Académique Documents
Professionnel Documents
Culture Documents
Cyber Development
Training Prospectus
Advanced skills training programmes and
professional cyber development for current
and future security professionals in:
Ethical hacking (penetration testing)
Digital forensics
Cyber incident response
7Safe, Cambridge Technology Centre, Information security
Discover | Develop | Secure Discover | Develop | Secure
Melbourn, Herts, SG8 6DP United Kingdom
tel: +44(0) 1763 285 285 education@7safe.com www.7safe.com www.7safe.com
Contents Professional cyber development
03
04
Cyber Development Training
Why Train with 7Safe?
training at 7Safe
05 7 Good Reasons to Choose 7Safe Each year, around 500 of the worlds leading cyber experts start and develop their vocational
06 7Safe Training Passports training with 7Safe. Some of them go on to lead their organisations security procedures and
07 Our Training Locations tackle serious crime, and others become technical leaders protecting technical assets.
08 7Safe Cyber Development Skills
Cyber Security and Digital
10 Ethical Hacking Courses
11 Certified Security Testing Associate (CSTA)
Investigations are rapid growth
areas within IT and the skills
Who are 7Safe?
12 Certified Security Testing Professional (CSTP) required are in demand. We provide cyber security and digital investigation advice,
7Safe training is intensive: education and technical services to all technology-enabled
13 Certified Wireless Security Analyst (CWSA)
our consultants coach individual organisations.
14 Certified Mobile Security Tester (CMST) delegates so that they leave with Since 2001, we have been helping organisations to develop,
15 Certified Application Security Tester (CAST) the confidence to do the job that maintain and grow their cyber security and information
16 Digital Forensics Courses they are training for. Our aim is investigation capabilities, increasing their overall trust in
to create skilled professionals the systems that they operate, the information that they
17 Certified Data Collection Technician (CDaCT)
capable of undertaking work as hold and the people who have access to it.
18 Certified Forensic Investigation Practitioner (CFIP) penetration testers, reviewing
19 Certified Malware Investigator (CMI) and testing software code for We offer a range of consultancy services, including:
20 Certified Mac Forensics Specialist (CMFS) security flaws, and performing Penetration testing and technical security assessments
digital forensics analysis. Digital forensic investigations
21 Certified Linux Forensic Practitioner (CLFP)
The traditional graduate
22 Certified Forensic Investigation Specialist (CFIS)
PCI and ISO27001 audit and compliance
recruitment and training route
Information security policy, and reviews of best practice
23 Certified Cyber Investigator (CCI) to acquiring these skills and
qualifications would typically eDiscovery document and audio review, and secure data hosting
24 Information Security Training
take around two years. Information governance and data risk assessments
25 Hacking Insight for Managers (HIM)
We maintain regular contact Professional cyber development is the cornerstone of effective
26 Certified ISO 27001 Implementation Practitioner (CIIP) with all our Alumni, supporting security and we underpin the services above with our portfolio
27 Payment Card Industry Data Security Standard (PCI DSS) them throughout their career of university and industry-accredited courses and certifications.
We look forward to Implementation progression. As part of PA Consulting Group, we offer a comprehensive set
partnering with you to 28 Software Security of IT, cyber security and education services that few can
combat the growing cyber Certified Secure Coding for Software Developers (CSCSD) compete with.
threat across all industry 29 MSC in Professional Practice in Digital
sectors, through the delivery Forensics and Security
qualifications not only as they enter the cyber security industry, but as 4. Able to secure the respect of others:
you will learn to follow the best
they progress through it. Kathryn Hurcomb, Education Co-ordinator practice recommended by partners
IISP, CREST, and ACPO.
Course
HIM
Hacking Insight
CIIP
ISO 27001
accreditations
for Managers Implementation
Software Security
Secure Coding for Software
Developers Discover | Develop | Secure
This web application ethical hacking course is designed to This two-day course is for people involved in a variety of wireless
To find out if our cyber To find out if our cyber
give you the skills you need to ensure valuable data assets training is right for you, network-related roles. It is designed to give you the skills you need training is right for you,
are effectively protected. and to make a booking, to develop a more secure infrastructure around critical data and and to make a booking,
contact our education team applications, and defend systems from unauthorised wireless contact our education team
on 01763 285 285 or email on 01763 285 285 or email
What will I learn? Who should attend? education@7safe.com attacks. education@7safe.com
You will be introduced to a range Anyone with responsibility for, or
of defensive countermeasures to an interest in, the security of web What will I learn? Who should attend?
Accreditations You will learn how hackers bypass Anyone with responsibility for, or an Accreditations
become more resistant to attack applications, including:
You will learn how to exploit these System administrators wireless security, and gain an interest in, the security of wireless
vulnerabilities to access data and Software developers understanding of the principles networks and Wi-Fi enabled devices,
functionality beyond your remit Budding penetration testers of wireless cryptography including:
Anyone subject to the Once able to identify and exploit IT managers
How will I benefit? requirements of the Payment Card CSTP is accredited by CREST and helps
vulnerabilities, you will be Systems/network administrators CWSA is accredited by CREST and
This course will give you: Industry Data Security Standard you prepare for the CREST Registered introduced to a range of defensive IT security professionals helpsyou prepare for the CREST
Penetration Tester examination. Registered Penetration Tester
Valuable preparation for the (PCI DSS) countermeasures, allowing you Forensic/network investigators examination and the CREST Wireless
CREST Registered Penetration to complete the final exercise of Specialist examination.
Tester (CRT) examination and CSTP prerequisites building a secure wireless network CWSA prerequisites
the knowledge required to join An understanding of how a web to protect information assets Basic understanding of TCP/IP
our CAST course (advanced page is requested and delivered: Covering the IISP skill areas of Level 1:
networking:
web application security) Are you familiar with the high- A6, B2 and C1; Level 1+: D2 How will I benefit? Are you familiar with the OSI
Covering the IISP skill areas of Level
The skills and understanding to level components involved, This course will give you: model? Can you name a layer 2 1:A6, B2 and C1; Level 1+: D2
progress to the next stage in your e.g. browsers, web servers, web Valuable preparation for the and layer 3 protocol?
career as a security professional applications and databases? CREST Registered Penetration Can you describe how a request
What are HTTP and HTML? Tester (CRT) examination reaches a web server through
What qualification will I receive? An understanding of databases A thorough understanding of how Ethernet, IP and TCP?
Upon successful completion of and SQL would also be an hackers target wireless networks
the exam, you will be awarded the advantage Sarantis is a great and how to protect wireless If you are planning to do both
Certified Security Testing Professional instructor. The course networks (and clients) from the CSTA and CWSA courses, we
(CTSP) qualification. If you are a web developer looking content helped to attack in the real world recommend you take CSTA first.
for a secure coding course, please reinforce my existing See page 11.
see our Certified Secure Coding knowledge and give What qualification will I receive?
for Software Developers (CSCSD). real world examples Upon successful completion of
See page 28. and practical exercises the exam, you will be awarded the An essential course for
for the key features Certified Wireless Security Analyst those designing and
of the content and (CWSA) qualification. configuring all aspects
syllabus. of wireless networking.
CSTP Delegate CWSA Delegate
NewVoiceMedia Ltd New Vision Group Ltd
12 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 13
Ethical Hacking Ethical Hacking
Certified Mobile Certified Application
Security Tester (CMST) Security Tester (CAST)
Specialist-level course 7 good reasons to choose 7Safe - see page 5 Specialist-level course 7 good reasons to choose 7Safe - see page 5
This three-day course is for people in a wide variety of mobile This specialist four-day web hacking course is for people in a wide
To find out if our cyber To find out if our cyber
application-related roles. It introduces the fundamentals of mobile training is right for you,
range of application development and testing roles. It is designed training is right for you,
application security and gives you an understanding of whether and to make a booking, to give you an in-depth knowledge of how to identify security and to make a booking,
the sensitive information stored on mobile devices is sufficiently contact our education team vulnerabilities and an understanding of the real risk that these contact our education team
on 01763 285 285 or email on 01763 285 285 or email
protected. education@7safe.com
vulnerabilities pose by exploiting them. education@7safe.com
What will I learn? What qualification will I receive? What will I learn? Who should attend?
Accreditations
You will be led through the current Upon successful completion of You will be led through a range People working in an application
OWASP Mobile Top Ten, the most the exam, you will be awarded the of state-of-the-art hacking testing (security assessment/
critical mobile application security Certified Mobile Security Tester tools and techniques to allow administration) or developer
risks that leave organisations and (CMST) qualification. you to conduct a complete web environment, including
their customers data vulnerable application security assessment experienced:
to attack Who should attend? Once able to identify and exploit Penetration testers CAST is accredited by CREST and
Once able to identify and exploit Anyone looking to understand the vulnerabilities, you will learn Application developers helps you prepare for the Certified
Web Application Tester examination.
vulnerabilities in both iOS and fundamentals of mobile application a range of defensive counter Security professionals
Android platforms, you will be security, including: measures, allowing you to
introduced to a range of defensive App developers develop applications that are CAST prerequisites
countermeasures, allowing you IT security officers more resistant to attack and Completion of the 7Safe CSTP
to develop applications that are Penetration testers provide a better protection course or equivalent knowledge Covering the IISP skill areas of Level 1:
more resistant to attack Network and systems for data assets Practical experience of backend A6, B2 and C1; Level 1+: D2
This core-level technical course is designed for people looking This is a core-level technical course for people looking to extend
To find out if our cyber To find out if our cyber
to develop their computer forensics investigation skills, either training is right for you, their digital forensic knowledge beyond conventional device training is right for you,
for a career in digital investigations or as part of their current and to make a booking, analysis. It will help you protect your IT environment by showing and to make a booking,
cyber role. contact our education team you how to conduct malware analysis, from first principles all the contact our education team
on 01763 285 285 or email on 01763 285 285 or email
education@7safe.com way to investigating network activity stemming from malicious education@7safe.com
What will I learn? n industry-recognised
A software infection that your AV software has failed to detect.
You will learn the principles and qualification in forensic
Accreditations Accreditations
guidelines for static computer investigation and ideal What will I learn? Certified Malware Investigator (CMI)
forensic investigations; the preparation for the 7Safe You will learn how to identify, qualification.
fundamentals of the complete CFIS advanced course analyse and interpret malicious
forensic investigation process; software and associated forensic Who should attend?
how to preserve evidence and What qualification will I receive? Covering the IISP skills areas of Level 1: artefacts, including trojan horses, Digital forensic analysts, law
the methodology for conducting Upon successful completion of A2, A6; Level 1+: F2, F3 viruses and worms enforcement officers, cyber CMI is accredited by CREST as useful
a forensic investigation the exam, you will be awarded the You will practice malware incident investigators and system preparation for the CREST-Registered
Intrusion Analyst examination.
You will use practical, hands-on Certified Forensic Investigation investigations from mounted, administrators looking to develop
exercises to help you understand Practitioner (CFIP) qualification. booted and network perspectives, their skills in malware identification
how data is stored on electronic and undertake real-world and analysis.
media, how to work with key Who should attend? exercises, including the conversion
forensic investigation tools and Anyone who is or wants to be of E01 forensic images to bootable CMI prerequisites Covering the IISP skill areas of Level 1:
how to identify Windows-based responsible for computer forensic virtual machine disks Completion of the 7Safe CFIP course C1 and E1; Level 1+: F2 and F3
This specialist-level course is for experienced forensic This specialist-level course is for experienced forensic
To find out if our cyber To find out if our cyber
investigators whose role requires them to expertly examine training is right for you, investigators who want to acquire the knowledge and training is right for you,
Apple devices, giving them knowledge and confidence in and to make a booking, skills to navigate, identify, capture and examine data and to make a booking,
handling the data and forensic evidence in Mac OS X and contact our education team from Linux-based systems. contact our education team
on 01763 285 285 or email on 01763 285 285 or email
iOS environments. education@7safe.com education@7safe.com
What will I learn? What qualification will I receive?
What will I learn? Who should attend? You will develop a core Upon successful completion of
Accreditations Accreditations
You will learn the underlying Forensic practitioners, systems understanding of the file system the exam, you will be awarded the
data structures of Apple devices administrators and cyber data structures and key files in Certified Linux Forensic Practitioner
and the many forensic artefacts investigators who want to extend Linux-based systems so that you (CLFP) qualification.
specific to Mac OS X and iOS their experience with Window- can be confident of capturing
You will practice using real life based systems to the Mac OS X Covering the IISP skill areas of Level 1: potential digital evidence Who should attend? Covering the IISP skill areas of Level 1:
examples identifying, finding, and iOS environments. A6, B1, C1 and F2; Level 1+: F3 You will practice using both Forensic practitioners, systems A6, E2; Level 1+: F2 and F3
extracting, decoding and Linux GUI and command line administrators and cyber
interpreting the data stored on CMFS prerequisites environments, and learn how to investigators who want to extend
an Apple device from a forensic Completion of the 7Safe CFIP use Linux for forensic imaging their experience from Window-
practitioners perspective course is highly recommended. You will capture RAM and based systems to the Linux
Otherwise you will need: basic volatile data from a live environment.
How will I benefit? Knowledge of the principles and An excellent course Linux system, and use forensic
This course will give you the guidelines surrounding forensic which gave a thorough software to create an image CLFP prerequisites
opportunity to: investigation overview of Mac of a Linux system Completion of the 7Safe CFIP
Learn effective techniques for the Basic knowledge of data Forensics, the HFS+ file course is highly recommended.
identification and interpretation structures, e.g. binary and system and important How will I benefit? Alternatively you will need an
of forensic artefacts on OS X and hexadecimal artefacts and their On this course, you will: understanding of digital forensic
iOS devices locations on the file Understand the data structures principles and practices. No Linux
Understand Apple disk partitioning system. The exercises associated with the ext file experience is necessary.
and develop confidence when supported the theory systems
identifying and isolating artefacts well and helped build Learn effective techniques
from Apple devices on the course content. to extract data from a Linux
Improve your ability to respond As a non-Mac user, environment
effectively to a wider range of I now feel a lot more Develop confidence when
forensic incidents confident working identifying and capturing Very good course, well
with Macs, not just Linux system artefacts paced and provided
What qualification will I receive? for forensic analysis, Improve your ability to respond a good understanding
Upon successful completion of but generally. effectively to a wider range of of the Linux platform
the exam, you will be awarded the CMFS Delegate forensic incidents and analysis.
Certified Mac Forensics Specialist The Babraham CLFP Delegate
(CMFS) qualification. Institute Huron Consulting
20 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 21
Digital Forensics Digital Forensics
Certified Forensic Certified Cyber
Investigation Specialist (CFIS) Investigator (CCI)
Specialist-level course 7 good reasons to choose 7Safe - see page 5 Specialist-level course 7 good reasons to choose 7Safe - see page 5
This specialist-level course is for professionals whose role This specialist-level course is for professionals who are looking
To find out if our cyber To find out if our cyber
requires them to capture and analyse data from live systems. training is right for you, to develop and improve their ability to respond effectively training is right for you,
It introduces the latest guidelines and artefacts on current and to make a booking, to a cyber event. It helps you develop the skills needed to and to make a booking,
Windows operating systems, and teaches essential skills for contact our education team isolate, investigate and extract evidence from a live networked contact our education team
on 01763 285 285 or email on 01763 285 285 or email
conducting an efficient and comprehensive investigation. education@7safe.com environment during or after a cyber incident. education@7safe.com
What will I learn? What qualification will I receive? What will I learn? What qualification will I receive?
Accreditations
You will learn to capture volatile Upon successful completion of You will learn and practice the Upon successful completion of
and stored data from a system the exam, you will be awarded the critical skills needed to identify the exam, you will be awarded the
in a live and booted state and Certified Forensic Investigation the correct forensic artefacts in a Certified Cyber Investigator (CCI)
from remote and virtualised Specialist (CFIS) qualification. live network environment during qualification.
systems, and to capture or after a cyber event, and how to
mailboxes from a Microsoft Who should attend? CFIS is accredited by CREST as preserve and collect that data Who should attend?
Exchange Server and webmail Experienced forensic investigators useful for those preparing for the You will practice how to correctly Experienced forensic investigators
CREST-Certified Host Intrusion
accounts and digital security practitioners Analyst examination. acquire and handle dynamic data and cyber security practitioners who
You will practice your new skills who have computer forensic so that you do not inadvertently already have a good knowledge of
using a realistic data/IP theft experience who want to dig deeper alter or destroy vital clues that forensic investigation and want to
scenario employing a range and develop their skills. This course could result in your investigation extend their skills.
of forensic tools, scripts and is a natural progression from the failing or the resultant evidence
techniques. You will identify 7Safe CFIP course. Covering the IISP skill areas of Level 1: being inadmissible in court CCI prerequisites
A2 and A6; Level 1+: F2 and F3
data from the Windows domain You will need a good understanding
controller, network file shares CFIS prerequisites How will I benefit? and experience of: This was the most
and FTP logs before moving to Knowledge of the principles and This course will enable you to: The forensic investigation process useful networking
more conventional analysis of a general guidelines surrounding Learn a number of methodologies Windows and Linux operating investigation course
forensic image of a workstation forensic investigations for undertaking a sound cyber systems I have been on in
Experience of carrying out investigation Command line interface recent years.
How will I benefit? forensic investigations Acquire and practice new Computer networks I came away with a
This course will enable you to: Attendance of a basic computer The course was techniques to extract relevant substantial increase
Develop your forensic forensic course, e.g. 7Safes CFIP brilliant. I really data from a live networked We strongly recommend completion in my knowledge
investigation skills to an course enjoyed it. It helped me environment of the 7Safe CFIP and CLFP courses along with some very
advanced level to improve and develop Gain confidence when identifying as a minimum before attending this useful documentation.
Practise new techniques suitable my knowledge. I look and capturing live operating course. If youre going to
for evidence identification, forward to using the system artefacts do one networking
capture and analysis in a live skills I have gained Improve your ability to respond investigation course
environment at work. effectively to a cyber event year, make it this one.
Acquire an industry-recognised CFIS Delegate CCI Delegate
qualification to support your Computer Sciences Regional
career progress Corporation Cyber Crime Unit
22 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 23
Information Information Security
security training HIM Hacking Insight
courses and for Managers
certifications Awareness-level course 7 good reasons to choose 7Safe - see page 5
overview
This one-day awareness course is for people who need a high-
7Safes information security courses To find out if our cyber
level understanding of hacking rather than practical know-how. training is right for you,
are focused towards anyone with It introduces the basic technical concepts behind the various and to make a booking,
responsibility for, or with an interest in, stages of a hacking attack, as well as some common tools contact our education team
protecting an organisations IT systems on 01763 285 285 or email
used by hackers and security professionals. education@7safe.com
& data, including those employed in IT,
Business, Financial and HR Management. What will I learn? Who should attend?
The courses last between one and Accreditations
You will gain an insight into Anyone interested in understanding
three days and provide a high-level the mindset and motivation the risks that hackers pose,
understanding of the techniques and of hackers, and learn how they including:
current trends used in hacking or the infiltrate organisations and IT managers
steps involved in planning, implementing the damage that can follow Systems analysts
Covering the IISP skills areas of Level 1:
You will find out how IT security professionals and
and maintaining ISO 27001 or Payment A5, B1, B2, D2, E3, F1
organisations are exposed auditors
Card Industry Data Security Standard through the various routes of Security officers and data
(PCI DSS). attack, including the internet, protection representatives
employees, social engineering,
emails and wireless For a course with more hands-on
You will learn about the security technical content, delegates should
lapses behind a number of real- consider 7Safes CSTA and CSTP
world, high-profile attacks courses on pages 11 and 12
You will have the chance to try
your hand at some simple web HIM prerequisites
application attacks in our hack lab No information security
knowledge is needed, just basic
How will I benefit? computer literacy
On this course, you will: We recommend you read up on
Gain an understanding of IT the concept of domain names and
security from an attackers IP addresses before the course
perspective Bring a Wi-Fi enabled device to
Be able to evaluate the possible join the hack lab (e.g. laptop or
risks to your business from tablet)
hackers Excellent instruction;
Understand the principles of clear and concise
how to defend your organisation overview, perfect for
effectively from the risk of attack non-specialists.
HIM Delegate
PA Consulting Group
24 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 25
Information Security Information Security
Certified ISO 27001 Payment Card Industry Data Security
Implementation Practitioner (CIIP) Standard (PCI DSS) Implementation
Fundamentals-level course 7 good reasons to choose 7Safe - see page 5 Awareness-level course 7 good reasons to choose 7Safe - see page 5
This three-day practical ISO 27001 training course is for people This one-day awareness training course is for people who want
To find out if our cyber To find out if our cyber
who want to understand the component parts of the ISO Standard training is right for you,
to learn how the Payment Card Industry Data Security Standard training is right for you,
with a view to setting up an implementation project. You will learn and to make a booking, (PCI DSS) is implemented. It covers the importance of the and to make a booking,
how to define and risk-assess your organisations information contact our education team Standard to all organisations processing, storing or transmitting contact our education team
on 01763 285 285 or email on 01763 285 285 or email
assets, and prepare for the essential requirements needed to education@7safe.com
credit card information. education@7safe.com
obtain ISO 27001 certification.
What will I learn? Who should attend?
Accreditations
What will I learn? Gain confidence that certification You will gain a clear This course is for:
You will gain an understanding is within reach and obtain understanding of the PCI Anybody accepting credit card
of the key steps involved guidance on applying for DSS and how to apply your payments, including:
in planning, implementing certification knowledge when assisting with Merchants
and maintaining an ISO Covering the IISP skills areas of Level 1: PCI DSS assessments Third-party service providers
27001-compliant information What qualification will I receive? A1, A2, A3, A4, A5, A6, D1, E1, E2, G1 You will learn how the Standard Acquirers
Level 1+: B1, B2
security management system Upon successful completion of developed, its benefits and Anybody processing, storing or
(ISMS) the exam, you will be awarded the who it applies to transmitting credit card data
You will learn what an ISMS is Certified ISO 27001 Implementation You will find out about the key Finance, internal audit, IT, sales
and how to define information Practitioner (CIIP) qualification. requirements of the Standard department staff
security policies for your and how to become compliant
organisation Who should attend? PCI DSS prerequisites
You will gain the skills needed to Anyone with responsibility for, or How will I benefit? This course is suitable for
identify information assets and with an interest in, information With this course, you will: non-technical staff and no prior
undertake a risk assessment, security, including: Gain an appreciation of the knowledge is required.
and will acquire effective People employed in IT, financial controls necessary for your
techniques for managing risk and HR management organisation to be able to
Computer auditors continue dealing with
How will I benefit? IT security officers cardholder data
With this course, you will: Information security Learn the key principles and
Gain an in-depth understanding professionals requirements of the Standard
of information security and how Develop an understanding
it applies to your organisation CIIP prerequisites of the route to compliance
Learn how to define information This course is suitable for non- Solid coverage of the (self-assessment and audit)
assets in a way thats suitable technical staff and no prior standard, referenced Be in a position to prepare an
for your organisation and how knowledge is required. well to the point of implementation plan for your
to undertake a risk assessment applicability and organisation, improving your
usability. chances of a successful audit
CIIP Delegate
Bluefish
Communications
26 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 27
Software Security
Certified Secure Coding MSc in Professional Practice
for Software Developers (CSCSD) in Digital Forensics and Security
Specialist-level course 7 good reasons to choose 7Safe - see page 5 Specialist-level course 7 good reasons to choose 7Safe - see page 5
This two-day course is for people who want to understand This programme, delivered in partnership with De Montfort
To find out if our cyber To find out if our cyber
the technical controls used to prevent software vulnerabilities. training is right for you,
University (DMU), is for people who want to gain a postgraduate- training is right for you,
It focuses on common insecure coding practices and examines and to make a booking, level qualification in information security. This qualification is and to make a booking,
how these can be addressed to make secure applications. contact our education team based on 7Safes technical hands-on training courses, combined contact our education team
on 01763 285 285 or email on 01763 285 285 or email
education@7safe.com
with academic modules delivered by the University. education@7safe.com
What will I learn? What qualification will I receive?
You will learn about the Upon successful completion of What will I learn? What qualification will I receive?
vulnerabilities that arise from the exam, you will be awarded You will acquire a thorough and The MSc course consists of seven
insecure coding and the array of the Certified Secure Coding for practical knowledge of the very 7Safe training courses (CSTA, CSTP,
hacking techniques that many Software Developers (CSCSD) latest computer forensics and CWSA, CFIP, CMI, CFIS and CIIP),
attackers use to disrupt the way qualification. security principles, practices, tools eight University modules and an
an applications programming/ and techniques. The key modules MSc project/dissertation. Upon
business logic work Who should attend? covered are: network security and successful completion of the MSc,
You will find out how to take This course is for people who want ethical hacking, wireless security, you will therefore have seven As a self-employed
a defence in depth approach to learn secure coding, including: forensic investigations, malware industry-recognised professional software and system
and ensure you consider all the Penetration testers investigations and implementing certificates as well as the MSc security specialist,
security issues that may arise Professional software ISO 27001 qualification. I wanted a Masters
while developing applications developers You will gain an understanding of program that would
You will gain an understanding Software architects the main academic, professional Who is this course for? allow me to continue
of the most important principles Software security auditors and research concerns of Anyone ambitious to build a career in my current lifestyle
in secure coding and apply your Security managers computer security and forensics information security by completing a and gain further
new knowledge with examples through a research-led module part-time or full-time post-graduate academic recognition.
and exercises in Java CSCSD prerequisites that will help prepare you for course. When taking the course as The 7Safe MSc
A basic understanding of web your MSc project/dissertation a part-time pathway you should Training Programme
How will I benefit? application coding, preferably expect to study for a minimum of has allowed me to do
With this course, you will: in Java. How will I benefit? two to three years, and must be this. I took just over a
Have access to a purpose- The course was This course will provide you with: completed within six years. year to complete the
built controlled environment excellent and highly The latest tools, techniques seven 7Safe courses
specifically created to relevant to my work and knowledge in one of the MSc prerequisites without any impact
demonstrate the main areas as a web developer. most exciting areas of After successfully completing one on my contracts that
of vulnerability and the key A variety of topics were modern computing or more 7Safe courses, the MSC ran during this period
mitigation strategies covered and I thought Expert staff with extensive is the most practical and natural and the support from
Get the chance to practise that a good level of experience in the field of progression to further your cyber 7Safe in creating a
techniques to address common time was dedicated forensics and security knowledge and career development. programme to allow
insecure coding practices to the most prevalent Excellent career prospects in this was invaluable.
Build your skills and confidence and serious exploits. a rapidly expanding industry Delegate on
in coding secure applications CSCSD Delegate De Montfort University
Falck Safety Services MSc Programme
28 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 29
7Safe Services
7Safes Cyber Security Capabilities
vulnerabilities that might not be organisation is resistant to
Technical Security detected through testing alone. a variety of simulated social
engineering attacks, conducted
Services Firewall Reviews though the Internet, over the
This detailed analysis and phone or physically at your
test of your firewall examines premises.
vulnerabilities associated
with a specific vendors VOIP Security
solution. Vulnerabilities include Voice over Internet Protocol
We are at the forefront of providing susceptibility of the firewall to (VoIP) is a good cost saving
penetration testing services to focused connection, information- option for any organisation,
clients around the world, offering driven attacks and exploits, and however as with any benefit,
not only exceptional technical misconfigurations that allow an comes risk. The risk increases
expertise but outstanding client attacker to overcome specific when VoIP is integrated directly
services. These include website, firewall protections. into your internal network.
application and infrastructure Our combined approach of
assessments, hardening UNIX and Database Assessments assessing the VoIP network
Windows systems, code reviews, Database security assessment helps to identify and effectively
wireless security assessments involves checking various remediate risks.
and social engineering. information security controls
Our expert consultants will help aimed at protecting databases Wireless Assessments
you to convert the findings of our against compromises of their Regular security tests of the
technical reports into immediately confidentiality, integrity and features of your wireless
actionable and positive business availability. We will analyse your network, which are an extension
impact. database (MS SQL, Oracle, MySQL, to an organisations overall
etc.) and check its configuration, network security and part of any
Penetration Testing (Pen Testing) security features, access rights, infrastructure penetration test
We are passionate about our system and object privileges or vulnerability testing exercise.
penetration testing service - and more. We will review your wireless
providing you with the maximum LANs (identification, security and
value by finding security Server Build Reviews encryption features), and identify
vulnerabilities and working with Our server build review will provide any rogue access points.
you to understand the risks posed. you with transparency over the
security of your server builds, Mobile Application
Managed Vulnerability Scanning allowing you maintain compliance and Device Security
Our managed vulnerability with regulatory or internal With the increase in mobile
scanning service provides updates standards. Very often, such testing devices being used in everyday
on new vulnerabilities giving you is conducted as part of a wider life as well as in corporate
additional peace of mind and information security assessment environments, there is a
reducing activity around your which is a strategic piece of work. heightened demand for the
regular penetration test. security of mobile applications.
Social Engineering 7Safe delivers comprehensive
Code Reviews Social engineering is the process mobile application security
We have a team of highly- of manipulating or deceiving a assessments giving peace of
experienced code reviewers who person(s) into performing actions mind to you and your customers
will check your code for flaws, or divulging sensitive information. by ensuring that your applications
finding and removing common We will check whether your are secure.
30 7Safe Cyber Development Prospectus 7Safe Cyber Development Prospectus 31
7Safe Services
7Safes Digital Investigation Capabilities
cause and to be able to identify
Digital malicious intruders.
Cyber Development
Training Prospectus
Advanced skills training programmes and
professional cyber development for current
and future security professionals in:
Ethical hacking (penetration testing)
Digital forensics
Cyber incident response
7Safe, Cambridge Technology Centre, Information security
Discover | Develop | Secure Discover | Develop | Secure
Melbourn, Herts, SG8 6DP United Kingdom
tel: +44(0) 1763 285 285 education@7safe.com www.7safe.com www.7safe.com