Cyber Security Training Courses

Cyber Security Training Courses

If you're looking to learn the fundamentals of cybersecurity, advance tactics, or prepare for industry-recognised certifications, we've got you covered.

At an alarming rate, data breaches are occurring. We no longer have to wonder what will happen next, but rather when. It is now necessary for the C-suite to cooperate with IT experts to develop a resilient workforce and implement new security policies and procedures to address the fact that cybersecurity is no longer only an IT problem.

Prepare for system breaches with our wide choice of product-specific cybersecurity training and industry-recognised certification preparatory classes. Become an expert in critical infrastructure risk management, secure coding, web security, and security awareness. We can provide you with the security training you need to manage critical infrastructure threats and comply with Department of Defense security standards, no matter what level of position you hold.

Cybersecurity training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Cyber Security trainings in the UK can be carried out locally on customer premises or in NobleProg corporate training centres.

Testimonials

★★★★★
★★★★★

Cybersecurity Course Outlines

Course Name
Duration
Overview
Course Name
Duration
Overview
35 hours
This instructor-led, live training in the UK (online or onsite) is designed to help participants prepare for the CompTIA PenTest+ certification exam.  The course covers the fundamentals of penetration testing and provides hands-on experience with various pen testing tools and techniques. Participants will learn how to identify network vulnerabilities, exploit security weaknesses, and recommend remediation strategies.
28 hours
Description: CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting. Our CISA course is an intense, very competitive and exam focused training course. With experience of delivering more than 150+ CISA trainings in Europe and around the world and training more than 1200+ CISA delegates, the Net Security CISA training material has been developed in house with the top priority of ensuring CISA delegates pass the ISACA CISA® Exam. The training methodology focuses on understanding the CISA IS auditing concepts and practicing large number of ISACA released question banks from the last three years. Over a period, CISA holders have been in huge demand with renowned accountings firms, global banks, advisory, assurance, and internal audit departments. Delegates may have years of experience in IT auditing but perspective towards solving CISA questionnaires will solely depend on their understanding to globally accepted IT assurance practices. CISA exam is very challenging because the chance of a very tight clash between two possible answers exists and that is where ISACA tests you on your understanding in global IT auditing practices. To address these exam challenges, we always provide the best trainers who have extensive experience in delivering CISA training around the world. The Net Security CISA manual covers all exam-relevant concepts, case studies, Q&A's across CISA five domains. Further, the Trainer shares the key CISA supporting material like relevant CISA notes, question banks, CISA glossary, videos, revision documents, exam tips, and CISA mind maps during the course. Goal: The ultimate goal is to pass your CISA examination first time. Objectives:
  • Use the knowledge gained in a practical manner beneficial to your organisation
  • Provide audit services in accordance with IT audit standards
  • Provide assurance on leadership and organizational structure and processes
  • Provide assurance on acquisition/ development, testing and implementation of IT assets
  • Provide assurance on IT operations including service operations and third party
  • Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
Target Audience: Finance/CPA professionals, I.T. professionals, Internal & External auditors, Information security, and risk consulting professionals.
21 hours
This instructor-led, live training in the UK (online or onsite) is aimed at IT professionals who wish to understand how to use the CipherTrust Solution suite. By the end of this training, participants will be able to:
  • Understand the CipherTrust Solution and its basic functions.
  • Evaluate device architecture and usage schemes.
  • Manage CipherTrust product suite.
14 hours
This instructor-led, live training in the UK (online or onsite) is aimed at experienced developers who wish to gain a comprehensive understanding of Python programming and its applications in cybersecurity. By the end of this training, participants will be able to:
  • Use Python programming for defensive cybersecurity.
  • Understand and use Python for ethical offensive techniques and digital forensics tasks.
  • Recognize legal and ethical considerations surrounding offensive cybersecurity and vulnerability disclosure.
14 hours
This instructor-led, live training in the UK (online or onsite) is aimed at security managers who wish to learn basic to intermediate-level CCTV security surveillance and management skills. By the end of this training, participants will be able to:
  • Familiarize the types of CCTV systems and know their benefits and features.
  • Understand cabling and CCTV systems setup requirements.
  • Install, configure, and manage CCTV systems.
28 hours
Description: Disclaimer: Please be advised that this updated CISM exam content outline is applicable to exams starting 1 June 2022. CISM® is the most prestigious and demanding qualification for Information Security Managers around the globe today. This qualification provides you with a platform to become part of an elite peer network who have the ability to constantly learn and relearn the growing opportunities/ challenges in Information Security Management. Our CISM training methodology provides an in-depth coverage of contents across the Four CISM domains with a clear focus on building concepts and solving ISACA released CISM exam questions. The course is an intense training and hard-core exam preparation for ISACA’s Certified Information Security Manager (CISM®) Examination. Our instructors encourage all attending delegates to go through the ISACA released CISM QA&E (Questions, Answers and Explanations) as exam preparation - you get this FREE as part of our course. The QA&E is exceptional in helping delegates understand the ISACA style of questions, approach to solving these questions and it helps rapid memory assimilation of the CISM concepts during live classroom sessions.
All our trainers have extensive experience in delivering CISM training. We will thoroughly prepare you for the CISM examination. Goal: The ultimate goal is to pass your CISM examination first time. Objectives:
  • Use the knowledge gained in a practical manner beneficial to your organisation
  • Establish and maintain an Information security governance framework to achieve your organization goals and objectives
  • Manage Information risk to an acceptable level to meet the business and compliance requirements
  • Establish and maintain information security architectures (people, process, technology)
  • Integrate information security requirements into contracts and activities of third parties/ suppliers
  • Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact
Target Audience:
  • Security professionals with 3-5 years of front-line experience
  • Information security managers or those with management responsibilities
  • Information security staff, information security assurance providers who require an in-depth understanding of information security management including: CISO’s, CIO’s, CSO’s, privacy officers, risk managers, security auditors and compliance personnel, BCP / DR personnel, executive and operational managers responsible for assurance functions
14 hours
This instructor-led, live training in the UK (online or onsite) is aimed at security professionals who wish to learn and improve how to handle security threats and perform security risk assessments. By the end of this training, participants will be able to:
  • Manage security systems and handle any hostile environment.
  • Manage any security risks or threats.
  • Learn how to conduct security risk assessments.
14 hours
This instructor-led, live training in the UK (online or onsite) is aimed at service technicians, system admins, or anyone who wishes to learn proper installation, usage, and management of the Honeywell security system. By the end of this training, participants will be able to:
  • Learn the concepts of the Honeywell security systems and components.
  • Properly install and maintain a Honeywell security system.
  • Utilize the Honeywell maintenance tools and management suite to control a security system.
14 hours
This instructor-led, live training in the UK (online or onsite) is aimed at system administrators who wish to learn the fundamentals of software licensing, the key features of FlexNet, and how to implement and maintain software license management solutions. By the end of this training, participants will be able to:
  • Understand the fundamental concepts of software licensing.
  • Manage core components and operation systems of FlexNet.
  • Create various license models and types, generate license keys, and activate software licenses for end-users.
  • Add, manage, and allocate licenses to end-users, monitor license usage, and ensure compliance.
7 hours
This instructor-led, live training in the UK (online or onsite) is aimed at developers and anyone who wishes to learn and use OAuth to provide applications with secure delegated access. By the end of this training, participants will be able to:
  • Learn the fundamentals of OAuth.
  • Understand the native applications and their unique security issues when using OAuth.
  • Learn and understand the common extensions to the OAuth protocols.
  • Integrate with any OAuth authorization server.
14 hours
This instructor-led, live training in the UK (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code. By the end of this training, participants will be able to:
  • Understand the features and structure of Snyk.
  • Use Snyk to find and fix code security issues.
  • Integrate Snyk in a software development lifecycle.
14 hours
The CCSK Foundation course starts with the fundamentals, then increases in complexity as it works through all 16 domains of the CSA Security Guidance, recommendations from the European Union Agency for Network & Information Security (ENISA), and an overview of the Cloud Controls Matrix. This is a Cloud Security Alliance (CSA) authorized course and NobleProg is an official CSA Training Partner. This course is delivered by CSA Authorized CCSK Instructors.
All attendees receive:
  • official CSA CCSK Foundation course certificates
  • official CCSK Foundation Student Handbooks
  • 1 CCSK exam voucher and 1 re-attempt exam voucher
This course covers the most current version of the CCSK exam - currently version 4.1.
21 hours
The CCSK Plus builds on the foundation class with expanded material and offers extensive hands-on activities that reinforce classroom instruction. Students engage in a scenario of bringing a fictional organization securely into the cloud, which gives them the opportunity to apply their knowledge by performing a series of activities that would be required in a real-world environment. The CCSK Plus Course includes all the modules in the CCSK Foundation course with additional material. This is a Cloud Security Alliance (CSA) authorized course and NobleProg is an official CSA Training Partner. This course is delivered by CSA Authorized CCSK Instructors.  All attendees receive:
  • official CSA CCSK Plus course certificates
  • official CCSK Foundation Student Handbooks
  • 1 CCSK exam voucher and 1 re-attempt exam voucher
This course covers the most current version of the CCSK exam - currently version 4.1.
35 hours
ISO/IEC 27002 Lead Manager training enables you to develop the necessary expertise and knowledge to support an organization in implementing and managing Information Security controls as specified in ISO/IEC 27002.  After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27002 Lead Manager” credential.  A PECB Lead Manager Certification, proves that you have mastered the principles and techniques for the implementation and management of Information Security Controls based on ISO/IEC 27002. Who should attend?
  • Managers or consultants seeking to implement an Information Security Management System (ISMS) based on ISO/IEC 27001 and ISO/IEC 27002
  • Project managers or consultants seeking to master the Information Security Management System implementation process
  • Individuals responsible for the information security, compliance, risk, and governance, in an organization
  • Members of information security teams
  • Expert advisors in information technology
  • Information Security officers
  • Privacy officers
  • IT professionals
  • CTOs, CIOs and CISOs
Learning objectives
  • Master the implementation of Information Security controls by adhering to the framework and principles of ISO/IEC 27002
  • Gain a comprehensive understanding of the concepts, approaches, standards, methods and techniques required for the effective implementation and management of Information Security controls
  • Comprehend the relationship between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
  • Understand the importance of information security for the strategy of the organization
  • Master the implementation of information security management processes
  • Master the formulation and implementation of security requirements and objectives
Educational approach
  • This training is based on both theory and practice
  • Sessions of lectures illustrated with examples based on real cases
  • Practical exercises based on case studies
  • Review exercises to assist the exam preparation
  • Practice test similar to the certification exam
General Information
  • Certification fees are included on the exam price
  • Training material containing over 500 pages of information and practical examples will be distributed to the participants
  • A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued to the participants
  • In case of exam failure, you can retake the exam within 12 months for free
14 hours
This instructor-led, live training in the UK (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks. By the end of this training, participants will be able to:
  • Configure Cloudflare for their websites.
  • Set up DNS records and SSL certificates.
  • Implement Cloudflare for content delivery and caching.
  • Protect their websites from DDoS attacks.
  • Implement firewall rules to restrict traffic to their websites.
21 hours
This instructor-led, live training in the UK (online or onsite) is aimed at engineers who wish to safeguard connected vehicles from cyber attacks. By the end of this training, participants will be able to:
  • Implement cybersecurity in automotive systems.
  • Choose the most suitable technologies, tools, and approaches.
14 hours
This course is designed to help the attendee to build organizational resilience against a range of threats so that organizations can respond effectively to incidents, maintain the availability of business operations and safeguard its interests. 
21 hours
Who is it for: Anyone who is involved in the areas of information security and information assurance.  The certificate is relevant to anyone requiring an understanding of Business Continuity Management as well as those who are involved in the areas of information security and information assurance. What will I learn: Candidates should be able to demonstrate: 
  • The function of and need for business continuity management within an organisation
  • The business continuity management life cycle
  • The main components of a business continuity management programme
  • The need for risk assessment within business continuity management
  • The options for development of a business continuity management strategy
  • How to prepare and develop plans for business continuity management response  
  • The need for exercising, maintenance and review of plans 
  • The need for embedding business continuity management awareness within the organisation 
14 hours
BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN. In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment. By the end of this training, participants will be able to:
  • Assess their organization's existing security model.
  • Shift access controls from the perimeter to individual devices and users.
  • Deploy applications using a user and device-centric authentication and authorization workflow.
  • Understand, plan and implement a Zero Trust network within their organization.
Audience
  • Network engineers
  • Cyber security professionals
  • System architects
  • IT managers
Format of the Course
  • Part lecture, part discussion, exercises and heavy hands-on practice
Note
  • To request a customized training for this course, please contact us to arrange.
7 hours
This course will introduce the scientific principles and practical techniques that are used in crime scenes , in addition to cover the basics of Biometric Forensic  and what is related approaches in the technological landscape.
7 hours
In this instructor-led, live training the UK (online or onsite), we discuss CAS's architecture and features and practice installing and configuring a CAS server. By the end of this training, participants will be able to:
  • Have an understanding of CAS's implementation of SSO (Single-Sign-On Authentication).
  • Have the necessary practice to deploy and manage their own authentication server.
7 hours
This course help you to understand what is special about Bitcoin, we need to understand how it works at a technical level. We’ll address the important questions about Bitcoin, such as:
How does Bitcoin work? What makes Bitcoin different? How secure are your Bitcoins? How anonymous are Bitcoin users? What determines the price of Bitcoins? Can cryptocurrencies be regulated? What might the future hold?   
 
7 hours
This course discusses how to manage an incident response team, how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations. Incident response is the last line of defense, detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge
 
7 hours
This one day course show the cyber crime impact on the business and how the hackers can effect the business through the cyber crimes, the course discuss the history of cyber crime and security terminologies of the hacking and cyber security, finally it will discuss how to stop this risk on the business    
    
 
7 hours
This instructor-led, live training in the UK (online or onsite) is aimed at beginner to intermediate-level security analysts and system administrators who wish to establish a foundational understanding of Cyber Defence (SOC) analysis. By the end of this training, participants will be able to:
  • Understand the principles of Security Management in a Cyber Defence context.
  • Execute effective Incident Response strategies to mitigate security incidents.
  • Implement Security Education practices to enhance organizational awareness and preparedness.
  • Manage and analyze Security Information for proactive threat identification.
  • Utilize Event Management techniques to monitor and respond to security events.
  • Implement Vulnerability Management processes to identify and address system vulnerabilities.
  • Develop skills in Threat Detection to identify and respond to potential cyber threats.
  • Participate in Simulated Attacks to test and improve incident response capabilities.
35 hours
A CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets a CISSP apart. The credential demonstrates a globally recognized level of competence provided by the (ISC)2® CBK®, which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more. This course helps you review the 10 domains of the information security practices. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security. Objectives:
  • To review of the main topics of CISSP CBK (Common Body of Knowledge).
  • To prepare for a CISSP examination
7 hours
  • After this one day seminar the attendee will be able to demonstrate knowledge and understanding of Cloud Computing.
14 hours
This class will help the attendees to scan, test, hack on secure their own systems, get in-depth knowledge and practical experience with the current essential security systems. the attendees know how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed, the attendees then will learn how intruders escalate privileges and what steps can be taken to secure a system, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.    
 
7 hours
This course discusses how to manage an incident response team. how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations. Incident response is the last line of defense, detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge
7 hours
This instructor-led, live training in the UK (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, especially as it relates to cybersecurity. By the end of this training, participants will be able to:
  • Understand the security oversights that can bring about significant damage and disruption to a supply chain.
  • Break down a complex security problem into manageable and actionable parts.
  • Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
  • Adopt best practices in securing a supply chain.
  • Noticeably reduce or eliminate the biggest risks to an organization's supply chain.

Last Updated:

Upcoming Cyber Security Courses

Online Cybersecurity courses, Weekend Cybersecurity courses, Evening Cyber Security training, Cybersecurity boot camp, Cybersecurity instructor-led, Weekend Cyber Security training, Evening Cybersecurity courses, Cybersecurity coaching, Cyber Security instructor, Cyber Security trainer, Cybersecurity training courses, Cyber Security classes, Cybersecurity on-site, Cybersecurity private courses, Cybersecurity one on one training

Course Discounts

No course discounts for now.

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

This site in other countries/regions