Emerging threats

We support organisations striving to build a trustworthy, safe online environment where users can engage authentically in their communities.
Cross-sector corporatesWe support international government organisations and NGOs working to provide infrastructure or improve the capabilities, security and resilience of their nation.
International programmes and developmentWe support commercial organisations operating in a digital world, seeking to protect their reputation and prevent business disruption caused by cyber attacks and compliance breaches.
UK government and public sectorWe support UK government organisations responsible for safeguarding critical infrastructure, preserving public trust, and maintaining national security.
The CREST Registered Penetration Tester (CRT) course is designed for cyber security professionals ready to take their skills to the next level.
This advanced training course is aligned with the CREST syllabus and prepares you for the CREST Registered Penetration Tester (CRT) exam. It will equip you with the technical skills and expertise to perform thorough, high-quality penetration tests on complex systems and networks.
The B2C course runs over 5 days, led by a CREST-approved trainer, and includes a CRT exam voucher so you’ll be ready to certify as soon as you’re confident.
The CRT is a highly respected certification that proves your capability to deliver professional, standards-based penetration testing services - a key milestone for anyone serious about offensive security. You'll receive expert-led training, hands-on learning, and a qualification that sets you apart.
This training can be delivered virtually, at our London or Bristol facilities, or at our clients’ premises.
CRT exam included in pricing
Week commencing 15 October 2024
Book nowCREST-Approved Training.
If the CRT qualification is achieved, it can—alongside security clearance vetting—be used to acquire the UK NCSC’s CHECK Team Member certification status.
By the end of this training, you will be able to demonstrably use both new and existing skills to penetrate computer systems or networks effectively and professionally—using realistic threat techniques—to evaluate their security and detect potential vulnerabilities.
Intermediate level cyber security professionals who wish to safely consolidate and practise their skills using ethical hacking tools, and advance the necessary techniques to fulfil security testing responsibilities. Example roles might include:
This training can be tailored to an industry or for a defined audience, with various durations. Example topics typically include:
Information Gathering
Windows Services, Enumerations and Exploitations
Linux Services, Enumerations and Exploitations
Web Application Technologies and their Vulnerabilities
Database Enumeration and Vulnerabilities