Our Training Courses
Take your security skills to the next level
We are dedicated to helping to close the cybersecurity skills gap in New Zealand. Regardless of your role or experience we offer a range of courses to help you develop practical and up-to-date knowledge and skills.
Our courses are delivered by experts with real-world experience in the subjects that they teach.
Got a specific training need we’ve not covered?
We have partnered with the Software Engineering Institute at Carnegie Mellon University to deliver its Computer Security Incident Response Team (CSIRT) training courses.
Whether you are responsible for establishing or managing a CSIRT or are an incident handler our courses will provide you with the knowledge and skills required to plan, implement and operate a CSIRT to effectively and efficiently respond to information security incidents.
Creating a Computer Security Incident Response Team
This 1-day course is designed for managers and project leaders who have been tasked with implementing a CSIRT. This course provides a high-level overview of the key issues and decisions that must be addressed when establishing a CSIRT. As part of the course, attendees will develop an action plan that can be used as a starting point in planning and implementing their CSIRT.
Managing Computer Security Incident Response Teams
This 3-day course provides current and future managers of CSIRTs with a pragmatic view of the issues that they will face in operating an effective team. The course provides insight into the work that CSIRT staff may be expected to handle, an overview of the incident handling process and the types of tools and infrastructure needed to be effective.
Fundamentals of Incident Handling
This 5-day course is for CSIRT technical personnel with little or no incident handling experience. It provides a basic introduction to the main incident handling tasks and critical thinking skills that will help an incident handler perform their job. This course is recommended to those new to incident handling work.
Advanced Incident Handling
This 5-day course, designed for CSIRT technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging computer security threats and attacks that are targeted at a variety of operating systems and architectures. Building on the methods and tools discussed in the Fundamentals of Incident Handling course, this course provides guidance that incident handlers can use in responding to system compromises at the privileged (root or administrator) level. Through interactive instruction, facilitated discussions, and group exercises, instructors help participants identify and analyse a set of events and then propose appropriate response strategies.
We have partnered with Red Tiger Security to deliver its Industrial Controls Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) security training courses in New Zealand.
If you are responsible for securing or operating critical infrastructure our courses will provide you with valuable insight into the issues with and methods for securing real-time environments and critical infrastructure based on ICS/SCADA systems.
RTS-101 - 1 Day Management Workshop for Security ICS/SCADA Systems
This 1-day workshop is designed for managers, control system engineers, technicians and security professionals with little or no experience of securing ICS/SCADA systems. It presents an overview of the security threats unique to ICS/SCADA systems, how they exploit the inherent weaknesses and vulnerabilities in ICS/SCADA equipment, together with how to develop a cybersecurity strategy to defend against them.
RTS-201 - 5 Day Course for Securing ICS/SCADA Systems
This 5-day course is designed for control system engineers, technicians and security professionals working in ICS/SCADA environments. It provides real-world architecture and deployment examples and deep dives into instrumentation, I/O, control techniques, automation theory, HMI visualisation, data archival systems and protocols (including OPC, ModbusTCP, and EthernetIP) to provide a thorough understanding of how ICS/SCADA systems work. It also presents a methodology for planning and safely executing security testing within ICS/SCADA environments with over 20 hands-on exercises performed in a portable SCADA lab that contains over 15 different PLCs, RTUs, RF, and telemetry devices.