
The Institute offers a diverse range of short courses to upskill your staff, improve your own abilities, or to revamp your knowledge in cyber security. We also offer tailored packages to suit your individual or team needs. Our training pathways allow different entry and exit points depending upon requirements and existing skills.Our professional education courses are micro-credentialed providing a pathway towards completing Master-level degrees.
Take your cyber security education to the next level with the Cyber Security Fundamentals course. Fully online, this self paced course is held over five weeks requiring ~six hours per week of effort.
The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organisations from growing sophisticated attacks.
This course will look at reviewing C/C++ code for security issues. The course is heavily based around practical auditing of actual C/C++ programs. Common coding bugs will be identified in set lectures and then students will apply the theory by reviewing real programs and identifying vulnerabilities.
The course provides hands on experience with the complexity of modern information technology equipment and the components in control systems and legacy systems, the threat environment and attackers’ capabilities as well as techniques for securing these systems.
This course will provide students with hands-on experience of how to build, deploy and configure various cyber deception tools and technologies to protect computer networks and digital data.
This course provides in-depth understanding of the techniques and policy used in computer and network defence. Cyber defenders learn the strategy and technical skills to protect and harden cyber systems, collect appropriate information through logging, detect attempted attacks, and respond to intrusions.
The aim of this course is to provide the foundation for offensive tactical cyber operations, to develop knowledge and skills of various tools, techniques and procedures (TTP) involved with offensive cyber operations, and to develop competence in addressing strategic, operational and tactical issues of cyber operations.
This is a 101 IT cyber security short course designed to teach you about IT security issues, looking at the types of attacks that are happening now, how they work and how to protect yourself and your organisation against them.
This course will introduce participants to digital forensic analysis and investigation first principles. Students will be introduced to theoretical concepts including the digital forensic method, intent and its application.
This course will introduce students to the art and science of exploit development. Core concepts involving debuggers, stack based overflows, disassemblers and some defence mitigation will be taught in a largely practical delivery style.
This course provides an introduction to Penetration Testing and works through the differences between Vulnerability Assessments and actual Penetration Tests.
This course introduces participants to the Python programming language in a security context. Participants are shown core Python language structures before applying these to security problems.
This course aims to develop knowledge and understanding of the strategies, techniques and technologies used in attacking and defending networks and how to design secure networks and protect against intrusion, malware and other hacker exploits.
In this short course students will learn how malware interacts with the underlying Operating System, how to go about identifying the functionality of malware, and how to perform large scale data analysis of malware.
Wireless technologies are ubiquitous in modern systems yet pose unique challenges. This technical course looks at security issues of a broad range of wireless devices from wireless computers, mobile phones and operational technologies.