
If you're looking to learn the fundamentals of cybersecurity, advance tactics, or prepare for industry-recognised certifications, we've got you covered.
At an alarming rate, data breaches are occurring. We no longer have to wonder what will happen next, but rather when. It is now necessary for the C-suite to cooperate with IT experts to develop a resilient workforce and implement new security policies and procedures to address the fact that cybersecurity is no longer only an IT problem.
Prepare for system breaches with our wide choice of product-specific cybersecurity training and industry-recognised certification preparatory classes. Become an expert in critical infrastructure risk management, secure coding, web security, and security awareness. We can provide you with the security training you need to manage critical infrastructure threats and comply with Department of Defense security standards, no matter what level of position you hold.
Cybersecurity training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Cyber Security trainings in the UK can be carried out locally on customer premises or in NobleProg corporate training centres.
Testimonials
Overview of automotive cyber security
NIPPON SEIKI (Europe) BV
Course: Automotive Cyber Security Fundamentals
The trainer was very knowledgeable and was happy to go at the pace of the attendees. He was polite and respectful to all those in attendance. I felt I learnt a lot from the course as the trainer was very succinct in his delivery when going through the PP slides. A really good, worthwhile course from my personal point of view.
Julie Price - KnowledgePool
Course: Business Continuity Practitioner
The exercises and group discussions.
KnowledgePool
Course: Business Continuity Practitioner
The pace of training delivery.
Ian McInally - KnowledgePool
Course: Business Continuity Practitioner
Trainers experience was evident and his examples from personal experience helped frame the context of the course.
Khadija Ukadia, KPMG LLP
Course: CISM - Certified Information Security Manager
The experience and knowledge of the trainer and ease to which he passed on that knowledge
HMRC
Course: Managing Cyber Risks in the Supply Chain
The discussions, plus the trainer brought in some real life examples which we could relate to.
HMRC
Course: Managing Cyber Risks in the Supply Chain
Depth of knowledge. A true SME in Openstack. Patient and very helpful. Explained complex topics in an understandable and digestible way.
Jake McIlwaine - Sam Bultitude, Gamma
Course: OpenStack Security
The trainer was extremely knowledgable and helpful. While walking through the exercises, I wasn't rushed and was allowed to make mistakes (to a point) and then help was given to correct to them where needed.
Tim Wilkes - Timothy Wilkes, Gamma
Course: OpenStack Security
I found it very interesting to learn all about what happens behind the scenes when it comes to IT systems. I also enjoyed learning about security and what hackers do as ethical hacking is an avenue I'm very keen in pursuing.
Knowledge Pool/ DVLA
Course: Understanding Modern Information Communication Technology
Trainer covered a lot of ground over a relatively short period.
Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
It was quite informal.
Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
Martin was very knowledgeable and gave really good tips; he allowed plenty of time for discussion and allowing us to ask questions. It was really well delivered, even virtually which sometimes is a difficult medium to work with.
Kewal Rai - Knowledgepool Group Ltd
Course: Introduction to ISO27001
Knowledge of the trainer was excellent and delivered in an engaging manner
Richard Brown - KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP)
Not very much, it felt like the course was crammed into 3 days. This is not the trainers fault, but this course should have been over 4 or 5 days. Too much information to take in and to understand prior to taking an exam in the subject
KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP)
Great to have qualification as gives me the recognition of my work
KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP)
Trainer Knowledge - Thought his general knowledge on the subject was impressive.
Khadija Ukadia, KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day
Nigel was very engaging with our group. The examples he used to make the material more relatable was extremely helpful
Erica McBride - Khadija Ukadia, KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day
Nigel's mastery of the subject and his anecdotes (where they fitted into the subject matter) were great
Kevin Lazell - Khadija Ukadia, KPMG LLP
Course: BCS Foundation Certificate in Information Security Management Principles (CISMP) 4 day
The way examples were linked to the relevant sections. Good broad knowledge from trainer in ISO.
Andrew Bell - Khadija Ukadia, KPMG LLP
Course: ISO/IEC 27001 Foundation
The trainer style and engagement (and the slides and notes).
Khadija Ukadia, KPMG LLP
Course: ISO/IEC 27001 Foundation
John is very knowledgeable on the course subject.
Khadija Ukadia, KPMG LLP
Course: ISO/IEC 27001 Foundation
Trainer delivery and pace
Rachel Simmons - Khadija Ukadia, KPMG LLP
Course: ISO27001: 2013 Lead Auditor (certification course)
The training ran at exactly the right pace. I was concerned about it being virtual but I feel that it went really well. I particularly liked the structure of breaks etc which supported the learning experience. The instructor was clearly well informed and able to put learning in to context with real life experience
Sue Brocken - Khadija Ukadia, KPMG LLP
Course: ISO27001: 2013 Lead Auditor (certification course)
Subject content and instructor
Jas Paul Farmahan - Capita Business Services Ltd
Course: ISO27001: 2013 Lead Auditor (certification course)
Trainer used industry experience which brought the programmeme to live
Christian Eduwa - Khadija Ukadia, KPMG LLP
Course: BCS Practitioner Certificate in Information Risk Management (CIRM)
Trainer's interaction to each individual, using whiteboard instead of going through slides, interactive team session, well-structured, adequate breaks, very much enjoyed going through exam question results and overall updates at end of each day with open forum discussion.
Maureen Barker - Khadija Ukadia, KPMG LLP
Course: BCS Practitioner Certificate in Information Risk Management (CIRM)
Abhi is a great trainer and his experience adds to the delivery. If any other of my colleagues are to attend the course, I would want the trainer to be Abhi. The workshops to help those on the course that Abhi added off his own back, helped to solidify the learning.
Yusuf Bhayat - Khadija Ukadia, KPMG LLP
Course: BCS Practitioner Certificate in Information Risk Management (CIRM)
I enjoyed the practical exercises. Hands-on is the best way to learn.
W L Gore & Associates (UK) Ltd
Course: PKI: Implement and Manage
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course: CGEIT – Certified in the Governance of Enterprise IT
The structure of the training event which covered all aspects of security from Network, Infrastructure and an Application perspective. I liked the use of labs which acted as a refresher exercise but also helped to cement the learning points. I particularly enjoyed the final day which focused on vulnerabilities and the top 10 OWASP risks.
Brian Rynn - KPMG LLP
Course: Application Security in the Cloud
The mix of theory and labs worked very well. It wasn't a course where you were simply talked at for 3 days, you were also doing practical exercises which helped the understanding of what had just been discussed.
Marc Armstrong - KPMG LLP
Course: Application Security in the Cloud
I liked he was passionate about the subject and very convincing too.
Diana Vladulescu
Course: Secure Web Application Development and Testing
The trainer's subject knowledge was excellent, and the way the sessions were set out so that the audience could follow along with the demonstrations really helped to cement that knowledge, compared to just sitting and listening.
Jack Allan - Ben Tyler, RSM UK Management Ltd.
Course: Secure Developer .NET (Inc OWASP)
I personally found the 2nd day the most interesting; and liked Fulvio walking through / showing some exploits to the team on the 1st couple of days... I also loved that Fulvio tailored the course to some of my questions and the initial set of questionnaires you sent out (e.g., include some secure development bits).
Ben Tyler, RSM UK Management Ltd.
Course: Secure Developer .NET (Inc OWASP)
The depth of knowledge Fulvio had
Ben Tyler, RSM UK Management Ltd.
Course: Secure Developer .NET (Inc OWASP)
The trainers knowledge - really interesting content and practical examples
Tracey Rollock
Course: Open Source Cyber Intelligence - Introduction
Piotr was incredibly knowledgeable and very patient. He was great at explaining things and I'd strongly recommend this course to others
Victoria Harper
Course: Open Source Cyber Intelligence - Introduction
Cybersecurity Course Outlines
- Use the knowledge gained in a practical manner beneficial to your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
- Understand the CipherTrust Solution and its basic functions.
- Evaluate device architecture and usage schemes.
- Manage CipherTrust product suite.
- Use Python programming for defensive cybersecurity.
- Understand and use Python for ethical offensive techniques and digital forensics tasks.
- Recognize legal and ethical considerations surrounding offensive cybersecurity and vulnerability disclosure.
- Familiarize the types of CCTV systems and know their benefits and features.
- Understand cabling and CCTV systems setup requirements.
- Install, configure, and manage CCTV systems.
All our trainers have extensive experience in delivering CISM training. We will thoroughly prepare you for the CISM examination. Goal: The ultimate goal is to pass your CISM examination first time. Objectives:
- Use the knowledge gained in a practical manner beneficial to your organisation
- Establish and maintain an Information security governance framework to achieve your organization goals and objectives
- Manage Information risk to an acceptable level to meet the business and compliance requirements
- Establish and maintain information security architectures (people, process, technology)
- Integrate information security requirements into contracts and activities of third parties/ suppliers
- Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact
- Security professionals with 3-5 years of front-line experience
- Information security managers or those with management responsibilities
- Information security staff, information security assurance providers who require an in-depth understanding of information security management including: CISO’s, CIO’s, CSO’s, privacy officers, risk managers, security auditors and compliance personnel, BCP / DR personnel, executive and operational managers responsible for assurance functions
- Manage security systems and handle any hostile environment.
- Manage any security risks or threats.
- Learn how to conduct security risk assessments.
- Learn the concepts of the Honeywell security systems and components.
- Properly install and maintain a Honeywell security system.
- Utilize the Honeywell maintenance tools and management suite to control a security system.
- Understand the fundamental concepts of software licensing.
- Manage core components and operation systems of FlexNet.
- Create various license models and types, generate license keys, and activate software licenses for end-users.
- Add, manage, and allocate licenses to end-users, monitor license usage, and ensure compliance.
- Learn the fundamentals of OAuth.
- Understand the native applications and their unique security issues when using OAuth.
- Learn and understand the common extensions to the OAuth protocols.
- Integrate with any OAuth authorization server.
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
All attendees receive:
- official CSA CCSK Foundation course certificates
- official CCSK Foundation Student Handbooks
- 1 CCSK exam voucher and 1 re-attempt exam voucher
- official CSA CCSK Plus course certificates
- official CCSK Foundation Student Handbooks
- 1 CCSK exam voucher and 1 re-attempt exam voucher
- Managers or consultants seeking to implement an Information Security Management System (ISMS) based on ISO/IEC 27001 and ISO/IEC 27002
- Project managers or consultants seeking to master the Information Security Management System implementation process
- Individuals responsible for the information security, compliance, risk, and governance, in an organization
- Members of information security teams
- Expert advisors in information technology
- Information Security officers
- Privacy officers
- IT professionals
- CTOs, CIOs and CISOs
- Master the implementation of Information Security controls by adhering to the framework and principles of ISO/IEC 27002
- Gain a comprehensive understanding of the concepts, approaches, standards, methods and techniques required for the effective implementation and management of Information Security controls
- Comprehend the relationship between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
- Understand the importance of information security for the strategy of the organization
- Master the implementation of information security management processes
- Master the formulation and implementation of security requirements and objectives
- This training is based on both theory and practice
- Sessions of lectures illustrated with examples based on real cases
- Practical exercises based on case studies
- Review exercises to assist the exam preparation
- Practice test similar to the certification exam
- Certification fees are included on the exam price
- Training material containing over 500 pages of information and practical examples will be distributed to the participants
- A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued to the participants
- In case of exam failure, you can retake the exam within 12 months for free
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
- Implement cybersecurity in automotive systems.
- Choose the most suitable technologies, tools, and approaches.
- The function of and need for business continuity management within an organisation
- The business continuity management life cycle
- The main components of a business continuity management programme
- The need for risk assessment within business continuity management
- The options for development of a business continuity management strategy
- How to prepare and develop plans for business continuity management response
- The need for exercising, maintenance and review of plans
- The need for embedding business continuity management awareness within the organisation
- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.
- Network engineers
- Cyber security professionals
- System architects
- IT managers
- Part lecture, part discussion, exercises and heavy hands-on practice
- To request a customized training for this course, please contact us to arrange.
- Have an understanding of CAS's implementation of SSO (Single-Sign-On Authentication).
- Have the necessary practice to deploy and manage their own authentication server.
How does Bitcoin work? What makes Bitcoin different? How secure are your Bitcoins? How anonymous are Bitcoin users? What determines the price of Bitcoins? Can cryptocurrencies be regulated? What might the future hold?
- Understand the principles of Security Management in a Cyber Defence context.
- Execute effective Incident Response strategies to mitigate security incidents.
- Implement Security Education practices to enhance organizational awareness and preparedness.
- Manage and analyze Security Information for proactive threat identification.
- Utilize Event Management techniques to monitor and respond to security events.
- Implement Vulnerability Management processes to identify and address system vulnerabilities.
- Develop skills in Threat Detection to identify and respond to potential cyber threats.
- Participate in Simulated Attacks to test and improve incident response capabilities.
- To review of the main topics of CISSP CBK (Common Body of Knowledge).
- To prepare for a CISSP examination
- After this one day seminar the attendee will be able to demonstrate knowledge and understanding of Cloud Computing.
- Understand the security oversights that can bring about significant damage and disruption to a supply chain.
- Break down a complex security problem into manageable and actionable parts.
- Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
- Adopt best practices in securing a supply chain.
- Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
Last Updated: