Cyber Security

We offer a suite of Cyber Security & Hacking Courses, Vulnerability Testing, formal IT security and Formal IT audits and support for Information Security ISO27001:2013 certification.

Cyber Security courses

Course Schedule

Cyber Security Courses

If you (or your employees) need to be brought up to speed quickly and to the depth specified by your requirements, then come to us as our instructors are second to NONE!

CISSP, CISM, CEGIT, CEH, ISO 27001 and other bespoke “Hacking” courses. We hold the belief that, whilst Certification courses in the Cyber arena undoubtedly have their place, there is also a need for solid “Trade Craft” training in key areas such as Indicators of Attack (IoA), Indicators of Compromise (IoC), Security Analyst skillsets and many more disciplines.

VIEW ALL OUR CYBER SECURITY COURSES >

Bespoke Hacking Course

The bespoke Hacking courses are offered at various levels of competence from Beginner through Intermediate to Advanced (Advanced means High-Level; check prerequisites if unsure). They include preparation for, but are not limited to, CEH, CISSP, OCSP, CLAS, SANS, ISACA and beyond.

Vulnerability Testing

Vulnerability Testing procedures are covered as is Penetration testing to a highly skilled level.

IT security and Formal IT audits

We also offer formal IT security and Formal IT audits.  Preparation of a full ISMS Document Suite.

PCI-DSSv3.0 – preparation for standard and Internal Audit (arrangement of formal award by external audit from QSA registered company)

Internal and External Penetration Testing by leading industry practitioners.

Information Security

To provide Management Direction and support for information security.

Organisation of Assets and Resources – to help you manage information security. Asset classification and control – to help you identify and protect your assets. Personnel security – to reduce the risks of human error, theft, fraud or misuse of facilities. Physical and environmental security – to prevent unauthorised access, damage, and interference with premises and information. Communications and operations management – to ensure the correct and secure operation of information processing facilities.

  • Access control – to control access to information.
  • Systems development and maintenance – to ensure that security is built into information systems.
  • Business continuity management – to counteract interruptions to business activities and protect critical processes from the effects of major failures or disasters.
  • Compliance – to avoid breaches of criminal and civil law, statutory, regulatory, or contractual obligations, and any security requirement.

An organisation using ISO27001:2013 as the basis for its ISMS and registered by BSI proves to stakeholders that it meets the required standard.

ITOPSEC can help any organisation to achieve ISO27001:2013 certification.

We also provide a preparatory or “current state” audit against the standards thus allowing you to introduce improvements where necessary.

Accreditation is fundamental to the assurance and delivery of any ‘trusted’ system or service that underpins business.

It is a Continuous Process, throughout and beyond the life of the delivery project.