Professional education

Personalise
Two Female IT Programers Working on Desktop Computer in Data Center System Control Room. Team of Young Professionals In Software and Hardware Development, Doing Coding

The Institute offers a diverse range of short courses to upskill your staff, improve your own abilities, or to revamp your knowledge in cyber security. We also offer tailored packages to suit your individual or team needs. Our training pathways allow different entry and exit points depending upon requirements and existing skills.Our professional education courses are micro-credentialed providing a pathway towards completing Master-level degrees.

Explore courses

Cyber Security Fundamentals*

Take your cyber security education to the next level with the Cyber Security Fundamentals course. Fully online, this self paced course is held over five weeks requiring ~six hours per week of effort. 

opens in a new window

CISSP Training*

The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organisations from growing sophisticated attacks.

opens in a new window

Code Review

This course will look at reviewing C/C++ code for security issues. The course is heavily based around practical auditing of actual C/C++ programs. Common coding bugs will be identified in set lectures and then students will apply the theory by reviewing real programs and identifying vulnerabilities.

opens in a new window

Critical Infrastructure Cyber Security (SCADA)

The course provides hands on experience with the complexity of modern information technology equipment and the components in control systems and legacy systems, the threat environment and attackers’ capabilities as well as techniques for securing these systems.

opens in a new window

Cyber Deception

This course will provide students with hands-on experience of how to build, deploy and configure various cyber deception tools and technologies to protect computer networks and digital data. 

opens in a new window

Cyber Defence

This course provides in-depth understanding of the techniques and policy used in computer and network defence. Cyber defenders learn the strategy and technical skills to protect and harden cyber systems, collect appropriate information through logging, detect attempted attacks, and respond to intrusions. 

opens in a new window

Cyber Offence

The aim of this course is to provide the foundation for offensive tactical cyber operations, to develop knowledge and skills of various tools, techniques and procedures (TTP) involved with offensive cyber operations, and to develop competence in addressing strategic, operational and tactical issues of cyber operations.

opens in a new window

Cyber Security Boot Camp

This is a 101 IT cyber security short course designed to teach you about IT security issues, looking at the types of attacks that are happening now, how they work and how to protect yourself and your organisation against them.

Digital Forensics

This course will introduce participants to digital forensic analysis and investigation first principles. Students will be introduced to theoretical concepts including the digital forensic method, intent and its application.

opens in a new window

Exploit Development

This course will introduce students to the art and science of exploit development. Core concepts involving debuggers, stack based overflows, disassemblers and some defence mitigation will be taught in a largely practical delivery style.

opens in a new window

Introduction to Pen Testing

This course provides an introduction to Penetration Testing and works through the differences between Vulnerability Assessments and actual Penetration Tests. 

opens in a new window

Introduction to Python Scripting

This course introduces participants to the Python programming language in a security context. Participants are shown core Python language structures before applying these to security problems.

opens in a new window

Intrusion Analysis and Response

This course aims to develop knowledge and understanding of the strategies, techniques and technologies used in attacking and defending networks and how to design secure networks and protect against intrusion, malware and other hacker exploits.

opens in a new window

Reverse Engineering

In this short course students will learn how malware interacts with the underlying Operating System, how to go about identifying the functionality of malware, and how to perform large scale data analysis of malware. 

opens in a new window

Wireless, Mobile and Internet of Things Security

Wireless technologies are ubiquitous in modern systems yet pose unique challenges. This technical course looks at security issues of a broad range of wireless devices from wireless computers, mobile phones and operational technologies.

opens in a new window