Popular ISO 9001 Quality management > ISO 13485 Quality management for medical devices > ISO 14001 Environmental management > ISO 22301 Business continuity > ISO/IEC 27001 Information security > ISO 45001 (OHSAS 18001) Occupational health and safety > View all standards >
Access and buy standards How to access and buy > Decide which option works best for your business BSOL > Full standards collections Compliance Navigatior > Medical device standards
Standards and information Access and buy standards > Search our standards catalogue Develop a standard > Work with BSI to develop a standard Online subscription services > BSOL, Compliance Navigator, Eurocodes PLUS, BSI Membership and SCREEN
Auditing, certification and training Assessment and ISO certification > ISO certification and others eg: IATF, FSSC Auditing and verification > Supplier audits, custom audits and internal audits Product testing and certification > BSI Kitemark, CE marking and verification, Market access solutions Validate BSI-issued certificates > Check company, site and product certificates
Training courses > Individual, group and company-wide training Medical devices services > CE marking for medical devices, MDR and IVDR, quality management for medical devices Compliance software and solutions > Software tools and solutions for governance, cyber security, risk and supply chain management
Consulting practices Cybersecurity and information resilience > Environmental health and safety > Supply chain management > View all BSI services >
About BSI > BSI impartiality > Our accreditation > Our clients and partners > Our financial information >
Our governance > Our legal information > Our purpose, mission and vision > Our Royal Charter > UK National Standards body > The global role of BSI as the national standards body >
Careers > Events and webinars > Media centre/press room > Sustainability > Modern slavery statement Contact us >
Data protection (GDPR) > Penetration testing > Vulnerability assessment > PCI DSS consultancy > ISO 27001 consultancy > IT audit and assessment > Incident response > View all our services >
End user security awareness > eDiscovery/eDisclosure and digital forensics > Critical infrastructure security > Security testing cyber lab >
Cloud security > Managed security > Secure web gateway > Cloud encryption > Vulnerability management > SIEM solutions > Identity and access management > Cloud access security broker (CASB) > View all our solutions >
Information compliance training > Technical security training > Managerial security training > eDiscovery training > View all our cybersecurity training courses >
Fundamentals of GDPR > Certified Information Privacy Professional Europe (CIPP/E) > Certified Information Privacy Manager (CIPM) > Certified Information Privacy Technologist (CIPT) >
Certified Ethical Hacker (CEH) > Certified Information Security Manager (CISM) > Certified Information Systems Auditor (CISA) > Certified Information Systems Security Professional (CISSP) >
Advanced Hacking: The Weaponised Cyber Range Take your ethical hacking skills to the next level with our three-day Weaponised Cyber Range training. This course will give you hands-on experience to help secure your business environment. By attending you'll receive a full weaponised Pwn Pad, a 32gb quad core Google Nexus running a unique Kali Linux OS, Bluetooth and network hacking hardware, and the Rubber Duck USB attack platform. You'll get plenty of experience putting these tools into practice so you know how to best use them back in your business. Plus you'll understand how to look for weaknesses and vulnerabilities in target systems, which will help prevent them being exploited. Who should attend? For individuals who have the EC Council Certified Ethical Hacker (C|EH) or equivalent certification, and are involved in, or responsible for the network/perimeter security, including: IT security officers Network administrators Information security team members Site administrators Anyone dealing with network infrastructure integrity What will I learn? Network MiTMs Wireless MiTMs Wireless cracking Social media hacking Coffee shop attacks SSL strip Blue jacking Bluesnarfing Rubber duck attacks Payload injection Attack encoding Social engineering toolkit Metasploit SNORT SNORT rules TCPDUMP Wire shark NMAP Capture the flag Pharming DNS poisoning How will I benefit? You'll understand how to look for the weaknesses and vulnerabilities in target systems Get exposure to cutting edge hacking technology Confidence to put the tools that are used by real attackers into practice What's included? Lunch Refreshments Comprehensive course materials Certificate of attendance Tools including: Nexus 32Gb with Kali OS USB promiscuous wireless adapter and network adaptor 400 meter Bluetooth USB capture USB Keyboard USB rubber duck with 256Mb SD card USB charger and cable USB OTG cable