CYBERSECURITY TRAINING COURSES
Cybersecurity training can give your teams the knowledge and skills they need to tackle complex challenges. Bureau Veritas offers a comprehensive range of cybersecurity training courses designed to empower individuals and organisations.
WHAT IS CYBERSECURITY TRAINING?
Our training programmes cover a wide range of cybersecurity topics, giving your teams the insights they need, introducing best practice approaches to cybersecurity and – in some cases – helping to achieve compliance with global regulations.
They cover people and processes, with training courses available open to public enrolment (subject to demand) or available in-house at your chosen location.
OUR CYBERSECURITY TRAINING COURSES
People and process training courses:
-
ISO/IEC 27001 Lead Auditor
Trains participants to conduct and manage Information Security Management System (ISMS) audits, covering ISO 19011 and ISO/IEC 17021-1 standards. It includes practical exercises for mastering audit techniques, managing audit teams, and resolving conflicts.
-
ISO/IEC 27001 Lead Implementer
Participants learn to support the establishment, implementation, management, and maintenance of an ISMS based on ISO/IEC 27001. The course offers a deep dive into best practices of information security management, preparing participants for certification as a PECB Certified ISO/IEC 27001 Lead Implementer.
-
DORA Boardroom
Designed for board members in the financial sector, this training prepares participants for the requirements of the Digital Operational Resilience Act (DORA), which mandates cybersecurity knowledge to legally manage cyber responsibilities. The course concludes with certification demonstrating compliance with DORA's training requirements.
-
NIS2 Boardroom
Supports boardroom members to meet the NIS2 compliance that mandates cybersecurity training. It focuses on protecting digital infrastructure from cyber threats, with certification provided upon completion to meet legal training requirements.
-
Personal Digital Security
Focuses on enhancing the digital security of high-profile individuals susceptible to cyber threats due to their visible roles. It provides practical advice on protecting personal devices and data in hostile digital environments, based on best practices in cybersecurity and national security.
-
Travel SAFE
Aimed at international companies and frequent travellers, this course addresses travel-related security risks such as data theft, hacking, and scams. It offers practical methods to enhance security while traveling, ensuring the safety of both personal and corporate assets.
Technology Training courses
-
Internal Pentest Training
Dive into the essentials of internal penetration testing in this comprehensive course designed for IT security professionals. Learn to identify and mitigate vulnerabilities within corporate networks through a blend of theoretical knowledge and practical exercises. Understand the methodologies behind effective penetration testing and enhance your ability to secure office automation networks. This course is particularly beneficial for network administrators, security testers, and blue team members aiming to deepen their expertise and effectively manage security assessments.
-
Hands-on Hacking Workshop
A course designed to offer practical insight into hacking by watching a live demonstration of network penetration and setting up a Raspberry Pi Zero as an attack tool. This one-day course blends demonstrations with hands-on activities, ideal for those eager to learn basic offensive cybersecurity tactics.
-
Hacker Mindset Workshop
Explore the tactics of ethical hackers in this dynamic workshop. Learn to identify subtle security flaws and think like an attacker as you explore real-world hacking scenarios. Perfect for IT professionals and developers, this interactive session uses practical demonstrations and guided exercises to enhance your understanding of cybersecurity vulnerabilities and defence strategies.
-
Docker and Kubernetes Security Workshop
Master the security of Docker and Kubernetes in this comprehensive three-day workshop. Learn to identify and exploit common misconfigurations, navigate through container escape scenarios, and take control of Kubernetes clusters. Ideal for developers, pentesters, and anyone with a technical background, this workshop offers hands-on exercises and interactive sessions to deepen your understanding of container and cluster security.
-
Cloud Security Training
Equip your team with critical cloud security skills in this dynamic two-day training course. Understand the fundamentals of cloud security, explore common vulnerabilities, and learn how to protect cloud and hybrid environments against modern cyber threats. This course covers everything from cloud architecture basics to advanced vulnerability management, ideal for network administrators, security testers, and any IT professionals involved in cloud operations. Engage in hands-on sessions and capture-the-flag events to apply what you've learned practically.
-
IEC 62443
Provides a comprehensive understanding of the IEC 62443 standards for industrial cybersecurity, focusing on securing industrial automation and control systems.
-
ISO SAE 21434 Deep Dive
Learn about the ISO 21434 standard and its application in the automotive industry, focusing on cybersecurity throughout the vehicle lifecycle.
-
Mobile Application Hacking
A course focused on identifying and exploiting security vulnerabilities in mobile applications across Android and iOS platforms.
-
OT Cybersecurity Fundamentals
Offers foundational knowledge on securing Industrial Control Systems (ICS), critical for maintaining the integrity of infrastructures.
-
Secure Programming
Teaches developers how to integrate security best practices into software development from the start to mitigate risks and prevent breaches.
-
Threat Modelling
Learn to use the STRIDE methodology for threat modelling to identify and prioritize potential security threats in IT projects and existing systems.
-
UNECE Regulations on Cybersecurity & Software Updates
Provides insights into UNECE R155 and R156 regulations, focusing on cybersecurity and software update requirements and compliance strategies.
WHAT ARE THE BENEFITS OF BUREAU VERITAS CYBERSECURITY TRAINING COURSES?
- Strengthen your cybersecurity culture
- Reduce the risk of breaches
- Improve your responses to incidents
- Enable long-term cost savings
- Make sure employees know their own roles and responsibilities in cybersecurity
- Understand application frameworks, regulations and guidelines to support cyber crisis management and business resilience
- Identify best practices for cybersecurity management
WHY CHOOSE BUREAU VERITAS FOR CYBERSECURITY TRAINING?
Our cybersecurity training courses are developed and delivered by cyber experts with comprehensive understand and experience of the challenges you face.
Flexible solutions are available open to public enrolment (subject to demand) or available in-house at your chosen location.
All supported by a comprehensive range of cyber crisis management business resilience services for a complete end-to-end solution.