Welcome to The Cyber Pulse. This is your portal to free Cyber content, including on-demand webinars, articles written by leading experts, industry reports, and live events. The Cyber Pulse will be updated with new content regularly so always pop back to see what's new. Feast your eyes and mind on what is in the world of cyber and how we can help you. 

Scroll down to see more

Upcoming events
In-person events
Industry reports
Cheat Sheets
Test yourself
Webinar recordings
Featured courses
Mergers Index
Icon_Webinar

Featured blog: Looking Over the Horizon at Cyber-enabled Fraud

 

The Office for National Statistics (ONS) statistics show that there were 1.6 million computer misuse offences in the year ending 2022, an increase of 89% on the year 2020. Between November 2020 and 2021, the UK lost £2.5 billion in fraud and cybercrime cases.

In this article, QA's Richard Beck examines emerging threats that are just over the horizon, such as deep fakes, biometrics and artificial-intelligence (AI). Are you prepared for the future of cyber-fraud?

See more

 

 

 

Icon_Webinar

Upcoming Virtual events

London, QEII Centre

Cyber Pathways

ExCel London

BlackHat Europe

CYBERUK - Belfast

Icon_Microphone

Join the conversation!

Join Cyber Security Skills Meetup! Hear from industry experts focused on cyber skills and development. Our community speakers will share their knowledge on cyber skills innovations, emerging technology, and key challenges in the Cyber skills space.

Whether you’re embarking on a career in Cyber security or already have experience, the Cyber Security Skills Meetup aims to empower you with the knowledge and insight you need to advance your career.

meetup-logo-script-1200x630 (1)

 

Join community

Latest blogs
Skills_Icon

How AI-powered Cyber Range elevates teamworking success

QA's Director of Cyber Security, Richard Beck, takes a look at the benefits of utilising AI in Cyber Ranges, including collaboration and teamwork.

A cyber range is designed to mimic real-world scenarios that can be used to detect and react to simulated ‘live fire’ cyberattacks, and to enable players to test and experience technologies to enhance their cybersecurity knowledge and ultimately their organisational resilience posture. A cyber range is not a collection of virtual labs, which are great for individual development, but miss out on providing collaboration and power skills, as described by Forbes, crucial for security professionals.

Read the full article

Play Button Icon - QA Blue

On-demand webinars

Previous Next
See all webinars
Icon_Reports

Industry reports

View all reports

Cyber Security and Universities: Managing the Risk (2023 Update) - Universities UK; NCSC; Jisc

Cyber security will be high on every university’s risk register. By collaborating with expert organisations which provide advice and solutions, we can minimise the risk and provide reassurance to our governors that, while it is impossible to be immune to attack, we can be as well prepared as possible.

View more

DLP Checklist - Next DLP 

Follow this checklist to ensure that you’re covering all the bases, from developing your DLP strategy to rollout and enforcement.

View more

Sharing, transmitting and storing healthcare data securely - SSH

View more

Icon_Articles_White

Mergers, Investments and Acquisitions (MIA) Index

Keep up with the latest news on Cyber industry mergers, investments and acquisitions and check out our monthly reports.

April 2023

View more

March 2023

View more

February 2023

View more

January 2023

View more

December 2022

View more

November 2022

View more

October 2022

View more

September 2022

View more

August 2022

View more

July 2022

View more

June 2022

View more

May 2022

View more

April 2022

View more

March 2022

View more

February 2022

View more

January 2022

View more

Lock2_Icon

Cheat Sheets & Guides

Cheat sheets are perfect for those just starting out. However, even the most experienced need to lean on references every once in a while.

NEW: The CISO Cheat Sheet

View more

NEW: Art of Google Dorking Guide

Learn more

NEW: Kubernetes OWASP Top Ten

One of our newest cheat sheets - open it to find out how to apply the OWASP Top Ten to Kubernetes

Learn more

NIST Cheat Sheet

If you're looking to get familiar with the NIST framework, or already are, this cheat sheet will come in handy when applying the framework. 

Learn more

Nmap

Click below to see a list of target specifications, target ports, scan types and other essential Nmap information. 

Learn more

sqlmap

Click below to see the sqlmap cheat sheet.

Learn more

SQL - Kusto

Click below to access the cheat sheet: 

Learn more

WPScan

Click below to access the WPScan cheat sheet.

Learn more

zsh

Click below to access the zsh cheat sheet

Learn more

Log Sources for Forensics

Click on the button below to access the cheat sheet 

Learn more

Network Log Sources for Forensics

Click below to access the cheat sheet: 

Learn more

Email Header guide Cheat Sheet

Click below to access the cheat sheet: 

Learn more

Creating a 'Sock Puppet' for Research

Click below to access the cheat sheet: 

Learn more

Creating an Android VM for Research

Click below to access the cheat sheet: 

Learn more

Linux Commands Cheat Sheet

Click below to access the cheat sheet: 

Learn more

Cyber A-Z

Click below to access the cheat sheet: 

Learn more

Burp Suite Cheat Sheet

Click below to access the cheat sheet: 

Learn more

Ethereum Blockchain Cheat Sheet

Click below to access the cheat sheet: 

Learn more

Quantum Computing Terms

Click below to access the cheat sheet: 

Learn more

Crypto Basics

Click below to access the cheat sheet: 

Learn more

Splunk

Click below to access the cheat sheet: 

Learn more

NEW: Security Programme RACI Cheat Sheet

Click below to access the cheat sheet: 

View more

NEW: Incident Response Action Activity - Cheat Sheet

Click below to access the cheat sheet: 

Learn more

New: AI Tools Cheat Sheet

Click below to access the cheat sheet: 

Learn more

Using Google Advanced Search Operators

Google advanced search operators are an invaluable research tool.


Learn more

Wireshark

Here is a list of the common commands used within Wireshark.


Learn more

Hashcat

Here you can find some common Hashcat syntax.

Learn more

Hydra

Click below to see a list of common Hydra commands. 

Learn more

John the Ripper

Click below to see a list of John the Ripper commands. 

Learn more

Linux Bash

Click below to see some essential Linux Bash terminal shortcuts, regular expressions and commands.

Learn more

Metasploit

Click below to see the most useful Generic Commands, Database Commands and Meterpreter Commands for Metasploit.

Learn more

Setting up a Firefox for Research

Click below to access the cheat sheet: 

Learn more

GIT cheat sheet

Click below to access the cheat sheet: 

Learn more

HTTP Server Response Codes

Click below to access the cheat sheet: 

Learn more

OWASP Zap

Click below to access the cheat sheet: 

Learn more

Docker

Click below to access the cheat sheet: 

Learn more

AWS Cloud Foundations

Click below to access the cheat sheet: 

Learn more

OSCP Cheat Sheet

Click below to access the cheat sheet: 

Learn more

gcloud CLI Cheat Sheet

Click below to access the cheat sheet: 

Learn more

Cloud Services

Click below to access the cheat sheet: 

Learn more

Blockchain Glossary

Click below to access the cheat sheet: 

Learn more

Responder

Click below to access the cheat sheet: 

Learn more

New: Malware Families Cheat Sheet

Click below to access the cheat sheet: 

Learn more

ONEQA_LP_HI_Arrowdesign#3
Skills_Icon

Test your skills!

Put your knowledge to the test, and select from our range of quizzes. These tests are relatively short and should only take 5-6 minutes to complete. 

Security Risk Foundations

Take quiz

 

Port scanning

Take quiz

 

Ethical Hacking Databases

Take quiz

 

Password attacks

Take quiz

 

Ethical hacking Windows

Take quiz

 

 

 

 

 

 

 

Ethical Hacking Linux

Take quiz

 

 

Ethical Web Hacking

Take quiz

 

 

 

 

 

Cloud Security Foundation

Take quiz

 

 

 

 

 

 

 

Security Audit Foundations

Take quiz

 

 

Security Architecture Fundamentals

Take quiz

 

 

 

 

 

Application Security

Take quiz

 

 

 

 

 

 

 

Secure by Design

Take quiz

 

 

 

 

 

Icon_Articles

Weekly Newsletter

Sign up to our Weekly Cyber Pulse Newsletter


Stay in the know. Sign up for our Cyber Pulse newsletter and stay up to date with the latest Cyber news!

Subscribe today
ONEQA_LP_HI_Arrowdesign#4

QA is proud to support 2 not-for-profit Women in Cyber organisation

NEWWiCySLogotoplinestackedhoriz
SEIDEA

WiCyS, a global community of women, allies and advocates, are dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. They unite local communities of aspiring and thriving women cybersecurity professionals across the world to collaborate, share their knowledge, network and mentor. They create opportunities through professional development programs, conferences, career fairs, and more. 

QA designed a tailored IT Security Auditor programme for WiCyS (UK), virtually delivered over 16 weeks for an entirely female cohort of 25 fully funded places which included Certified Information Systems Auditor (CISA) and Certificate of Cloud Auditing Knowledge (CCAK) training, exam preparation days, mentoring and exam vouchers (valid for 1 year).


Seidea is a career development platform with a social mission of diversifying the cybersecurity industry. They support over 1000+ Black and Minority Ethnic women and non-binary people around the globe in their entry into the cybersecurity field through cyber career programmes and community engagement.

QA created a Digital Forensics Fundamentals programme for Seidea. Providing multiple global all female cohorts, 20 fully funded places an immersed gamified learning experience, completing 30+ tasks over a month, on the Project ARES cyber range. Learners acquired digital forensic practical hands-on skills, including the ability to conduct data recovery investigations, disc image analysis, and forensic analysis investigations., earning a Credly digital badge to evidence competence.

Find Out More
Find Out More
Icon_Course

Featured courses

QACBTL1OL

Certified Blue Team Level 1

BTL1 is perfect for security enthusiasts or professionals that want to develop their practical defensive cyber skills. 

 

 

 

View course

£ From £399 ex VAT

View Pathways

Sign-up to our Cyber Newsletter


The Cyber Pulse Newsletter is your weekly round-up of key news in the Cyber Space. In such a fast-moving industry, it can be tough to keep your finger on the pulse - so let QA do it for you! Sign-up for the Cyber Pulse newsletter today.

Sign-up
ONEQA_LP_HI_Arrowdesign#4