X

Enquiry

Which date are you interested in? We can run short courses on demand, delivering them from our Academy or client sites. We do have a minimum attendee requirement of 5 for the short courses.
For further information please get in touch.

Submit

Thanks you for your enquiry.
One of our team will be in touch shortly.

Training Services

Click on the ‘+’ to view full course description

CREST Practitioner Threat Intelligence Analyst

5 day course covering CREST CPTIA, price including exam £1,997 Excl. VAT

It is not a requirement to sit the CPTIA exam before taking the CRTIA course.

Crucial Academy have designed and deliver the world's first and only CREST accredited threat intelligence course.

Cyber Threat Intelligence (CTI) is an area of cyber security that focuses on the collection and analysis of information about current and potential future attacks that threaten the safety of a nation, an organisation and/or its assets and individuals. The benefit of threat intelligence is that it's a proactive security measure, hopefully preventing data breaches and saving businesses the financial costs of cleaning up an incident. Its purpose is to give companies and individuals an understanding of the threats that pose the greatest risk to their infrastructure and employees and allows them to make informed decisions on what they can do to protect themselves.

The CPTIA qualification demonstrates that an individual has a solid understanding of the theory and practice of cyber threat intelligence operations and is competent to undertake operational Threat Intelligence activities under the supervision of a CREST Certified Threat Intelligence Manager.

Syllabus Covered

Syllabus is available through CREST's website: here

Apply:

CREST Registered Threat Intelligence Analyst

5 day course covering CREST CRTIA, price inclusive of exam £2,997 Excl. VAT

You must complete our CPTIA course before being able to take our CRTIA course.

Crucial Academy have designed and deliver the world's first and only CREST accredited threat intelligence course.

Cyber Threat Intelligence (CTI) is an area of cyber security that focuses on the collection and analysis of information about current and potential future attacks that threaten the safety of a nation, an organisation and/or its assets and individuals. The benefit of threat intelligence is that it's a proactive security measure, hopefully preventing data breaches and saving businesses the financial costs of cleaning up an incident. Its purpose is to give companies and individuals an understanding of the threats that pose the greatest risk to their infrastructure and employees and allows them to make informed decisions on what they can do to protect themselves.

The CREST Registered Threat Intelligence Analyst (CRTIA) examination is aimed at individuals who are part of a team delivering threat intelligence services. A minimum of two years’ experience collecting, analysing and documenting threat intelligence is expected.

The CRTIA qualification provides assurance that an individual has reached the appropriate standard as a threat intelligence team member to deliver safe, legal and ethical services.

Syllabus Covered

Syllabus is available through CREST's website: here

Apply:

CREST Practitioner Security Analyst

5 day course covering CREST CPSA, price including exam £1,997 Excl. VAT

Offensive Cyber Security is a proactive approach to protecting computer systems, networks and individuals from attacks. The practice at its core involves conducting a penetration test of computers and networks looking for vulnerabilities and weaknesses that attackers could exploit.

The CREST Practitioner Security Analyst (CPSA) qualification is an entry-level examination that tests a candidate’s knowledge in assessing operating systems and common network services at a basic level. The CPSA examination also includes an intermediate level of web application security testing and methods for identifying common web application security vulnerabilities.

Syllabus Covered

Syllabus is available through CREST's website: here

Apply:

CREST Registered Penetration Tester

5 day course covering CREST CRT, price including exam £2,997 Excl. VAT

You must complete your CPSA before being able to sit the CRT exam.

Offensive Cyber Security is a proactive approach to protecting computer systems, networks and individuals from attacks. The practice at its core involves conducting a penetration test of computers and networks looking for vulnerabilities and weaknesses that attackers could exploit.

The CREST Registered Penetration Tester (CRT) examination is recognised by the National Cyber Security Centre (NCSC) as providing the minimum standard for CHECK Team Member status and is designed to assess a candidate’s ability to carry out basic vulnerability assessment and penetration testing tasks.

Syllabus Covered

Syllabus is available through CREST's website: here

Apply:

CompTIA Cyber Security Analyst+

10 day course covering CompTIA CySA+, price including exam £1,997 Excl. VAT

Defensive Cyber Security focuses on detecting, orienting, and engaging cyber threats in order to ensure businesses and individuals remain secure and have the ability to out-manoeuvre adversaries. The course has a strong emphasis on intelligence, surveillance, vulnerability management and implementing security controls.

The role in Defensive Cyber Security focuses on securing networks and monitoring the data within computers and systems whilst hunting for threats. You will protect businesses against a range of different attacks from malware, social engineering, phishing and physical techniques attempting to gain access to systems.

CompTIA Cyber Security Analyst+ (CySA+) is the only intermediate highstakes cybersecurity analyst certification with performance-based questions covering security analytics, intrusion detection and response. It is the most up-to-date security analyst certification that covers every topic you need to protect businesses against the myriad of threats posed nowadays.

Introduction
  • Introduction to Cyber Security
  • Principles of Security
  • Cyber Security vs Information Security
  • The Basics of Cyber Security
  • Cyber Threats
  • Common Attack Methods
  • Vulnerabilities
  • Defence Against Attacks
Reconnaissance
  • Active Reconnaissance
  • Passive Reconnaissance
  • Gathering Organisational Intelligence
  • Common Resources
  • Detecting, Preventing and Responding to Reconnaissance
Threat Management
  • Building a Secure Network
  • Cyber Security Toolkit
  • Penetration Testing
  • Reverse Engineering
  • Introduction to Risk
  • Evaluating Risk
  • Risk Reduction Techniques
  • Cyber Kill Chain
  • Diamond Model
  • Gathering Indicators
Vulnerability Management
  • Implementing a Vulnerability Management Plan
  • Analysing Vulnerability Scans
  • CVSS Scoring
  • Network Vulnerabilities
  • Host Vulnerabilities
  • Wireless Vulnerabilities
  • Application Vulnerabilities
  • Virtual Infrastructure Vulnerabilities
  • ICS Vulnerabilities
  • Tools for Vulnerability Detection
Incident Response
  • Incident Response
  • Capturing Events
  • Detecting Common Network Issues
  • Handling Network Probes & Attacks
  • Investigating Host Issues
  • Analysing Data Exfiltration
  • Analysing Application Symptoms
  • Understanding the Compromise
  • Recovery and Post-incident Response
  • Conducting a Forensic Investigation
Security Architecture
  • Security Architecture
  • Defence-in-Depth
  • Common Architectural Issues
  • Maintaining & Reviewing
  • Policy & Compliance
  • Software Development Lifecycle Security
  • Secure Coding
Access Management
  • Identity and Access Management Security
  • Identity as a Security Layer
  • Identity Attacks
  • Building a Forensic Capability
Apply:

Information Assurance

10 day course covering PECB ISO/IEC 27001 Lead Implementer and CDPO, price including exams £3,997 Excl. VAT

Information Assurance provides the security backbone in any business. Keeping data safe, managing risk and ensuring the right information gets to the right people is at the heart of the discipline.

Information Assurance (IA) relates more to how businesses protect their data, strategic risk management of information and related systems, rather than the creation and application of security controls.

Therefore, in addition to defending against malicious attackers and malware, IA roles consider corporate governance issues such as privacy, regulatory and standards compliance, auditing, business continuity, and disaster recovery as they relate to information systems.

ISO/IEC 27001 provides requirements for organisations seeking to establish, implement, maintain and continually improve an information security management system. This framework serves as a guideline towards continually reviewing the safety of your information, which will exemplify reliability and add value to services of your organisation.

The Certified Data Protection Officer (CPDO) training course enables you to develop the necessary knowledge, skills and competence to effectively implement and manage a compliance framework regarding the protection of personal data. By holding a PECB Certified Data Protection Officer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to assist organisations in applying data protection laws and regulations.

Introduction to ISO/IEC 27001 and initiation of an ISMS
  • Course objectives and structure
  • Standard and regulatory framework
  • Information Security Management System (ISMS)
  • Fundamental principles of information security
  • Initiating the ISMS implementation
  • Understanding the organization and clarifying the information security objectives
  • Analysis of the existing management system
Plan the implementation of the ISMS
  •  Leadership and approval of the ISMS project 
  • ISMS scope 
  • Information security policies 
  • Risk management process 
  • Definition of the organizational structure of information security 
  • Statement of applicability and management decision to implement the ISMS 
Implementation of the ISMS
  • Design of security controls and drafting of specific policies & procedures 
  • Implementation of security controls 
  • Definition of the document management process 
  • Communication plan 
  • Training and awareness plan 
  • Operations management 
  • Incident management 
ISMS monitoring, continuous improvement and preparation for certification audit
  • Monitoring, measurement, analysis and evaluation 
  • Internal audit 
  • Management review 
  • Treatment of problems and non-conformities 
  • Continual improvement 
  • Preparing for the certification audit 
  • Competence and evaluation of implementers 
Introduction to Data Protection
  • The General Data Protection Regulation
  • Fundamental Principles of the GDPR 
  • Initiating implementation of the GDPR
Understanding the Business
  • Understanding the organisation and clarifying the data protection objectives 
  • Analysis of the existing system 
  • Leadership and approval of the GDPR compliance project 
  • Data protection policy 
  • Definition of the organisational structure of data protection
  • Data classification 
  • Risk assessment under GDPR
  • The Privacy Impact Assessment (PIA)


Controls Management
  • Design of security controls and drafting of specific policies & procedures
  • Implementation of controls
  • Definition of the document management process
  • Communication Plan 
  • Training and awareness plan
  • Operations management 
  • Incident management
Auditing and Review
  • Monitoring, measurement, analysis and evaluation
  • Internal audit 
  • Data breaches and corrective actions 
  • Continual improvement 
  • Competency, evaluation and closing the training 
Apply:

Cyber Fundamentals

2 day short course, price £497 Excl. VAT

Crucial Academy’s Cyber Fundamentals course is aimed at individuals and businesses that wish to gain a more thorough understanding of cyber security or refresh their current level of knowledge. Focused on delivering current, up-to-date teachings in cyber security, the two-day course will train people on the current threats out there and the most common ways people and businesses are exploited.

Teaching is a mix of practical hands-on training and group exercises; the course is designed to get everyone involved and raise confidence in understanding and talking about cyber security.

Combine this course with the Crucial Cyber Security Challenge Day for an original team bonding session that will both offer training in a very important subject and develop team cohesion.

Course Syllabus
  • Introduction to Cyber Security
  • Cyber Security Principles
  • Introduction to Information Security
  • Common Cyber Threats
  • Common Attack Methods
  • Common Vulnerabilities
  • What is the internet?
  • What is malware?
  • Main Risk Areas
  • The Steps to Cyber Security:
  • Risk Management
  • Remote Access
  • Password Security
  • Patch Management
  • Anti-Virus
  • Penetration Testing
  • Policies
  • Access Control
  • Security Configurations
  • Data Protection
  • Vulnerability Management
  • Network Security
  • Wi-Fi Security
  • Managing User Privilege
  • Incident Management
  • Security Monitoring
  • Removeable Media Controls
  • Home and Mobile Working
  • Team Scenario Exercises:
  • Case Study Walkthrough
  • Incident Scenario Practice
Apply:

Cyber Protection

2 day short course, price £497 Excl. VAT

Crucial Academy’s Cyber Protection course is aimed at individuals and businesses that wish to gain a thorough understanding of how to defend themselves and their business against current cyber threats.

The course will outline current attack methods, current threats and the most common vulnerabilities observed and exploited by attackers. Learn how to select the right security controls for yourself and for a business to prevent yourself or the company from becoming a statistic in the growing list of victims of cyber attacks.

Learn how to build a cyber framework and implement it within your business to ensure you can remind agile and one step ahead of the attackers looking for easy targets.

Teaching is a mixture of practical and exercise-based learning and aims to build your knowledge and understanding in cyber security, so you do not become a victim in today’s fast-paced, evolving digital world.

Course Syllabus
  • Introduction to Cyber Security
  • Cyber Security Principles
  • Introduction to Information Security
  • Common Cyber Threats
  • Common Attack Methods
  • Common Vulnerabilities:
  • Network Vulnerabilities
  • Host Vulnerabilities
  • Wireless Vulnerabilities
  • Application Vulnerabilities
  • What is the internet?
  • What is malware?
  • Main Risk Areas
  • Defence Against Attacks
  • Using Threat Intelligence
  • Detecting, Preventing and Responding to Reconnaissance
  • Building a Secure Network
  • Cyber Security Toolkit
  • Introduction to Risk
  • Evaluating Risk
  • Risk Reduction Techniques
  • Understanding the Compromise
  • Implementing a Vulnerability Management Plan
  • Incident Response
  • Defence-in-Depth
  • Common Architectural Issues
  • Policy & Compliance
  • Identity and Access Management Security
  • Team Scenario Exercises:
  • Case Study Walkthrough
  • Incident Scenario Practice
Apply:

Cyber War Game

2 day short course culminating in a team building exercise, price £497 Excl. VAT

Crucial Academy’s War Game course is aimed at companies looking to do something a little different for a corporate day out or team bonding experience. Based on how a real, live cyber operations centre functions, Crucial’s War Game scenario pits your team against a cyber attacker looking to take your business down. Don’t worry if you feel your cyber skills are the beginner level as the scenario can be adjusted for all levels.

Why not learn cyber security in a fun and relaxed environment, whilst at the same time building new skills and bonding as a team.

The course can be taught at your location or one of ours and can consist of one or two days. Our two day course, offers Crucial’s Cyber Fundamentals, to develop a teams understanding of current cyber security teachings before throwing individuals

Course Syllabus
  • Introduction to Cyber Security
  • Cyber Security Principles
  • Introduction to Information Security
  • Common Cyber Threats
  • Common Attack Methods
  • Common Vulnerabilities
  • What is the Internet?
  • What is Malware?
  • Main Cyber Risk Areas
  • The Steps to Cyber Security
  • Team Scenario exercise and Case Study
  • Cyber War Game - Teams battle against a cyber attacker trying to attack critical infrastructure, which the teams must try and prevent through solving increasingly difficult incidents and puzzles. All based on cyber themes and teachings.
Apply:

Data Protection

2 day short course, price £497 Excl. VAT

Crucial Academy’s Data Protection Course looks to provide individuals or businesses with a complete understanding of how to protect their data against attackers or simple ignorance. Strategic risk management of information and related systems, and the relevant creation and application of security controls will be outlined along with the cyber threats they are up against.

Based on the NIST Cyber Security Framework, ISO/IEC 27001 and the GDPR, you will be provided with the requirements needed to protect yourself and a business from malpractice and exploitation. Understanding of how to comply with GDPR and combining it with cyber security controls can be the difference between normal operations and a severe data breach, resulting in negative media exposure and monetary fines.

Teaching is a mixture of practical and exercise-based learning and aims to build your knowledge and understanding in Information Security, so you do not become a victim in today’s fast-paced, evolving digital world.

Course Syllabus
  • Introduction to Information Security
  • Information Security Principles
  • Common Cyber Threats
  • Common Attack Methods
  • Common Vulnerabilities
  • What is Malware?
  • Main Risk Areas
  • Introduction to the NIST Cyber Security Framework
  • Introduction to ISO/IEC 27001:
  • Planning the Information Security Management System
  • Implementing the ISMS
  • Monitoring and Improving
  • Introduction to the GDPR:
  • Fundamental Principles of the GDPR
  • The Process of Implementing
  • The Privacy impact assessment (PIA)
  • Design of Controls and Policy
  • The Data Protection Officer
  • Data Breaches and Corrective Actions
  • Information Security Policies
  • Team Scenario Exercises:
  • Case Study Walkthrough
  • Incident Scenario Practice
Apply:

What our customers say about us

“I was lucky enough to be on the first offensive course. The training and qualification gained from the Crucial Academy allowed me to step straight into a career as a penetration tester. I cannot recommend the Crucial Academy highly enough to those starting their new cyber career”

Gareth
Context IS

"I attended the Defensive Course in July 2018 and I would urge anyone with an interest in a cyber career to attend. A professionally run team with a wealth of knowledge, that helped me expand my military cyber experience and gain new qualifications that secured me a new career route"

Daz
MWR InfoSecurity

"I attended the Crucial Academy Information Assurance course in July 2018. The organisation provides great opportunities, helping to advance your career into cyber. I would recommend this company to others"

Jasmine
CGI

"I attended the Crest Registered Threat Intelligence Analyst course at the Crucial Academy in November 2018. I can't thank Crucial Academy enough, the instructors, guest speakers and the mentors were all truly fantastic. They enabled me to gain a deeper understanding about cyber security, helped me to focus on what was relevant, gave me plenty of useful links and self study tutorials"

Rachael
Raytheon

"I attended Crucial Academy's first Information Assurance and Cyber Threat Intelligence courses. The content and instruction on both were of a very high standard. The Crucial offer is an incredible opportunity, not to be missed, for current and ex-military hoping to transition into Information/Cyber Security"

Mark
KPMG

"Crucial Academy provided an impressive fusion of real-world experience with subject matter expertise. This training ensured that the students not only passed their exam but came away with the information to be better information security professionals. I recommend Crucial Academy to anyone looking to improve their understanding of cyber security"

Robert
EY

"I attended Crucial Academy's Cyber Threat Intelligence course and was incredibly pleased with the quality of instruction. I struggled in one or two areas and the instructor went out of his way to sit with me and run through everything after hours until I was happy. Great bunch of people and a fantastic offering"

Ross
MOD