Cyber Security Training with Cyber Toa
Globally there is a shortage of skilled cyber security professionals. Cyber Toa offers a range of technical and non-technical cyber security courses to up skill yourself or your staff to meet this demand. We offer both introductory and advanced courses in web applications, network security and cyber-reconnaissance.
For more information or to book a course contact us
29th Oct - 2nd November 2018 - Defensive Network Security Fundamentals (Wellington), 5 days
5th - 9th November 2018 - Cyber-reconnaissance and Recovery (Wellington), 5 days
13th November 2018 - Cybersecurity Fundamentals (Wellington), 0.5 days
13th November 2018 - Incident Response Playbooks (Wellington), 0.5 days
14th November 2018 - Cybersecurity Fundamentals (Auckland), 0.5 days
14th November 2018 - Incident Response Playbooks (Auckland), 0.5 days
19th - 23rd November 2018 - CompTIA Pentest+ (Wellington), 5 days
Our awareness training is suitable for all staff and covers a range of simple cybersecurity tips and practices that can help an organisation secure itself against cyber-threats. We offers a customised training experience which can be tailored to the needs of individual organisations or teams.
This course covers the most common web exploits and examples of vulnerable applications. This course is gives at giving managers and executives an overview of common exploits to check their applications against, and also provides general best-practice cybersecurity advice for organisations.
Improve security in your web application design process. This course covers OWASP web application testing tools, the most common web exploits and examples of vulnerable applications. This hands-on course is aimed at developers who wish to test or improve the security of their web applications.
This course provides detailed analysis of various defence mechanisms against threats. Various policies that are in practice to mitigate threats and their effectiveness are also covered.
This course expands on the material from the introductory course. We use a variety of modern network security tools and give hands-on experience with network defenses.
This course provides an overview of the various tools attackers can use to digitally footprint an organisation - a common first step in cyber-attacks. It also covers mitigation strategies organisations can use to reduce cybersecurity risks and to recover from incidents.
This course builds on the content from the introductory course and provides a hands-on introduction to host discovery and vulnerability analysis and mitigation using both commercial and open-source tools.