. This
learning track enables individuals and organisations to utilise investigative tools,
gather ‘digital evidence’ and report in a way that ensures clarity and actionable
insight.
Delivered on Windows and Linux labs, covering methods to identify, preserve,
analyse and report on digital artefacts, mobile devices, e-discovery and
recovery, these courses offer the opportunity to put digital forensics into action.
Cyber Offensive Defence
Designed to deliver advanced skills in ethical hacking, our range of penetration
testing and hacking courses set a new standard in cyber security education.
Our training utilises a ‘hands on’ approach allowing you to experience the most
common hacking tools which we use to demonstrate the true vulnerabilities that
many technology vendors would rather you didn’t see.
In addition, for our advanced courses, we now include 30 days post course
access to our virtual ‘Hacking Labs’ allowing you to develop, practice and test
out your cyber skills in a dedicated environment. So if you need to develop
world class cyber defence skills and techniques in your organisation these
courses are designed for you.
Immersive, scenario
based learning.
This state-of-the art facility delivers practical
hands-on training, allowing organisations to
simulate and react to a real life cyber threat in
a secure physical environment and ultimately,
gain a better understanding of the entire
cyber threat landscape.
The Cyber Labs enable cross business teams
and IT security professionals to develop
and practice both technical and soft skills
applicable to their role through a variety of off
the shelf, tailored and bespoke experiences
including hackathons and ‘Capture the Flag’
style team experiences.
When attending the Cyber Labs immersive
scenario based training you will explore the
following areas:
CYBER CRISIS
MANAGEMENT
DIGITAL FORENSIC
INVEVESTIGATIONS
•	 Understand how to conduct digital
investigations relating to malicious
activity
•	 Learn how to accurately collect and
analyse evidence
•	 Gather social media intelligence on
‘Digital Treasure Hunts’
•	 Conduct investigations online and
across multiple devices
•	 Rehearse incident response
•	 Learn to lead and communicate in a
cyber crisis
•	 Simulate press and media liaison
exercises
•	 Practice effective inter-department
communications
•	 Rehearse industry specific
scenarios
SECURITY
OPERATIONS
•	 How do you know you haven’t
already been compromised? Learn
the skills to find out.
•	 Keep up to date with advanced
attack, detection and reporting
methods
•	 Develop technical solutions for
managing cyber risk
•	 Understand and practice effective
security incident triage
OFFENSIVE
DEFENCE
•	 Developing a defensive shield
•	 The art of ethical hacking – for
beginners to advanced
•	 Hands-on hacking tools
& techniques to identify
vulnerabilities
•	 Develop proactive defence skills
“Subject knowledge is essential for effective
instruction. Through my career I have been
enrolled on many courses.
This course [CISMP] has been
unquestionably the most valuable, due to
[the trainer’s] experience, passion for the
subject and communication skills. I will look
to undertake courses with him in the future.”
Providing the best for
our customers.
More than
courses
In addition to the most comprehensive security
training portfolio to bolster Cyber Professionals skills,
QA are also able to offer organisations world-class
Apprentices, Master Degrees and high-calibre fully-
trained QA Consultants in the Cyber Arena.
92% of organisations employing QA Apprenticeships
say that QA adds value to their business allowing them
to develop and retain talented professionals.
Building on our award-winning apprenticeship model
and through our academic partnerships we offer a
fully accredited UK postgraduate master’s degree
in Cyber and a Consulting Programme as an answer
to the increasing demand for qualified IT security
professionals.
A P P R E N T I C E S H I P S I N C Y B E R
A P P R E N T I C E S H I P S . Q A . C O M
of Apprentices gain a job
94%
M A S T E R D E G R E E S I N C Y B E R
M A S T E R S . Q A . C O M
Central London campus Internationally–recognised
postgraduate degree
apprentices placed into technology
businesses since 2009
8,000of emplyers that work with us say
we add value to their business
92%
QA Apprenticeships combine employment with
government funding, giving you a cost-effective way
to bring raw talent into your organisation allowing
you to develop and retain talented professionals,
whilst addressing your skills shortages.
Our unrivalled, flexible range of programmes mean we are able to
match the ideal programme and candidate to your requirements
even arranging to place your existing staff aged 16-24 years
old, into an apprenticeship programme within your organisation.
It builds on our award-winning apprenticeship model, which
currently employs over 1700 apprentices across 700 clients.
Sponsoring an employee through a master’s
programme can provide your organisation with
differentiation and success. Developing your own
existing employees, will help train both talent along
with core organisational knowledge and experience.
For businesses it is no longer a question of if a cyber-attack will
occur but rather when, and as such, the demand for qualified
IT security professionals has risen exponentially. Northumbria
University’s part-time MSc in Cyber Security has been designed
to give you the skills to meet this increased demand including
how to handle security incidents, identify new and existing
threats and determine methods to minimise them.
month part–time
programme
24
We source the most talented recent graduates and
train them to be fully-qualified IT consultants, ready
to ‘hit the ground running’ enabling scalability and
stability for your delivery teams.
We operate a set of unique customer enablement programmes in
which we provide industry-leading capability to both public and
private sectors. We excel in recruiting, training and supplying our
own specialist consultants which is built on our award-winning
apprenticeship model, currently employing over 1700 apprentices
across 700 clients.
T A L E N T A N D R E S O U R C E S
Q A . C O M / C O N S U L T I N G
QA CONSULTING
Centre of Excellence enablement,
underpinned by our unique
Academy model.
KNOWLEDGE TRANSFER
Retain IP through our knowledge
transfer proposition.
HIGHLY SKILLED CONSULTANTS
Industry-standard certifications and
professional expertise.
Make sure you have
the skills to protect
your organisation.
speak to one of our
learning advisors
0345 074 7978
visit
QA.COM/CYBER
or drop in to one of our
national centres.
v1.6
QA.COM/CYBER
For a list of our courses, please visit

Mais conteúdo relacionado

Mais procurados

The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of CybersecurityBenoit Callebaut
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesSlideTeam
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsMark Arena
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskMighty Guides, Inc.
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesCyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesParsons Behle & Latimer
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to PracticeAlgoSec
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002pgpmikey
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologiesSalih Islam
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...Edureka!
 
iPaaS: A platform for Integration technology convergence
iPaaS: A platform for Integration technology convergenceiPaaS: A platform for Integration technology convergence
iPaaS: A platform for Integration technology convergenceRaveendra Babu Darsi
 

Mais procurados (20)

The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of Cybersecurity
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
Strategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity RiskStrategies for Managing OT Cybersecurity Risk
Strategies for Managing OT Cybersecurity Risk
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesCyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
 
iPaaS: A platform for Integration technology convergence
iPaaS: A platform for Integration technology convergenceiPaaS: A platform for Integration technology convergence
iPaaS: A platform for Integration technology convergence
 

Destaque

EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsITpreneurs
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT SecurityAjay Jassi
 
cloud-computing-brochure
cloud-computing-brochurecloud-computing-brochure
cloud-computing-brochureNick Serafimov
 
Cscu (non atc) v2 (usd)
Cscu (non atc) v2 (usd)Cscu (non atc) v2 (usd)
Cscu (non atc) v2 (usd)Tiger Virani
 
Network Security Monitoring - Theory and Practice
Network Security Monitoring - Theory and PracticeNetwork Security Monitoring - Theory and Practice
Network Security Monitoring - Theory and PracticeMichael Boman
 

Destaque (7)

EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and Certifications
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
cloud-computing-brochure
cloud-computing-brochurecloud-computing-brochure
cloud-computing-brochure
 
Cscu (non atc) v2 (usd)
Cscu (non atc) v2 (usd)Cscu (non atc) v2 (usd)
Cscu (non atc) v2 (usd)
 
Cscu power point
Cscu power pointCscu power point
Cscu power point
 
Network Security Monitoring - Theory and Practice
Network Security Monitoring - Theory and PracticeNetwork Security Monitoring - Theory and Practice
Network Security Monitoring - Theory and Practice
 
9780840024220 ppt ch10
9780840024220 ppt ch109780840024220 ppt ch10
9780840024220 ppt ch10
 

Semelhante a cyber-security-brochure

Cybergate International - Your Cyber Security Partner - Company Profile.pdf
Cybergate International - Your Cyber Security Partner - Company Profile.pdfCybergate International - Your Cyber Security Partner - Company Profile.pdf
Cybergate International - Your Cyber Security Partner - Company Profile.pdfFrancescoMifsud1
 
How to Become a Cyber Security Specialist.doc
How to Become a Cyber Security Specialist.docHow to Become a Cyber Security Specialist.doc
How to Become a Cyber Security Specialist.docEmmanuelDaniel41
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxSkillogic Solutions
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Skillogic Solutions
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Skillogic Solutions
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxSkillogic Solutions
 
Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Skillogic Solutions
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Skillogic Solutions
 
Cyber security course in Hyderabad January
Cyber security course in Hyderabad JanuaryCyber security course in Hyderabad January
Cyber security course in Hyderabad JanuarySkillogic Solutions
 
Cyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxCyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxSkillogic Solutions
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Skillogic Solutions
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Skillogic Solutions
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Skillogic Solutions
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Skillogic Solutions
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Skillogic Solutions
 
Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Skillogic Solutions
 
Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Skillogic Solutions
 
Introduce cyber seacurity course in kerala
Introduce cyber seacurity course in keralaIntroduce cyber seacurity course in kerala
Introduce cyber seacurity course in keralaachuamal415
 

Semelhante a cyber-security-brochure (20)

Cybergate International - Your Cyber Security Partner - Company Profile.pdf
Cybergate International - Your Cyber Security Partner - Company Profile.pdfCybergate International - Your Cyber Security Partner - Company Profile.pdf
Cybergate International - Your Cyber Security Partner - Company Profile.pdf
 
How to Become a Cyber Security Specialist.doc
How to Become a Cyber Security Specialist.docHow to Become a Cyber Security Specialist.doc
How to Become a Cyber Security Specialist.doc
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
 
Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024Cyber Security Course in Hyderabad January 2024
Cyber Security Course in Hyderabad January 2024
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
 
Cyber security course in Hyderabad January
Cyber security course in Hyderabad JanuaryCyber security course in Hyderabad January
Cyber security course in Hyderabad January
 
Cyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptxCyber Security Course in Hyderabad February 2024.pptx
Cyber Security Course in Hyderabad February 2024.pptx
 
Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024Cyber Security Course in Hyderabad February 2024
Cyber Security Course in Hyderabad February 2024
 
Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024
 
braincavesoft-com-cyber-security.pdf
braincavesoft-com-cyber-security.pdfbraincavesoft-com-cyber-security.pdf
braincavesoft-com-cyber-security.pdf
 
braincavesoft-com-cyber-security (1).pdf
braincavesoft-com-cyber-security (1).pdfbraincavesoft-com-cyber-security (1).pdf
braincavesoft-com-cyber-security (1).pdf
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
 
Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024
 
Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024
 
Introduce cyber seacurity course in kerala
Introduce cyber seacurity course in keralaIntroduce cyber seacurity course in kerala
Introduce cyber seacurity course in kerala
 

Mais de Nick Serafimov

Mais de Nick Serafimov (8)

qapd-learningsolutions-2012
qapd-learningsolutions-2012qapd-learningsolutions-2012
qapd-learningsolutions-2012
 
devops-brochure
devops-brochuredevops-brochure
devops-brochure
 
devops-brochure
devops-brochuredevops-brochure
devops-brochure
 
office-apps-brochure
office-apps-brochureoffice-apps-brochure
office-apps-brochure
 
business-systems-development-brochure
business-systems-development-brochurebusiness-systems-development-brochure
business-systems-development-brochure
 
app-and-web-brochure
app-and-web-brochureapp-and-web-brochure
app-and-web-brochure
 
ppm-brochure
ppm-brochureppm-brochure
ppm-brochure
 
QA Corporate Brochure 2016
QA Corporate Brochure 2016QA Corporate Brochure 2016
QA Corporate Brochure 2016
 

cyber-security-brochure

  • 2. Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need for all organisations to be able to detect, deter and defend against these attacks as part of their every-day business. With a large majority of breaches being the result of technological compromise as well as human error (social engineering, phishing, etc.), todays modern businesses need to ensure they have both the right technology solutions and cyber skills across their organisation. At QA we have developed the most comprehensive end-to-end cyber security training portfolio providing training for the whole of your organisation, from end user to executive board level courses as well as advanced programmes for your security professionals.
  • 3. Raise your Cyber Security defences. THE HIGHEST QUALITY TRAINING WHAT WE OFFER IMMERSIVE, SCENARIO BASED LEARNING PROVIDING THE BEST FOR OUR CUSTOMERS MORE THAN COURSES CYBER SECURITY TRAINING: THE QA WAY
  • 4. RICHARD BECK Head of Cyber Security NATHAN MITCHELL Cyber Security Technical Consultant MARK AMORY Cyber Security Team Lead Trainer MAX VETTER Cyber Security Technical Consultant WE HAVE 25 TRAINERS DEDICATED TO TEACHING CYBER SECURITY SKILLS FLEXIBLE LEARNING TRAINER EXPERTISE More accredited professionals with real-world experience than any other training provider. Authored Our unique QA Authored courses bridge the gap between theory and real-world expertise. At QA we offer learning in many ways, with classroom, e-learning, public, private and bespoke programmes ensuring our customers can learn anywhere, any time, any way. UNMISTAKEABLY QA BESPOKE PROGRAMMES Cyber security learning pathways developed to meet your organisations needs. The highest quality training.
  • 5. "We often hear about patching common application vulnerabilities, however human weaknesses are the vulnerabilities that are in need of urgent patching. Poor security practices and under investment in security training and awareness will continue to be at the root for almost all data breaches until we prioritise the human element of the cyber threat." Richard Beck Head of Cyber Security, QA
  • 6. Cyber Awareness Cyber Compliance HMG Information Assurance Cyber Security Operations Cyber Secure Developer Cyber Incident Response Digital Forensics Cyber Intelligence At QA, we are passionate about security training. Recognising the importance of educating security professionals and business users, we have developed the most comprehensive Cyber Security training portfolio, helping organisations to detect, deter and defend against cyber threats, in a supportive, hands–on learning environment. Delivering public, private and bespoke training courses to meet the business needs of individuals, employers and enterprise. Our unique ‘cyber-lab’ provides an immersive environment for security professionals to accelerate their skills with hands-on platforms led by experts in their field. With over 50 public courses, we offer cyber certifications, cyber assurance and cyber defence training for the whole organisation from end users to the board with specialist security training at the core. What we offer O U R C Y B E R D O M A I N S
  • 7. Cyber Certifications Cyber Awareness HMG Information Assurance Cyber Compliance Cyber Security Operations Cyber Incident Response Cyber Secure Developer Cyber Intelligence Digital Forensics Cyber Offensive Defence en du ser service d esk service m an ag em en tit o peratio n s it tech n ic al bu sin ess an alysis pro jec t m an ag ers so ftw are d evelo pers secu rity team in cid en t respo n se riskm an ag ers h u m an reso u rces leg al an d co m plian ce in tern al au d it m arketin g / co m m u n ic atio n s n o n –tech n ic al m an ag ers sen io r m an ag ers execu tive bo ard course areas Current courses (March 2016). visit qa.com/cyber for the most up to date course list. T H E E N D T O E N D C Y B E R S E C U R I T Y S O L U T I O N
  • 8. HMG Information Assurance If your organisation is part of the public sector or the HMG supply chain, then you will be required to demonstrate a full understanding of security relating to information, security threats and appropriate mitigation methods. Our HMG information assurance (IA) training is for security professionals (in both public and private sectors) that need to develop thorough and practical knowledge of IA. Our courses are designed to provide processes, methodologies and disciplines that enable risk identification, analysis and mitigation at the highest possible standard. Reinforced using real world case studies and constantly updated to stay ahead of the rapidly changing landscape, you can rest assured that our HMG IA courses will deliver the skills you need. Cyber Compliance It doesn’t matter how robust your technology is, every business faces an element of risk. A holistic approach to security risk ensures employees are well educated against cyber threats and security risks and helps to illustrate the responsibility for keeping an organisations data safe is business wide, not just IT. Our cyber compliance training ensures that employees are clear on their regulatory responsibilities and the current best practice and standards. Through in-depth practitioner training we focus on enhancing and embedding knowledge rather than just teaching ‘tick-box’ compliance like many other training organisations. So reduce the risk in your business and utilise the best practice security training from QA. Cyber Certifications When assessing a security professional's capability and skills, prospective employers look at their certifications as a measure of achievement and commitment to self development. We provide best-of-breed security certification training, leading to internationally- recognised qualifications, from entry level CompTIA Security+ to our Certified Information Systems Security Professional (CISSP) course. Cyber Awareness It’s a simple fact that the majority of security compromises in organisations involve human error. So in today’s ‘always on’ workforce the need to inform, influence and educate employees has never been greater. Through education comes a reduction of risk, and that is where QA Cyber Awareness courses really deliver. Delivered by our highly skilled instructors, we understand the realities around cyber security and how to embed them into people and organisations. Including areas such as ‘the modern threat landscape’, ‘insider risks’, ‘supply chain risks’ and ‘Executive Mitigations’. O U R C Y B E R D O M A I N S E X P L A I N E D
  • 9. Cyber Security Operations Our Security Operations Curriculum delivers security operations training through hands-on technical experience needed to respond to security incidents and vulnerabilities. These courses are designed to enable individuals and organisations to improve operational security, leverage the security operations centre (SOC) analyst and understand the specialist training techniques used in vulnerability management and security information event management (SIEM) platforms. Including specific courses on malware, reverse engineering, vulnerability management and encryption and delivered in a technology agnostic approach means we are able to offer training that is independent to vendor or cloud technology. Cyber Intelligence Open Source Cyber Intelligence (OSCI) is fast becoming an essential toolset of the cyber security analyst and digital investigator. With the modern cyber criminals’ ever increasing ability to utilise peoples ‘digital footprints’ to compromise organisations, it is a vital component in cyber defence to fully understand the extent that our cyber-enabled world leaks data which could put you and your organisation at risk. This is the foundation of the cyber intelligence tradecraft. Our cyber intelligence courses provide the skills to become more effective by utilising a highly practical approach to learning, allowing delegates the time to explore and understand core subject areas deeply, including the Dark Web, Cyber Crime in Business, protecting your online footprint, along-side the core courses of Open Source Cyber Intelligence. Cyber Incident Response QA’s Cyber Crisis Management and Incident Response training provides the vital skills for your business leaders and specialists to lead and manage the unique challenges brought about by a ‘cyber crisis’. By providing both public and closed cyber crisis management training we can provide the skills, tools and techniques to help manage and mitigate risks across the whole organisation. In addition, our unique ‘Cyber Labs’ provide a safe place to simulate and role play resolution scenarios, meaning that we deliver both theory and practice ensuring maximum learning. Cyber Secure Developer The majority of successful cyber-attacks depend on exploiting a few well- known common vulnerabilities in code and systems. With QA’s Cyber Secure Developer curriculum you can learn how to ‘design in’, rather than ‘bolt on’ security to your system development lifecycle. Suitable for software developers, business analysts and other professionals working across the technical development lifecycle these courses help organisations develop with security top of mind.
  • 10. Digital Forensics It is a fundamental fact that today, nearly all businesses rely on web technologies to operate, and with that dependency comes the reality of an increased cyber threat. To combat that threat and/or to investigate incidents that have occurred in order to prevent future threats, the discipline of Digital Forensics is key. At QA we have developed a ‘digital forensics track’ that takes delegates from forensic fundamentals, mobile forensics through to advanced topics. This learning track enables individuals and organisations to utilise investigative tools, gather ‘digital evidence’ and report in a way that ensures clarity and actionable insight. Delivered on Windows and Linux labs, covering methods to identify, preserve, analyse and report on digital artefacts, mobile devices, e-discovery and recovery, these courses offer the opportunity to put digital forensics into action. Cyber Offensive Defence Designed to deliver advanced skills in ethical hacking, our range of penetration testing and hacking courses set a new standard in cyber security education. Our training utilises a ‘hands on’ approach allowing you to experience the most common hacking tools which we use to demonstrate the true vulnerabilities that many technology vendors would rather you didn’t see. In addition, for our advanced courses, we now include 30 days post course access to our virtual ‘Hacking Labs’ allowing you to develop, practice and test out your cyber skills in a dedicated environment. So if you need to develop world class cyber defence skills and techniques in your organisation these courses are designed for you.
  • 11. Immersive, scenario based learning. This state-of-the art facility delivers practical hands-on training, allowing organisations to simulate and react to a real life cyber threat in a secure physical environment and ultimately, gain a better understanding of the entire cyber threat landscape. The Cyber Labs enable cross business teams and IT security professionals to develop and practice both technical and soft skills applicable to their role through a variety of off the shelf, tailored and bespoke experiences including hackathons and ‘Capture the Flag’ style team experiences. When attending the Cyber Labs immersive scenario based training you will explore the following areas: CYBER CRISIS MANAGEMENT DIGITAL FORENSIC INVEVESTIGATIONS • Understand how to conduct digital investigations relating to malicious activity • Learn how to accurately collect and analyse evidence • Gather social media intelligence on ‘Digital Treasure Hunts’ • Conduct investigations online and across multiple devices • Rehearse incident response • Learn to lead and communicate in a cyber crisis • Simulate press and media liaison exercises • Practice effective inter-department communications • Rehearse industry specific scenarios SECURITY OPERATIONS • How do you know you haven’t already been compromised? Learn the skills to find out. • Keep up to date with advanced attack, detection and reporting methods • Develop technical solutions for managing cyber risk • Understand and practice effective security incident triage OFFENSIVE DEFENCE • Developing a defensive shield • The art of ethical hacking – for beginners to advanced • Hands-on hacking tools & techniques to identify vulnerabilities • Develop proactive defence skills
  • 12. “Subject knowledge is essential for effective instruction. Through my career I have been enrolled on many courses. This course [CISMP] has been unquestionably the most valuable, due to [the trainer’s] experience, passion for the subject and communication skills. I will look to undertake courses with him in the future.” Providing the best for our customers.
  • 13. More than courses In addition to the most comprehensive security training portfolio to bolster Cyber Professionals skills, QA are also able to offer organisations world-class Apprentices, Master Degrees and high-calibre fully- trained QA Consultants in the Cyber Arena. 92% of organisations employing QA Apprenticeships say that QA adds value to their business allowing them to develop and retain talented professionals. Building on our award-winning apprenticeship model and through our academic partnerships we offer a fully accredited UK postgraduate master’s degree in Cyber and a Consulting Programme as an answer to the increasing demand for qualified IT security professionals.
  • 14. A P P R E N T I C E S H I P S I N C Y B E R A P P R E N T I C E S H I P S . Q A . C O M of Apprentices gain a job 94% M A S T E R D E G R E E S I N C Y B E R M A S T E R S . Q A . C O M Central London campus Internationally–recognised postgraduate degree apprentices placed into technology businesses since 2009 8,000of emplyers that work with us say we add value to their business 92% QA Apprenticeships combine employment with government funding, giving you a cost-effective way to bring raw talent into your organisation allowing you to develop and retain talented professionals, whilst addressing your skills shortages. Our unrivalled, flexible range of programmes mean we are able to match the ideal programme and candidate to your requirements even arranging to place your existing staff aged 16-24 years old, into an apprenticeship programme within your organisation. It builds on our award-winning apprenticeship model, which currently employs over 1700 apprentices across 700 clients. Sponsoring an employee through a master’s programme can provide your organisation with differentiation and success. Developing your own existing employees, will help train both talent along with core organisational knowledge and experience. For businesses it is no longer a question of if a cyber-attack will occur but rather when, and as such, the demand for qualified IT security professionals has risen exponentially. Northumbria University’s part-time MSc in Cyber Security has been designed to give you the skills to meet this increased demand including how to handle security incidents, identify new and existing threats and determine methods to minimise them. month part–time programme 24
  • 15. We source the most talented recent graduates and train them to be fully-qualified IT consultants, ready to ‘hit the ground running’ enabling scalability and stability for your delivery teams. We operate a set of unique customer enablement programmes in which we provide industry-leading capability to both public and private sectors. We excel in recruiting, training and supplying our own specialist consultants which is built on our award-winning apprenticeship model, currently employing over 1700 apprentices across 700 clients. T A L E N T A N D R E S O U R C E S Q A . C O M / C O N S U L T I N G QA CONSULTING Centre of Excellence enablement, underpinned by our unique Academy model. KNOWLEDGE TRANSFER Retain IP through our knowledge transfer proposition. HIGHLY SKILLED CONSULTANTS Industry-standard certifications and professional expertise.
  • 16. Make sure you have the skills to protect your organisation. speak to one of our learning advisors 0345 074 7978 visit QA.COM/CYBER or drop in to one of our national centres. v1.6
  • 17. QA.COM/CYBER For a list of our courses, please visit