Cyber Security Training with Cyber Toa
Globally there is a shortage of skilled cyber security professionals. Cyber Toa offers a range of technical and non-technical cyber security courses to up skill yourself or your staff to meet this demand. We offer both introductory and advanced courses in web applications, network security and cyber-reconnaissance.
For more information or to book a course contact us
30th April 2019 - Incident Response Playbooks (Online), 0.5 day [SOLD OUT]
22nd May 2019 - Web Security Fundamentals (Online), 0.5 day
23rd May 2019 - Incident Response Playbooks (Online), 0.5 days [1 space left]
June 2019 - Cyber-Security Fundamentals (Online), 0.5 day
June 2019 - Hands-on Web Application Vulnerability Testing (Online), 1 day
July 2019 - Defensive Network Security Fundamentals (Wellington), 5 days
Our awareness training is suitable for all staff and covers a range of simple cybersecurity tips and practices that can help an organisation secure itself against cyber-threats. We offers a customised training experience which can be tailored to the needs of individual organisations or teams.
This course covers the most common web exploits and examples of vulnerable applications. This course is gives at giving managers and executives an overview of common exploits to check their applications against, and also provides general best-practice cybersecurity advice for organisations.
Improve security in your web application design process. This course covers OWASP web application testing tools, the most common web exploits and examples of vulnerable applications. This hands-on course is aimed at developers who wish to test or improve the security of their web applications.
This course provides detailed analysis of various defence mechanisms against threats. Various policies that are in practice to mitigate threats and their effectiveness are also covered.
This course expands on the material from the introductory course. We use a variety of modern network security tools and give hands-on experience with network defenses.
This course provides an overview of the various tools attackers can use to digitally footprint an organisation - a common first step in cyber-attacks. It also covers mitigation strategies organisations can use to reduce cybersecurity risks and to recover from incidents.
This course builds on the content from the introductory course and provides a hands-on introduction to host discovery and vulnerability analysis and mitigation using both commercial and open-source tools.