Cyber Security Courses
Cyber Security Courses
Information Security, Ethical Hacking, Penetration Testing
AI Assisted Secure Software Development
This immersive three-day course introduces software developers to the transformative role of artificial intelligence in modern development workflows. Participants will explore the landscape of AI-assisted coding tools, including…
View CourseAI Fundamentals
Embark on an exciting journey to explore the potential of AI in everyday work with our comprehensive AI Fundamentals course. This immersive two-day training program is designed to…
View CourseAI Safety Risk Management
This immersive Agentic AI security risk simulation scenario equips participants with the skills to navigate the emerging risks of autonomous AI systems operating across organisational functions. As organisations…
View CourseAI Threat Modelling Certificate
This hands-on practical three-day course for private cohorts only, it empowers AI engineers, developers, and security professionals to design secure AI systems by mastering AI-specific threat modelling. Using…
View CourseAdvanced Infrastructure Hacking
IT infrastructure is more complex and dynamic than it’s ever been demanding comprehensive, up-to-date, and well-rehearsed security skills to match. Join this, fresh for 2023, hands-on 5-day course…
View CourseAdvanced in AI Auditor (AAIA)
This two-day, official ISACA Advanced in AI Audit (AAIA) instructor-led course provides Information Systems auditors with the essential knowledge to assess the design, governance, and operational risks associated…
View CourseAdvanced in AI Security Management (AAISM)
This two-day accelerated course provides a comprehensive foundation in AI-specific security management. The ISACA Advanced in AI Security Management (AAISM™) certification equips security leaders with the knowledge and…
View CourseAndroid Internals
This 5-day course, based on Jonathan Levin's Android Internals books, delves into the architecture and implementation of Android. Participants will explore Android’s features, its relationship to Linux, and…
View CourseApplication Security Testing
After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be…
View CourseApplication Security for Developers
The future of secure software development depends on developers who understand how to design, build, and maintain secure applications. This intensive two-day course provides developers, architects, and tech…
View CourseApplication Security in the Cloud
Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it…
View CourseAssessing and Exploiting Control Systems & IIoT
This is not your traditional SCADA, ICS, IIoT security course! How many courses send you home with lifetime access to course updates and a $500 kit including your…
View CourseBCS Certificate in Information Security Management Principles
This official BCS CISMP course provides the foundational knowledge required for individuals with information security responsibilities as part of their role or those considering a career in information…
View CourseBCS EXIN Essentials Certificate in Blockchain
The BCS EXIN Essentials Certificate in Blockchain validates a professional’s knowledge about Blockchain as a ledger with potential as a worldwide, decentralised record for the registration, inventory, and…
View CourseBlack Belt Pentesting / Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation
Have you ever thought of hacking web applications for fun and profit? How about playing with authentic, award-winning security bugs identified in some of the greatest companies? If…
View CourseCCSP
Specialise in cloud security with CCSP, the premier certification for cloud security professionals. Prove your expertise in securing cloud environments, data, applications, and infrastructure at scale.
View CourseCISSP
Take your cybersecurity career to the highest level with CISSP, the globally recognised gold standard for security leadership. Validate your ability to design, implement, and manage enterprise-level security…
View CourseCMMC Foundations
The PECB CMMC Foundations training course allows you to learn more about the structure of the CMMC model including CMMC levels, domains, capabilities, processes, and practices. You will…
View CourseCMMC Organisational Foundations
The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's…
View CourseCMMC for Business Professionals: A Practical Guide to Getting Ready for CMMC
The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's…
View CourseCREST Practitioner Intrusion Analyst
Delegates are provided with a Pearson Vue exam voucher for the CPIA examination as part of the course fee. This course prepares the student for a career in…
View CourseCREST Practitioner Security Analyst
QA are an approved CREST training provider. The CPSA course leads to the CREST Practitioner Security Analyst (CPSA) examination, which is an entry level qualification that tests a…
View CourseCertificate in Cloud Security Knowledge(CCSK+)
Covering all 12 domains of critical cloud security knowledge, this CCSK+ v5 course covers the core concepts, best practices, and recommendations for securing an organization on the cloud…
View CourseCertificate in Digital Forensics Fundamentals
The Certificate in Digital Forensics Fundamentals course provides a comprehensive foundation in digital forensic investigation techniques, enabling participants to identify, preserve, analyse, and report on digital artefacts. The…
View CourseCertificate of Competence in Zero Trust (CCZT)
This two-day instructor-led course provides a comprehensive introduction to Zero Trust concepts, principles, and architectures as defined by the Cloud Security Alliance (CSA). Participants will learn how to…
View CourseCertified AI Governance Professional (AIGP)
The Artificial Intelligence Governance Professional training or 'AIGP' teaches professionals how to develop, integrate and deploy trustworthy AI systems in line with emerging laws and policies around the…
View CourseCertified AI Security Engineer
This course provides a comprehensive introduction to AI security and the evolving risks that accompany modern artificial intelligence systems. Participants explore how attackers exploit vulnerabilities in predictive and…
View CourseCertified C# and Web application security
This comprehensive three-day course empowers developers with the skills to secure C# and ASP.NET web applications against common vulnerabilities and advanced cyber threats. Participants will explore core IT…
View CourseCertified Cybercrime Threat Investigator
Over this five-day National Cyber Security Center (NCSC) assured course, learners will develop the skills to monitor networks, detect and respond to an attack, and handle incidents and…
View CourseCertified Cybersecurity Operations Analyst (CCOA)
ISACA’s Certified Cybersecurity Operations Analyst (CCOA™) certification equips learners with the technical skills to evaluate threats, identify vulnerabilities, and design countermeasures to protect digital ecosystems. As emerging technologies…
View CourseCertified Cybersecurity Technician
Build practical, job-ready cybersecurity skills with the Certified Cybersecurity Technician (CCT). This hands-on certification prepares you to defend systems, networks, and users against real-world threats.
View CourseCertified DORA Lead Manager
The PECB Certified DORA Lead Manager training course equips you with the necessary skills to lead and oversee the implementation of digital operational resilience strategies within financial entities…
View CourseCertified Data Protection Foundation
This two-day foundation course will provide a practical guide to Data Protection (GDPR) & Privacy Legislation, Information Governance and Data Protection (GDPR) implementation. Data protection law requires, the…
View CourseCertified Data Protection Practitioner
This comprehensive practitioner course with independent APMG exam, will provide a practical guide to planning, implementing, and maintaining compliance with Data Protection & GDPR (EU & UK) Regulations.…
View CourseCertified Ethical Hacker
The Certified Ethical Hacker (CEH) is EC-Council’s flagship certification for offensive security professionals. Its goal is to teach you how to think and act like a hacker so…
View CourseCertified ISO 27001 Practitioner
This Certified ISO27001 Practitioners training course will provide delegates with the requirements and principles of ISO/IEC 27001, with an awareness of the issues and challenges involved in implementing…
View CourseCertified ISO 27002 Lead Manager
The ISO/IEC 27002 Lead Manager training course enables participants to acquire a comprehensive knowledge and understanding of the implementation and management of information security controls based on ISO/IEC…
View CourseCertified ISO/IEC 27001 Lead Auditor
Updated for 2022 - ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely…
View CourseCertified ISO/IEC 27001 Lead Implementer
Updated for 2022 - ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information…
View CourseCertified ISO/IEC 42001 Foundation
The ISO/IEC 42001 Foundation training course equips you with the core principles necessary for establishing and managing an artificial intelligence management system (AIMS) in accordance with ISO/IEC 42001.…
View CourseCertified ISO/IEC 42001 Lead Auditor
ISO/IEC 42001 Lead Auditor training course enables you to gain the necessary expertise to audit artificial intelligence management systems (AIMS) by applying widely recognised audit principles, procedures, and…
View CourseCertified ISO/IEC 42001 Lead Implementer
The ISO/IEC 42001 Lead Implementer training course provides the participants with the essential competencies needed to effectively plan, implement, manage, monitor, maintain, and continually improve an artificial intelligence…
View CourseCertified Information Privacy Manager
Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help…
View CourseCertified Information Privacy Professional
Every day, we access, share, manage and transfer data across companies, continents and the globe. Knowing the ins and outs of data protection requirements gives you the information…
View CourseCertified Information Privacy Technologist
Every day we access, share, manage and transfer data across companies, continents and the globe. Having the knowledge to build your organization’s privacy structures from the ground up…
View CourseCertified Information Security Manager
This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Possession of this certification displays precise knowledge,…
View CourseCertified Information Systems Auditor
Certified Information Systems Auditor (CISA) is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of…
View CourseCertified Java and Web application security
This comprehensive three-day course equips Java developers with the skills to secure their web applications against common vulnerabilities and advanced threats. Participants will explore core IT security principles,…
View CourseCertified Lead AI Risk Manager
This course equips professionals with the knowledge and tools to identify, assess, and mitigate AI-related risks within modern organisations. It explores the principles of AI governance, compliance, and…
View CourseCertified Lead Cloud Security Manager
The growing number of organizations that support remote work has increased the use of cloud computing services, which has, in turn, increased the demand for a secure cloud…
View CourseCertified Lead Disaster Recovery Manager
The Certified Lead Disaster Recovery Manager is a four-day training course intended to help participants acquire the necessary expertise to support an organisation in establishing, implementing, and managing…
View CourseCertified NIS 2 Directive Lead Implementer
The Certified NIS 2 Directive Lead Implementer training course enables participants to gain the necessary competencies to support organizations in effectively planning, implementing, managing, monitoring, and maintaining a…
View CourseCertified NIST Cybersecurity Consultant
This four-day course uses the NIST Cybersecurity Framework, and NIST v2 cybersecurity standards, enabling participants to strengthen organisational resilience and compliance. Learners will explore core NIST publications, including…
View CourseCertified OWASP Security Fundamentals
This course aims to teach learners about the OWASP top 10 in bite size modules; we will look at the OWASP top 10 vulnerabilities and mitigations available to…
View CourseCertified Security Risk Manager
Master the fundamental principles and concepts of Security Risk Assessment and Optimal Security Risk Management in Information Security based on ISO/IEC 27005. ISO/IEC 27005 Security Risk Manager training…
View CourseCertified in Hacking and Defending the Cloud
With the rapid adoption of cloud infrastructure and the prevalence of hybrid cloud environments among organisations, the need to address cloud misconfigurations has become paramount. This course offers…
View CourseCertified in Risk and Information Systems Control (CRISC)
This four-day official ISACA course equips learners with the knowledge and practical skills needed to prepare for and pass the CRISC exam. CRISC is the only globally recognised…
View CourseCompTIA A+
Kick-start your IT career with CompTIA A+, the industry-leading certification for entry-level IT professionals. Build a strong foundation in hardware, software, networking, and troubleshooting skills that employers trust.
View CourseCompTIA Cloud+ (CV0-004)
This course can benefit you in two ways. If you intend to pass the CompTIA Cloud+ (Exam CV0-004) certification examination, this course can be a significant part of…
View CourseCompTIA CySA+
Advance your security career with CompTIA CySA+, designed for blue-team and security operations professionals. Demonstrate your ability to detect, analyse, and respond to real-world cyber threats using behavioural…
View CourseCompTIA Data+
Build in-demand data skills with CompTIA Data+, designed for professionals working with data-driven decision-making. Validate your ability to analyse, interpret, and communicate insights using real-world data.
View CourseCompTIA Linux+
CompTIA Linux+ validates the skills administrators need to secure the enterprise, power the cloud and keep systems running. The new certification ensures that IT professionals, software developers, cybersecurity…
View CourseCompTIA Network+
Take control of modern networks with CompTIA Network+, the essential certification for networking professionals. Prove your ability to design, configure, manage, and troubleshoot wired and wireless networks.
View CourseCompTIA PenTest+
Break into offensive security with CompTIA PenTest+, the certification that proves your hands-on penetration testing skills. Learn how to identify, exploit, and report vulnerabilities across modern enterprise environments.
View CourseCompTIA Security+
Step into cybersecurity with CompTIA Security+, the globally recognised entry point for security professionals. Validate your skills in threat detection, risk management, and securing modern IT environments.
View CourseCompTIA Server+
This 5-day course is intended for those wishing to qualify with CompTIA Server+ Exam SK0-005 The CompTIA Server+ exam will certify the successful candidate has the knowledge and…
View CourseCompTIA Tech+
CompTIA Tech+ provides an essential foundation in information technology (IT), guiding learners through the core concepts, systems, and tools that define modern digital environments. Designed for those new…
View CourseCyber Security - An Introduction
This course provides an essential introduction to cyber security, equipping participants with the knowledge and awareness required to protect themselves and their organisations against cyber threats. Learners will…
View CourseCyber Security Audit Certificate
ISACA’s Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits. It provides security professionals with an understanding of the audit process,…
View CourseCyber Security Essentials Bootcamp
Cybersecurity Essentials Bootcamp is a 4-day instructor-led course packed full of hands-on labs and practical exercises, which teach the effective steps to prevent, detect and respond to a…
View CourseCyber Stars (Critical National Infrastructure)
Cyber Stars (Critical National Infrastructure) Cyber Stars is the first education and awareness programme with an official qualification in cyber security awareness for those working within Critical National…
View CourseDVMS Cyber Resilience Professional – Awareness
In today’s digital-first economy, cybersecurity is a strategic and cultural imperative, not just an IT function. This introductory 1-day course empowers employees at all levels to understand the…
View CourseDVMS Cyber Resilience Professional – Foundation
This foundation-level course provides IT service management, governance, risk, compliance, and cybersecurity professionals with an in-depth understanding of the NIST Cybersecurity Framework (NIST-CSF) v2.0 and its integration within…
View CourseDVMS Cyber Resilience Professional – Practitioner
This course develops practitioner-level competencies in building a Digital Value Management System® (DVMS) to transform systemic cyber risk into operational resilience. Learners explore how to unite fragmented frameworks…
View CourseDevSecOps
Hands-on training to automate security into a fast-paced DevOps environment using various open-source tools and scripts. Modern enterprises are implementing the technical and cultural changes required to embrace…
View CourseEC Council Certified Network Defender (v3)
Certified Network Defender (CND) v3 is the world's first network security program with a continual / adaptive security strategy. It is a network security course designed to help…
View CourseEC Council Certified Threat Intelligence Analyst
Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations…
View CourseEC-Council Certified Chief Information Security Officer
EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the…
View CourseEC-Council Certified Incident Handler v3 (CIH)
The latest revision of EC-Council’s Certified Incident Handler (E|CIH) v3 certified program has been designed and developed in collaboration with cybersecurity and incident handling/response practitioners across the globe.…
View CourseForescout FSCA
Build essential knowledge of financial systems, compliance, and industry best practices with FSCA, designed for professionals working in regulated environments.
View CourseFoundation Certificate in Cyber Security
The objective of the course is to provide a comprehensive but necessarily high-level overview across industry standard technology and platforms, illuminating the technology and its specific cyber governance,…
View CourseFull-Stack Pentesting Laboratory: 100% Hands-On + Lifetime LAB Access
Modern IT systems are complex and it’s all about full-stack nowadays. To become a pentesting expert, you need to dive into full-stack exploitation and gain a lot of…
View CourseHardware Hacking Advanced: Firmware Extraction & Manipulation
This one-day workshop focuses on firmware extraction and system manipulation via on-chip debug interfaces. It is a hands-on environment where students will exploit bare metal and Linux-based devices…
View CourseHardware Hacking Basics
This two-day comprehensive course, from the world renown hardware hacker Joe Grand, teaches fundamental hardware hacking concepts and techniques used to reverse engineer and defeat the security of…
View CourseICS203 - ICS Practitioners Security
The IISP accredited ICS Practitioners Security Course is designed to provide ICS practitioners with an understanding of the cyber security challenges facing their environments. This knowledge is vital…
View CourseICS405 - Securing ICS: Becoming an Industrial Cyber Security Professional
The Securing ICS: Becoming a Global Industrial Cyber Security Professional course is designed to provide those at IT/operational level (or equivalent) with an understanding of today’s cyber security…
View CourseISA/IEC 62443 Lead Implementer
This 4-day course provides a comprehensive introduction to the ISA/IEC 62443 standards, focusing on the management perspective for securing industrial automation and control systems (IACS). Participants will gain…
View CourseISACA CISM Exam Prep
This official ISACA Certified Information Security Manager (CISM) self-study e-learning course is designed to develop expertise in information security governance, risk management, program development, and incident management. Recognised…
View CourseISC2 CCSP Exam Prep
ISC2 developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture,…
View CourseISC2 CISSP Exam Prep
The official ISC2 Certified Information Systems Security Professional (CISSP®) training provides a comprehensive review of the knowledge required to effectively design, engineer and manage the overall security posture…
View CourseISC2 Certified Cloud Security Professional
ISC2 developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture,…
View CourseISC2 Certified Information Systems Security Professional (CISSP)
The Official ISC2® Certified Information Systems Security Professional (CISSP®) training provides a comprehensive review of the knowledge required to effectively design, engineer and manage the overall security posture…
View CourseISC2 Certified Secure Software Lifecycle Professional
The Official ISC2 ® Certified Secure Software Lifecycle Professional (CSSLP®) training provides a comprehensive review of the knowledge required to incorporate security practices, including authentication, authorization and auditing,…
View CourseISC2 Certified in Cybersecurity
Official ISC2 Entry-Level Cybersecurity Certification Training Official ISC2 entry-level cybersecurity certification training will review the content covered in the exam. It prepares candidates by building a solid foundation…
View CourseISC2 Certified in Governance Risk and Compliance
This official ISC2® Certified in Governance, Risk and Compliance (CGRC) Training prepares you for the CGRC exam. The Certified in Governance, Risk and Compliance (CGRC®) is an information…
View CourseISC2 Systems Security Certified Practitioner
The official ISC2 Systems Security Certified Practitioner (SSCP) is the ideal certification for those with proven technical skills and practical, hands-on security knowledge in operational IT roles. It…
View CourseISO 27001 Transition
The new version of ISO/IEC 27001 has been recently published and is now aligned with the new version of ISO/IEC 27002, which was published in February, 2022. The…
View CourseIntegr8 - Hacking Cybersecurity Leadership & Multi-team Collaboration
This workshop provides a research-driven, human-centred approach to developing cybersecurity leadership and multi-team collaboration skills. Built on more than 56,000 hours of global social-behavioural research, including projects funded…
View CourseInvestigating Crypto Currencies
The course has been developed by UK leading professionals who actively investigate the use of cryptocurrencies in serious and organised crime, as well as complex investigations. Its purpose…
View CourseLinux Kernel Programming
This five-day Linux security course provides an in-depth exploration of the Linux Kernel, focusing on its internal architecture, core subsystems, and practical driver development. Learners gain both conceptual…
View CourseMac OS Internals
This course accompanies Jonathan Levin's highly praised trilogy, '*OS Internals,' with deeper discussions and hands-on examples. It focuses on macOS Monterey (10.17), Ventura (10.18), and iOS versions 15…
View CourseMastering LLM Integration Security: Offensive & Defensive Tactics
This intensive two-day course explores the security risks and challenges introduced by Large Language Models (LLMs) as they become embedded in modern digital systems. Through AI labs and…
View CourseMicrosoft SC-200
Protect organisations from cyber threats with Microsoft SC-200, focused on security operations and threat response. Learn how to detect, investigate, and respond to incidents using Microsoft Sentinel and…
View CourseNCSC's Technical Reconnect
View CourseNCSCs Cyber Security Foundation
Cyber Security Foundation has been developed by and is under license from the National Cyber Security Centre (NCSC) and is exclusively available through QA. Understand the landscape. Recognise…
View CourseNCSCs Cyber Security Risk Management
Cyber Security Risk Management has been developed by and is under license from the National Cyber Security Centre (NCSC) and is exclusively available through QA. Identify risks. Strengthen…
View CourseNIS 2 Directive Foundation
The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures. It provides the core concepts…
View CourseOWASP 101
This course aims to teach learners about the OWASP top 10 in bite size modules, we will look at the OWASP top 10 vulnerabilities and mitigations available to…
View CourseOffSec LearnOne Subscription & Exam Prep
OffSec LearnOne is ideal for anyone looking to start their cybersecurity journey or work through any of our courses. Having access to labs for one full year allows…
View CourseOffSec PEN-200 (OSCP)
This hands-on course OffSec PEN-200 (OSCP) class introduces learners to professional penetration testing using Kali Linux. PEN-200 is OffSec’s industry leading course for aspiring ethical hackers and forms…
View CourseOffSec PEN-300 (OSEP)
Evasion Techniques and Breaching Defenses (PEN-300) is an advanced penetration testing course. Learners who complete the course and pass the exam will earn the OffSec Experienced Pentester (OSEP)…
View CourseOffSec SEC-100 CyberCore – Security Essentials
SEC-100 Security Essentials provides a comprehensive foundation in cybersecurity for learners at the beginning of their careers. Covering a breadth of essential topics across governance and risk frameworks,…
View CourseOffSec WEB-200 (OSWA)
Foundational Web Application Assessments with Kali Linux and OSWA Certification Learn the foundations of web application assessments with Foundational Web Application Assessments with Kali Linux (WEB-200). Learners who…
View CourseOpen Source Intelligence (OSINT) A Course for Investigators
Who is this course for? Internet Intelligence & Investigation (I3) enables the user to harvest a rich source of accurate and timely data left by individuals within the…
View CoursePost Quantum Cryptography
Post-quantum cryptography is no longer just a futuristic concept, but a necessity in the present day. Anyone who works in the field and ignores its principles and techniques…
View CoursePractitioner Certificate in Cloud Security
This NCSC Assured hands-on (25+ labs) five-day vendor agnostic Practitioner Certificate in Cloud Security course is focused on Cloud Security, encompassing Cloud Security Architecture, Cloud Security Testing, Identity…
View CourseQuantum Computing Fundamentals
As the field of quantum computing continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges…
View CourseQuantum Secure Communication
As the field of quantum communication continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges…
View CourseReverse Engineering with Ghidra
The need for reverse engineering binary software components arises in more and more contexts every day. Common cases include analysis of malicious software such as viruses, worms, trojans…
View CourseReverse Engineering with IDA PRO
The need for reverse engineering binary software components arises in more and more contexts every day. Common cases include analysis of malicious software such as viruses, worms, trojans…
View CourseSecure by Design
This course teaches how to design, build, test, and operate secure software in modern development environments. It replaces bolt-on security approaches with secure-by-design practices embedded across the full…
View CourseWeb Hacking Black Belt Edition
This class teaches the audience a wealth of hacking techniques to compromise modern-day web applications, APIs and associated end-points. This class focuses on specific areas of appsec and…
View CourseWhiteboard Hacking (AKA Hands-On Threat Modelling)
Threat modeling is the primary security analysis task performed during the software design stage. Threat modeling is a structured activity for identifying and evaluating application threats and vulnerabilities.…
View CourseWindows Internals Specialist - Advanced
This five-day advanced-level course provides in-depth knowledge and skills for professionals seeking to master Windows Internals. Focusing on system architecture, security mechanisms, debugging, and memory management, the course…
View CourseWindows Internals Specialist - Intermediate
The Windows Internals Specialist (Intermediate) course is a comprehensive five-day programme designed to deepen your understanding of the core components and operation of the Windows operating system. By…
View Course