Welcome to The Cyber Pulse. This is your portal to free Cyber content, including on-demand webinars, articles written by leading experts, industry reports, and live events. The Cyber Pulse will be updated with new content regularly so always pop back to see what's new. Feast your eyes and mind on what is in the world of cyber and how we can help you. 

Scroll down to see more

Upcoming events
In-person events
Industry reports
Cheat Sheets
Test yourself
Weekly news
Featured courses
Mergers Index

4 Nations Secure Coding Tournament

QA_SCW_Email_Banner_AUG2022
Sign-up now

 

The 4 Nations Secure Code Warrior Tournaments are here!

 Calling all Secure Coders 📣 Are you a Secure Code Warrior?

Then prove it in the QA Secure Coding Tournaments! All challenges are based on the OWASP Top 10, and players can choose to compete in their preferred software language.

The tournaments offer participants a chance to represent their region: Scotland, N. Ireland, Wales and England, allowing you to compete against the other participants in a series of vulnerable code challenges that ask you to identify a problem, locate insecure code or weakness, and or fix a vulnerability.

The top ten finalists from each region will compete in the national UK Secure by Design Games!

The dates for the knockout stages are:

5th October - England
12 October - Scotland
19 October - Wales
26 October - Northern Ireland

Sign-up now
Icon_Webinar

Free Cyber events

Icon_Microphone

Join the conversation!

Join Cyber Security Skills Meetup! Hear from industry experts focused on cyber skills and development. Our community speakers will share their knowledge on cyber skills innovations, emerging technology, and key challenges in the Cyber skills space.

Whether you’re embarking on a career in Cyber security or already have experience, the Cyber Security Skills Meetup aims to empower you with the knowledge and insight you need to advance your career.

meetup-logo-script-1200x630 (1)

 

Join community

Play Button Icon - QA Blue

On-demand webinars

Previous Next
See all webinars
Icon_Reports

Industry reports

Cyber Deception for Insider Threats - Countercraft

Imagine a threat actor that has legitimate credentials to make their way to their objectives, inside knowledge of network architecture, and plenty of time to ponder over what next action is to be taken. This is the insider threat.

View report

Success Factor OT Security - Impulses for the Future of the Manufacturing Industry - T-Systems

Networked production offers new options for manufacturing. But when production systems are opened up to the outside world, for example, to the enterprise world or service providers via maintenance access, new risks arise. Cybercriminals have turned this development into a new business model and are implementing sabotage, blackmail, and intellectual property theft professionally and partially highly scalable.

View report

Hacking Tools you should get comfortable with - Hack the Box 

View report

View all reports
Icon_Articles_White

Mergers, Investments and Acquisitions (MIA) Index

Keep up with the latest news on Cyber industry mergers, investments and acquisitions and check out our monthly reports.

August 2022

View more

July 2022

View more

June 2022

View more

May 2022

View more

April 2022

View more

March 2022

View more

February 2022

View more

Lock2_Icon

Cheat Sheets

Cheat sheets are perfect for those just starting out. However, even the most experienced need to lean on references every once in a while.

Nmap

Click below to see a list of target specifications, target ports, scan types and other essential Nmap information. 

Learn more

sqlmap

Click below to see the sqlmap cheat sheet.

Learn more

SQL - Kusto

Click below to access the cheat sheet: 

Learn more

WPScan

Click below to access the WPScan cheat sheet.

Learn more

zsh

Click below to access the zsh cheat sheet

Learn more

Log Sources for Forensics

Click on the button below to access the cheat sheet 

Learn more

Network Log Sources for Forensics

Click below to access the cheat sheet: 

Learn more

Email Header guide Cheat Sheet

Click below to access the cheat sheet: 

Learn more

Creating a 'Sock Puppet' for Research

Click below to access the cheat sheet: 

Learn more

Creating an Android VM for Research

Click below to access the cheat sheet: 

Learn more

Linux Commands Cheat Sheet

Click below to access the cheat sheet: 

Learn more

Cyber A-Z

Click below to access the cheat sheet: 

Learn more

Burp Suite Cheat Sheet

Click below to access the cheat sheet: 

Learn more

Ethereum Blockchain Cheat Sheet

Click below to access the cheat sheet: 

Learn more

Quantum Computing Terms

Click below to access the cheat sheet: 

Learn more

Crypto Basics

Click below to access the cheat sheet: 

Learn more

Splunk

Click below to access the cheat sheet: 

Learn more

Using Google Advanced Search Operators

Google advanced search operators are an invaluable research tool.


Learn more

Wireshark

Here is a list of the common commands used within Wireshark.


Learn more

Hashcat

Here you can find some common Hashcat syntax.

Learn more

Hydra

Click below to see a list of common Hydra commands. 

Learn more

John the Ripper

Click below to see a list of John the Ripper commands. 

Learn more

Linux Bash

Click below to see some essential Linux Bash terminal shortcuts, regular expressions and commands.

Learn more

Metasploit

Click below to see the most useful Generic Commands, Database Commands and Meterpreter Commands for Metasploit.

Learn more

Setting up a Firefox for Research

Click below to access the cheat sheet: 

Learn more

GIT cheat sheet

Click below to access the cheat sheet: 

Learn more

HTTP Server Response Codes

Click below to access the cheat sheet: 

Learn more

OWASP Zap

Click below to access the cheat sheet: 

Learn more

Docker

Click below to access the cheat sheet: 

Learn more

AWS Cloud Foundations

Click below to access the cheat sheet: 

Learn more

OSCP Cheat Sheet

Click below to access the cheat sheet: 

Learn more

gcloud CLI Cheat Sheet

Click below to access the cheat sheet: 

Learn more

Cloud Services

Click below to access the cheat sheet: 

Learn more

Blockchain Glossary

Click below to access the cheat sheet: 

Learn more

Responder

Click below to access the cheat sheet: 

Learn more

ONEQA_LP_HI_Arrowdesign#3
Skills_Icon

Test your skills!

Put your knowledge to the test, and select from our range of quizzes. These tests are relatively short and should only take 5-6 minutes to complete. 

Security Risk Foundations

Take quiz

 

Port scanning

Take quiz

 

Ethical Hacking Databases

Take quiz

 

Password attacks

Take quiz

 

Ethical hacking Windows

Take quiz

 

 

 

 

 

 

 

Ethical Hacking Linux

Take quiz

 

 

Ethical Web Hacking

Take quiz

 

 

 

 

 

Cloud Security Foundation

Take quiz

 

 

 

 

 

 

 

Security Audit Foundations

Take quiz

 

 

Security Architecture Fundamentals

Take quiz

 

 

 

 

 

Application Security

Take quiz

 

 

 

 

 

 

 

Secure by Design

Take quiz

 

 

 

 

 

ONEQA_LP_HI_Arrowdesign#4

QA are proud to support The Cyber Helpline

QAL_TheCyberHelpline_Logo

The Cyber Helpline provides a free, confidential helpline for individuals and sole traders. We help victims understand, contain, recover and learn from cyber attacks by linking them with cyber security technology & experts who provide relevant advice and guidance. 

Find Out More
Icon_Course

Featured courses

QACBTL1OL

Certified Blue Team Level 1

BTL1 is perfect for security enthusiasts or professionals that want to develop their practical defensive cyber skills...

View course

£ From £399 ex VAT

View more

Sign-up to our Cyber Newsletter


The Cyber Pulse Newsletter is your weekly round-up of key news in the Cyber Space. In such a fast-moving industry, it can be tough to keep your finger on the pulse - so let QA do it for you! Sign-up for the Cyber Pulse newsletter today.

Sign-up
ONEQA_LP_HI_Arrowdesign#4