Our "Certificate in Cyber Defence Forensics" provides a comprehensive look into the crucial role of digital forensics in breach responses and legal investigations, equipping graduates with insights into malware behaviour and reverse engineering. Our "Certificate in Secure Network Operations" is designed for Networking Professionals who wish to gain a deep understanding of network security protocols, enhancing their capabilities to manage networks securely and adeptly handle cyber-attacks through log file and event analysis. A selection of 11 micro credentials for these courses, allows for a customised learning experience in the defensive security domain. Join us and stand at the forefront of cyber defence.
All our courses and modules are part-time and online, ensuring they seamlessly integrate with your work schedule and lifestyle. You can read more about them below.
Filter results by
Certificate in Cyber Defence Forensics
![Image for Certificate in Cyber Defence Forensics](/media/cyber-skills/site-assets/media/images/course-images/Cyber-Defence-Forensics.png)
Certificate in Secure Network Operations
![Image for Certificate in Secure Network Operations](/media/cyber-skills/site-assets/media/images/course-images/Secure-Network-Operations-Course.png)
Cloud Security Architecting
![Image for Cloud Security Architecting](/media/cloud-sec.jpeg)
Computer Forensics
![Image for Computer Forensics](/media/cyber-skills/site-assets/media/images/course-images/Computer-Forensics.png)
Cryptography & Protocols
![Image for Cryptography & Protocols](/media/cyber-skills/site-assets/media/images/course-images/Cryptography-and-protocols-course-583x318.png)
Cyber Incident Response
![Image for Cyber Incident Response](/media/27.png)
Cybersecurity Standards & Risk
![Image for Cybersecurity Standards & Risk](/media/cyber-skills/site-assets/media/images/course-images/CyberSecurity-Standards-and-risk-583x318.png)
Emerging Cyber Trends
![Image for Emerging Cyber Trends](/media/cyber-skills/site-assets/media/images/course-images/cyber_trends.jpg)
Higher Diploma in Cyber Security Operations
![Image for Higher Diploma in Cyber Security Operations](/media/cyber-skills/site-assets/media/images/course-images/iStock-1447298423.jpg)
Linux Administration
![Image for Linux Administration](/media/cyber-skills/site-assets/media/images/course-images/iStock-1700169379.jpg)
Log Files and Event Analysis
![Image for Log Files and Event Analysis](/media/cyber-skills/site-assets/media/images/course-images/Practical-Crypotgraphy-1-583x318.png)
Malware Behaviour Analysis
![Image for Malware Behaviour Analysis](/media/cyber-skills/site-assets/media/images/course-images/Malware-Behaviour-Analysis-v1.png)
Network Systems
![Image for Network Systems](/media/cyber-skills/site-assets/media/images/course-images/network_systems.jpg)
Professional Diploma in OT Security Operations Specialist
![Image for Professional Diploma in OT Security Operations Specialist](/media/cyber-skills/site-assets/media/images/course-images/OT-Specalist-Listing-Image.png)
Secure Network Systems
![Image for Secure Network Systems](/media/cyber-skills/site-assets/media/images/course-images/Secure-Network-Systems.png)
Windows Administration
![Image for Windows Administration](/media/cyber-skills/site-assets/media/images/course-images/67.jpg)