Our flagship training course “Comprehensive Cybersecurity“ is now officially accredited by the UK National Centre for Cyber security.
Training Courses
Comprehensive Cybersecurity
This comprehensive course offers an in-depth study of foundational cybersecurity principles, covering a broad spectrum of attack vectors, from physical threats to sophisticated social engineering tactics.
Designed for both professionals and students, it bridges theory with practical application, equipping participants with essential skills in threat identification, mitigation, and proactive defence. Over five immersive days, attendees will engage in a blend of lectures and hands-on exercises to build expertise in risk assessment, secure design strategies, and red teaming.
The course begins by establishing core cybersecurity concepts, such as confidentiality, integrity, and availability (CIA), and introduces essential knowledge of cryptography, legal considerations, and the lifecycle of cyber-attacks.
Participants will then examine the anatomy of prevalent threats like ransomware, distributed denial of service (DDoS) attacks, and supply chain vulnerabilities.
Moving into security design, the course provides insights into network security, secure software development, and the strategic use of red teaming for proactive defence.
Participants will also develop skills in protecting physical assets, with a focus on embedded systems and hardware supply chain security.
On the final day, participants will study risk management methodologies and gain a thorough understanding of the red teaming approach, including its stages, benefits, and challenges in simulating real-world cyber threats. Through analysis of vulnerabilities, tactics, and attack techniques, participants will craft a red teaming strategy and formulate a remediation plan.
By the end of the course, attendees will be ready to approach cybersecurity with a balanced mastery of theory, practical skills, and strategic foresight.
Cyber Security for Key Decision Makers
This provides a round overview of cyber security and cyber risk for the top executives who are called to make cyber-related decisions in their companies.
Foundations of Cyber Security
This is aimed mainly at computer scientists and engineers with no systematic body of knowledge of cyber security, it delivers a wide-spectrum, comprehensive program covering the key aspects of cyber security.
Hardware Security
This is aimed at electronics and embedded systems engineers and research. It provides an overview of the security vulnerabilities of the Hardware Supply Chain and explains how to mitigate such risks. It also provides comprehensive coverage of physical and microarchitecture attacks and defenses.
Cryptography
This provides a comprehensive coverage of cryptographic algorithms and their security applications. It is suitable for electronics and computer science engineers, with a special focus on post-quantum cryptography and how to prepare for it.
Digital Forensic Foundation
Covers essential principles of digital forensics and its applications.
Digital Forensic- Device Focused
Covers, Data Capture Wizard: acquisition & storage media, Mobile Sleuth: mobile device investigations, and IoT Inspector: unusual devices and IoT forensics.
Digital Forensic-Scene Analysis
Covers, scene specialist: Conducting Scene Investigations, Guardian Eye: CCTV Analysis and Security Sentinel: Corporate Security And Incident Response.
Digital Forensic- Technical Masterclass
Covers, AppTracker: Browser and App Forensics, Comms Data Analyzer: Analyzing Communication Data, Cyber Sleuth: Network and Corporate Investigations, Document Detective: Analyzing Digital Documents, Multimedia Marvel: Multimedia Forensics and Open Source Intel Operative: OSINT Techniques.
Digital Forensic Presentation
Covers Evidence Articulator: Communicating Digital Evidence.
Programming blockchains
This is aimed at software designers, engineers, and developers, it provides hands-on training to program both public blockchains (like Ethereum) and private blockchains (like HyperLedger).
Creative thinking
This drives the audience through the necessary steps and relative techniques to bridge the gap between the conception of a research idea, to the formulation, critique, and presentation of a coherent research plan.
Data protection and the GDPR
This covers the basics of data protection law, state-of-the-art privacy protection techniques, best practices for data protection risk assessments, and personal data governance within organisations.
Defensive programming
This illustrates the best modern programming techniques to leverage current hardware security features and produce robust and hacking-resistant code.
Penetration testing
This covers the main techniques for penetration testing, with a particular focus on reverse engineering the protection of web-based systems.
Course enquires and booking
For further information and to book a course please email: csa@soton.ac.uk