Cybersecurity and information resilience

Cybersecurity and information resilience

Training

Training

Red Overlay
Cybersecurity training courses
Cybersecurity training courses
Red Overlay

Information Security Training Courses

Today, in this highly interconnected world, protecting information is increasingly important. Organizations need to ensure they secure personal records and commercially sensitive information from business risk and vulnerabilities. With our range of information security training courses we can help you get the knowledge and skills you need to build resilience around your information security management.

Whether you're working to the internationally recognized ISO/IEC 27001 Information Security Management System or looking to gain a professional qualification that gets you recognition for your specialist role, our informative, interactive courses can help you develop.

Browse through our information security courses, or talk to our team about the best options for your business.


EU GDPR training courses

We have a range of training courses to give you the skills to ensure your organization is ready for the GDPR regulations. From beginner to advanced, we've got you covered. 





Our information security training courses



Technical security training courses

  • Fundamentals of Web Application Defence >
    This course covers the insecurities, vulnerabilities and exploits that lay within web applications and how to use secure design and development best practices to eliminate these risks.


  • Web Application Defence: Secure Coding (Java/.NET/PHP) >
    By attending this course you'll gain a detailed understanding of web application defence for Java/.NET/PHP and best practice approaches to apply secure coding and secure design and development to identify and eliminate risks.


  • Certified Lead SCADA Security Professional >
    This five-day training course will enable you to develop the expertise to plan, design and implement an effective program to protect SCADA systems.


  • Certified Ethical Hacker (C|EH)  >
    On this 5 day course you will learn ethical hacking and network security skills so that you can think like a hacker and defend your organization from the threat of being hacked.


  • EC–Council Certified Security Analyst / Licensed Penetration Tester (ECSA/LPT) >
    By attending this five-day course you'll develop knowledge of an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation.


  • Advanced Hacking: The Weaponised Cyber Range >
    Take your ethical hacking skills to the next level. This three-day course will give you hands-on experience to help secure your business environment.


  • Fundamentals of Mobile Application >
    This one-day course is a great opportunity for those interested in mobile security to look at iOS and Android applications through the eyes of the hacker.