Professional & Academic
This certification is essential for anyone looking to step into an IT Support role. It covers key areas like installation, networking and troubleshooting. It also includes a communication skills module which is essential for working with end-users and clients.
This course provides fundamental network knowledge in areas such as assessing network traffic, troubleshooting, common protocols and network security.
Gaining a certification in CompTIA Security+ will give candidates a thorough understanding of subjects such as network security, threats and vulnerabilities and cryptography. These will increase the aptitude of the candidate in dealing with and preventing security threats.
CREST Registered Penetration Tester
CREST provides an entry level Registered Tester examination. This examination is recognised by CESG as providing the minimum standard for CHECK Team Member status and is designed to assess a candidate’s ability to carry out basic vulnerability assessment and penetration testing tasks.
EC-Council , Certified Computer Hacking Forensic Investigator – CHFI
You will also learn how to create an effective computer crime policy, and gain the hands on skills to implement it. After attending Computer Forensics Training, you will leave with a custom computer forensics toolkit that will enable you to perform a legally admissible forensics investigation and the skills to run the investigation properly. This hands-on computer forensics training offers practical experience in a wide array of computer forensics situations that are applicable to the real world. Learn everything relating to computer forensics --- from how to establish a proper chain of custody that is admissible in a court of law to recovering files from intentionally damaged media.
EC-Council Certified Security Analyst – ECSA
InfoSec Institute’s Advanced Ethical Hacking Boot Camp aims to train you on how to successfully attack fully patched and hardened systems, how to circumvent common security controls, and how to get to confidential data. This is all possible if you have 0day exploits, or the ability to create your own exploit code. In this class, you will learn how to exploit modern operating system protections, such as ASLR and DEP, using ROP attacks, egghunter shellcode and heap spraying.
GIAC Certified Intrusion Analyst (GCIA)
GIAC Certified Intrusion Analysts (GCIAs) have the knowledge, skills, and abilities to configure and monitor intrusion detection systems, and to read, interpret, and analyze network traffic and related log files.
GIAC Network Forensic Analyst (GNFA)
The GNFA certification is for professionals who want to demonstrate that they qualified to perform examinations employing network forensic artifact analysis. Candidates are required to demonstrate an understanding of the fundamentals of network forensics, normal and abnormal conditions for common network protocols, the process and tools used to examine device and system logs, wireless communication and encrypted protocols.
IACRB, Certified Application Security Specialist (CASS)
The Certified Application Security Specialist (CASS) certification is designed to assess the knowledge and skill set of candidates within application security and secure programming realm.
IACRB, Certified Computer Forensics Examiner (CCFE)
The Certified Computer Forensics Examiner (CCFE) tests a candidate's fundamental knowledge of the computer forensics evidence recovery and analysis process. Candidates are evaluated on their relevant knowledge of both hard and soft skills. Candidates will be tested on soft skills; they must prove that they have the requisite background knowledge of the complex legal issues that relate to the computer forensics field.
IACRB, Certified Data Recovery Professional (CDRP)
The Certified Data Recovery Professional (CDRP) tests a candidate's fundamental knowledge of data recovery. Candidates must have the skills to successfully recover data from damaged or partially destroyed hard drives, sold state media and removable media. In addition to physical data recovery concepts tested, students must know how to perform logical recovery on common operating systems.
IACRB, Certified Reverse Engineering Analyst (CREA
The CREA is a multiple part exam. The first portion consists of a 50 question multiple choice style exam. Candidates have 2 hours to complete the exam. Candidates must achieve a 70% score or higher in order to pass the first portion of the exam. Candidates that pass the first portion of the CREA then receive the practical portion of the exam. The practical examination consists of an encrypted archived zip file. The current series of practicals contain a live malware sample collected in the wild. The password for the file is infected.
IACRB, Certified SCADA Security Architect (CSSA)
The CSSA determines if a candidate possess adequate knowledge to properly secure a SCADA system. It is designed to be relevant for power transmission, oil and gas and water treatment industries. The CSSA certification provides professionals with an objective measure of competence as well as a recognizable standard of achievement. The CSSA credential is ideal for industrial network administrators and their managers, as well as IT professionals and their managers.
IACRB, Complete Penetration Testing
The goal of this course is to help you master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation. This penetration testing training course has a significant Return on Investment, you walk out the door with hacking skills that are highly in demand, as well as up to five certifications (CEH, CPT, CEPT and the ECSA)
American InterContinental University, MIT: Information Assurance and Security
The Master of Information Technology (MIT) with a Specialization in Information Assurance and Security degree is a program designed to bring students industry-current and important knowledge to help develop them as IT professionals in the digital world. Students enrolled in this information security masters degree program will not only build upon prior knowledge from undergraduate coursework, but will also explore the realities and challenges of maintaining digital security systems and processes in the current industry climate.
Birmingham City University, MSc Cyber Security
This course has been designed to provide you with technical cyber security knowledge, in-depth understanding of underpinning principles and practical professional skills to successfully meet emerging cyber security challenges facing modern organisations. The course aims to meet the rising industrial and commercial demand for security architects, engineers, analysts, administrators able to design, analyse, implement and manage secure systems. At the same time, it provides an opportunity to develop a research career in information security working with top experts in their fields at the Centre for Cyber Security.
Canterbury Christ Church University, MSc Computer Forensics and Security
Computer Forensics and Security are interesting, dynamic and growing areas of Computing. As cybercrime continues to rise, so too does the need for computing professionals to lead the fight against it. Computer security involves (amongst other things) protecting computer systems from malicious attacks, human error, and exploitation of vulnerabilities. This includes utilising an ethical hacking approach to highlight security vulnerabilities so that they can be fixed or mitigated.
Canterbury Christ Church University, MSc Cybercrime Forensics
Cybercrime Forensics is a continuously evolving discipline that addresses the increasing use of computer technology in criminal activity. This is a taught HE Level 7 extension course currently offered as a closed part-time course to Law Enforcement Officers only. As an alternative, the School of Law, Criminal Justice and Computing offers MSc Forensic Computing degrees to those who are not employed in the UK Law Enforcement.
Cardiff University, MSc Advanced Computer Science
Designed for computing graduates who wish to differentiate themselves further through an advanced mastery of the discipline, this flagship programme offers exposure to state-of-the-art topics that are driving key technological developments and trends.
Cardiff University, MSc Information Security and Privacy
This programme addresses the key security issues that are faced by global communications and information systems. The programme provides a mix of business context with core security, trust and privacy issues that challenge the IT sector. As well as studying themes such as trust and identity and forensic investigation, security techniques and network and cyber security, the programme provides an understanding of the e-Commerce and business environment. This combined business/security approach provides valuable training for interacting with organisations, and understanding their business functions in a deeper context.
City University London, MSc in Cyber Security
MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security. The primarily objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.
City University London, MSci/ BSc (Hons) Computer Science with Cyber Security
Computer Science with Cyber Security focuses on how software and programming work, together with specialist content in computer security. Starting with core foundational skills, such as programming, the course progresses to cover a range of computing topics with a focus on practical application, while maintaining a strong theoretical underpinning.
Coventry University, MSc Forensic Security
To pursue an exciting and expert career in forensic computing you will be required to acquire specialist knowledge and skills that can be gained on our MSc in Forensic Computing. The course covers a range of skills that are essential for the retrieval of computer-based information for criminal investigations. Your masters project can be conducted either as a placement in an external organisation or working with one of the University research groups.
Cranfield University, MSc Forensic Computing by Research
Forensic Computing also referred to as Computer Forensics, Digital Forensics or Cyber Forensics, refers to a branch of Forensic Science that is concerned with the investigation of digital devices to recover evidence of crime. The Forensic Computing MSc is available both full-time and part-time. Students will complete a number of taught modules each with theoretical and practical elements and, for the MSc, an individual research project.
De Montfort University, MSc Forensic Computing for Practitioners – Professional
Many professionals, who have developed a successful career in this domain, do not have a relevant first degree. This programme of modules is intended to provide a pathway to academic accreditation and recognition for current practitioners. The course recognises and addresses the need for continuing professional development and career progression within a rapidly changing environment.
Edge Hill University, MSc in Cyber Security
This MSc in Cyber Security addresses these requirements by increasing relevant knowledge and skills in line with the UK Government’s National Cyber Security Strategy, while also addressing the national skills shortage in information security. You will develop an understanding of current issues in information security and cyber security, as well as gain in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource and for analysing and controlling security risks.
Edge Hill University, MSc Information Security and IT Management
This Master’s degree is aimed at current or prospective system managers, system administrators and other IT professionals with a responsibility or aspiration for strategic IT and security management. You will gain an understanding of current issues in information security and IT management, together with an in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource as well as for analysing and controlling security risks. A key aspect of the programme is the systemic perspective that is taken; security is not simply a technical issue, but a component of the wider context of IT management.
Edinburgh Napier University, MSc Advanced Security and Digital Forensics
The Masters degree in Advanced Security and Cybercrime focuses on extending your knowledge into leading-edge issues related to network and computer security technologies and processes, both generally and with a particular focus on the growing threats from cybercrime. The course blends hands-on technical knowledge with theoretical understanding, utilizing a range of remotely accessible resources to allow access to specialized computer configurations. These remote systems allow you to engage with the practical activities of the course from home or work. We also have well-equipped labs, which can be utilized if you wish to attend the campus.
Training Course: 7Safe, CCI - Network Forensic Investigation: Hands-On
The 7Safe hands-on Network Forensic Investigation training course is designed to provide you with the skills to isolate, investigate and extract evidence from a live networked environment during or after a cyber incident. This is a new course introduced in 2015 and is an intensive 4 days’ training designed for experienced forensics analysts/cyber investigators only.
Training Course: InfoSec Skills, Intrusion Analysis & Digital Forensics Essentials
This is the first cross discipline course of its' kind that covers the essential knowledge and skills needed for intrusion detection, incident handling, computer/network forensics and malware reverse engineering. This course raises the bar and sets a new security baseline for aspiring Intrusion Analysis and Digital Forensics professionals. Every team member should take this course before embarking upon their very own, more specialised, career path. Following this course a student may challenge the CREST core skills exam resulting in the CREST Registered Intrusion Analyst (CRIA) qualification.
Training Course: SANS, MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
The most effective way to secure the human element is to establish a high-impact security awareness program that goes beyond just compliance and changes behaviours. This intense two-day course will teach you the key concepts and skills needed to build maintain and measure just such a program. All course content is based on lessons learned from hundreds of security awareness programs from around the world. You will learn not only from your instructor, but from extensive interaction with your peers, as well.
Training Course: SANS, SEC562: CyberCity Hands-on Kinetic Cyber Range Exercise
Computers, networks, and programmable logic controllers operate most of the physical infrastructure of our modern world, ranging from electrical power grids, water systems, and traffic systems all the way down to HVAC systems and industrial automation. Increasingly, security professionals need the skills to assess and defend these important infrastructures. In this innovative and cutting-edge course based on the SANS CyberCity kinetic range, you will learn how to analyse and assess the security of control systems and related infrastructures, finding vulnerabilities that could result in significant kinetic impact.
University of Surrey, MSc in Information Security
The science behind our Information Security MSc connects various disciplines (from computer science, electronic engineering and mathematics) and aims to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems. Focused on key information security concepts, mechanisms and technologies, our MSc examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.