CREST CPSA/CRT EXAM PREPARATION

Overview: This CREST accredited exam preparation course will prepare you for the CREST/CRT exams.

Learn More
Overview: No technical knowledge or background is required for this course which is particularly recommended for companies and organizations. All staff members who use computers, mobile devices, networks and the internet will learn how to apply good technology practices and everyday habits that will maximize online security and minimize risks.

Learn More

Download the Course Outline 




Overview: This course provides a holistic view of modern network security including operating system hardening, firewalls, intrusion-detection systems, VPNs and Encryption. Physical Security, Standards, System Security and Security Policies are also included.

Learn More

Download the Course Outline 



Overview: This course teaches penetration testing and will illustrate how to think like an attacker and use industry standard tools to perform penetration testing. The course is aligned with the CREST CRT technical syllabus.  Students will learn and perform the different phases of penetration testing assessments. The students will practice using Kali Linux and its tools to perform information gathering, target discovery and enumeration, vulnerability mapping, social engineering, system exploitation, privilege escalation, and maintaining access to compromised systems. The students will also learn to report the results of their assessments.

Learn More

Download the Course Outline 


Overview:  You'll gain insight into the insecurities, vulnerabilities and exploits that lie within web applications so you can reduce the risk this poses to your business. This CREST Accredited course is based on OWASP Top 10 2017 and along with course Network Infrastructure Penetration Testing and Ethical Hacking will help students prepare for the CREST CRT examination.

Learn More

Download Course Outline 


Overview:  This course provides a holistic view of how Incident Response is implemented in the real world, including Incident Response preparation, acquiring and analyzing digital forensic images and analyzing host and network data. Malware analysis, Threat intelligence and report creation are also included.

Learn More

Download the Course Outline 


Overview:  The ISO27001 is the most acknowledged and globally recognized standard for implementing an Information Security Management System (ISMS) within any organization. The value of information assets and the importance of thoroughly securing them against today’s ever increasing threats, highlight the significance of developing and implementing effective and holistic security management systems. The course highlights the importance of information security and provides the necessary tools and methodologies for students to master the concepts of ISMS implementation, in line with ISO27001.

Learn More

Download the Course Outline 


MSc Cybersecurity:  Get three accredited professional qualifications and an academic post-graduate degree – the ideal combination from an employer’s perspective.

Learn More