QA’s state-of-the-art Cyber Labs enable teams to learn in a way that no other training does. Through collaboration, competition and simulation, those that attend experience real life cyber-attacks on ‘their’ infrastructure and, though our Capture the Flag (CTF) events, teams can learn prevent and combat security breaches with the added incentive of competition!
Learn to defend your systems in the real world
"The event went well as it enabled me to learn a lot of content while giving me practical experience and was generally more engaging than standard courses."
Understand how to conduct digital investigations relating to malicious activity
Learn how to accurately collect and analyse evidence.
Gather social media intelligence on ‘Digital Treasure Hunts’
Conduct investigations online and across multiple devices
Immerse yourself in a full 'hands-on' simulated attack
Secure development challenges for application developers
Learn to 'detect, deter and defend' cyber attacks with hands-on labs
Understand and practice effective security incident triage
Rehearse incident response techniques
Learn to lead and communicate in a cyber crisis
Simulate press and media liaison exercises
Practice effective inter-department communications
Rehearse industry specific scenarios
Learn how to develop a defensive shield
Cyber Defender skills for your industry - from beginner to advanced
Hands-on Cyber trade craft tools & techniques to identify vulnerabilities
Develop proactive cyber defence skills
"I enjoyed the event, I enjoyed spending more time learning about the theory behind what we were taught."
This foundation event provides a learning platform for multi-discipline IT technical teams to work together collaborating as they would defending their organisation in a real cyber attack.
Taking the learner in teams, with almost no cyber experience through engaging hands-on labs to provide a solid foundation into the practical disciples of Kali Linux, Encoding and Decoding, Incident Response and Vulnerability Management.
This simulated cyber event will test your ability under pressure to identify and patch vulnerabilities in a number of compromised systems as well as identify malware and other types of backdoors installed by an attacker and ultimately, defend assets from live attacks as they happen.
Some experience within the Linux environment and the ability to identify vulnerabilities and attacks using a variety of network, vulnerability and malware analysis tools, techniques and procedures would be recommended.
The Dark Web is at the forefront of criminal innovation and understanding how it works is the first step in being able to combat the illegal activities that go on there. This challenge will refine the skills and techniques needed to efficiently and effectively find key pieces of intelligence on the Internet and Dark Web.
This practical event will allow you to put the skills they have learnt into practical test into a real life environment.
Designed to teach where to look before, during and after an attack has taken place. Learn to identify indicators of attack and compromise, discover how to find previously undetected vulnerabilities, suspicious insider or malicious activity on a network.
Pinpoint advanced malware, zero-day vulnerabilities and lateral movement within your network. Discover tools and techniques to support rapid analysis of sophisticated cyber-threats.
“The facilities were fit for purpose and the environment was spacious and effective for learning.”
Very effective. It’s invaluable to get real world information in
“An amazing set up to learn and practice against different attacks.”