Digital Solution


Cybersecurity training can give your teams the knowledge and skills they need to tackle complex challenges. Bureau Veritas offers a comprehensive range of cybersecurity training courses designed to empower individuals and organisations. 


Our training programmes cover a wide range of cybersecurity topics, giving your teams the insights they need, introducing best practice approaches to cybersecurity and – in some cases – helping to achieve compliance with global regulations.

They cover people and processes, with training courses available open to public enrolment (subject to demand) or available in-house at your chosen location.


People and process training courses:

  • ISO/IEC 27001 Lead Auditor

    Trains participants to conduct and manage Information Security Management System (ISMS) audits, covering ISO 19011 and ISO/IEC 17021-1 standards. It includes practical exercises for mastering audit techniques, managing audit teams, and resolving conflicts.

  • ISO/IEC 27001 Lead Implementer

    Participants learn to support the establishment, implementation, management, and maintenance of an ISMS based on ISO/IEC 27001. The course offers a deep dive into best practices of information security management, preparing participants for certification as a PECB Certified ISO/IEC 27001 Lead Implementer.

  • DORA Boardroom

    Designed for board members in the financial sector, this training prepares participants for the requirements of the Digital Operational Resilience Act (DORA), which mandates cybersecurity knowledge to legally manage cyber responsibilities. The course concludes with certification demonstrating compliance with DORA's training requirements.

  • NIS2 Boardroom

    Supports boardroom members to meet the NIS2 compliance that mandates cybersecurity training. It focuses on protecting digital infrastructure from cyber threats, with certification provided upon completion to meet legal training requirements. 

  • Personal Digital Security

    Focuses on enhancing the digital security of high-profile individuals susceptible to cyber threats due to their visible roles. It provides practical advice on protecting personal devices and data in hostile digital environments, based on best practices in cybersecurity and national security.

  • Travel SAFE

    Aimed at international companies and frequent travellers, this course addresses travel-related security risks such as data theft, hacking, and scams. It offers practical methods to enhance security while traveling, ensuring the safety of both personal and corporate assets.

Technology Training courses

  • Internal Pentest Training

    Dive into the essentials of internal penetration testing in this comprehensive course designed for IT security professionals. Learn to identify and mitigate vulnerabilities within corporate networks through a blend of theoretical knowledge and practical exercises. Understand the methodologies behind effective penetration testing and enhance your ability to secure office automation networks. This course is particularly beneficial for network administrators, security testers, and blue team members aiming to deepen their expertise and effectively manage security assessments.

  • Hands-on Hacking Workshop

    A course designed to offer practical insight into hacking by watching a live demonstration of network penetration and setting up a Raspberry Pi Zero as an attack tool. This one-day course blends demonstrations with hands-on activities, ideal for those eager to learn basic offensive cybersecurity tactics.

  • Hacker Mindset Workshop

    Explore the tactics of ethical hackers in this dynamic workshop. Learn to identify subtle security flaws and think like an attacker as you explore real-world hacking scenarios. Perfect for IT professionals and developers, this interactive session uses practical demonstrations and guided exercises to enhance your understanding of cybersecurity vulnerabilities and defence strategies.

  • Docker and Kubernetes Security Workshop

    Master the security of Docker and Kubernetes in this comprehensive three-day workshop. Learn to identify and exploit common misconfigurations, navigate through container escape scenarios, and take control of Kubernetes clusters. Ideal for developers, pentesters, and anyone with a technical background, this workshop offers hands-on exercises and interactive sessions to deepen your understanding of container and cluster security.

  • Cloud Security Training

    Equip your team with critical cloud security skills in this dynamic two-day training course. Understand the fundamentals of cloud security, explore common vulnerabilities, and learn how to protect cloud and hybrid environments against modern cyber threats. This course covers everything from cloud architecture basics to advanced vulnerability management, ideal for network administrators, security testers, and any IT professionals involved in cloud operations. Engage in hands-on sessions and capture-the-flag events to apply what you've learned practically.

  • IEC 62443

    Provides a comprehensive understanding of the IEC 62443 standards for industrial cybersecurity, focusing on securing industrial automation and control systems. 

  • ISO SAE 21434 Deep Dive

    Learn about the ISO 21434 standard and its application in the automotive industry, focusing on cybersecurity throughout the vehicle lifecycle.

  • Mobile Application Hacking

    A course focused on identifying and exploiting security vulnerabilities in mobile applications across Android and iOS platforms.

  • OT Cybersecurity Fundamentals

    Offers foundational knowledge on securing Industrial Control Systems (ICS), critical for maintaining the integrity of infrastructures.

  • Secure Programming

    Teaches developers how to integrate security best practices into software development from the start to mitigate risks and prevent breaches.

  • Threat Modelling

    Learn to use the STRIDE methodology for threat modelling to identify and prioritize potential security threats in IT projects and existing systems.

  • UNECE Regulations on Cybersecurity & Software Updates

    Provides insights into UNECE R155 and R156 regulations, focusing on cybersecurity and software update requirements and compliance strategies.


  • Strengthen your cybersecurity culture 
  • Reduce the risk of breaches
  • Improve your responses to incidents 
  •  Enable long-term cost savings
  • Make sure employees know their own roles and responsibilities in cybersecurity
  •  Understand application frameworks, regulations and guidelines to support cyber crisis management and business resilience
  • Identify best practices for cybersecurity management


Our cybersecurity training courses are developed and delivered by cyber experts with comprehensive understand and experience of the challenges you face.

Flexible solutions are available open to public enrolment (subject to demand) or available in-house at your chosen location.

All supported by a comprehensive range of cyber crisis management business resilience services for a complete end-to-end solution. 


Please select country prefix
Enquiring about
If known (Approx.)
If known (Approx.)
Maximum 3 files.
2 MB limit.
Allowed types: pdf, doc, docx, ppt, pptx, xls, xlsx, jpg, png.
I have read and understood the terms and conditions of {Personal data protection policy}.
Your personal data is collected by Bureau Veritas UK, having its registered office at Suite 206, Fort Dunlop, Fort Parkway, Birmingham B24 9FD, and is subject to computer processing in order to respond to questions from the media about the Group or its subsidiaries on the basis of your consent, and to respond to customer complaints, on the basis of the service contract that you have entered into with a subsidiary of Bureau Veritas.

Your personal data is intended for the Corporate Communication department or the Quality, Health & Safety and Environment department of the Bureau Veritas Group, depending on the nature of your request, and for their service providers, providing consulting and technical services as well as for the Bureau Veritas IT department. Your personal data will be retained for a period of one year for media requests and three years for customer complaints from your request. Your personal data can be transferred outside the European Union, in countries where Bureau Veritas subsidiaries operate, on the basis of standard contractual clauses established by the European Commission, available on request, by submitting a query here.

Fields marked with an asterisk must be filled in. Otherwise, Bureau Veritas would not be able to answer your questions and/or complaints. In accordance with the Data Protection Act 2018 and the General Data Protection Regulation of 27 April 2016, you have the right to access, rectify and erase any personal data concerning you, as well as the right to limit the processing, the right to oppose to the processing or the right to portability of your personal data. You have the right to withdraw your consent at any time by submitting a query here and unchecking the box dedicated to the collection of your consent. You can exercise your rights online to lodge a complaint to the Information Commissioner’s Office.