Emerging threats

We support organisations striving to build a trustworthy, safe online environment where users can engage authentically in their communities.
Cross-sector corporatesWe support international government organisations and NGOs working to provide infrastructure or improve the capabilities, security and resilience of their nation.
International programmes and developmentWe support commercial organisations operating in a digital world, seeking to protect their reputation and prevent business disruption caused by cyber attacks and compliance breaches.
UK government and public sectorWe support UK government organisations responsible for safeguarding critical infrastructure, preserving public trust, and maintaining national security.
It will provide participants with the skills and knowledge required to conduct authorised attempts to penetrate computer systems or networks and physical premises—using realistic threat techniques—to evaluate their security and detect potential vulnerabilities.
Training is aligned to support individuals seeking to undertake the CREST Registered Penetration Tester (CRT) exam.
This training can be delivered virtually, at our London or Bristol facilities, or at our clients’ premises.
Week commencing 15 October 2024
Book nowCREST-Approved Training.
If the CRT qualification is achieved, it can—alongside security clearance vetting—be used to acquire the UK NCSC’s CHECK Team Member certification status.
By the end of this training, you will be able to demonstrably use both new and existing skills to penetrate computer systems or networks effectively and professionally—using realistic threat techniques—to evaluate their security and detect potential vulnerabilities.
Intermediate level cyber security professionals who wish to safely consolidate and practise their skills using ethical hacking tools, and advance the necessary techniques to fulfil security testing responsibilities. Example roles might include:
This training can be tailored to an industry or for a defined audience, with various durations. Example topics typically include:
Information Gathering
Windows Services, Enumerations and Exploitations
Linux Services, Enumerations and Exploitations
Web Application Technologies and their Vulnerabilities
Database Enumeration and Vulnerabilities