• Make your team


    Your first line of defense

    Threat actors increasingly adapt their TTPs to exploit a lack of security skills and knowledge in the workforce. Whether it is executives, end-users, admins or developers, a cornerstone of an effective and resilient security posture is your team's ability to identify, protect and respond to cyber-threats.

Secure Coding

For security to be fully integrated within the SDLC, organizations must hire, retain and continuously train their staff in secure coding practices, shifting security left within the cycle and ensuring systems are secure from the get-go. Through our strategic partnership with Cycubix LTD we deliver agnostic as well as language specific secure coding training to avoid common and complex programming bugs which result in exploitable code. Based on OWASP, CWE and other tools and methodologies, our training empowers devops and security teams to reach a resilient "secure by design" state in software products.

Web Application Security Essentials

Web applications play a key role in the success of an organisation – from streamlining business processes to creating online interactions that ensure a positive customer experience. However, web applications do allow access to critical and confidential resources. But without understanding web application vulnerabilities and addressing them, organisations risk their data, their operations and their reputation.

Learn more
Buy Course

Secure Coding in Java

Java is used to develop full featured and very powerful corporate applications. Many of these applications do allow access to critical and confidential resources and this has made them popular targets for attack. To minimise the likelihood of security vulnerabilities caused by programmer error, Java developers must understand and adhere to best practices.

Learn more

Secure Coding in .NET

The .NET framework provides unprecedented flexibility and productivity to web application developers. Many applications allow access to critical and confidential resources and this has made them popular targets for attack. Application developers are responsible for understanding the limitations of the .NET framework and adopting best practices to ensure that their code is secure.

Learn more


Digital Forensics and Incident Response

Successfully thwarting an attack is not limited to preventing a breach, as it is likely that sooner or later every organization is targeted and compromised to a certain degree, whether by a simple malware attack or a high profile data theft incident. It is therefore crucial to set up and maintain an effective DFIR capability that is able to timely detect, analyze, contain, erradicate, recover and learn from incidents, while acquiring and preserving critical digital evidence.

Practical Forensics: An Essential Guide to Incident Response

This course provides the knowledge and resources required to triage, analyze and effectively respond to computer security incidents. The participants, through the understanding of theory and a strong focus on practical exercises, will be able to acquire best-of-breed tools and techniques aimed at quickly identifying and thwarting attacks, uncovering and preserving vital evidence, while allowing for complete and accurate recovery of the affected assets.

Learn more
Buy Course