With its state-of-the-art cyber academy based in Bristol, PGI offers a number of courses that help you to improve your understanding of cyber security.
As well as our Cyber Security Awareness (CSA) course which allows leaders and managers of organisations to grasp the business critical issues of cyber security, PGI also offers training for IT professionals that will allow them to take their careers to the next level.
Advanced Threat Methodology (ATM)
The Advanced Threat Methodology (ATM) course taught by PGI will teach an attendee on how an external threat may attack an organisation, allowing them to develop system management, strategies and techniques.
If you want to get ahead in your career as a cyber professional the ATM course will be a great help for you to achieve your goals.
For more information on the ATM course offered by PGI click here
Operational Digital Forensics (ODF)
The Operational Digital Forensics (ODF) course taught by PGI Cyber, accredited by APM Group and certified by GCHQ offers a security professional a number of benefits.
Attendees learn investigative skills and digital forensics techniques relating to cybercrime.
The course teaches attendees to become malware hunters and defenders for their organisation; they will know what looks suspicious and which tools to use to help them investigate and identify malware at a forensic level. They will also learn how to perform fast and efficient investigations required to discover and counter high-end cyber threats.
An attendee will also learn about the tactics used by hackers and cyber criminals to evade detection and the real-world skills needed to locate and respond to malicious elements discovered on a network.
By the end of the course an attendee will be able to identify threats, report a security breach respond appropriately and defend against future threats to their organisations network.
For more information on the ODF course offered by PGI click here
Qualified Security Team Member Course (QSTM)
Individuals wanting to advance their career scheme can demonstrate that they possess the necessary practical and theoretical skills by passing the QSTM course.
By passing the course and having the qualification on your CV you will stand out from the crowd in a market that is crying out for security professionals.
The Senior Level Tiger scheme assessment is recognized by GCHQ, as the National Technical Authority for Information Assurance in the UK and as technically equivalent to the level required for CHECK Scheme Team Leaders. The senior level assessment, once passed, will be accepted as such by CHECK companies and elsewhere. The qualification lasts for three years, after which the candidate must re-sit and pass all elements of the assault course.
Certified Information Systems Security Professional Course (CISSP)
PGI’s CISSP Course provides students with a clear understanding of the information security principles and background knowledge required to operate as an effective Information Security Manager within the eight security domains as set out by (ISC) 2. CISSP is widely considered as the Gold Standard IT Security Management Qualification. This course allows attendees to understand and grasp the business critical issues of security, enabling you to understand what needs to be done to mitigate risks and exploit opportunities and to plan investment proportionate to the risk your company faces.
For more information on the CISSP course offered by PGI click here
Your free global geopolitical
PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.
The Risk Portal gives users up-to-date information and analysis on global affairs.
The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.
Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.
Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.
Subscribe to our Cyber Bytes Newsletter
Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.