Professional & Academic

Certifications

CREST Certified Host Intrusion Analyst

The CREST Certified Host Intrusion Analyst (CC HIA) examination tests candidates’ knowledge of analysing Windows hosts for evidence of potential compromise and analysing potential infection vectors. The examination is a rigorous assessment of the candidate’s ability to assess a Windows host for indications of malware and related forensic artefacts.

http://www.crest-approved.org/examination/host-intrusion-analyst/index.html

CREST Certified Network Intrusion Analyst

The Certified Network Intrusion Analyst (CC NIA) examination tests candidates’ knowledge of analysing network traffic and log files for evidence of potential compromise and analysing the potential underlying causes and infection vectors. The examination is a rigorous assessment of the candidate’s ability to assess a given network for indications of malicious activity including remote control and data ex-filtration.

https://www.crest-approved.org/examination/certified-network-intrusion-analyst/

CREST Registered Intrusion Analyst

The technical syllabus for Intrusion Analysis identifies at a high level the technical skills and knowledge that CREST expects candidates to possess for the Certification examinations in this area. The CREST Registered Intrusion Analyst (CRIA) examination tests a candidates’ knowledge across all three subject areas of network intrusion, host intrusion and malware reverse engineering.

http://www.crest-approved.org/information-security-testers/registered-intrusion-analyst/index.html

EC-Council , Certified Computer Hacking Forensic Investigator – CHFI

You will also learn how to create an effective computer crime policy, and gain the hands on skills to implement it. After attending Computer Forensics Training, you will leave with a custom computer forensics toolkit that will enable you to perform a legally admissible forensics investigation and the skills to run the investigation properly. This hands-on computer forensics training offers practical experience in a wide array of computer forensics situations that are applicable to the real world. Learn everything relating to computer forensics --- from how to establish a proper chain of custody that is admissible in a court of law to recovering files from intentionally damaged media.

http://www.infosecinstitute.com/courses/computer_forensics_training.html

EC-Council Certified Security Analyst – ECSA

InfoSec Institute’s Advanced Ethical Hacking Boot Camp aims to train you on how to successfully attack fully patched and hardened systems, how to circumvent common security controls, and how to get to confidential data. This is all possible if you have 0day exploits, or the ability to create your own exploit code. In this class, you will learn how to exploit modern operating system protections, such as ASLR and DEP, using ROP attacks, egghunter shellcode and heap spraying.

http://www.infosecinstitute.com/courses/advanced_ethical_hacking_training.html

GIAC Certified Forensic Analyst (GCFA)

The GCFA certification is for professionals working in the information security, computer forensics, and incident response fields. The certification focuses on core skills required to collect and analyze data from Windows and Linux computer systems.

http://www.giac.org/certification/certified-forensic-analyst-gcfa

GIAC Certified Intrusion Analyst (GCIA)

GIAC Certified Intrusion Analysts (GCIAs) have the knowledge, skills, and abilities to configure and monitor intrusion detection systems, and to read, interpret, and analyze network traffic and related log files.

http://www.giac.org/certification/certified-intrusion-analyst-gcia

GIAC Certified Perimeter Protection Analyst (GPPA)

The GIAC Certified Firewall Analyst (GCFW) certification has been renamed to the GIAC Certified Perimeter Protection Analyst (GPPA) effective January 1, 2014. This change comes as the industry continues to incorporate Cloud, mobile and virtualization into their systems, presenting new challenges into the traditional perimeter defences. The GPPA addresses these challenges as well as traditional perimeter protection and multilayered security. Once upon a time, perimeter security included primarily firewalls. Today, perimeter security involves much more than just firewalls to protect our environments. The perimeter is not what it used to be! Therefore, the GCFW certification has been renamed to properly reflect that fact.

http://www.giac.org/certification/certified-perimeter-protection-analyst-gppa

GIAC Mobile Device Security Analyst (GMOB)

Mobile phones and tablets continue to demonstrate their usefulness and importance in enterprises and government offices. With the amount of sensitive data that can be accessed on these devices and their lack of security, mobile devices are enticing targets for nefarious attackers. The GMOB ensures that the people charged with protecting systems and networks know how to properly secure the mobile devices accessing vital information.

http://www.giac.org/certification/mobile-device-security-analyst-gmob

GIAC Network Forensic Analyst (GNFA)

The GNFA certification is for professionals who want to demonstrate that they qualified to perform examinations employing network forensic artifact analysis. Candidates are required to demonstrate an understanding of the fundamentals of network forensics, normal and abnormal conditions for common network protocols, the process and tools used to examine device and system logs, wireless communication and encrypted protocols.

http://www.giac.org/certification/network-forensic-analyst-gnfa

IACRB, Certified Reverse Engineering Analyst (CREA

The CREA is a multiple part exam. The first portion consists of a 50 question multiple choice style exam. Candidates have 2 hours to complete the exam. Candidates must achieve a 70% score or higher in order to pass the first portion of the exam. Candidates that pass the first portion of the CREA then receive the practical portion of the exam. The practical examination consists of an encrypted archived zip file. The current series of practicals contain a live malware sample collected in the wild. The password for the file is infected.

http://www.iacertification.org/crea_certified_reverse_engineering_analyst.html

Courses

American InterContinental University, MIT: Information Assurance and Security

The Master of Information Technology (MIT) with a Specialization in Information Assurance and Security degree is a program designed to bring students industry-current and important knowledge to help develop them as IT professionals in the digital world. Students enrolled in this information security masters degree program will not only build upon prior knowledge from undergraduate coursework, but will also explore the realities and challenges of maintaining digital security systems and processes in the current industry climate.

http://www.aiuniv.edu/degrees/masters/it/security

Birmingham City University, MSc Cyber Security

This course has been designed to provide you with technical cyber security knowledge, in-depth understanding of underpinning principles and practical professional skills to successfully meet emerging cyber security challenges facing modern organisations. The course aims to meet the rising industrial and commercial demand for security architects, engineers, analysts, administrators able to design, analyse, implement and manage secure systems. At the same time, it provides an opportunity to develop a research career in information security working with top experts in their fields at the Centre for Cyber Security.

http://www.bcu.ac.uk/courses/cyber-security-msc

Canterbury Christ Church University, MSc Computer Forensics and Security

Computer Forensics and Security are interesting, dynamic and growing areas of Computing. As cybercrime continues to rise, so too does the need for computing professionals to lead the fight against it. Computer security involves (amongst other things) protecting computer systems from malicious attacks, human error, and exploitation of vulnerabilities. This includes utilising an ethical hacking approach to highlight security vulnerabilities so that they can be fixed or mitigated.

http://www.canterbury.ac.uk/study-here/courses/undergraduate/computer-forensics-and-security-17-18.aspx

Canterbury Christ Church University, MSc Cybercrime Forensics

Cybercrime Forensics is a continuously evolving discipline that addresses the increasing use of computer technology in criminal activity. This is a taught HE Level 7 extension course currently offered as a closed part-time course to Law Enforcement Officers only. As an alternative, the School of Law, Criminal Justice and Computing offers MSc Forensic Computing degrees to those who are not employed in the UK Law Enforcement.

https://www.canterbury.ac.uk/study-here/courses/postgraduate/cybercrime-forensics.aspx

Cardiff University, MSc Advanced Computer Science

Designed for computing graduates who wish to differentiate themselves further through an advanced mastery of the discipline, this flagship programme offers exposure to state-of-the-art topics that are driving key technological developments and trends.

http://courses.cardiff.ac.uk/postgraduate/course/detail/p072.html

Cardiff University, MSc Information Security and Privacy

This programme addresses the key security issues that are faced by global communications and information systems. The programme provides a mix of business context with core security, trust and privacy issues that challenge the IT sector. As well as studying themes such as trust and identity and forensic investigation, security techniques and network and cyber security, the programme provides an understanding of the e-Commerce and business environment. This combined business/security approach provides valuable training for interacting with organisations, and understanding their business functions in a deeper context.

http://courses.cardiff.ac.uk/postgraduate/course/detail/p148.html

City University London, MSc in Cyber Security

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security. The primarily objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.

http://www.city.ac.uk/courses/postgraduate/cyber-security 

City University London, MSci/ BSc (Hons) Computer Science with Cyber Security

Computer Science with Cyber Security focuses on how software and programming work, together with specialist content in
 computer security. Starting with
 core foundational skills, such as programming, the course progresses to cover a range of computing topics with a focus on practical application, while maintaining a strong theoretical underpinning. 

http://www.city.ac.uk/courses/undergraduate/computer-science-cyber-security-msci/2015

Coventry University, MSc Forensic Security

To pursue an exciting and expert career in forensic computing you will be required to acquire specialist knowledge and skills that can be gained on our MSc in Forensic Computing. The course covers a range of skills that are essential for the retrieval of computer-based information for criminal investigations.

http://www.coventry.ac.uk/course-structure/2014/faculty-of-engineering-and-computing/postgraduate/forensic-computing-msc/

Cranfield University, MSc Forensic Computing by Research

Forensic Computing also referred to as Computer Forensics, Digital Forensics or Cyber Forensics, refers to a branch of Forensic Science that is concerned with the investigation of digital devices to recover evidence of crime. The Forensic Computing MSc is available both full-time and part-time. Students will complete a number of taught modules each with theoretical and practical elements and, for the MSc, an individual research project.

https://www.cranfield.ac.uk/courses/masters/forensic-computing.html

De Montfort University, MSc Forensic Computing for Practitioners – Professional

Many professionals, who have developed a successful career in this domain, do not have a relevant first degree. This programme of modules is intended to provide a pathway to academic accreditation and recognition for current practitioners. The course recognises and addresses the need for continuing professional development and career progression within a rapidly changing environment.

http://www.dmu.ac.uk/study/courses/postgraduate-courses/fc4p/forensic-computing-for-practitioners.aspx

Edge Hill University, MSc in Cyber Security

This MSc in Cyber Security addresses these requirements by increasing relevant knowledge and skills in line with the UK Government’s National Cyber Security Strategy, while also addressing the national skills shortage in information security. You will develop an understanding of current issues in information security and cyber security, as well as gain in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource and for analysing and controlling security risks.

https://www.edgehill.ac.uk/courses/cyber-security/

Edge Hill University, MSc Information Security and IT Management

This Master’s degree is aimed at current or prospective system managers, system administrators and other IT professionals with a responsibility or aspiration for strategic IT and security management. You will gain an understanding of current issues in information security and IT management, together with an in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource as well as for analysing and controlling security risks. A key aspect of the programme is the systemic perspective that is taken; security is not simply a technical issue, but a component of the wider context of IT management.

https://www.edgehill.ac.uk/courses/information-security-and-it-management/modules/ 

Edinburgh Napier University, MSc Advanced Security and Digital Forensics

The Masters degree in Advanced Security and Cybercrime focuses on extending your knowledge into leading-edge issues related to network and computer security technologies and processes, both generally and with a particular focus on the growing threats from cybercrime. The course blends hands-on technical knowledge with theoretical understanding, utilizing a range of remotely accessible resources to allow access to specialized computer configurations. These remote systems allow you to engage with the practical activities of the course from home or work. We also have well-equipped labs, which can be utilized if you wish to attend the campus.

http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

Training Course: 7Safe, CCI - Network Forensic Investigation: Hands-On

The 7Safe hands-on Network Forensic Investigation training course is designed to provide you with the skills to isolate, investigate and extract evidence from a live networked environment during or after a cyber incident.  This is a new course introduced in 2015 and is an intensive 4 days’ training designed for experienced forensics analysts/cyber investigators only.

http://7safe.com/cci-network-forensic-investigation-hands-on.htm

Training Course: 7Safe, CDaCT Certified Data Collection Technician: Hands-On

It is essential in all civil, regulatory, and criminal matters that the correct data capture and handling procedures are followed in order that any investigation and resulting action are not compromised - this brand new 2-day course has therefore been specifically designed and developed for those individuals who are required to collect data during the initial stages of an investigation, advise on and/or handle data on a regular basis, but who do not need to forensically analyse that data.

http://7safe.com/certified-data-collection-technician-hands-on.htm

Training Course: 7Safe, Certified Application Security Tester (CAST)

The CAST course is billed as an advanced application security course and as such a number of pre-requisites are recommended before attendance. The advanced nature of the course means a number of topics are not included, however these topics are generally in line with the intended audience.

http://www.crest-approved.org/7safe-training/index.html

Training Course: 7Safe, Certified Security Testing Professional (CSTP)

The course provides a good grounding in the knowledge and skills required of a CREST CRT consultant. It is not by any means exhaustive, however no course of this length can be. It covers a wide range of topics, a large many of which are pre-requisite knowledge for anyone in the process of studying for the CRT qualification.

http://www.crest-approved.org/training-and-academia/crest-accredited-training-courses/index.html

Training Course: 7Safe, Certified Wireless Security Analyst (CWSA)

The course provides a good grounding in the knowledge and skills required of a CREST CRT consultant. It is not by any means exhaustive, however no course of this length can be. It covers a wide range of topics, a large many of which are pre-requisite knowledge for anyone in the process of studying for the CRT qualification. The course does not concentrate solely on the technical but also provides a good introduction to the soft skills and assessment management skills required of a competent CRT consultant.

http://www.crest-approved.org/training-and-academia/crest-accredited-training-courses/index.html

Training Course: 7Safe, CFIP Forensic Investigation: Hands-On

On this 4 day practical computer forensics training course, gain an understanding of static computer forensics analysis by learning about forensic principles, evidence continuity and methodology to employ when conducting a forensic investigation. Using practical case scenarios, you will be guided through the process of conducting a computer forensics investigation, and will learn the principles surrounding the collection of evidence, together with the forensic tools associated with forensic analysis.

http://7safe.com/forensic_investigation_course-technical_hands-on.html

Training Course: 7Safe, CFIS Advanced Forensic Investigation: Hands-On

Since computer forensics became mainstream over 15 years ago, it has had to constantly evolve due to the introduction of new technologies. With systems now running 24/7/365 it is essential to have the knowledge and skills to capture and process data from ‘live’ systems and be aware of the latest guidelines and artefacts available on current Windows operating systems to conduct an efficient and comprehensive analysis.

http://7safe.com/computer_security_course-technical_hands-on.html

Training Course: 7Safe, CLFP - Linux Forensic Investigation: Hands On

The 7Safe Linux Forensic Investigation training course is designed to equip digital forensic analysts and investigators with the knowledge and skills to navigate, identify, capture and examine data from Linux based systems.  This is a two-day hands-on course, ideally suited to experienced investigators who are looking to extend their knowledge of this increasingly popular operating system.

http://7safe.com/clfp-linux-forensic-investigation-hands-on.htm

Training Course: 7Safe, CMFS Apple Mac Forensics: Hands-On

This Mac forensics training course (2 days) gives delegates a practical understanding of:

  • Data structures and potential evidence as produced in Apple Mac OS X environments
  • Implementing forensic tools on Mac OS X-based file systems

http://7safe.com/applied_mac_forensics.htm

Training Course: 7Safe, CMI - Malware Investigation: Hands-On

On this 3 day practical training course, extend your knowledge beyond conventional static computer forensics analysis. You will be guided through the process of conducting malware analysis, from the principles surrounding the different analysis environments and 7Safe's malware investigation methodology to investigating network activity stemming from malicious software infection. 

http://7safe.com/computer_malware_investigation_training_course.htm

Training Course: 7Safe, CWSA Wireless Security: Hands-On

The course follows the evolution of wireless security, teaching the underlying principles so that delegates leave not only with an understanding of the current scene but also better prepared as the world of wireless inevitably changes. Hands-on exercises reinforce theory with practice, allowing delegates to see the methods work for themselves.

http://7safe.com/wireless_security_training_course.htm

Training Course: IRM, Attack and Defence Simulator

This one day course comprises of a half day ethical hacking and incident response workshop designed to introduce delegates to the theory of both cyber topics. This is then followed by a half day ethical hacking and incident response simulation exercise focused around a fictitious website in order to test the practical application of theory taught during the first half of the course. The fast paced and interactive course tests and improves cyber security threat awareness, theory and technical security skills, in addition to how teams cooperate in the midst of a cyber security incident. The Attack and Defence Simulator was first created for Oxford University’s Cyber Security Centre in order to provide cyber professionals of the future with the necessary intelligence and practical experience to defend the UK’s most crucial businesses.

http://www.irmplc.com/training/attack-and-defence-simulator/

Training Course: IT Governance, CMI Malware Investigation

On this 3 day practical training course, extend your knowledge beyond conventional static computer forensics analysis.

http://www.itgovernance.co.uk/shop/p-470-cmi-malware-investigation-hands-on-training-course.aspx#.VX6W9_lViko

Training Course: IT Governance, CSIS Computer Security Incident Investigation Hands On

This 4 day course is designed to equip information security specialists with the knowledge and skills to deal effectively with incident response situations.

http://www.itgovernance.co.uk/shop/c-210-training-courses.aspx?pagenum=3

Training Course: PGI Advanced Threat Methodology

The Advanced Threat Methodology course will teach you precisely how an external threat may attack your organisation, which will help you to develop strategies, system management techniques and user policies to defend your network and critical information. You will receive in-depth, hands-on training on a variety of tools for gaining access to a remote network.

http://courses.independent.co.uk/training/pgi/advanced-threat-methodology-586948

Training Course: PGI, Operational Digital Forensics

This 6 or 10 day Operational Digital Forensics course will provide you with investigating skills and knowledge of digital forensics relating to cyber-enabled crime (traditional crimes committed whereby digital media has been used as a resource), and cybercrime whereby threats to networks, hosts and users have the potential to become criminal, but are essentially investigated via incident response. You will also become a malware hunter and defender for your organisation; you will know what looks suspicious and which tools to use to help you investigate and identify malware at a forensic level.

http://pgicyberacademy.com/courses/operational-digital-forensics-staff/

Training Course: SANS, SEC504: Hacker Tools, Techniques, Exploits and Incident Handling

The course is particularly well-suited to individuals who lead or are a part of an incident handling team. General security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to prevent, detect, and respond to attacks.

https://www.sans.org/course/hacker-techniques-exploits-incident-handling

University of Surrey, MSc in Information Security

The science behind our Information Security MSc connects various disciplines (from computer science, electronic engineering and mathematics) and aims to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.   Focused on key information security concepts, mechanisms and technologies, our MSc examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

http://www.surrey.ac.uk/postgraduate/information-security