8 MINORIES , 3RD FLOOR, LONDON, EC3N 1BJ, UNITED KINGDOM
Mon-Sat, 9:00AM - 5:00PM. Sunday CLOSED

Awareness of threats is key to preventing cyber attacks





"Quotes"


Member

"No tehcnology that is connected to the internet is unhackable."

Abhijit Naskar

Neuroscientist, Author & the Poet with most sonnets in history (700 plus)

Member

"If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked."

Richard Clarke

Assistant Secretary of State for Political-Military Affairs

Member

"Data is the pollution problem of the information age, and protecting privacy is the environmental challenge."

Bruce Schneier

American cryptographer, computer security professional, privacy specialist, and writer


Employee training


We offer training to business who are looking to up skill their IT personnel or cybersecurity team and tackle the risk which human error poses to security of its business.

Have a look at some of our training packages below to learn more. If you don’t find a course that suits your business, fill the form and a member of our training team will contact you to assess your needs.

SOC/ Security Engineering

What you will learn?

What logs are,Log format and Log Collection.
Forwarding and Management.
Email Security and Web Security.
Endpoint Security and Network Security.
Incidence Investigation.
Response and Reporting.

Apply Now

Cyber Risk Management

What you will learn?

What is Vulnerability, Threat and Risk.
Risk identification, Risk Analysis & Assessment.
Risk Appetite Threat Actor, Vector and Profile,
Risk Tree Risk statement.
Risk Scenario.

Apply Now

Cybersecurity Fundamentals

What you will learn?

Introduction to Cybersecurity.
Cybersecurity Pillars.
Cybersecurity Functions.
Roles in Cyber security.

Apply Now

Information Assurance

What you will learn?

Security Requirements traceability.
Control testing.
Vendor assessment.
Software assessment.

Apply Now

Could Security & Architecture

What you will learn?

AWS controls.
Azure Controls.
Basic 7 Controls.
Pipeline Security.

Apply Now

Cyber security Campaign


The most common causes of data leak in 2022 is bad password, social engineering attacks is system misconfigurations. This is often due to lack of understanding or security awareness by staff members. Social engineering attacks such as phishing if successful undermines all investment into security tooling and technologies as prevention is majorly reliant on user awareness.

We offer a range of safe cybersecurity campaigns aimed at identifying staff members who are susceptible to social engineering attack and send them for re-training.

Have a look at some of our campaign packages below to learn more. If you don’t find a course that suits your business, fill the form and a member of our training team will contact you to assess your needs.

DevSecOps Training

Password Management

Partners


partnerco
tvc
arcade
bearbrand
fast brothers
harculis beards
partnerco
tvc
bearbrand
harculis beards
tvc
partnerco
tvc
bearbrand
harculis beards
partnerco
tvc
bearbrand