Our cybersecurity courses blend foundational theories with hands-on applications. Tailored for the digital world of today, our courses provide insights into current methodologies, tools, and regulations, equipping learners to apply their knowledge practically and advance their careers. Our academic offerings include 8 core cybersecurity courses and 27 specialised micro-credentials. These micro-credentials focus on niche areas in cybersecurity, allowing professionals to refine their expertise in specific domains. All our courses and modules are part-time and online, ensuring they seamlessly integrate with your work schedule and lifestyle.
Understanding that each learner has distinct needs, you can search by keyword for specific topics or use filters to sort by field, start date, duration, or qualification. This helps you quickly find courses that match your goals and interests.
Filter results by
Certificate in Cyber Defence Forensics
![Image for Certificate in Cyber Defence Forensics](/media/cyber-skills/site-assets/media/images/course-images/Cyber-Defence-Forensics.png)
Certificate in Digital Operational Resilience
![Image for Certificate in Digital Operational Resilience](/media/cyber-skills/site-assets/media/images/course-images/thumbnail_DORA-Pathway--260x164.jpg)
Certificate in Secure Network Operations
![Image for Certificate in Secure Network Operations](/media/cyber-skills/site-assets/media/images/course-images/Secure-Network-Operations-Course.png)
Certificate in Secure Software Development
![Image for Certificate in Secure Software Development](/media/cyber-skills/site-assets/media/images/course-images/Course-SSD.png)
Certificate in Security Penetration Testing & Analysis
![Image for Certificate in Security Penetration Testing & Analysis](/media/cyber-skills/site-assets/media/images/course-images/Security-Penetration.png)
Certificate in Systems Architecture Security
![Image for Certificate in Systems Architecture Security](/media/cyber-skills/site-assets/media/images/course-images/Secure-Systems-Architecture-Course-1.png)
Certificate in Web Penetration Testing and Assurance
![Image for Certificate in Web Penetration Testing and Assurance](/media/cyber-skills/site-assets/media/images/course-images/Web-Penetration.png)
Cloud Security Architecting
![Image for Cloud Security Architecting](/media/cloud-sec.jpeg)
Computer Forensics
![Image for Computer Forensics](/media/cyber-skills/site-assets/media/images/course-images/Computer-Forensics.png)
Computer Science Project
![Image for Computer Science Project](/media/cyber-skills/site-assets/media/images/course-images/computer_project.jpg)
Cryptography & Protocols
![Image for Cryptography & Protocols](/media/cyber-skills/site-assets/media/images/course-images/Cryptography-and-protocols-course-583x318.png)
Cyber Incident Response
![Image for Cyber Incident Response](/media/27.png)
Cyber Security Law and Regulations
![Image for Cyber Security Law and Regulations](/media/cyber-skills/site-assets/media/images/course-images/Cyber-Security-Law-and-Regulations-1.png)
Cybercrime and Digital Forensics
![Image for Cybercrime and Digital Forensics](/media/cyber-skills/site-assets/media/images/course-images/Cyber-Crime-and-Digital-Forensics-v1.png)
Cybersecurity & Digital Operational Resilience
![Image for Cybersecurity & Digital Operational Resilience](/media/cyber-skills/site-assets/media/images/course-images/EU-DORA-Digital-Operational-Resilience-Act-regulation.jpg.png)
Cybersecurity Risk Frameworks
![Image for Cybersecurity Risk Frameworks](/media/cyber-skills/site-assets/media/images/course-images/Cyber-Security-standards-and-risks.png)
Cybersecurity Standards & Risk
![Image for Cybersecurity Standards & Risk](/media/cyber-skills/site-assets/media/images/course-images/CyberSecurity-Standards-and-risk-583x318.png)
Emerging Cyber Trends
![Image for Emerging Cyber Trends](/media/cyber-skills/site-assets/media/images/course-images/cyber_trends.jpg)
Evasion and Defense Analysis
![Image for Evasion and Defense Analysis](/media/cyber-skills/site-assets/media/images/course-images/Evasion-and-Defense-Analysis-v1.png)
Future Focused Professional Portfolio 1
![Image for Future Focused Professional Portfolio 1](/media/cyber-skills/site-assets/media/images/course-images/Future-Focused-Professional-Portfolio-1-v1.png)
Future Focused Professional Portfolio 2
![Image for Future Focused Professional Portfolio 2](/media/cyber-skills/site-assets/media/images/course-images/Future-Focused-Professional-Portfolio-2-v1-1.png)
Higher Diploma in Cyber Security Operations
![Image for Higher Diploma in Cyber Security Operations](/media/cyber-skills/site-assets/media/images/course-images/iStock-1447298423.jpg)
Information Security Architecture
![Image for Information Security Architecture](/media/cyber-skills/site-assets/media/images/course-images/Information-security-architechture-course-583x318.png)
Linux Administration
![Image for Linux Administration](/media/cyber-skills/site-assets/media/images/course-images/iStock-1700169379.jpg)
Log Files and Event Analysis
![Image for Log Files and Event Analysis](/media/cyber-skills/site-assets/media/images/course-images/Practical-Crypotgraphy-1-583x318.png)
Malware Behaviour Analysis
![Image for Malware Behaviour Analysis](/media/cyber-skills/site-assets/media/images/course-images/Malware-Behaviour-Analysis-v1.png)
Malware Reverse Engineering
![Image for Malware Reverse Engineering](/media/cyber-skills/site-assets/media/images/course-images/Malware-Reverse-Engineering-v1.png)
Network Systems
![Image for Network Systems](/media/cyber-skills/site-assets/media/images/course-images/network_systems.jpg)
OT/ICS Networks & Protocols
![Image for OT/ICS Networks & Protocols](/media/cyber-skills/site-assets/media/images/course-images/OT_ICS-Networks--Protocols-v1.png)
Penetration Testing
![Image for Penetration Testing](/media/cyber-skills/site-assets/media/images/course-images/Network-Penetration-Testing-v1.png)
Practical Cryptography
![Image for Practical Cryptography](/media/cyber-skills/site-assets/media/images/course-images/Practical-Cryptography.png)
Professional Diploma in OT Security Operations Specialist
![Image for Professional Diploma in OT Security Operations Specialist](/media/cyber-skills/site-assets/media/images/course-images/OT-Specalist-Listing-Image.png)
Secure Network Services
![Image for Secure Network Services](/media/cyber-skills/site-assets/media/images/course-images/Secure-Network-services-2-583x318.png)
Secure Network Systems
![Image for Secure Network Systems](/media/cyber-skills/site-assets/media/images/course-images/Secure-Network-Systems.png)
Secure OT/ICS Networks
![Image for Secure OT/ICS Networks](/media/cyber-skills/site-assets/media/images/course-images/Secure-OT_ICS-Networksv1.png)
Secure Software Development
![Image for Secure Software Development](/media/cyber-skills/site-assets/media/images/course-images/Secure-Software-Development-Course-583x318.png)
Security Architecture
![Image for Security Architecture](/media/cyber-skills/site-assets/media/images/course-images/Secure-Systems-Architecture-Course-583x318.png)
Security Assurance
![Image for Security Assurance](/media/cyber-skills/site-assets/media/images/course-images/Security-Assurance--583x318.png)
Security Web Penetration Testing
![Image for Security Web Penetration Testing](/media/cyber-skills/site-assets/media/images/course-images/Security-Web-Penetration-Testing-v1-.png)
Vulnerability Analysis
![Image for Vulnerability Analysis](/media/cyber-skills/site-assets/media/images/course-images/Vulnerability-Analysis-v1.png)
Windows Administration
![Image for Windows Administration](/media/cyber-skills/site-assets/media/images/course-images/67.jpg)