Welcome to the Cyber Skills Academy

    Available courses

    This five-day intensive course enables the participants to develop the expertise needed to audit an Information Security Management System (ISMS), and manage a team of auditors by applying widely recognized audit principles, procedures and techniques. During this training, the participants will acquire the knowledge and skills needed to proficiently plan and perform internal and external audits in compliance with certification process of the ISO/IEC 27001 standard. Based on practical exercises, the participants will develop the skills (mastering audit techniques) and competencies (managing audit teams and audit program, communicating with customers, conflict resolution, etc.) necessary to conduct an audit efficiently.
    The CREST Practitioner Security Analyst (CPSA) course is the first cross discipline course of its' kind that covers the essential knowledge and skills needed for intrusion detection, incident handling, computer/network forensics and malware reverse engineering. This course raises the bar and sets a new security baseline for aspiring Intrusion Analysis and Digital Forensics professionals. Every team member should take this course before embarking upon their very own, more specialised, career path. THE STORY OF AN ATTACK FROM START TO FINISH ..... How to detect an attack, how to handle it, how to trace and acquire the evidence, investigate, analyse and re-construct the incident. We then lay the groundwork for malware analysis by presenting the key tools and techniques malware analysts use to examine malicious programs. Practical exercises throughout ensure that the skills learned can be put to work immediately.
    The CREST Registered Tester (CRT) course is the first cross discipline course of its' kind that covers the essential knowledge and skills needed for intrusion detection, incident handling, computer/network forensics and malware reverse engineering. This course raises the bar and sets a new security baseline for aspiring Intrusion Analysis and Digital Forensics professionals. Every team member should take this course before embarking upon their very own, more specialised, career path. THE STORY OF AN ATTACK FROM START TO FINISH ..... How to detect an attack, how to handle it, how to trace and acquire the evidence, investigate, analyse and re-construct the incident. We then lay the groundwork for malware analysis by presenting the key tools and techniques malware analysts use to examine malicious programs. Practical exercises throughout ensure that the skills learned can be put to work immediately.
    The Practitioner Certificate in Information Assurance Architecture (PCiIAA) prepares the student for a career in security architecture. A Security Architect (SA) is a senior-level enterprise architect role, either within a dedicated security team or as part of a more general Enterprise Architecture (EA) team.
    The Certificate in Information Security Management Principles course is designed to provide the foundation of knowledge necessary for individuals who have information security responsibilities as part of their day to day role, or who are thinking of moving into an information security or related function. It also provides the opportunity for those already within these roles to enhance or refresh their knowledge and in the process gain a qualification, recognised by industry, which demonstrates the level of knowledge gained.
    This five-day intensive course enables the participants to develop the expertise necessary to support an organization in implementing and managing an Information Security Management System (ISMS) based on ISO/IEC 27001. The participants will also be given a thorough grounding in best practices used to implement Information Security controls from all areas of ISO/IEC 27002. This training is consistent with the project management practices established in ISO 10006 (Quality Management Systems - Guidelines for Quality Management in Projects). This training is also fully compatible with ISO 27003 (Guidelines for the Implementation of an ISMS), ISO 27004 (Measurement of Information Security) and ISO/IEC 27005 (Risk Management in Information Security).

    Mastering the incident management process based on ISO/IEC 27035

    In this five-day intensive course participants develop the competence to master a model for implementing an incident management process throughout their organization using the
    ISO/IEC 27035 standard as a reference framework. Based on practical exercises, participants acquire the necessary knowledge and skills to manage information security incidents in time by being familiar with their life cycle. During this training, we will present the ISO/IEC 27035 information security incident management standard, a process model for designing and developing an organizational incident management process, and how companies may use the standard. This training is also fully compatible with ISO/IEC 27035 which supports ISO/IEC 27001 by providing guidance for incident management.

    Welcome to Security Awareness. This course is made available to companies and their staff who have enrolled in the InfoSec Skills Security Awareness Programme. Security Awareness is for everyone. Raising the Security Awareness bar across an organisation reduces risk for that organisation. These Security Awareness topics will impart important knowledge that will contribute to your security and the security of your organisation.
    Welcome to Security Awareness. This course is made available to companies and their staff who have enrolled in the InfoSec Skills Security Awareness Programme. Security Awareness is for everyone. Raising the Security Awareness bar across an organisation reduces risk for that organisation. These Security Awareness topics will impart important knowledge that will contribute to your security and the security of your organisation.

    Conversation simulations offer scenario based training so students learn from doing.

    Conversation simulations offer scenario based training so students learn from doing.