Professional & Academic


CREST Certified Web Application Tester

The CREST Certified Web Application Tester examination is an assessment of the candidate’s ability to find vulnerabilities in bespoke web applications.  The examination uses specially designed applications running on a variety of web application platforms and now covers a wider scope than purely traditional web applications to include more recent advances in the field of web application technology and security.  The candidate will be expected to demonstrate that they are able to find a range of security flaws and vulnerabilities, including proving the ability to exploit and leverage the flaws to ascertain the impact of the issues found.

For more information:


Cyber Scheme Team Member

Provider: IRM

This four day Penetration Testing training course and one day assessment has been created for individuals looking to enter and advance in the cyber security industry. The CSTM assessment has been reviewed by CESG, the National Technical Authority for Information Assurance in the UK, and has been accepted as meeting the technical requirements for a CHECK Team Member assault course.

The training provides delegates with an introduction to the theoretical and practical aspects of Penetration Testing in a real life, hands-on environment and is led by IRM’s experienced CHECK Team Leader instructors.

For more information:

CMST Mobile Application Hacking: Hands-On

Provider: 7Safe

7Safe's 4-day mobile application hacking training course is designed to provide developers and ethical hackers with the fundamentals of mobile application security, detailing the most common vulnerabilities and how to identify them.

Focussing on the prevalent mobile platforms, Android and iOS, delegates will have access to vulnerable mobile applications using devices and emulators to assess their security through a series of practical hands-on exercises. The techniques gained throughout this course will enable delegates understand whether the sensitive information stored on mobile devices is sufficiently protected and what the risk and exposure is if an attacker was able to get his hands on the mobile device.

For more information: