Are you on top of your game?

Our Training Courses

Take your security skills to the next level

We are dedicated to helping to close the cybersecurity skills gap in New Zealand. Regardless of your role or experience we offer a range of courses to help you develop practical and up-to-date knowledge and skills.

Our courses are delivered by experts with real-world experience in the subjects that they teach.

Got a specific training need we’ve not covered?

Incident Response

We have partnered with the Software Engineering Institute at Carnegie Mellon University to deliver its Computer Security Incident Response Team (CSIRT) training courses.

Whether you are responsible for establishing or managing a CSIRT or are an incident handler our courses will provide you with the knowledge and skills required to plan, implement and operate a CSIRT to effectively and efficiently respond to information security incidents.


Creating a Computer Security Incident Response Team

This 1-day course is designed for managers and project leaders who have been tasked with implementing a CSIRT. This course provides a high-level overview of the key issues and decisions that must be addressed when establishing a CSIRT. As part of the course, attendees will develop an action plan that can be used as a starting point in planning and implementing their CSIRT.

View course outline and dates

Managing Computer Security Incident Response Teams

This 3-day course provides current and future managers of CSIRTs with a pragmatic view of the issues that they will face in operating an effective team. The course provides insight into the work that CSIRT staff may be expected to handle, an overview of the incident handling process and the types of tools and infrastructure needed to be effective.

View course outline and dates

Fundamentals of Incident Handling

This 5-day course is for CSIRT technical personnel with little or no incident handling experience. It provides a basic introduction to the main incident handling tasks and critical thinking skills that will help an incident handler perform their job. This course is recommended to those new to incident handling work.

View course outline and dates

Advanced Incident Handling

This 5-day course, designed for CSIRT technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks that are targeted at a variety of operating systems and architectures. Building on the methods and tools discussed in the Fundamentals of Incident Handling course, this course provides guidance that incident handlers can use in responding to system compromises at the privileged (root or administrator) level. Through interactive instruction, facilitated discussions, and group exercises, instructors help participants identify and analyse a set of events and then propose appropriate response strategies.

View course outline and dates

ICS/SCADA Security

We have partnered with Red Tiger Security to deliver its Industrial Controls Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) security training courses in New Zealand.

If you are responsible for securing or operating critical infrastructure our courses will provide you with valuable insight into the issues with and methods for securing real-time environments and critical infrastructure based on ICS/SCADA systems.


RTS-101 - 1 Day Management Workshop for Security ICS/SCADA Systems

This 1-day workshop is designed for managers, control system engineers, technicians and security professionals with little or no experience of securing ICS/SCADA systems. It presents an overview of the security threats unique to ICS/SCADA systems, how they exploit the inherent weaknesses and vulnerabilities in ICS/SCADA equipment, together with how to develop a cybersecurity strategy to defend against them.

View course outline and dates

RTS-201 - 5 Day Course for Securing ICS/SCADA Systems

This 5-day course is designed for control system engineers, technicians and security professionals working in ICS/SCADA environments. It provides real-world architecture and deployment examples and deep dives into instrumentation, I/O, control techniques, automation theory, HMI visualisation, data archival systems and protocols (including OPC, ModbusTCP, and EthernetIP) to provide a thorough understanding of how ICS/SCADA systems work. It also presents a methodology for planning and safely executing security testing within ICS/SCADA environments with over 20 hands-on exercises performed in a portable SCADA lab that contains over 15 different PLCs, RTUs, RF, and telemetry devices.

View course outline and dates

Be informed about future courses