CYBER SECURITY TRAINING

Similar documents
Cyber Security School

CYBER SECURITY SKILLS AND TALENT SOLUTIONS

Cyber Analyst Academy. Closing the Cyber Security Skills Gap.

Security Awareness Training Courses

BHConsulting. Your trusted cybersecurity partner

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

BHConsulting. Your trusted cybersecurity partner

Incident Response Services

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

Sage Data Security Services Directory

The fast track to top skills and top jobs in cyber. Guaranteed.

CYBER RESILIENCE & INCIDENT RESPONSE

BRING EXPERT TRAINING TO YOUR WORKPLACE.

to Enhance Your Cyber Security Needs

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

locuz.com SOC Services

Certified Cyber Security Specialist

The UK s National Cyber Security Strategy

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

School of Engineering & Built Environment

Cyber Security Technologies

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

RISK MANAGEMENT Education and Certification

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Risk Advisory Academy Training Brochure

How do you decide what s best for you?

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

IT Systems and Networking Degree Apprenticeship

EU General Data Protection Regulation (GDPR) Achieving compliance

COMPUTER FORENSICS (CFRS)

Security by Default: Enabling Transformation Through Cyber Resilience

Suma Soft s IT Risk & Security Management Solutions for Global Enterprises

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

BCS Level 4 Certificate in Cyber Security Introduction Syllabus QAN 603/0830/8

Cyber Security. Building and assuring defence in depth

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Governance, Organisation, Law, Regulation and Standards Syllabus QAN 603/0855/2

Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL

Continuous protection to reduce risk and maintain production availability

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Expand Your Cyber Expertise. Secure Your Future.

Industrial control systems

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

A United States Cyber Academy Program

Ingram Micro Cyber Security Portfolio

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning.

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Building the Cybersecurity Workforce. November 2017

TRULY INDEPENDENT CYBER SECURITY SPECIALISTS. Cyber Major

DXC Security Training

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Implementation Strategy for Cybersecurity Workshop ITU 2016

TRAINING CURRICULUM 2017 Q2

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

Securing Your Digital Transformation

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Sign up for the Barco University experience Best in class, first in business

E-guide Getting your CISSP Certification

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are:

Cyber Security Strategy

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

falanx Cyber ISO 27001: How and why your organisation should get certified

DIGITAL APPRENTICESHIPS

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

IT Information Security Manager Job Description

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

SANS/REN-ISAC Partnership

Security-as-a-Service: The Future of Security Management

Best Practices in Securing a Multicloud World

Bachelor of Information Technology

INTELLIGENCE DRIVEN GRC FOR SECURITY

Information Systems and Tech (IST)

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

TRUE SECURITY-AS-A-SERVICE

A new approach to Cyber Security

SECURITY SERVICES SECURITY

Training on CREST Practitioner Security Analyst (CPSA)

CompTIA Cybersecurity Analyst+

KEDAYAM A KAAPAGAM MANAGED SECURITY SERVICES. Kaapagam Technologies Sdn. Bhd. ( T)

Bachelor of Information Technology (Network Security)

Cyber Risks in the Boardroom Conference

Transcription:

CYBER

Security skills for the digital age. Cyber Crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat. In response to this growing threat, QA have developed the most comprehensive, end-to-end, Cyber Security training portfolio available. Our training caters for all roles within an organisation, from general employees up to senior management and including highly skilled Cyber specialists. So whether you are an independent security professional or a global organisation, our Cyber Security training domains offer the most effective way to focus on the skills you need. QA.COM/CYBER

Personal learning, whatever the scale At QA we never forget that training isn t an end in itself, it's a means to achieve better performance. That is why, no matter what the scale, we design every course to bring lasting benefits to the individual and back to their workplace. Through the UK s most comprehensive, end-to-end, Cyber Security training portfolio, coupled with our unique relationships with the world-leading Cyber Security bodies, QA offer individuals and organisations the most effective way to gain the right skills in Cyber Security. SMEs NON-PROFIT ORGANISATIONS ENTERPRISE PROGRAMMES PUBLIC SECTOR SECURITY PROFESSIONALS INDIVIDUALS

What we offer OUR CYBER DOMAINS The most comprehensive, end-to-end Cyber Security training portfolio From public courses to private events, covering Cyber certifications, assurance and defence skills, our 10 Cyber Domains cover Cyber Security training for: Staff of all levels Government Information Security Practitioners Project Managers Software Developers and Test Teams Law Enforcement and Government Network and Infrastructure Specialists Specialist Cyber Security Professionals. Capture the Flag events hosted in our Cyber Labs

End User Serv ice Desk Serv ice management It operations It technical Business analysis Project managers Sof t wa re developers Security team Incident response Risk managers Human resources Legal and compliance Internal audit Marketing/ communications Non technical managers Senior managers Executive board Cyber Certifications Cyber Awareness HMG Information Assurance Cyber Compliance Cyber Security Operations Cyber Incident Response Cyber Secure Developer Cyber Intelligence Digital Forensics Cyber Offensive Defence Courses current at time of publishing (Sep '17). For our latest course lists please visit QA.COM/CYBER

OUR CYBER PORTFOLIO EXPLAINED With over 50 public courses, we offer Cyber training for the whole organisation. In a supportive, hands-on learning environment, our public, private and bespoke training courses meet the needs of individuals, employers and enterprise. Cyber Certifications Industry-recognised security certifications that demonstrate a security professional' s capability and skill. These certifications also represent a measure of personal achievement for security professionals and prove their commitment to self development, making them highly-prized by prospective employers. Our international qualifications range from the entry-level CompTIA Security+ to the comprehensive Certified Information Systems Security Professional (CISSP). HMG Information Assurance Courses for security professionals, both in the public and private sectors, that need to develop thorough and practical knowledge of HMG Information Assurance. If your organisation is part of the public sector, or the HMG supply chain, you will be required to demonstrate a full understanding of security relating to information, security threats and appropriate mitigation methods. Our courses are designed to provide processes, methodologies and disciplines that enable risk identification, analysis and mitigation at the highest possible standard. They are reinforced using real-world case studies and constantly updated to stay ahead of the rapidly changing landscape. Cyber Awareness Courses that raise awareness of the most common Cyber threats such as Phishing, Malware, protecting your online footprint, the Internet of Things, supply chain and more. These training courses are aimed at staff of all levels and designed to educate them of the various Cyber threats faced on a day-to-day basis. Awareness is the first key step towards reducing risk and protecting an organisation from Cyber breaches. Our offering includes a newly-developed Cyber Essentials for End Users package, which combines Ethical Phishing Assessments with Security Awareness E-learning to measure the Cyber awareness of all staff within an organisation. Cyber Compliance Courses for those required to maintain regulatory security standards not just IT - within an organisation. The responsibility for keeping an organisation s data safe is business wide, so it is crucial to ensure that employees are clear on their regulatory responsibilities and the current best practice and standards. Through in-depth practitioner training on topics such as privacy and fraud to the GDPR, ISO27001 and PCI-DSS standards, we focus on enhancing and embedding knowledge rather than just teaching tick-box compliance like many other training organisations.

Cyber Security Operations Courses for those working in a security management and operational role. These courses are designed to enable organisations to improve operational security, leverage the Security Operations Centre (SOC) analyst and understand the specialist training techniques used in vulnerability management and security information event management (SIEM) platforms. Our specific courses on Malware, Reverse Engineering, Vulnerability Management and Encryption are delivered in a technology agnostic approach, making them applicable to any vendor or Cloud technology. Cyber Secure Developer Courses for Security Project Managers, Software Developers, Business Analysts and Test Teams. The majority of successful Cyber attacks depend on exploiting a few well-known common vulnerabilities in code and systems. QA s Cyber Secure Developer curriculum teaches how to design in, rather than bolt on, security to your system development life-cycle. Cyber Incident Response Courses for those responsible for Crisis Management, Communications and CERT teams. These training courses provide the skills, tools and techniques to manage the unique challenges brought about by a Cyber crisis. In addition, our unique Cyber Labs provide a safe place to simulate and role play resolution scenarios, meaning that we deliver both theory and practice, ensuring maximum learning. Cyber Intelligence Courses for security professionals such as Cyber Security Analysts, IT Risk Management, Internal Audit, Law Enforcement (Digital Investigator) and Government. Modern Cyber criminals are increasingly able to utilise digital footprints to compromise security, so it is vital to fully understand the risk that data leaks could put individuals and organisations at. Our courses provide the skills and time to explore core subject areas deeply, including the Dark Web, Cyber Crime in Business, Protecting your Online Footprint, and Open Source Cyber Intelligence (OSCI).

Digital Forensics Courses for Security professionals, IT Risk Management, Internal Audit, Law Enforcement and Government. Nowadays, most businesses now depend on web technologies to operate and with that dependency comes the reality of an increased Cyber threat. To combat that threat and/or to investigate incidents that have occurred in order to prevent future threats, the discipline of Digital Forensics is key. Our Digital Forensics Track takes security professionals through forensic fundamentals, mobile forensics and advanced topics. It enables individuals and organisations to utilise investigative tools, gather digital evidence and report in a way that ensures clarity and actionable insight. These courses offer the opportunity to put digital forensics into action, in Windows and Linux labs. Capture The Flag Events Interactive challenges for 'Cyber Defenders', from foundation to advanced. Our state-of-the-art Cyber Labs enable companies to simulate real-life Cyber attacks on their infrastructure, helping them to prevent and combat breaches without risking their own network. Participants in the events have to navigate through systems, seek vulnerabilities and then exploit them in different ways in order to capture the flag. DON'T JUST TAKE OUR WORD FOR IT... Cyber Offensive Defence Courses for those responsible for defending IT networks, applications and infrastructure designed to support the novice and accelerate the most advanced with genuine skills in Cyber Offensive Defence trade-craft. Our range of penetration testing and ethical hacking courses utilise a hands-on approach, teaching the skills required to use the most common hacking tools. We use these tools to demonstrate the real vulnerabilities that many technology vendors would rather you didn t see. By using simulated attack scenarios, security professionals can develop, practice and test out Cyber defence skills in our state-of-the-art Cyber Labs. Subject knowledge is essential for effective instruction. Through my career I have been enrolled on many courses. This course [CISMP] has been unquestionably the most valuable, due to [the trainer s] experience, passion for the subject and communication skills. I will look to undertake courses with him in the future.

QA s Cyber Labs are state-of-the art facilities that provide an ideal opportunity for practical hands-on training. Fully immersive learning in our stateof-the-art Cyber Labs The Cyber Labs enable IT security teams to develop and practice a variety of Cyber Defender Capture the Flag (CTF) events. The labs allow organisations to simulate and react to real life Cyber threats in a safe environment. DIGITAL FORENSIC INVESTIGATIONS Understand how to conduct digital investigations relating to malicious activity Learn how to accurately collect and analyse evidence Gather Social Media intelligence on Digital Treasure Hunts Conduct investigations online and across multiple devices. PROACTIVE SECURITY CYBER CRISIS MANAGEMENT Rehearse incident response techniques Learn to lead and communicate in a Cyber crisis Simulate press and media liaison exercises Practice effective inter-department communications Rehearse industry specific scenarios. OFFENSIVE DEFENCE Our CTF events help harness the talent within teams enabling them to solve the challenges before they have to do it for real. Immerse yourself in a full 'hands-on' simulated attack Secure development challenges for application developers Learn to 'detect, deter and defend' Cyber attacks with hands-on labs Understand and practice effective security incident triage. Learn how to develop a defensive shield Cyber Defender skills for your industry - from beginner to advanced Hands-on Cyber trade craft tools & techniques to identify vulnerabilities Develop proactive Cyber defence skills.

Learn online - The Cyber Security Academy ONLINE ACADEMIES With distributed workforces and training budgets always under pressure, QA Online Academies provide a perfect learning solution for modern day organisations. Whether the need is for end-to-end Cyber Security Awareness, Compliance, Security Operations, Digital Forensics or Security Development, QA's Online Cyber Security Academy is a fast and specific way to learn through video - based learning solutions. Featuring QA instructors and leveraging our QA classroom course materials, coupled with full reporting for Managers, our video - based learning provides a cost effective, proven method of learning. The QA Cyber Security Online Academy courses include: ISO27001 2013 Introduction Cyber Security Introduction Secure by Design Protecting Your Online Footprint Data Protection Manager Operational Cloud Security Introduction to Digital Forensics. QA.COM/OA Other Online Academies include, Project Management, Business Systems, App and Web Development, ITIL and BSD.

Experts in Cyber Security training TRAINER EXPERTISE More accredited professionals with real-world experience than any other training provider. Authored UNMISTAKEABLY QA Our Cyber Security experts develop and write many of our courses, bridging the gap between theory and real-life expertise. THE HIGHEST QUALIT Y INSTRUCTORS, THE HIGHEST STANDARD IN TRAINING. RICHARD BECK Head of Cyber Security MAX VETTER Cyber Security Technical Consultant THE QA CYBER LABS Unique Cyber Labs facility providing immersive learning and hands-on practice to perfect defence. BESPOKE PROGRAMMES Tailored Cyber Security learning pathways developed to transform your security capabilities. FLEXIBLE At QA we offer learning in many ways, with classroom, e-learning, public, private and bespoke programmes ensuring our customers can learn anywhere, any time, any way. NATHAN MITCHELL Cyber Security Technical Consultant MARK AMORY Cyber Security Team Lead Trainer OVER 25 TRAINERS DEDICATED TO TEACHING CYBER SECURITY SKILLS

Skills and talent solutions for the digital age APPRENTICESHIPS We provide high quality Career-changing IT, Tech and Business Apprenticeships that develop the skills you need in your business. In addition to our training and development in Cyber Security, QA provides organisations with the ability to develop and deploy talent through our Higher Education, Apprenticeships and Consulting offerings. These Divisions enable organisations to rapidly deploy specific, highly skilled resources (through our Consulting division) and future proof their talent needs (through our Apprenticeships and Higher Education divisions). For full details of these services please visit the following websites or call us on 0345 074 7978. CONSULTING Together with our partners, QA Consulting design, develop and deliver business and technology services, delivering a blueprint that will future proof our customer s solutions. QA.COM/APPRENTICESHIPS QA.COM/CONSULTING QAHIGHEREDUCATION.COM HIGHER EDUCATION At QA Higher Education, we work closely with our partners to deliver industry-focused courses for students to develop key employability skills, resulting in accomplished graduates who are motivated and highly employable.

Learn anywhere, any time, any way ONLINE Modern organisations need modern ways to learn, combining our UK-wide training centres with the latest methods in online learning, means we can offer you more convenient, more accessible and more effective ways to learn. INSTRUCTOR LED CLASSROOM INTERACTIVE SELF PACED ONLINE E- FULL CERTIFICATION PATHS THROUGH OUR ONLINE ACADEMIES THE COMPLETE VIRTUAL CLASSROOM BLENDED SOLUTIONS IN OUR 20+ UK WIDE TRAINING CENTRES INSTRUCTOR LED CLASSROOM TRAINING ON YOUR PREMISES CLASSROOM AND DIGITAL BLENDED SOLUTIONS PERFORMANCE BASED - DIGITAL MEETS FACILITATED CLASSROOMS MEETS SOCIAL JOIN CLASSROOMS TRAINING REMOTELY VIA ATTEND FROM ANYWHERE

To discuss your Cyber Security training needs speak to one of our Learning Advisors. 0345 074 7978 visit QA.COM/CYBER or drop in to one of our national centres.

To talk to us about your Cyber Security training needs, please call 0345 074 7978 For a list of our latest courses please visit QA.COM/CYBER Search #SkillsfortheDigitalAge 0.4 Published December 2017