Cyber Security for Key Decision Makers
This provides a round overview of cyber security and cyber risk for the top executives who are called to make cyber-related decisions in their companies.
Foundations of Cyber Security
This is aimed mainly at computer scientists and engineers with no systematic body of knowledge of cyber security, it delivers a wide-spectrum, comprehensive program covering the key aspects of cyber security.
Advance Cyber Security
This provides an in-depth tutorial on state-of-the-art security attacks and countermeasures, with a particular focus on:
- security by design
- supply chain security
- machine learning
- red-teaming or adversarial testing
- risk assessment
- post-quantum cryptography
- semiconductor chip security
The course is a mixture of lectures and activities where attendees are encouraged to apply their learning in several practical scenarios.
This is aimed at electronics and embedded systems engineers and research. It provides an overview of the security vulnerabilities of the Hardware Supply Chain and explains how to mitigate such risks. It also provides comprehensive coverage of physical and microarchitecture attacks and defenses.
This provides a comprehensive coverage of cryptographic algorithms and their security applications. It is suitable for electronics and computer science engineers, with a special focus on post-quantum cryptography and how to prepare for it.
Digital Forensic Foundation
Covers essential principles of digital forensics and its applications.
Digital Forensic- Device Focused
Covers, Data Capture Wizard: acquisition & storage media, Mobile Sleuth: mobile device investigations, and IoT Inspector: unusual devices and IoT forensics.
Digital Forensic-Scene Analysis
Covers, scene specialist: Conducting Scene Investigations, Guardian Eye: CCTV Analysis and Security Sentinel: Corporate Security And Incident Response.
Digital Forensic- Technical Masterclass
Covers, AppTracker: Browser and App Forensics, Comms Data Analyzer: Analyzing Communication Data, Cyber Sleuth: Network and Corporate Investigations, Document Detective: Analyzing Digital Documents, Multimedia Marvel: Multimedia Forensics and Open Source Intel Operative: OSINT Techniques.
Digital Forensic Presentation
Covers Evidence Articulator: Communicating Digital Evidence.
This is aimed at software designers, engineers, and developers, it provides hands-on training to program both public blockchains (like Ethereum) and private blockchains (like HyperLedger).
This drives the audience through the necessary steps and relative techniques to bridge the gap between the conception of a research idea, to the formulation, critique, and presentation of a coherent research plan.
Data protection and the GDPR
This covers the basics of data protection law, state-of-the-art privacy protection techniques, best practices for data protection risk assessments, and personal data governance within organisations.
This illustrates the best modern programming techniques to leverage current hardware security features and produce robust and hacking-resistant code.
This covers the main techniques for penetration testing, with a particular focus on reverse engineering the protection of web-based systems.
Course enquires and booking
For further information and to book a course please email: firstname.lastname@example.org