8 MINORIES , 3RD FLOOR, LONDON, EC3N 1BJ, UNITED KINGDOM
Mon-Sat, 9:00AM - 5:00PM. Sunday CLOSED

Awareness of threats is key to preventing cyber attacks





Build Your Career


Looking to start a career in cybersecurity? Or perhaps you want to develop and broaden your skillset with cybersecurity? Our training syllabus breaks cybersecurity down into smaller and easier streams to understand.

We understand re-training can be demanding and cumbersome. That’s why we never seek to teach a skill with diverse role as a crash course. Our courses evolve as market trend evolves ensuring you are equipped with relevant skills to remain marketable

We offer training to individuals who are looking to start a career in cybersecurity or broaden their skillset within the field.

Have a look at some of our training packages below to learn more. If you don’t find a course that suits you, here are the stages that determinines the appropriate cybersecurity training based on your current understanding, it is crucial to align your skills with the corresponding level of expertise.

Foundational

If you are new to Cybersecurity, Cybersecurity Fundamentals is ideal for building a solid foundation. This covers essential concepts and principles that lay the groundwork for more advanced topics.

Intermediate

For those with a foundational knowledge, Cyber Risk Management and Information Assurance courses delves into assessing and mitigating risks, ensuring a comprehensive understanding of cybersecurity within an organizational context.

Specialist

If you possess intermediate to advanced knowledge, encompassing Vulnerability Management, SOC/Security Engineering, and Cloud Security & Architecture, caters to professionals seeking specialized expertise in handling complex security issues, making it the suitable choice for those looking to deepen their skills and tackle advanced challenges.

Foundational

Cybersecurity Fundamentals

What you will learn?

Introduction to Cybersecurity.
Cybersecurity Pillars.
Cybersecurity Functions.
Roles in Cyber security.
Typical Cybersecurity Programmes.

Benefits

3 months access to training material
Post training Support

Terms and Condition

Apply Now

Intermediate

Information Assurance

What you will learn?

Cyber security & Compliance Frameworks.
Security requirements and Traceability.
Policies, Standards and Guidelines.
Controls Testing.
Controls Mapping.
Vendor Assessment.
Pentest Scoping.

Benefits

One to One sessions
CV Review
3 months access to training material
Labs or Scenario based questions

Terms and Condition

Apply Now

Cyber Risk Management

What you will learn?

What is Vulnerability, Threat and Risk.
Risk identification.
Risk Analysis & Assessment.
Risk Appetite Threat Actor.
Risk Vector and Profiling.
Risk Tree Risk statement.
Risk Scenario.

Benefits

One to One sessions
CV Review
3 months access to training material
Labs or Scenario based questions

Terms and Condition

Apply Now

Specialist

SOC/ Security Engineering

What you will learn?

What logs are
Log format and Log Collection.
Email Security and Web Security.
Endpoint Security and Network Security.
Incidence Investigation.
Response and Reporting.
Practical Sessions.

Benefits

One to One sessions
CV Review
3 months access to training material
Labs or Scenario based questions

Terms and Condition

Apply Now

Cloud Security & Architecture

What you will learn?

AWS Security controls.
Azure Security controls.
Basic 7 Controls.
Pipeline Security & Automation
Secure Development Lifecycle.

Benefits

One to One sessions
CV Review
3 months access to training material
Labs or Scenario based questions

Terms and Condition

Apply Now

Vulnerability Management

What you will learn?

Vulnerability Scanning and Scoring
Vulnerability Analysis
Vulnerability Assessment techniques
Vulnerability Reporting
Compliance requirements
Threat Intelligence
Patch Management

Benefits

One to One sessions
CV Review
3 months access to training material
Labs or Scenario based questions

Terms and Condition

Apply Now

"Quotes"


Member

"No tehcnology that is connected to the internet is unhackable."

Abhijit Naskar

Neuroscientist, Author & the Poet with most sonnets in history (700 plus)

Member

"If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked."

Richard Clarke

Assistant Secretary of State for Political-Military Affairs

Member

"Data is the pollution problem of the information age, and protecting privacy is the environmental challenge."

Bruce Schneier

American cryptographer, computer security professional, privacy specialist, and writer


Partners


partnerco
tvc
arcade
bearbrand
fast brothers
harculis beards
partnerco
tvc
bearbrand
harculis beards
tvc
partnerco
tvc
bearbrand
harculis beards
partnerco
tvc
bearbrand