Professional & Academic

Certifications

CREST Certified Infrastructure Tester

The CREST Certified Infrastructure Tester examination is a rigorous assessment of the candidate’s ability to assess a network for flaws and vulnerabilities at the network and operating system layer. The exam includes:

  • Public domain information sources
  • Networking
  • Windows operating systems
  • Unix operating systems
  • Desktops
  • Databases
  • Voice networking
  • Wireless networking

http://www.crest-approved.org/examination/certified-infrastructure-tester/index.html

CREST Certified Web Application Tester

The CREST Certified Web Application Tester examination is an assessment of the candidate’s ability to find vulnerabilities in bespoke web applications.  The examination uses specially designed applications running on a variety of web application platforms and now covers a wider scope than purely traditional web applications to include more recent advances in the field of web application technology and security.  The candidate will be expected to demonstrate that they are able to find a range of security flaws and vulnerabilities, including proving the ability to exploit and leverage the flaws to ascertain the impact of the issues found.

http://www.crest-approved.org/examination/certified-web-application-tester/index.html

CREST Certified Wireless Specialist

The CREST Certified Wireless Specialist (CCWS) tests candidates’ knowledge and expertise in a common set of core skills and knowledge for penetration testers performing traditional wireless security reviews but also includes elements such as RFID, bluetooth and zigbee amongst other wireless technologies.  Success will confer the qualification (CCWS) to an existing CREST Certified Consultant who has previously passed one of the CREST CCT level examinations

http://www.crest-approved.org/information-security-testers/certified-wireless-specialist/index.html

CREST Registered Penetration Tester

CREST provides an entry level Registered Tester examination.  This examination is recognised by CESG as providing the minimum standard for CHECK Team Member status and is designed to assess a candidate’s ability to carry out basic vulnerability assessment and penetration testing tasks.

http://www.crest-approved.org/professional-examinations/registered-tester/index.html

EC-Council , Certified Computer Hacking Forensic Investigator – CHFI

You will also learn how to create an effective computer crime policy, and gain the hands on skills to implement it. After attending Computer Forensics Training, you will leave with a custom computer forensics toolkit that will enable you to perform a legally admissible forensics investigation and the skills to run the investigation properly. This hands-on computer forensics training offers practical experience in a wide array of computer forensics situations that are applicable to the real world. Learn everything relating to computer forensics --- from how to establish a proper chain of custody that is admissible in a court of law to recovering files from intentionally damaged media.

http://www.infosecinstitute.com/courses/computer_forensics_training.html

GIAC Certified Forensic Analyst (GCFA)

The GCFA certification is for professionals working in the information security, computer forensics, and incident response fields. The certification focuses on core skills required to collect and analyze data from Windows and Linux computer systems.

http://www.giac.org/certification/certified-forensic-analyst-gcfa

GIAC Certified Forensic Examiner (GCFE)

The GCFE certification is for professionals working or interested in the information security, legal and law enforcement industries with a need to understand computer forensic analysis. The certification focuses on core skills required to collect and analyze data from Windows computer systems.

http://www.giac.org/certification/certified-forensic-examiner-gcfe

GIAC Certified Intrusion Analyst (GCIA)

GIAC Certified Intrusion Analysts (GCIAs) have the knowledge, skills, and abilities to configure and monitor intrusion detection systems, and to read, interpret, and analyze network traffic and related log files.

http://www.giac.org/certification/certified-intrusion-analyst-gcia

GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)

Security personnel whose job duties involve assessing target networks, systems and applications to find vulnerabilities. The GXPN certifies that candidates have the knowledge, skills, and ability to conduct advanced penetration tests, how to model the abilities of an advanced attacker to find significant security flaws in systems, and demonstrate the business risk associated with these flaws.

http://www.giac.org/certification/exploit-researcher-advanced-penetration-tester-gxpn

GIAC Reverse Engineering Malware (GREM)

The GIAC Reverse Engineering Malware (GREM) certification is designed for technologists who protect the organization from malicious code. GREM-certified technologists possess the knowledge and skills to reverse-engineer malicious software (malware) that targets common platforms, such as Microsoft Windows and web browsers. These individuals know how to examine inner-workings of malware in the context of forensic investigations, incident response, and Windows system administration.

http://www.giac.org/certification/reverse-engineering-malware-grem

IACRB, Certified Reverse Engineering Analyst (CREA

The CREA is a multiple part exam. The first portion consists of a 50 question multiple choice style exam. Candidates have 2 hours to complete the exam. Candidates must achieve a 70% score or higher in order to pass the first portion of the exam. Candidates that pass the first portion of the CREA then receive the practical portion of the exam. The practical examination consists of an encrypted archived zip file. The current series of practicals contain a live malware sample collected in the wild. The password for the file is infected.

http://www.iacertification.org/crea_certified_reverse_engineering_analyst.html

Courses

Abertay University, MSc/PGDip Ethical Hacking & Computer Security

Abertay is the only university in the UK that offers a Masters programme in Ethical Hacking and our students are passionate about their subject area and developing their knowledge. Ethical Hacking is the process of evaluating the security of a computer system by simulating an attack by a malicious hacker. The course is designed to teach students how to think like a hacker, providing them with a deep understanding of security issues and concerns.

http://www.abertay.ac.uk/courses//pg/ehcs/

Canterbury Christ Church University, MSc Computer Forensics and Security

Computer Forensics and Security are interesting, dynamic and growing areas of Computing. As cybercrime continues to rise, so too does the need for computing professionals to lead the fight against it. Computer security involves (amongst other things) protecting computer systems from malicious attacks, human error, and exploitation of vulnerabilities. This includes utilising an ethical hacking approach to highlight security vulnerabilities so that they can be fixed or mitigated.

http://www.canterbury.ac.uk/study-here/courses/undergraduate/computer-forensics-and-security-17-18.aspx

Canterbury Christ Church University, MSc Cybercrime Forensics

Cybercrime Forensics is a continuously evolving discipline that addresses the increasing use of computer technology in criminal activity. This is a taught HE Level 7 extension course currently offered as a closed part-time course to Law Enforcement Officers only. As an alternative, the School of Law, Criminal Justice and Computing offers MSc Forensic Computing degrees to those who are not employed in the UK Law Enforcement.

https://www.canterbury.ac.uk/study-here/courses/postgraduate/cybercrime-forensics.aspx

Cardiff University, MSc Advanced Computer Science

Designed for computing graduates who wish to differentiate themselves further through an advanced mastery of the discipline, this flagship programme offers exposure to state-of-the-art topics that are driving key technological developments and trends.

http://courses.cardiff.ac.uk/postgraduate/course/detail/p072.html

City University London, MSci/ BSc (Hons) Computer Science with Cyber Security

Computer Science with Cyber Security focuses on how software and programming work, together with specialist content in
 computer security. Starting with
 core foundational skills, such as programming, the course progresses to cover a range of computing topics with a focus on practical application, while maintaining a strong theoretical underpinning. 

http://www.city.ac.uk/courses/undergraduate/computer-science-cyber-security-msci/2015

De Montfort University, MSc Forensic Computing for Practitioners – Professional

Many professionals, who have developed a successful career in this domain, do not have a relevant first degree. This programme of modules is intended to provide a pathway to academic accreditation and recognition for current practitioners. The course recognises and addresses the need for continuing professional development and career progression within a rapidly changing environment.

http://www.dmu.ac.uk/study/courses/postgraduate-courses/fc4p/forensic-computing-for-practitioners.aspx

Essex University,MSc Computer Networks and Security

Our MSc Computer Networks and Security will equip you with the in-depth knowledge of the principles and practice of the quickly changing world of computer networks. Increasingly, such networks cannot be considered without the important issue of security and the content of this course addresses this need for the modern computer network professional. The course includes content such as current and future internet protocols, programming networked services and securing these systems. We offer a strong practical element through laboratory programmes in software engineering and in computer networking. Laboratory work in security includes unique environments where the techniques of the attackers can be observed and stopped using specialist security tools. 

http://www.essex.ac.uk/coursefinder/course_details.aspx?course=MSC+H60112

Training Course: 7Safe, CFIS Advanced Forensic Investigation: Hands-On

Since computer forensics became mainstream over 15 years ago, it has had to constantly evolve due to the introduction of new technologies. With systems now running 24/7/365 it is essential to have the knowledge and skills to capture and process data from ‘live’ systems and be aware of the latest guidelines and artefacts available on current Windows operating systems to conduct an efficient and comprehensive analysis.

http://7safe.com/computer_security_course-technical_hands-on.html

Training Course: 7Safe, CMI - Malware Investigation: Hands-On

On this 3 day practical training course, extend your knowledge beyond conventional static computer forensics analysis. You will be guided through the process of conducting malware analysis, from the principles surrounding the different analysis environments and 7Safe's malware investigation methodology to investigating network activity stemming from malicious software infection. 

http://7safe.com/computer_malware_investigation_training_course.htm

Training Course: 7Safe, CSTA Ethical Hacking: Hands-On

The course demonstrates hacking techniques - there's no better way to understand attacks than by doing them yourself - but this is always done with defence in mind and countermeasures are discussed throughout. The course is therefore suited to system administrators, IT security officers and budding penetration testers.

http://7safe.com/ethical_hacking_course-technical_hands-on.htm

Training Course: ActNow Training, BCS Certificate in Freedom of Information

The BCS Certificates in Data Protection and Freedom of Information provide a cost-effective solution to your information law training needs. Our BCS courses are designed to benefit both new DP and FOI officers as well as experienced practitioners. All our speakers are well known experts in their field who deliver a comprehensive course with the most up to date materials.

http://www.actnow.org.uk/bcs

Training Course: InfoSec Skills, Intrusion Analysis & Digital Forensics Essentials

This is the first cross discipline course of its' kind that covers the essential knowledge and skills needed for intrusion detection, incident handling, computer/network forensics and malware reverse engineering. This course raises the bar and sets a new security baseline for aspiring Intrusion Analysis and Digital Forensics professionals. Every team member should take this course before embarking upon their very own, more specialised, career path. Following this course a student may challenge the CREST core skills exam resulting in the CREST Registered Intrusion Analyst (CRIA) qualification.

https://www.infosecskills.com/Incident-Response

Training Course: IT Governance, CFIP Forensic Investigation

The CFIP training course and associated examination is a four day course, providing delegates with a practically based understanding of the legalities, best practice and methodologies used in the current computer forensic investigation environment. The course content covers seizure, evidence handling and data preservation, through to investigation and interpretation and finally the reporting and presentation of findings.

http://www.itgovernance.co.uk/shop/c-210-training-courses.aspx

Training Course: IT Governance, CISA - Certified Information Systems Auditor

This four-day CISA course is run by the official UK reseller of ISACA's CISA materials and is the perfect intensive preparation course for the CISA exam. The CISA exam changes every year and our up-to-date course always reflect the latest official guidance on content and exam questions.

http://www.itgovernance.co.uk/shop/c-213-training-courses.aspx

Training Course: IT Governance, EC-Council - Ethical Hacking and Countermeasures

This 5-day course is the ideal preparation tool for you wish to sit the examination in Ethical Hacking and Countermeasures.

http://www.itgovernance.co.uk/shop/c-210-training-courses.aspx

Training Course: PGI Advanced Threat Methodology

The Advanced Threat Methodology course will teach you precisely how an external threat may attack your organisation, which will help you to develop strategies, system management techniques and user policies to defend your network and critical information. You will receive in-depth, hands-on training on a variety of tools for gaining access to a remote network.

http://courses.independent.co.uk/training/pgi/advanced-threat-methodology-586948

Training Course: SANS, SEC504: Hacker Tools, Techniques, Exploits and Incident Handling

The course is particularly well-suited to individuals who lead or are a part of an incident handling team. General security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to prevent, detect, and respond to attacks.

https://www.sans.org/course/hacker-techniques-exploits-incident-handling