Cyber Security training

Explore the only end-to-end cyber security curriculum in the UK through the QA 10 cyber domains.

State-of-the-art Cyber Labs

International House is home to the QA Cyber Labs, where companies can simulate real-life cyber attacks on their infrastructure, helping them to prevent & combat breaches without risking their own network.

Cyber Security courses

With over 75 public cyber courses, from the QA 10 cyber domains, we offer cyber certifications, cyber assurance and cyber defence training for the whole organisation. In a supportive, hands-on learning environment, our public, private and bespoke training courses meet the needs of individuals, employers and enterprise.

Cyber Awareness

Cyber Security training courses for staff of all levels.

HMG Info Assurance

For government information security practitioners.

Cyber Compliance

For those required to maintain regulatory security standards.

Cyber Security Ops

For those working in security management & operational roles.

Cyber Incident Response

For those responsible for crisis management & communications.

Cyber Secure Developer

For security project managers, software developers & test teams.

Cyber Intelligence

For security professionals, IT risk management & government.

Digital Forensics

For security professionals, law enforcement & government.

Cyber Offensive Defence

For defending IT networks, applications & infrastructure.

Cyber Games

Challenges for 'Cyber Defenders' from foundation to advanced.

Cyber Consultancy

For organisations that want to test their current cyber controls.

Cyber Online Courses

Digital training that can be accessed from anywhere.

Cyber Security spotlight

View our latest and most popular cyber security training courses.

DevSecOps Hands-on

DevSecOps has been described as 'security as code', 'a marriage of DevOps and Security' and 'Shifting security to the left'.

Secure Coding Masterclass for Financial Services

5-day course for engineers developing apps for the banking and finance sector.

ICS Security for Managers

Designed to provide those at managerial level with an understanding of today’s cyber security challenges.

Practitioner Certificate in Cloud Security

This 5-day GHCQ Certified course is focussed on cloud security principles and architecture.

Cyber Security brochures

Click on the cards below to download our latest cyber security brochures and reports.

Cyber Security news

Read the latest cyber news from our cyber security experts.

Cyber Pulse: Edition 27

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Pulse: Edition 26

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Pulse: Edition 25

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

QA has signed a partnership agreement with PECB United Kingdom

Cyber Pulse: Edition 24

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Pulse: Edition 23

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Pulse: Edition 22

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Pulse: Edition 21

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Pulse: Edition 20

Read the latest edition of Cyber Pulse, our roundup of Cyber news. Read the full story

Cyber Security events

Find out more about our upcoming cyber security events and register to attend.

QA Cyber Summit 10/09/18 - 14/09/18

QA Cyber Summit is an exclusive 5-day event delivered by QA Cyber experts and partners.

QAHE Cyber Conference 26/07/18 - 27/07/18

We are hosting a conference in Nigeria about creating awareness for the new Digital Age.

Password Security 30/07

This FREE webinar looks at why passwords are weak and how your future passwords have already been predicted.

Cyber Security Summit & Expo 15/11/18

We are exhibiting at this London event about cyber security, data protection and securing CNI.

Black Hat Europe 2018 03/12/18 - 06/12/18

QA is attending this huge Information Security event in London.

COMING SOON

Cyber training by vendor

We offer a wide range of fully-accredited cyber security courses from the leading vendors.

Cyber Security blogs

Read the latest blogs from our cyber security experts.

Cryptocurrency in traditional crimes

QA Cyber Security Trainer, James Aguilan, looks at how cryptocurrency is used in crimes such as drug trafficking, money laundering and fraud. Read the full article

Most common ways for thieves to steal your cryptocurrency

QA Cyber Security Trainer, James Aguilan, looks at how cybercriminals can steal your coins. Read the full article

Business security challenges from the IoT

QA Cyber Security Trainer, James Aguilan, details the business security challenges when it comes to the exponential growth of the Internet of Things (IoT). Read the full article

Pwned Passwords and a Python Tool

Brad Stone, QA's Head of Cyber Certifications, looks at the problems with typical password-meters and advises on the best way you can securely check the strength of your passwords. Read the full article

Top 10 free tools for digital forensic investigation

QA Cyber Security Trainer, James Aguilan, lists his favourite free tools for forensic wizardry. Read the full article

Turning an Amazon Echo into a smart home security system

QA Cyber Security Trainer, James Aguilan, looks at how an Amazon Echo can act as the control point for several home security appliances. Read the full article

How to hack a plane...

Siker CEO, Tim Harwood, looks at how cyber security threats can affect more than just personal computers and data stored by organisations - it is possible to hack a plane! Read the full article

Cyber criminals can exploit flaws in online security and all new appliances

QA Cyber Security Trainer, James Aguilan, looks at how internet-enabled devices such as fridges, doorbells and TVs are leaving consumers exposed to hackers. Read the full article

Household smart appliances can provide clues in Forensic Investigations

QA Cyber Security Trainer, James Aguilan, looks at how household technology appliances such as washing machines and fridges will soon be used by law enforcement to gather evidence from crime scenes. Read the full article

Reskilling the cyber gap in the UK

QA Cyber Security Trainer, James Aguilan, shares his expert opinion on the key issues around reskilling the cyber gap in the UK today. Read the full article

The perils of single-factor authentication

QA Cyber Security Trainer, Graeme Batsman, offers a first-hand opinion on single-factor authentication and the exposure of company platforms to the internet. Read the full article

Cyber Security research papers

Click on the links below to download our latest cyber security research papers.

On Assessing the Impact of Ports Scanning on the Target Infrastructure

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, provides an in-depth analysis of port scan techniques, with extensive information of each scan technique. Read the full article

SCADA Threats in the Modern Airport

In this research paper Dr John McCarthy, a leading authority on Cyber Security strategy and implementation, conducts a detailed study concerned with Supervisory Control and Data Acquisition (SCADA) systems that are at the heart of distributed critical infrastructures within airports. Read the full article

A Comprehensive Security Framework for Heterogeneous IoTs

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, looks at the security challenges of using LISP as an overlay to support IoTs communications and highlights the need for a unified security framework for heterogeneous IoTs. Read the full article

How efficient AntiViruses are: An empirical investigation of AntiViruses with RATs

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, conducts an empirical investigation of the efficiency of Antivirus programs in detecting malware. Read the full article

Cyber case studies

Find out what makes QA the trusted training provider for the world's leading organisations.

Cyber Security trainers

Meet some of our specialist Cyber Security team.

Scott Isaac

Head of Cyber Product Development

Spencer Collins

Cyber Training Delivery Manager