Skip to main content
Cyber Security Academy

Training Courses

Explore out continued professional development courses.

Cyber Security for Key Decision Makers 

This provides a round overview of cyber security and cyber risk for the top executives who are called to make cyber-related decisions in their companies. 

Foundations of Cyber Security 

This is aimed mainly at computer scientists and engineers with no systematic body of knowledge of cyber security, it delivers a wide-spectrum, comprehensive program covering the key aspects of cyber security. 

Advance Cyber Security   

This provides an in-depth tutorial on state-of-the-art security attacks and countermeasures, with a particular focus on: 

  • security by design
  • supply chain security
  • machine learning
  • red-teaming or adversarial testing
  • risk assessment
  • post-quantum cryptography
  • semiconductor chip security

The course is a mixture of lectures and activities where attendees are encouraged to apply their learning in several practical scenarios.  

Hardware Security 

This is aimed at electronics and embedded systems engineers and research. It provides an overview of the security vulnerabilities of the Hardware Supply Chain and explains how to mitigate such risks. It also provides comprehensive coverage of physical and microarchitecture attacks and defenses.   

Cryptography 

This provides a comprehensive coverage of cryptographic algorithms and their security applications. It is suitable for electronics and computer science engineers, with a special focus on post-quantum cryptography and how to prepare for it.  

Digital Forensic Foundation 

Covers essential principles of digital forensics and its applications.  

Digital Forensic- Device Focused 

Covers, Data Capture Wizard: acquisition & storage media, Mobile Sleuth: mobile device investigations, and IoT Inspector: unusual devices and IoT forensics. 

Digital Forensic-Scene Analysis 

Covers, scene specialist: Conducting Scene Investigations, Guardian Eye: CCTV Analysis and Security Sentinel: Corporate Security And Incident Response. 

Digital Forensic- Technical Masterclass 

Covers, AppTracker: Browser and App Forensics, Comms Data Analyzer: Analyzing Communication Data, Cyber Sleuth: Network and Corporate Investigations, Document Detective: Analyzing Digital Documents, Multimedia Marvel: Multimedia Forensics and Open Source Intel Operative: OSINT Techniques. 

Digital Forensic Presentation 

Covers Evidence Articulator: Communicating Digital Evidence.  

Programming blockchains

This is aimed at software designers, engineers, and developers, it provides hands-on training to program both public blockchains (like Ethereum) and private blockchains (like HyperLedger). 

Creative thinking 

This drives the audience through the necessary steps and relative techniques to bridge the gap between the conception of a research idea, to the formulation, critique, and presentation of a coherent research plan. 

Data protection and the GDPR

This covers the basics of data protection law, state-of-the-art privacy protection techniques, best practices for data protection risk assessments, and personal data governance within organisations. 

Defensive programming 

This illustrates the best modern programming techniques to leverage current hardware security features and produce robust and hacking-resistant code. 

Penetration testing 

This covers the main techniques for penetration testing, with a particular focus on reverse engineering the protection of web-based systems. 

Course enquires and booking

For further information and to book a course please email: csa@soton.ac.uk

Back
to top