Vous êtes sur la page 1sur 19

The CSTA course is well laid out

and has a very good balance


between the theory and practical
elements. In addition, the lab
and exercises are well set out
and reflect a practical network.
What I found even more valuable
was the additional tips and leads
provided by a knowledgeable
instructor demonstrated by
real life scenarios and examples.
All in all, a fantastic experience
and by far the best training
course I have attended.
Highly recommended.
IT Security Analyst

Cyber Development
Training Prospectus
Advanced skills training programmes and
professional cyber development for current
and future security professionals in:
Ethical hacking (penetration testing)
Digital forensics
Cyber incident response
7Safe, Cambridge Technology Centre, Information security
Discover | Develop | Secure Discover | Develop | Secure
Melbourn, Herts, SG8 6DP United Kingdom
tel: +44(0) 1763 285 285 education@7safe.com www.7safe.com www.7safe.com
Contents Professional cyber development
03
04
Cyber Development Training
Why Train with 7Safe?
training at 7Safe
05 7 Good Reasons to Choose 7Safe Each year, around 500 of the worlds leading cyber experts start and develop their vocational
06 7Safe Training Passports training with 7Safe. Some of them go on to lead their organisations security procedures and
07 Our Training Locations tackle serious crime, and others become technical leaders protecting technical assets.
08 7Safe Cyber Development Skills
Cyber Security and Digital
10 Ethical Hacking Courses
11 Certified Security Testing Associate (CSTA)
Investigations are rapid growth
areas within IT and the skills
Who are 7Safe?
12 Certified Security Testing Professional (CSTP) required are in demand. We provide cyber security and digital investigation advice,
7Safe training is intensive: education and technical services to all technology-enabled
13 Certified Wireless Security Analyst (CWSA)
our consultants coach individual organisations.
14 Certified Mobile Security Tester (CMST) delegates so that they leave with Since 2001, we have been helping organisations to develop,
15 Certified Application Security Tester (CAST) the confidence to do the job that maintain and grow their cyber security and information
16 Digital Forensics Courses they are training for. Our aim is investigation capabilities, increasing their overall trust in
to create skilled professionals the systems that they operate, the information that they
17 Certified Data Collection Technician (CDaCT)
capable of undertaking work as hold and the people who have access to it.
18 Certified Forensic Investigation Practitioner (CFIP) penetration testers, reviewing
19 Certified Malware Investigator (CMI) and testing software code for We offer a range of consultancy services, including:
20 Certified Mac Forensics Specialist (CMFS) security flaws, and performing Penetration testing and technical security assessments
digital forensics analysis. Digital forensic investigations
21 Certified Linux Forensic Practitioner (CLFP)
The traditional graduate
22 Certified Forensic Investigation Specialist (CFIS)
PCI and ISO27001 audit and compliance
recruitment and training route
Information security policy, and reviews of best practice
23 Certified Cyber Investigator (CCI) to acquiring these skills and
qualifications would typically eDiscovery document and audio review, and secure data hosting
24 Information Security Training
take around two years. Information governance and data risk assessments
25 Hacking Insight for Managers (HIM)
We maintain regular contact Professional cyber development is the cornerstone of effective
26 Certified ISO 27001 Implementation Practitioner (CIIP) with all our Alumni, supporting security and we underpin the services above with our portfolio
27 Payment Card Industry Data Security Standard (PCI DSS) them throughout their career of university and industry-accredited courses and certifications.
We look forward to Implementation progression. As part of PA Consulting Group, we offer a comprehensive set
partnering with you to 28 Software Security of IT, cyber security and education services that few can
combat the growing cyber Certified Secure Coding for Software Developers (CSCSD) compete with.
threat across all industry 29 MSC in Professional Practice in Digital
sectors, through the delivery Forensics and Security

of the highest quality cyber 30 7Safe Services


Cyber Security Capabilities
security training.
32 Digital Investigation Capabilities
Richard Allen
33 Cyber Incident Response
Education Business
34 eDiscovery
Development Manager
35 Information Governance Discover | Develop | Secure
2 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 3
Why train with 7Safe?
Our courses are all taught
by practising consultants
Accredited by CREST and the IISP,
our courses offer current, relevant
Would you like to be one of
the few who make the grade?
7 good reasons
who are either former skills that are designed for your
work place, as well as the support
This prospectus shows just
some of the training courses
to choose 7Safe
police officers and
government security
of joining our exclusive Alumni and experiences on offer to IT You will become:
Network. Unlike other Cyber professionals and entry-level
professionals, industry- Academies, 7Safes Development delegates, with information 1. A recognised cyber professional:
experienced penetration Centre provides regular courses on how to book your place. you will join a growing community
throughout the year. We even of cyber experts who seek to uphold
testers, and/or respected the standards required to protect
take our training to prestigious
digital forensics city venues around the UK and businesses and individuals alike.
specialists who are to Europe.
2. A visionary for improvement: the
engaged by police forces knowledge and advice you will receive
in the UK (and around the in the latest cyber security techniques
To find out if our cyber training is right for you, and to make
world) to provide evidence a booking, contact our education team on 01763 285 285 or
will enable you to apply your learning
in high-profile criminal to real world scenarios.
email education@7safe.com
cases. 3. Well-informed and able to gather
the right critical information:
you will learn to understand the
Whatever stage you are at in your career, were here to help you. We are root cause of problems and act
committed to helping people develop their skills and gain professional based on fact, not guesswork.

qualifications not only as they enter the cyber security industry, but as 4. Able to secure the respect of others:
you will learn to follow the best
they progress through it. Kathryn Hurcomb, Education Co-ordinator practice recommended by partners
IISP, CREST, and ACPO.

5. Capable of strategic thinking within


7Safe Training provides: your area of specialism: you will learn
from our consultants how to anticipate
Current, relevant courses delivered by practising Membership of 7Safe Alumni Network trends in cybercrime associated with
consultants 7Safes Alumni Network gives our delegates the rapid development of info tech.
developed, delivered and regularly revised to exclusive membership access to all the latest
reflect latest developments, techniques, exploits, updates in our courses, so that they never fall 6. Proficient at cyber project
and defensive recommendations, an approach that behind when things change. Its also the perfect management: you will learn to carry
guarantees up-to-date, highly relevant real-world community for crowdsourcing technical advice out your work in a highly-proficient,
content. when needed back at your work place. methodological and managed way.

7. Confident at achieving your goals:


Work-based, practical approach that satisfies Skills needed by industry and government
you will be able to measure and
real-world requirements 7Safes technical training courses provide industry
review your progress towards
Hands-on practical exercises transfer skills needed recognised certifications with delegates coming
career objectives.
in the workplace, and unlike so many courses in this to us from all sectors including law enforcement
field, when delegates complete the exam, they are agencies and even our competitors to increase
ready to do the job. their in-house capability and peer recognition.

4 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 5


7Safe training passports Our training locations
Discounted training with 7Safes Training Passports are the most economical way 7Safe offers you a wide choice of venues designed to suit your needs and budget,
to get all the training that you or your team needs. Each Training Passport enables starting with our flagship training centre close to the vibrant City of Cambridge.
you to purchase a set number of training days which can be used across our
Cambridge Cyber
entire portfolio of courses for a discounted rate compared to when booking Development Centre The opportunity to perform hands-on hacking and forensic work
the courses individually. 7Safe courses are taught in using the latest equipment is one feature of our Cyber Training
several locations, including Programme; others include:
our flagship Cambridge Cyber
Development Centre (CDC) Up-to-date technology and training rooms
at Melbourn. At the CDC, our Free lunch and coffees throughout your course
trainers use purpose-built Air-conditioned training rooms in well-lit, spacious surroundings
facilities to create the right
Free on-site car parking with no restrictions for private car users
environment in which to
Near to major road network (M11/A10/A505) and train stations
provide structured hands-on
training. Many of our delegates Only 36 minutes by train from central London*
remark that our approach is
different and advantageous
because of the personal For the latest venues and We are also planning on-site
attention they receive in this dates, see: www.7safe.com/ and public training courses
unique educational setting. professional-development in EU countries and welcome
However, if you would prefer to enquiries by telephone, email
train at your organisations site, Accredited training partners or the web.
or at a public training venue 7Safe Accredited Training
closer to your home or company Partners (ATP) based in USA,
location, we offer these Ireland and Cyprus, offer access to
alternative options: our market leading cyber training
programmes outside the UK.
On-site training:
For groups of 8 people or more, we
can design a tailor-made package
to meet your companys cyber
skills requirements delivered on
Where to find us
your site. For more details, see: By car

Key Benefits: www.7safe.com/


professionaldevelopment/
60 miles from London
105 miles from
Gain
 the most up-to-date skills Networking opportunities Birmingham
7Safe Training Alumni custom-courses
95 miles from Oxford
Significantly reduce your As a 7Safe training alumni, Professional development
training costs you are fundamental to our Discounts on new courses 7Safe training By train
Greater flexibility with class continued success, so we (loyalty discounts) at a City near you London Kings Cross
scheduling are keen to keep in touch Lifelong learning from Convenient training venues to Royston station
Visit our website for latest with you. Your lifelong access to white papers or around the UK, including: 36 minute direct train
journey and 10 minute
deals regarding our Training connection with us briefings on the latest cyber London
taxi to Cambridge
Passports and prices. offers you many benefits: security issues Manchester Technology Centre
Reading
* plus short taxi ride.

6 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 7


7Safe cyber development skills overview

Awareness Fundamentals Core Specialist


Meet the trainers
CAST Our courses are all taught by
CSTA Advanced Web
Ethical Hacking
App Security
practising consultants who
are either former government
security professionals or police
Ethical Hacking CSTP CMST officers, industry experienced
Ethical Web Mobile App
Penetration Tester/Ethical Hacker Hacking security penetration testers or respected
Intrusion Detection and Attack digital forensics specialists.
Monitoring
IT Security Manager CWSA
Wireless Aleksander
Security
Gorkowienko
Penetration
Testing Training
CDaCT CFIP CFIS Team Manager
Data Collection Forensic Forensic
Technician Investigation Investigation

Digital Forensics CMI


Malware
CCI
Network Forensic
Computer Forensics Consultant Investigation Investigation
Cyber Security Analyst
Data Forensics Technician
CLFP
Forensic Computer Analyst Linux Forensic
Investigation
Digital Forensics Training Team
Paul Cain
CMFS Dave Swinden
Apple Mac
Forensic Steve Shepherd

Course
HIM
Hacking Insight
CIIP
ISO 27001
accreditations
for Managers Implementation

Information Security PCI DSS


PCI DSS
Hacking Awareness Training Implementation
PCI DSS Awareness
ISO27001 Implementation

To find out if our cyber training


is right for you, and to make a
booking, contact our education
CSCSD
Secure Coding team on 01763 285 285 or email
education@7safe.com

Software Security
Secure Coding for Software
Developers Discover | Develop | Secure

8 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 9


Ethical hacking Ethical Hacking
courses and Certified Security
certifications Testing Associate (CSTA)
overview Core-level course 7 good reasons to choose 7Safe - see page 5

7Safes ethical hacking courses are


aimed at penetration testers, software This infrastructure ethical hacking course is our most popular
To find out if our cyber
developers, system administrators and core-level technical course for people from a wide variety of training is right for you,
network architects. We provide the latest network related and security roles across all industry sectors and to make a booking,
techniques as well as valuable insight looking to develop their own capability to support their contact our education team
on 01763 285 285 or email
into the attack methods used by hackers organisations in-house cyber team. education@7safe.com
and how to defend your systems against
them. Our courses are between two and What will I learn? What qualification will I receive?
Accreditations
four days of hands-on experience, using You will learn a series of attack Upon successful completion of
practical exercises to discover and learn methodologies and gain practical the exam, you will be awarded the
techniques/methods that will provide experience using a range of tools Certified Security Testing Associate
to undertake an infrastructure (CSTA) qualification, accredited by
both developing and experienced cyber
penetration test across a both CREST and the IISP.
professionals with the latest in-depth multi-OS environment CSTA is accredited by CREST and helps
knowledge. Once you are able to identify Who should attend? you prepare for the CREST Registered
Penetration Tester examination.
and exploit vulnerabilities in If you are looking to improve your
a safe manner, you will be career prospects by starting or
introduced to a range of defensive transitioning into a cyber security
countermeasures, allowing you role e.g.
to protect your network and Network engineers Covering the IISP skill areas of Level 1:
respond to cyber threats Systems administrators A6, B2 and C1; Level 1+: D1, D2, D3

Systems architects or developers


How will I benefit?
This course in particular will give you: CSTA prerequisites:
Valuable preparation and hands- Basic understanding of TCP/IP
on practice in preparation for the networking and comfortable with
CREST Registered Penetration Windows and Linux command line.
Tester (CRT) examination
Understanding of common CSTA is also a good source of I found it all very
After completing the CSTP Ethical Web Application Hacking infrastructure vulnerabilities and information on TCP/IP networking, interesting, the
training course I applied for a few pen-testing positions how to exploit or resolve them should you wish to refresh your hardware and
knowledge. software system was
and I recently joined Marks & Spencer as an Ethical Hacker. excellent, everything
The training at 7Safe consolidated my previous knowledge worked as planned.
The content was
in web application security and therefore helped me a lot extremely relevant to
in my career. Ethical Hacker, Marks and Spencer our organisation.
CSTA Delegate
SuperWebs Ltd
10 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 11
Ethical Hacking Ethical Hacking
Certified Security Testing Certified Wireless
Professional (CSTP) Security Analyst (CWSA)
Core-level course 7 good reasons to choose 7Safe - see page 5 Core-level course 7 good reasons to choose 7Safe - see page 5

This web application ethical hacking course is designed to This two-day course is for people involved in a variety of wireless
To find out if our cyber To find out if our cyber
give you the skills you need to ensure valuable data assets training is right for you, network-related roles. It is designed to give you the skills you need training is right for you,
are effectively protected. and to make a booking, to develop a more secure infrastructure around critical data and and to make a booking,
contact our education team applications, and defend systems from unauthorised wireless contact our education team
on 01763 285 285 or email on 01763 285 285 or email
What will I learn? Who should attend? education@7safe.com attacks. education@7safe.com
You will be introduced to a range Anyone with responsibility for, or
of defensive countermeasures to an interest in, the security of web What will I learn? Who should attend?
Accreditations You will learn how hackers bypass Anyone with responsibility for, or an Accreditations
become more resistant to attack applications, including:
You will learn how to exploit these System administrators wireless security, and gain an interest in, the security of wireless
vulnerabilities to access data and Software developers understanding of the principles networks and Wi-Fi enabled devices,
functionality beyond your remit Budding penetration testers of wireless cryptography including:
Anyone subject to the Once able to identify and exploit IT managers
How will I benefit? requirements of the Payment Card CSTP is accredited by CREST and helps
vulnerabilities, you will be Systems/network administrators CWSA is accredited by CREST and
This course will give you: Industry Data Security Standard you prepare for the CREST Registered introduced to a range of defensive IT security professionals helpsyou prepare for the CREST
Penetration Tester examination. Registered Penetration Tester
Valuable preparation for the (PCI DSS) countermeasures, allowing you Forensic/network investigators examination and the CREST Wireless
CREST Registered Penetration to complete the final exercise of Specialist examination.

Tester (CRT) examination and CSTP prerequisites building a secure wireless network CWSA prerequisites
the knowledge required to join An understanding of how a web to protect information assets Basic understanding of TCP/IP
our CAST course (advanced page is requested and delivered: Covering the IISP skill areas of Level 1:
networking:
web application security) Are you familiar with the high- A6, B2 and C1; Level 1+: D2 How will I benefit? Are you familiar with the OSI
Covering the IISP skill areas of Level
The skills and understanding to level components involved, This course will give you: model? Can you name a layer 2 1:A6, B2 and C1; Level 1+: D2
progress to the next stage in your e.g. browsers, web servers, web Valuable preparation for the and layer 3 protocol?
career as a security professional applications and databases? CREST Registered Penetration Can you describe how a request
What are HTTP and HTML? Tester (CRT) examination reaches a web server through
What qualification will I receive? An understanding of databases A thorough understanding of how Ethernet, IP and TCP?
Upon successful completion of and SQL would also be an hackers target wireless networks
the exam, you will be awarded the advantage Sarantis is a great and how to protect wireless If you are planning to do both
Certified Security Testing Professional instructor. The course networks (and clients) from the CSTA and CWSA courses, we
(CTSP) qualification. If you are a web developer looking content helped to attack in the real world recommend you take CSTA first.
for a secure coding course, please reinforce my existing See page 11.
see our Certified Secure Coding knowledge and give What qualification will I receive?
for Software Developers (CSCSD). real world examples Upon successful completion of
See page 28. and practical exercises the exam, you will be awarded the An essential course for
for the key features Certified Wireless Security Analyst those designing and
of the content and (CWSA) qualification. configuring all aspects
syllabus. of wireless networking.
CSTP Delegate CWSA Delegate
NewVoiceMedia Ltd New Vision Group Ltd
12 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 13
Ethical Hacking Ethical Hacking
Certified Mobile Certified Application
Security Tester (CMST) Security Tester (CAST)
Specialist-level course 7 good reasons to choose 7Safe - see page 5 Specialist-level course 7 good reasons to choose 7Safe - see page 5

This three-day course is for people in a wide variety of mobile This specialist four-day web hacking course is for people in a wide
To find out if our cyber To find out if our cyber
application-related roles. It introduces the fundamentals of mobile training is right for you,
range of application development and testing roles. It is designed training is right for you,
application security and gives you an understanding of whether and to make a booking, to give you an in-depth knowledge of how to identify security and to make a booking,
the sensitive information stored on mobile devices is sufficiently contact our education team vulnerabilities and an understanding of the real risk that these contact our education team
on 01763 285 285 or email on 01763 285 285 or email
protected. education@7safe.com
vulnerabilities pose by exploiting them. education@7safe.com

What will I learn? What qualification will I receive? What will I learn? Who should attend?
Accreditations
You will be led through the current Upon successful completion of You will be led through a range People working in an application
OWASP Mobile Top Ten, the most the exam, you will be awarded the of state-of-the-art hacking testing (security assessment/
critical mobile application security Certified Mobile Security Tester tools and techniques to allow administration) or developer
risks that leave organisations and (CMST) qualification. you to conduct a complete web environment, including
their customers data vulnerable application security assessment experienced:
to attack Who should attend? Once able to identify and exploit Penetration testers CAST is accredited by CREST and
Once able to identify and exploit Anyone looking to understand the vulnerabilities, you will learn Application developers helps you prepare for the Certified
Web Application Tester examination.
vulnerabilities in both iOS and fundamentals of mobile application a range of defensive counter Security professionals
Android platforms, you will be security, including: measures, allowing you to
introduced to a range of defensive App developers develop applications that are CAST prerequisites
countermeasures, allowing you IT security officers more resistant to attack and Completion of the 7Safe CSTP
to develop applications that are Penetration testers provide a better protection course or equivalent knowledge Covering the IISP skill areas of Level 1:
more resistant to attack Network and systems for data assets Practical experience of backend A6, B2 and C1; Level 1+: D2

administrators web application technologies


How will I benefit? How will I benefit? (ef HTML, Java Script, PHP, ASP,
This course will give you: CMST prerequisites This course will give you: MSSQL, MySQL)
An understanding of whether A basic understanding of: An industry recognised Hands-on experience of modern
the sensitive information stored How the iOS and Android platform qualification, accredited by hacking trends, tools and
on mobile devices is sufficiently and devices work CREST and the IISP technologies would be
protected and what the risk would HTTP protocol Essential preparation for an advantage
be if the device fell into the hands Programming The whole course was the CREST Certified Tester
of an attacker Windows and Linux command line excellent, I did not realise (application) exam Had a fantastic time
The ability to use a variety of tools Java and Objective-C languages what a massive and Security vulnerability on the course, well
and techniques, including static interesting field security identification and avoidance delivered, useful and
and run-time analysis, binary is. It has opened my eyes eye opening to say the
patching and reverse engineering, to what the hackers do What qualification will I receive? least. Heading off to
to improve mobile application to try and steal sensitive Upon successful completion of take the CREST exam
security data. the exam, you will be awarded the shortly! Thanks for
CMST Delegate Certified Application Security Tester all your help.
Z-Tech Control (CAST) qualification. CAST Delegate
Systems Ltd MarketingSource Ltd
14 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 15
Digital forensics Digital Forensics
courses and Certified Data Collection
certifications Technician (CDaCT)
overview Fundamentals-level course 7 good reasons to choose 7Safe - see page 5

7Safe has successfully delivered its


certified digital forensic training courses This is a fundamentals-level course for people who have to
To find out if our cyber
to numerous law enforcement and handle or advise on electronic evidence/data on a regular basis training is right for you,
legal professionals as well as private and provides them with the skills to ensure that forensic and and to make a booking,
corporations across all industry evidential integrity is retained when data is transferred or copied. contact our education team
on 01763 285 285 or email
sectors. Our programme is aimed at education@7safe.com
forensic investigators, digital security What will I learn? Who should attend?
practitioners and those with computer You will be introduced to the Anyone responsible for the process
Accreditations
forensic experience wanting to develop legalities, best practice and of data acquisition, including:
skills further in order to conduct current techniques used for data Law enforcement officers
thorough, efficient and comprehensive acquisition as part of forensic and agents
investigation, eDiscovery or other Network administrators
investigations. Expert-led trainers
regulatory proceedings IT security officers
and practical technical exercises will You will carry out forensic imaging Civil litigation lawyers/legal
Covering the IISP skills areas of Level 1:
A2, A6 and H1; Level 1+: D1, F3
ensure you have the latest industry best in a number of environments, using council
practice knowledge and tools to conduct different methods and software Litigation support managers
the most effective digital forensic You will learn how to extract eDiscovery consultants
investigations for your organisation. individual mailboxes from a live
Microsoft Exchange email server, CDaCT prerequisites
as well as live system memory A general appreciation of information
and volatile data capture technology and computer forensic
principles/methods is desirable,
How will I benefit? but not essential.
This course will give you:
The skills you need to be
competent in handling data during
the initial stages of investigation
The opportunity to practice
identifying and collecting Steve Shepherd MBE
Instructor was very knowledgeable and able to give examples of electronic evidence/data and has a great personality
experience which supported and enhanced knowledge of the course build your confidence for teaching and has
An industry-recognised the ability to make
material. Excellent material covered with the theory in the manual qualification in data collection the course fun and
backed up by the exercises. Where material was more complex the interesting. I have
What qualification will I receive? thoroughly enjoyed
instructor supported this by explaining it further or drawing diagrams, Upon successful completion of the course and will be
doing demos, etc. CFIP Delegate, The Babraham Institute the exam, you will be awarded the sending my team on it.
Certified Data Collection Technician CDaCT Delegate
(CDaCT) qualification. City Docs Ltd
16 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 17
Digital Forensics Digital Forensics
Certified Forensic Investigation Certified Malware
Practitioner (CFIP) Investigator (CMI)
Core-level course 7 good reasons to choose 7Safe - see page 5 Core-level course 7 good reasons to choose 7Safe - see page 5

This core-level technical course is designed for people looking This is a core-level technical course for people looking to extend
To find out if our cyber To find out if our cyber
to develop their computer forensics investigation skills, either training is right for you, their digital forensic knowledge beyond conventional device training is right for you,
for a career in digital investigations or as part of their current and to make a booking, analysis. It will help you protect your IT environment by showing and to make a booking,
cyber role. contact our education team you how to conduct malware analysis, from first principles all the contact our education team
on 01763 285 285 or email on 01763 285 285 or email
education@7safe.com way to investigating network activity stemming from malicious education@7safe.com
What will I learn?  n industry-recognised
A software infection that your AV software has failed to detect.
You will learn the principles and qualification in forensic
Accreditations Accreditations
guidelines for static computer investigation and ideal What will I learn? Certified Malware Investigator (CMI)
forensic investigations; the preparation for the 7Safe You will learn how to identify, qualification.
fundamentals of the complete CFIS advanced course analyse and interpret malicious
forensic investigation process; software and associated forensic Who should attend?
how to preserve evidence and What qualification will I receive? Covering the IISP skills areas of Level 1: artefacts, including trojan horses, Digital forensic analysts, law
the methodology for conducting Upon successful completion of A2, A6; Level 1+: F2, F3 viruses and worms enforcement officers, cyber CMI is accredited by CREST as useful
a forensic investigation the exam, you will be awarded the You will practice malware incident investigators and system preparation for the CREST-Registered
Intrusion Analyst examination.
You will use practical, hands-on Certified Forensic Investigation investigations from mounted, administrators looking to develop
exercises to help you understand Practitioner (CFIP) qualification. booted and network perspectives, their skills in malware identification
how data is stored on electronic and undertake real-world and analysis.
media, how to work with key Who should attend? exercises, including the conversion
forensic investigation tools and Anyone who is or wants to be of E01 forensic images to bootable CMI prerequisites Covering the IISP skill areas of Level 1:
how to identify Windows-based responsible for computer forensic virtual machine disks Completion of the 7Safe CFIP course C1 and E1; Level 1+: F2 and F3

OS forensic artefacts investigations, including: is highly recommended. Otherwise


Cyber forensic and network How will I benefit? you will need:
How will I benefit? investigators The course will give you: Knowledge of the principles
The course will give you: IT security officers The skills to analyse and interpret surrounding forensic investigation
An understanding of each stage Law enforcement officials malicious software, and investigate and an understanding of the
of a forensic investigation, from network activity initiated by preliminary forensic investigation
evidence seizure through to data CFIP prerequisites malicious software infection case considerations
investigation and interpretation, Experience with Microsoft An understanding of how to Sound experience with the
to report and presentation of Windows OS and, ideally, a general simplify complex evidence, Microsoft Windows operating
findings appreciation of forensic principles, and collate and report results systems Instructor was
The skills to allow you to practices and software. An industry-recognised An understanding of how a web interesting and
undertake the forensic acquisition qualification in malware page is requested and delivered engaging. Obviously
of an electronic device Excellent course with investigation Ideally an understanding of knew the subject well.
Confidence in working with key very knowledgeable Command Line Interface (CLI) I thoroughly enjoyed
forensic investigation products tutor, highly What qualification will I receive? and TCP/IP networking concepts the course.
recommended. Upon successful completion of CMI Delegate
CFIP Delegate the exam, you will be awarded the Assured Security
Staffordshire University Control Ltd
18 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 19
Digital Forensics Digital Forensics
Certified Mac Forensics Certified Linux Forensic
Specialist (CMFS) Practitioner (CLFP)
Specialist-level course 7 good reasons to choose 7Safe - see page 5 Specialist-level course 7 good reasons to choose 7Safe - see page 5

This specialist-level course is for experienced forensic This specialist-level course is for experienced forensic
To find out if our cyber To find out if our cyber
investigators whose role requires them to expertly examine training is right for you, investigators who want to acquire the knowledge and training is right for you,
Apple devices, giving them knowledge and confidence in and to make a booking, skills to navigate, identify, capture and examine data and to make a booking,
handling the data and forensic evidence in Mac OS X and contact our education team from Linux-based systems. contact our education team
on 01763 285 285 or email on 01763 285 285 or email
iOS environments. education@7safe.com education@7safe.com
What will I learn? What qualification will I receive?
What will I learn? Who should attend? You will develop a core Upon successful completion of
Accreditations Accreditations
You will learn the underlying Forensic practitioners, systems understanding of the file system the exam, you will be awarded the
data structures of Apple devices administrators and cyber data structures and key files in Certified Linux Forensic Practitioner
and the many forensic artefacts investigators who want to extend Linux-based systems so that you (CLFP) qualification.
specific to Mac OS X and iOS their experience with Window- can be confident of capturing
You will practice using real life based systems to the Mac OS X Covering the IISP skill areas of Level 1: potential digital evidence Who should attend? Covering the IISP skill areas of Level 1:
examples identifying, finding, and iOS environments. A6, B1, C1 and F2; Level 1+: F3 You will practice using both Forensic practitioners, systems A6, E2; Level 1+: F2 and F3

extracting, decoding and Linux GUI and command line administrators and cyber
interpreting the data stored on CMFS prerequisites environments, and learn how to investigators who want to extend
an Apple device from a forensic Completion of the 7Safe CFIP use Linux for forensic imaging their experience from Window-
practitioners perspective course is highly recommended. You will capture RAM and based systems to the Linux
Otherwise you will need: basic volatile data from a live environment.
How will I benefit? Knowledge of the principles and An excellent course Linux system, and use forensic
This course will give you the guidelines surrounding forensic which gave a thorough software to create an image CLFP prerequisites
opportunity to: investigation overview of Mac of a Linux system Completion of the 7Safe CFIP
Learn effective techniques for the Basic knowledge of data Forensics, the HFS+ file course is highly recommended.
identification and interpretation structures, e.g. binary and system and important How will I benefit? Alternatively you will need an
of forensic artefacts on OS X and hexadecimal artefacts and their On this course, you will: understanding of digital forensic
iOS devices locations on the file Understand the data structures principles and practices. No Linux
Understand Apple disk partitioning system. The exercises associated with the ext file experience is necessary.
and develop confidence when supported the theory systems
identifying and isolating artefacts well and helped build Learn effective techniques
from Apple devices on the course content. to extract data from a Linux
Improve your ability to respond As a non-Mac user, environment
effectively to a wider range of I now feel a lot more Develop confidence when
forensic incidents confident working identifying and capturing Very good course, well
with Macs, not just Linux system artefacts paced and provided
What qualification will I receive? for forensic analysis, Improve your ability to respond a good understanding
Upon successful completion of but generally. effectively to a wider range of of the Linux platform
the exam, you will be awarded the CMFS Delegate forensic incidents and analysis.
Certified Mac Forensics Specialist The Babraham CLFP Delegate
(CMFS) qualification. Institute Huron Consulting
20 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 21
Digital Forensics Digital Forensics
Certified Forensic Certified Cyber
Investigation Specialist (CFIS) Investigator (CCI)
Specialist-level course 7 good reasons to choose 7Safe - see page 5 Specialist-level course 7 good reasons to choose 7Safe - see page 5

This specialist-level course is for professionals whose role This specialist-level course is for professionals who are looking
To find out if our cyber To find out if our cyber
requires them to capture and analyse data from live systems. training is right for you, to develop and improve their ability to respond effectively training is right for you,
It introduces the latest guidelines and artefacts on current and to make a booking, to a cyber event. It helps you develop the skills needed to and to make a booking,
Windows operating systems, and teaches essential skills for contact our education team isolate, investigate and extract evidence from a live networked contact our education team
on 01763 285 285 or email on 01763 285 285 or email
conducting an efficient and comprehensive investigation. education@7safe.com environment during or after a cyber incident. education@7safe.com

What will I learn? What qualification will I receive? What will I learn? What qualification will I receive?
Accreditations
You will learn to capture volatile Upon successful completion of You will learn and practice the Upon successful completion of
and stored data from a system the exam, you will be awarded the critical skills needed to identify the exam, you will be awarded the
in a live and booted state and Certified Forensic Investigation the correct forensic artefacts in a Certified Cyber Investigator (CCI)
from remote and virtualised Specialist (CFIS) qualification. live network environment during qualification.
systems, and to capture or after a cyber event, and how to
mailboxes from a Microsoft Who should attend? CFIS is accredited by CREST as preserve and collect that data Who should attend?
Exchange Server and webmail Experienced forensic investigators useful for those preparing for the You will practice how to correctly Experienced forensic investigators
CREST-Certified Host Intrusion
accounts and digital security practitioners Analyst examination. acquire and handle dynamic data and cyber security practitioners who
You will practice your new skills who have computer forensic so that you do not inadvertently already have a good knowledge of
using a realistic data/IP theft experience who want to dig deeper alter or destroy vital clues that forensic investigation and want to
scenario employing a range and develop their skills. This course could result in your investigation extend their skills.
of forensic tools, scripts and is a natural progression from the failing or the resultant evidence
techniques. You will identify 7Safe CFIP course. Covering the IISP skill areas of Level 1: being inadmissible in court CCI prerequisites
A2 and A6; Level 1+: F2 and F3
data from the Windows domain You will need a good understanding
controller, network file shares CFIS prerequisites How will I benefit? and experience of: This was the most
and FTP logs before moving to Knowledge of the principles and This course will enable you to: The forensic investigation process useful networking
more conventional analysis of a general guidelines surrounding Learn a number of methodologies Windows and Linux operating investigation course
forensic image of a workstation forensic investigations for undertaking a sound cyber systems I have been on in
Experience of carrying out investigation Command line interface recent years.
How will I benefit? forensic investigations Acquire and practice new Computer networks I came away with a
This course will enable you to: Attendance of a basic computer The course was techniques to extract relevant substantial increase
Develop your forensic forensic course, e.g. 7Safes CFIP brilliant. I really data from a live networked We strongly recommend completion in my knowledge
investigation skills to an course enjoyed it. It helped me environment of the 7Safe CFIP and CLFP courses along with some very
advanced level to improve and develop Gain confidence when identifying as a minimum before attending this useful documentation.
Practise new techniques suitable my knowledge. I look and capturing live operating course. If youre going to
for evidence identification, forward to using the system artefacts do one networking
capture and analysis in a live skills I have gained Improve your ability to respond investigation course
environment at work. effectively to a cyber event year, make it this one.
Acquire an industry-recognised CFIS Delegate CCI Delegate
qualification to support your Computer Sciences Regional
career progress Corporation Cyber Crime Unit
22 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 23
Information Information Security
security training HIM Hacking Insight
courses and for Managers
certifications Awareness-level course 7 good reasons to choose 7Safe - see page 5
overview
This one-day awareness course is for people who need a high-
7Safes information security courses To find out if our cyber
level understanding of hacking rather than practical know-how. training is right for you,
are focused towards anyone with It introduces the basic technical concepts behind the various and to make a booking,
responsibility for, or with an interest in, stages of a hacking attack, as well as some common tools contact our education team
protecting an organisations IT systems on 01763 285 285 or email
used by hackers and security professionals. education@7safe.com
& data, including those employed in IT,
Business, Financial and HR Management. What will I learn? Who should attend?
The courses last between one and Accreditations
You will gain an insight into Anyone interested in understanding
three days and provide a high-level the mindset and motivation the risks that hackers pose,
understanding of the techniques and of hackers, and learn how they including:
current trends used in hacking or the infiltrate organisations and IT managers
steps involved in planning, implementing the damage that can follow Systems analysts
Covering the IISP skills areas of Level 1:
You will find out how IT security professionals and
and maintaining ISO 27001 or Payment A5, B1, B2, D2, E3, F1
organisations are exposed auditors
Card Industry Data Security Standard through the various routes of Security officers and data
(PCI DSS). attack, including the internet, protection representatives
employees, social engineering,
emails and wireless For a course with more hands-on
You will learn about the security technical content, delegates should
lapses behind a number of real- consider 7Safes CSTA and CSTP
world, high-profile attacks courses on pages 11 and 12
You will have the chance to try
your hand at some simple web HIM prerequisites
application attacks in our hack lab No information security
knowledge is needed, just basic
How will I benefit? computer literacy
On this course, you will: We recommend you read up on
Gain an understanding of IT the concept of domain names and
security from an attackers IP addresses before the course
perspective Bring a Wi-Fi enabled device to
Be able to evaluate the possible join the hack lab (e.g. laptop or
risks to your business from tablet)
hackers Excellent instruction;
Understand the principles of clear and concise
how to defend your organisation overview, perfect for
effectively from the risk of attack non-specialists.
HIM Delegate
PA Consulting Group
24 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 25
Information Security Information Security
Certified ISO 27001 Payment Card Industry Data Security
Implementation Practitioner (CIIP) Standard (PCI DSS) Implementation
Fundamentals-level course 7 good reasons to choose 7Safe - see page 5 Awareness-level course 7 good reasons to choose 7Safe - see page 5

This three-day practical ISO 27001 training course is for people This one-day awareness training course is for people who want
To find out if our cyber To find out if our cyber
who want to understand the component parts of the ISO Standard training is right for you,
to learn how the Payment Card Industry Data Security Standard training is right for you,
with a view to setting up an implementation project. You will learn and to make a booking, (PCI DSS) is implemented. It covers the importance of the and to make a booking,
how to define and risk-assess your organisations information contact our education team Standard to all organisations processing, storing or transmitting contact our education team
on 01763 285 285 or email on 01763 285 285 or email
assets, and prepare for the essential requirements needed to education@7safe.com
credit card information. education@7safe.com
obtain ISO 27001 certification.
What will I learn? Who should attend?
Accreditations
What will I learn? Gain confidence that certification You will gain a clear This course is for:
You will gain an understanding is within reach and obtain understanding of the PCI Anybody accepting credit card
of the key steps involved guidance on applying for DSS and how to apply your payments, including:
in planning, implementing certification knowledge when assisting with Merchants
and maintaining an ISO Covering the IISP skills areas of Level 1: PCI DSS assessments Third-party service providers
27001-compliant information What qualification will I receive? A1, A2, A3, A4, A5, A6, D1, E1, E2, G1 You will learn how the Standard Acquirers
Level 1+: B1, B2
security management system Upon successful completion of developed, its benefits and Anybody processing, storing or
(ISMS) the exam, you will be awarded the who it applies to transmitting credit card data
You will learn what an ISMS is Certified ISO 27001 Implementation You will find out about the key Finance, internal audit, IT, sales
and how to define information Practitioner (CIIP) qualification. requirements of the Standard department staff
security policies for your and how to become compliant
organisation Who should attend? PCI DSS prerequisites
You will gain the skills needed to Anyone with responsibility for, or How will I benefit? This course is suitable for
identify information assets and with an interest in, information With this course, you will: non-technical staff and no prior
undertake a risk assessment, security, including: Gain an appreciation of the knowledge is required.
and will acquire effective People employed in IT, financial controls necessary for your
techniques for managing risk and HR management organisation to be able to
Computer auditors continue dealing with
How will I benefit? IT security officers cardholder data
With this course, you will: Information security Learn the key principles and
Gain an in-depth understanding professionals requirements of the Standard
of information security and how Develop an understanding
it applies to your organisation CIIP prerequisites of the route to compliance
Learn how to define information This course is suitable for non- Solid coverage of the (self-assessment and audit)
assets in a way thats suitable technical staff and no prior standard, referenced Be in a position to prepare an
for your organisation and how knowledge is required. well to the point of implementation plan for your
to undertake a risk assessment applicability and organisation, improving your
usability. chances of a successful audit
CIIP Delegate
Bluefish
Communications
26 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 27
Software Security
Certified Secure Coding MSc in Professional Practice
for Software Developers (CSCSD) in Digital Forensics and Security
Specialist-level course 7 good reasons to choose 7Safe - see page 5 Specialist-level course 7 good reasons to choose 7Safe - see page 5

This two-day course is for people who want to understand This programme, delivered in partnership with De Montfort
To find out if our cyber To find out if our cyber
the technical controls used to prevent software vulnerabilities. training is right for you,
University (DMU), is for people who want to gain a postgraduate- training is right for you,
It focuses on common insecure coding practices and examines and to make a booking, level qualification in information security. This qualification is and to make a booking,
how these can be addressed to make secure applications. contact our education team based on 7Safes technical hands-on training courses, combined contact our education team
on 01763 285 285 or email on 01763 285 285 or email
education@7safe.com
with academic modules delivered by the University. education@7safe.com
What will I learn? What qualification will I receive?
You will learn about the Upon successful completion of What will I learn? What qualification will I receive?
vulnerabilities that arise from the exam, you will be awarded You will acquire a thorough and The MSc course consists of seven
insecure coding and the array of the Certified Secure Coding for practical knowledge of the very 7Safe training courses (CSTA, CSTP,
hacking techniques that many Software Developers (CSCSD) latest computer forensics and CWSA, CFIP, CMI, CFIS and CIIP),
attackers use to disrupt the way qualification. security principles, practices, tools eight University modules and an
an applications programming/ and techniques. The key modules MSc project/dissertation. Upon
business logic work Who should attend? covered are: network security and successful completion of the MSc,
You will find out how to take This course is for people who want ethical hacking, wireless security, you will therefore have seven As a self-employed
a defence in depth approach to learn secure coding, including: forensic investigations, malware industry-recognised professional software and system
and ensure you consider all the Penetration testers investigations and implementing certificates as well as the MSc security specialist,
security issues that may arise Professional software ISO 27001 qualification. I wanted a Masters
while developing applications developers You will gain an understanding of program that would
You will gain an understanding Software architects the main academic, professional Who is this course for? allow me to continue
of the most important principles Software security auditors and research concerns of Anyone ambitious to build a career in my current lifestyle
in secure coding and apply your Security managers computer security and forensics information security by completing a and gain further
new knowledge with examples through a research-led module part-time or full-time post-graduate academic recognition.
and exercises in Java CSCSD prerequisites that will help prepare you for course. When taking the course as The 7Safe MSc
A basic understanding of web your MSc project/dissertation a part-time pathway you should Training Programme
How will I benefit? application coding, preferably expect to study for a minimum of has allowed me to do
With this course, you will: in Java. How will I benefit? two to three years, and must be this. I took just over a
Have access to a purpose- The course was This course will provide you with: completed within six years. year to complete the
built controlled environment excellent and highly The latest tools, techniques seven 7Safe courses
specifically created to relevant to my work and knowledge in one of the MSc prerequisites without any impact
demonstrate the main areas as a web developer. most exciting areas of After successfully completing one on my contracts that
of vulnerability and the key A variety of topics were modern computing or more 7Safe courses, the MSC ran during this period
mitigation strategies covered and I thought Expert staff with extensive is the most practical and natural and the support from
Get the chance to practise that a good level of experience in the field of progression to further your cyber 7Safe in creating a
techniques to address common time was dedicated forensics and security knowledge and career development. programme to allow
insecure coding practices to the most prevalent Excellent career prospects in this was invaluable.
Build your skills and confidence and serious exploits. a rapidly expanding industry Delegate on
in coding secure applications CSCSD Delegate De Montfort University
Falck Safety Services MSc Programme
28 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 29
7Safe Services
7Safes Cyber Security Capabilities
vulnerabilities that might not be organisation is resistant to
Technical Security detected through testing alone. a variety of simulated social
engineering attacks, conducted
Services Firewall Reviews though the Internet, over the
This detailed analysis and phone or physically at your
test of your firewall examines premises.
vulnerabilities associated
with a specific vendors VOIP Security
solution. Vulnerabilities include Voice over Internet Protocol
We are at the forefront of providing susceptibility of the firewall to (VoIP) is a good cost saving
penetration testing services to focused connection, information- option for any organisation,
clients around the world, offering driven attacks and exploits, and however as with any benefit,
not only exceptional technical misconfigurations that allow an comes risk. The risk increases
expertise but outstanding client attacker to overcome specific when VoIP is integrated directly
services. These include website, firewall protections. into your internal network.
application and infrastructure Our combined approach of
assessments, hardening UNIX and Database Assessments assessing the VoIP network
Windows systems, code reviews, Database security assessment helps to identify and effectively
wireless security assessments involves checking various remediate risks.
and social engineering. information security controls
Our expert consultants will help aimed at protecting databases Wireless Assessments
you to convert the findings of our against compromises of their Regular security tests of the
technical reports into immediately confidentiality, integrity and features of your wireless
actionable and positive business availability. We will analyse your network, which are an extension
impact. database (MS SQL, Oracle, MySQL, to an organisations overall
etc.) and check its configuration, network security and part of any
Penetration Testing (Pen Testing) security features, access rights, infrastructure penetration test
We are passionate about our system and object privileges or vulnerability testing exercise.
penetration testing service - and more. We will review your wireless
providing you with the maximum LANs (identification, security and
value by finding security Server Build Reviews encryption features), and identify
vulnerabilities and working with Our server build review will provide any rogue access points.
you to understand the risks posed. you with transparency over the
security of your server builds, Mobile Application
Managed Vulnerability Scanning allowing you maintain compliance and Device Security
Our managed vulnerability with regulatory or internal With the increase in mobile
scanning service provides updates standards. Very often, such testing devices being used in everyday
on new vulnerabilities giving you is conducted as part of a wider life as well as in corporate
additional peace of mind and information security assessment environments, there is a
reducing activity around your which is a strategic piece of work. heightened demand for the
regular penetration test. security of mobile applications.
Social Engineering 7Safe delivers comprehensive
Code Reviews Social engineering is the process mobile application security
We have a team of highly- of manipulating or deceiving a assessments giving peace of
experienced code reviewers who person(s) into performing actions mind to you and your customers
will check your code for flaws, or divulging sensitive information. by ensuring that your applications
finding and removing common We will check whether your are secure.
30 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 31
7Safe Services
7Safes Digital Investigation Capabilities
cause and to be able to identify
Digital malicious intruders.

Forensics Data acquisition


and data collection
Data acquisition and collection
services for multi-nationals,
government departments,
prosecuting and regulatory
At 7Safe, we have been providing bodies in both criminal and
digital forensic services since civil matters. We have deep
2002. We pride ourselves in the experience in collecting volatile
technical skills of our consultants and static data from technologies
and their ability to adapt those including web, database and
skills and techniques to suit even email servers, memory, virtual
the most challenging of technical environments and all manner
tasks and investigations. of conventional (and some
Whether you are looking unconventional) digital devices
to identify lost data on an used by private individuals and
encrypted drive or you are businesses.
attempting to quickly identify
what data was compromised Evidential reports
within your network and how it and Expert witness
was done, we have the expertise All our work, whatever the
and skills to help you. size and goal, is performed
We provide you with four main to the same evidential rigour
forensic services, all of which will and standards required by
be tailored to suit your specific the criminal courts in the UK.
requirements. We provide : We prepare full evidential
packages for you and, if
Digital device investigations required, for disclosure to
Digital device, network your Board, Regulators or
and enterprise analysis the Authorities. Some of our
and investigation services. work results in a requirement
This forensic analysis and to attend at court to present
investigation service can be this expert evidence all our
provided as part of an ongoing senior investigators have
investigation (criminal or extensive experience of giving
regulatory) or dispute (civil) expert evidence at court.
or as part of our incident
response service (see below).
Talk to a 7Safe Digital
Cyber incident response
(inc incident technical advisory
Forensics Consultant
of data from computers, servers, help with incident response aware of a breach. We augment identify and isolate rogue digital
services and malware analysis). switches, routers and many other have a well-defined response this by providing a quick-reacting, code whilst gathering evidence +44(0) 870 600 1667
Cyber investigations are complex network devices. capability and plans that they on-site technical expertise to of the cyber event; all of which is contact@7safe.com
and will include the examination Most organisations that we enact as soon as they become help you when you need to essential to help identify the root
32 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 33
7Safe Services
7Safes Document Investigation Capabilities
Identifying data at risk Structuring unstructured data
eDiscovery Information Modern digital environments Plenty of quantitative as well
generate, analyse and share as empirical data is collected
Governance more data than ever before. and stored in unstructured
We can help you identify formats, making it slow to
and isolate regulated or identify and analyse. Data held
commercially sensitive data within Word tables, or even
that has inadvertently leaked PDF copies make search and
We provide advanced technical out of the core secure enterprise research tasks very laborious
eDiscovery services to law firms, systems that would normally and uneconomical. We use
general counsel and government We have developed some leading protect such data from misuse methods developed and refined
regulators to help them manage tools and methods to help modern or abuse. For example, this in the eDiscovery world to
and investigate the large volumes organisations with the Information may be personal data of your convert large quantities of
of unstructured data typically Governance challenges. In customers and clients or new unstructured data into formats
found in disputes, litigation and particular those created by their product blueprints that your suitable for storage and use in
regulatory procedures. changing environments that are Innovation Lab has created databases.
transitioning from an analogue IT that have been shared on less
Early Case Assessment to a fully digital way of working. secure networks.
We generate early case visibility
using our own unique tools and
processes to provide you focus
and help in the early stages of a
case using:
DocReview: DocReview is
a quick-to-use, fixed-price, then we have more cost effective all dialects and speech examples
document review service that solutions for dispute teams are correctly identified in the
allows you to start reviewing working to tight budgets. search results. This dramatically
large volumes of client emails/ increases the speed of the review
documents (up to 4GB) within Technology assisted review and much reduces the cost when
4 hours We configure our workflow compared with voice-to-text
Doc Discovery: Doc Discovery processes and algorithms together or other audio technologies.
is a simple, accurate and safe with you to best suit your matter
email search tool that will and achieve the very best outcome Air-gapped, on-site
help you quickly search using such predictive technologies. review solutions
all messages and their When legislative, privacy or
attachments. Doc Discovery can Document Review Platform security concerns constrain the
be downloaded for free from A secure, fast, enterprise Relativity specific location of data, we deploy
www.docdiscovery.net platform designed to support solutions to ensure total control
many hundreds of users. over where data is processed and
Data preparation and processing reviewed.
Our focus always is the price point Audio discovery
and speed selection balance. Our Our Nexidia audio discovery Talk to a 7Safe Digital
Nuix data processing capability service can accurately search
runs at industry leading speed,
Forensics Consultant
audio/video data using carefully
therefore giving you high quality crafted phonetic search terms. We +44(0) 870 600 1667
results can be achieved fast and at use proprietary phonetic definition contact@7safe.com
minimal cost. If time is not an issue, improvement methods to ensure
34 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 35
The CSTA course is well laid out
and has a very good balance
between the theory and practical
elements. In addition, the lab
and exercises are well set out
and reflect a practical network.
What I found even more valuable
was the additional tips and leads
provided by a knowledgeable
instructor demonstrated by
real life scenarios and examples.
All in all, a fantastic experience
and by far the best training
course I have attended.
Highly recommended.
IT Security Analyst

Cyber Development
Training Prospectus
Advanced skills training programmes and
professional cyber development for current
and future security professionals in:
Ethical hacking (penetration testing)
Digital forensics
Cyber incident response
7Safe, Cambridge Technology Centre, Information security
Discover | Develop | Secure Discover | Develop | Secure
Melbourn, Herts, SG8 6DP United Kingdom
tel: +44(0) 1763 285 285 education@7safe.com www.7safe.com www.7safe.com

Vous aimerez peut-être aussi