Professional & Academic

Certifications

CREST Certified Host Intrusion Analyst

The CREST Certified Host Intrusion Analyst (CC HIA) examination tests candidates’ knowledge of analysing Windows hosts for evidence of potential compromise and analysing potential infection vectors. The examination is a rigorous assessment of the candidate’s ability to assess a Windows host for indications of malware and related forensic artefacts.

http://www.crest-approved.org/examination/host-intrusion-analyst/index.html

CREST Certified Infrastructure Tester

The CREST Certified Infrastructure Tester examination is a rigorous assessment of the candidate’s ability to assess a network for flaws and vulnerabilities at the network and operating system layer. The exam includes:

  • Public domain information sources
  • Networking
  • Windows operating systems
  • Unix operating systems
  • Desktops
  • Databases
  • Voice networking
  • Wireless networking

http://www.crest-approved.org/examination/certified-infrastructure-tester/index.html

CREST Certified Network Intrusion Analyst

The Certified Network Intrusion Analyst (CC NIA) examination tests candidates’ knowledge of analysing network traffic and log files for evidence of potential compromise and analysing the potential underlying causes and infection vectors. The examination is a rigorous assessment of the candidate’s ability to assess a given network for indications of malicious activity including remote control and data ex-filtration.

https://www.crest-approved.org/examination/certified-network-intrusion-analyst/

CREST Certified Web Application Tester

The CREST Certified Web Application Tester examination is an assessment of the candidate’s ability to find vulnerabilities in bespoke web applications.  The examination uses specially designed applications running on a variety of web application platforms and now covers a wider scope than purely traditional web applications to include more recent advances in the field of web application technology and security.  The candidate will be expected to demonstrate that they are able to find a range of security flaws and vulnerabilities, including proving the ability to exploit and leverage the flaws to ascertain the impact of the issues found.

http://www.crest-approved.org/examination/certified-web-application-tester/index.html

CREST Practitioner Security Analyst

The CREST Practitioner Security Analyst (CPSA) examination tests a candidate’s knowledge in assessing operating systems and common network services at a basic level below that of the main CRT and CCT qualifications.  The CPSA examination also includes an intermediate level of web application security testing and methods to identify common web application security vulnerabilities.

http://www.crest-approved.org/examination/practitioner-security-analyst/index.html´╗┐

CREST Registered Penetration Tester

CREST provides an entry level Registered Tester examination.  This examination is recognised by CESG as providing the minimum standard for CHECK Team Member status and is designed to assess a candidate’s ability to carry out basic vulnerability assessment and penetration testing tasks.

http://www.crest-approved.org/professional-examinations/registered-tester/index.html

GIAC Certified Perimeter Protection Analyst (GPPA)

The GIAC Certified Firewall Analyst (GCFW) certification has been renamed to the GIAC Certified Perimeter Protection Analyst (GPPA) effective January 1, 2014. This change comes as the industry continues to incorporate Cloud, mobile and virtualization into their systems, presenting new challenges into the traditional perimeter defences. The GPPA addresses these challenges as well as traditional perimeter protection and multilayered security. Once upon a time, perimeter security included primarily firewalls. Today, perimeter security involves much more than just firewalls to protect our environments. The perimeter is not what it used to be! Therefore, the GCFW certification has been renamed to properly reflect that fact.

http://www.giac.org/certification/certified-perimeter-protection-analyst-gppa

GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)

Security personnel whose job duties involve assessing target networks, systems and applications to find vulnerabilities. The GXPN certifies that candidates have the knowledge, skills, and ability to conduct advanced penetration tests, how to model the abilities of an advanced attacker to find significant security flaws in systems, and demonstrate the business risk associated with these flaws.

http://www.giac.org/certification/exploit-researcher-advanced-penetration-tester-gxpn

GIAC Security Essentials (GSEC)

Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. 

http://www.giac.org/certification/security-essentials-gsec

GIAC Security Leadership (GSLC)

Security Professionals with managerial or supervisory responsibility for information security staff. No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security.

http://www.giac.org/certification/security-leadership-gslc

GIAC Systems and Network Auditor (GSNA)

GIAC Systems and Network Auditors (GSNAs) have the knowledge, skills and abilities to apply basic risk analysis techniques and to conduct a technical audit of essential information systems. Technical staff responsible for securing and auditing information systems; auditors who wish to demonstrate technical knowledge of the systems they are responsible for auditing.

http://www.giac.org/certification/systems-network-auditor-gsna

Courses

Abertay University, MSc/PGDip Ethical Hacking & Computer Security

Abertay is the only university in the UK that offers a Masters programme in Ethical Hacking and our students are passionate about their subject area and developing their knowledge. Ethical Hacking is the process of evaluating the security of a computer system by simulating an attack by a malicious hacker. The course is designed to teach students how to think like a hacker, providing them with a deep understanding of security issues and concerns.

http://www.abertay.ac.uk/courses//pg/ehcs/

American InterContinental University, MIT: Information Assurance and Security

The Master of Information Technology (MIT) with a Specialization in Information Assurance and Security degree is a program designed to bring students industry-current and important knowledge to help develop them as IT professionals in the digital world. Students enrolled in this information security masters degree program will not only build upon prior knowledge from undergraduate coursework, but will also explore the realities and challenges of maintaining digital security systems and processes in the current industry climate.

http://www.aiuniv.edu/degrees/masters/it/security

Birmingham City University, MSc Cyber Security

This course has been designed to provide you with technical cyber security knowledge, in-depth understanding of underpinning principles and practical professional skills to successfully meet emerging cyber security challenges facing modern organisations. The course aims to meet the rising industrial and commercial demand for security architects, engineers, analysts, administrators able to design, analyse, implement and manage secure systems. At the same time, it provides an opportunity to develop a research career in information security working with top experts in their fields at the Centre for Cyber Security.

http://www.bcu.ac.uk/courses/cyber-security-msc

Canterbury Christ Church University, MSc Computer Forensics and Security

Computer Forensics and Security are interesting, dynamic and growing areas of Computing. As cybercrime continues to rise, so too does the need for computing professionals to lead the fight against it. Computer security involves (amongst other things) protecting computer systems from malicious attacks, human error, and exploitation of vulnerabilities. This includes utilising an ethical hacking approach to highlight security vulnerabilities so that they can be fixed or mitigated.

http://www.canterbury.ac.uk/study-here/courses/undergraduate/computer-forensics-and-security-17-18.aspx

City University London, MSc in Cyber Security

MSc Cyber Security will prepare you for a successful career in the various roles directly and indirectly connected to the world of computer, network and information security. It will develop your specialist analytical, operational and development skills in both technical and socio-technical areas of cyber security. The primarily objective of MSc Cyber Security is to practise security with an interdisciplinary shared coursework that spans across all security related modules.

http://www.city.ac.uk/courses/postgraduate/cyber-security 

Coventry University, MSc Forensic Security

To pursue an exciting and expert career in forensic computing you will be required to acquire specialist knowledge and skills that can be gained on our MSc in Forensic Computing. The course covers a range of skills that are essential for the retrieval of computer-based information for criminal investigations. Your masters project can be conducted either as a placement in an external organisation or working with one of the University research groups.

http://www.coventry.ac.uk/course-structure/2014/faculty-of-engineering-and-computing/postgraduate/forensic-computing-msc/

De Montfort University, MSc in Cyber Security

Developed in conjunction with Deloitte, this course provides you with knowledge of the very latest cyber security principles, practices, tools and techniques, taught by a team of specialist staff in purpose-built computer cyber security laboratories. Graduates from this course are expected to make a real contribution to safeguarding cyber space and protecting national and organisational resources from unauthorised access and or malicious intent.

http://www.dmu.ac.uk/study/courses/postgraduate-courses/cyber-security.aspx

Edge Hill University, MSc in Cyber Security

This MSc in Cyber Security addresses these requirements by increasing relevant knowledge and skills in line with the UK Government’s National Cyber Security Strategy, while also addressing the national skills shortage in information security. You will develop an understanding of current issues in information security and cyber security, as well as gain in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource and for analysing and controlling security risks.

https://www.edgehill.ac.uk/courses/cyber-security/

Edge Hill University, MSc Information Security and IT Management

This Master’s degree is aimed at current or prospective system managers, system administrators and other IT professionals with a responsibility or aspiration for strategic IT and security management. You will gain an understanding of current issues in information security and IT management, together with an in-depth knowledge of a variety of techniques for strategically managing IT, both as a resource as well as for analysing and controlling security risks. A key aspect of the programme is the systemic perspective that is taken; security is not simply a technical issue, but a component of the wider context of IT management.

https://www.edgehill.ac.uk/courses/information-security-and-it-management/modules/ 

Edinburgh Napier University, MSc Advanced Security and Cybercrime

This course is focused on delivering to professionals already employed in the area of computing who wish to develop their skills into the areas of computer security and cybercrime. It allows employees to gain significant course credits by applying knowledge and skills gained from this course to their own company’s procedures and systems. Additionally, modules are available on a distance learning basis.

http://www.courses.napier.ac.uk/advancedsecurityandcybercrime_w56740.htm

Edinburgh Napier University, MSc Advanced Security and Digital Forensics

The Masters degree in Advanced Security and Cybercrime focuses on extending your knowledge into leading-edge issues related to network and computer security technologies and processes, both generally and with a particular focus on the growing threats from cybercrime. The course blends hands-on technical knowledge with theoretical understanding, utilizing a range of remotely accessible resources to allow access to specialized computer configurations. These remote systems allow you to engage with the practical activities of the course from home or work. We also have well-equipped labs, which can be utilized if you wish to attend the campus.

http://www.napier.ac.uk/courses/msc-advanced-security-and-digital-forensics-postgraduate-parttime

Queens Belfast University, MSc in Applied Cyber Security

Our MSc in Cyber Security aims to develop the next generation of industry leaders and address the shortage of cyber security professionals globally. The emphasis of the masters is to provide graduates with a comprehensive understanding of the cyber security challenges facing industry and society, today and in the future, and equipping them with the skills necessary to address those challenges. The MSc offers students a syllabus informed by the world-class research in the areas of data, network, media and physical security, being undertaken at Queen’s University Belfast’s Centre for Secure Information Technologies (CSIT).

http://www.qub.ac.uk/Study/Course-Finder/PCF1718/PTCF1718/Course/AppliedCyberSecurity.html

Royal Holloway, University of London, MSc Information Security

The Information Security course looks at both technical and management aspects of cyber security and teaches you about technologies including cryptography, computer security, fraud detection, and digital forensics. You will gain cyber security skills for senior level careers by focusing on principles and issues, and you will learn how information security can best be managed. You will benefit from Royal Holloway’s wealth of research, expertise and practical consulting experience, which ensures that the degree is up to date and commercially relevant. You can study most modules on a standalone basis and earn CPE credits. Students come from a variety of backgrounds, ranging from new graduates through to senior security managers in blue chip enterprises seeking a formal qualification in Information Security.

http://www.londoninternational.ac.uk/infosec/?utm_campaign=il2014&utm_source=findamasters-profile-msc-information-security&utm_medium=profile-link&utm_content=msc-information-security&utm_term=smrs

Training Course: 7Safe, CAST Advanced Application Security Testing: Hands-On

This is an advanced practical 4 day web hacking training course for penetration testers, security researchers, and security professionals needing to learn the art of security testing web applications. This hands-on course helps the attendees gain in-depth knowledge on how to identify security vulnerabilities and subsequently identify the real risk of these vulnerabilities by exploiting them. The course also covers the syllabus for the CREST Web Application Exam. The training utilises a collection of up-to-date modern hacking tools required for conducting a complete web application security assessment.

http://7safe.com/application_security_training_course.htm

Training Course: 7Safe, CWSA Wireless Security: Hands-On

The course follows the evolution of wireless security, teaching the underlying principles so that delegates leave not only with an understanding of the current scene but also better prepared as the world of wireless inevitably changes. Hands-on exercises reinforce theory with practice, allowing delegates to see the methods work for themselves.

http://7safe.com/wireless_security_training_course.htm

Training Course: IT Governance, CISSP - Certified Information Systems Security Professional

The Certified Information Systems Security Professional (CISSP) certification is highly sought after by those who are looking to further a career in information security. Our CISSP Accelerated Training Programme is an intensive, in-depth, supported training course that has consistently achieved a 95% pass rate in the CISSP examination.

http://www.itgovernance.co.uk/shop/p-456-cissp-accelerated-training-programme.aspx#.VV8989JVhBc

Training Course: PGI Advanced Threat Methodology

The Advanced Threat Methodology course will teach you precisely how an external threat may attack your organisation, which will help you to develop strategies, system management techniques and user policies to defend your network and critical information. You will receive in-depth, hands-on training on a variety of tools for gaining access to a remote network.

http://courses.independent.co.uk/training/pgi/advanced-threat-methodology-586948

Training Course: PGI QSTM Course

This 5 day course covers both the practical and theoretical knowledge and demonstration of security assessment skills. Candidates will be taught and be able to demonstrate: Information security in the corporate world, Professionalism and communications, skills ethics and the law, Network enumeration and network mapping, Network device management and exploitation, Service enumeration

Service topology/dependency mapping, Service management and exploitation, Application enumeration and profiling, Application and operating system management, Application and operating system exploitation and manipulation.

https://cyberservicesportal.pgicyber.com/#/productView/CYB-QSTM

Training Course: SANS, SEC440: Critical Security Controls: Planning, Implementing and Auditing

This course helps you master specific, proven techniques and tools needed to implement and audit the Critical Security Controls as documented by the Council on CyberSecurity. For security professionals, the course enables you to see how to put the controls in place in your existing network though effective and widespread use of cost-effective automation. For auditors, CIOs, and risk officers, the course is the best way to understand how you will measure whether the controls are effectively implemented. SEC440 does not contain any labs.

https://www.sans.org/course/critical-security-controls-planning-implementing-auditing

Training Course: SANS, SEC480: Top 4 Mitigation Strategies: Implementing & Auditing

For security professionals, this course enables you to practically implement these strategies in in your existing network using a variety of technologies and methods. For auditors, CIOs and risk officers this course is the best way to understand how to measure if the Top 4 mitigation strategies have been effectively implemented in an organisation. After attending this hands-on course, individuals will be able to effectively implement and audit the Top 4 mitigation strategies in their own environments to achieve a significant level of security.

https://www.sans.org/course/implementation-auditing-top-4-mitigation-strategies

Training Course: SANS, SEC504: Hacker Tools, Techniques, Exploits and Incident Handling

The course is particularly well-suited to individuals who lead or are a part of an incident handling team. General security practitioners, system administrators, and security architects will benefit by understanding how to design, build, and operate their systems to prevent, detect, and respond to attacks.

https://www.sans.org/course/hacker-techniques-exploits-incident-handling

Training Course: SANS, SEC542: Web App Penetration Testing and Ethical Hacking

Modern cyber defence requires a realistic and thorough understanding of web application security issues. Anyone can learn to sling a few web hacks, but web application penetration testing requires something deeper. SEC542 will enable students to capably assess a web application's security posture and convincingly demonstrate the impact of inadequate security that plagues most organizations. Students will come to understand major web application flaws and their exploitation and, most importantly, learn a field-tested and repeatable process to consistently find these flaws and convey what they have learned to their organizations.

https://www.sans.org/course/web-app-penetration-testing-ethical-hacking

Training Course: SANS, SEC560: Network Penetration Testing and Ethical Hacking

As a cyber security professional, you have a unique responsibility to find and understand your organization's vulnerabilities, and to work diligently to mitigate them before the bad guys pounce. Are you ready? SANS SEC560, our flagship course for penetration testing, fully arms you to address this duty head-on.

https://www.sans.org/course/network-penetration-testing-ethical-hacking

Training Course: SANS, SEC562: CyberCity Hands-on Kinetic Cyber Range Exercise

Computers, networks, and programmable logic controllers operate most of the physical infrastructure of our modern world, ranging from electrical power grids, water systems, and traffic systems all the way down to HVAC systems and industrial automation. Increasingly, security professionals need the skills to assess and defend these important infrastructures. In this innovative and cutting-edge course based on the SANS CyberCity kinetic range, you will learn how to analyse and assess the security of control systems and related infrastructures, finding vulnerabilities that could result in significant kinetic impact.

https://www.sans.org/course/cybercity-hands-on-kinetic-cyber-range-exercise

University College London, MSc Information Security

The Information Security MSc offers a specialist programme designed to provide a fundamental understanding of information security and to convey practical engineering skills. There are good prospects for highly trained information security professionals and there is a shortage of trained personnel in this area.

http://www.ucl.ac.uk/prospective-students/graduate/taught/degrees/information-security-msc

University of Southampton, MSc in Cyber Security

There is currently a worldwide shortage of skilled practitioners in cyber security. In the UK, the National Audit Office recently named "addressing the UK's current and future ICT and cyber security skills gap" as a "key challenge", whilst at a time when cybercrime “as-a-service” is on a steep rise, the Department for Business, Innovation & Skill calls for companies to make of cyber security a Board level responsibility. Our MSc is specifically designed to give students a well-rounded, multi-disciplinary view of the subject area, embracing not only the technical subjects, but also aspects of criminology, risk management, law and social sciences.  We believe a broad grounding in cyber security will give our students a key advantage in the marketplace.

http://www.ecs.soton.ac.uk/programmes/msc-cyber-security 

University of Surrey, MSc in Information Security

The science behind our Information Security MSc connects various disciplines (from computer science, electronic engineering and mathematics) and aims to design concepts, mechanisms and technologies for effective protection of digital information, communication infrastructures and computing systems.   Focused on key information security concepts, mechanisms and technologies, our MSc examines fundamental and advanced topics in important areas of modern information security, striving to achieve a balance between theoretical foundations and practical experience.

http://www.surrey.ac.uk/postgraduate/information-security

University of Warwick , MSc in Cyber Security and Management

The MSc in Cyber Security and Management is designed for those wishing to develop a career as a cyber security professional, or to take a leading technical or managerial role in an organisation critically dependent upon data and information communication technology. It is suitable for those from a computer science or information technology education background or courses with a significant component of either. Work experience will also be considered.

http://www2.warwick.ac.uk/fac/sci/wmg/education/wmgmasters/courses/cyber_security_management

University of York, MSc in Cyber Security

Our new MSc in Cyber Security is a forward-looking course that gives you the skills and knowledge you need in the core areas of cyber security. It emphasises the important technical material that will help you make effective cyber security decisions, and addresses issues.

http://www.cs.york.ac.uk/postgraduate/taught-courses/msc-cybersecurity/