Welcome to The Cyber Pulse. This is your portal to free Cyber content, including on-demand webinars, articles written by leading experts, industry reports, and live events. The Cyber Pulse will be updated with new content regularly so always pop back to see what's new. Feast your eyes and mind on what is in the world of cyber and how we can help you. 

Upcoming events
In-person events
Industry reports
Cheat Sheets
Test yourself
Weekly news
Featured courses
Mergers Index
Icon_Webinar

Free Cyber events

Icon_Microphone

Join the conversation!

Join Cyber Security Skills Meetup! Hear from industry experts focused on cyber skills and development. Our community speakers will share their knowledge on cyber skills innovations, emerging technology, and key challenges in the Cyber skills space.

Whether you’re embarking on a career in Cyber security or already have experience, the Cyber Security Skills Meetup aims to empower you with the knowledge and insight you need to advance your career.

meetup-logo-script-1200x630 (1)

 

Join community

Our next live meetup...

 

  •   Tuesday 24 May 2022
      12:30 to 13:30 GMT

Overview

Guest Speaker: Tiarnan Giles

Fundamentals of Kali Linux is an operating system designed for, and used widely by, security professionals. Due to an increased emphasis on user control and command-line based tooling, using any Linux operating system can be daunting for those who have not done so before.

This session is focused on demystifying the usage of Linux operating systems. We will be showing you how you can set up your own Kali Linux machine and teaching you the basics of using and navigating a Linux operating system.

Agenda:

- An introduction to Linux and Kali Linux
- Virtualisation
- Using virtualisation to create your own Kali Linux Virtual Machine
- The Graphical User Interface vs the Command Line Interface Fundamentals of the Linux Command Line
- An overview of the security uses of Kali Linux

About Tiarnan


Tiarnan is a Cyber Security Professional working in the training sector. He currently delivers Cyber Security Apprenticeships, prior to which he developed Cyber Security training content, including training courses, training materials and practical labs.

Tiarnan has an interest in all things cyber, but has a particular passion for Penetration Testing and Security Operations. In addition to working in the training sector, Tiarnan has a keen interest in the wider Cyber Security upskilling space, especially in; online, practical and gamified learning solutions. Tiarnan has a background in wider Computer Science, holding a BSc in “Computer Science with Artificial Intelligence”. His professional interests outside of Cyber Security include functional programming, networking, software development and Artificial Intelligence.

Specialist areas: Penetration Testing, Security Operations, Intelligence Gathering, Security Awareness, Functional Programming and Artificial Intelligence.




QAL_CyberPulseHub_Meetup240522
Attend online
ONEQA_LP_HI_Cyber_Pulse_Arrowdesign

Not long until our next meetup!

  • days
  • Hours
  • Minutes
  • Seconds

 

 

Play Button Icon - QA Blue

On-demand webinars

Previous Next
See all webinars
Icon_Reports

Industry reports

Navigating Industrial Cybersecurity - A Field Guide

Nearly every aspect of modern life depends upon the uninterrupted function of industrial control systems (ICS). ICSs keep the lights on, ensure clean drinking water, and provide other critical infrastructure processes. It’s imperative that ICSs are protected against all cyber events— accidental or malicious—because the physical ramifications of such events pose major threats to both public safety and to any industrial entity’s ability to stay operational and competitive.

View report

C-Level Guidance to Securing Serverless Architectures - Cloud Security Alliance

Serverless computing enables developers to develop and deploy faster, allowing a more effective way to move to Cloud-native services without managing infrastructures like container clusters or virtual machines. The information is intended for readers who are getting introduced to serverless computing and need to understand its business and security implications.

View report

Cyber Security Skills in the UK Labour Market 2022 - DCMS

This is a summary of research into the UK cyber security labour market, carried out on behalf of the Department for Digital, Culture, Media and Sport (DCMS). The research explores the nature and extent of cyber security skills gaps (people lacking appropriate skills) and skills shortages (a lack of people available to work in cyber security job roles).

View report

View all reports
Icon_Articles_White

Mergers, Investments and Acquisitions (MIA) Index

Keep up with the latest news on Cyber industry mergers, investments and acquisitions and check out our monthly reports.

April 2022

View more

March 2022

View more

February 2022

View more

January 2022

View more

Lock2_Icon

Cheat Sheets

Cheat sheets are perfect for those just starting out. However, even the most experienced need to lean on references every once in a while.

Nmap

Click below to see a list of target specifications, target ports, scan types and other essential Nmap information. 

Learn more

sqlmap

Click below to see the sqlmap cheat sheet.

Learn more

WPScan

Click below to access the WPScan cheat sheet.

Learn more

zsh

Click below to access the zsh cheat sheet

Learn more

Log Sources for Forensics

Click on the button below to access the cheat sheet 

Learn more

Network Log Sources for Forensics

Click below to access the cheat sheet: 

Learn more

Email Header guide Cheat Sheet

Click below to access the cheat sheet: 

Learn more

Creating a 'Sock Puppet' for Research

Click below to access the cheat sheet: 

Learn more

Creating an Android VM for Research

Click below to access the cheat sheet: 

Learn more

Using Google Advanced Search Operators

Google advanced search operators are an invaluable research tool.


Learn more

Wireshark

Here is a list of the common commands used within Wireshark.


Learn more

Hashcat

Here you can find some common Hashcat syntax.

Learn more

Hydra

Click below to see a list of common Hydra commands. 

Learn more

John the Ripper

Click below to see a list of John the Ripper commands. 

Learn more

Linux Bash

Click below to see some essential Linux Bash terminal shortcuts, regular expressions and commands.

Learn more

Metasploit

Click below to see the most useful Generic Commands, Database Commands and Meterpreter Commands for Metasploit.

Learn more

Setting up a Firefox for Research

Click below to access the cheat sheet: 

Learn more

GIT cheat sheet

Click below to access the cheat sheet: 

Learn more

ONEQA_LP_HI_Arrowdesign#3
Skills_Icon

Test your skills!

Put your knowledge to the test, and select from our range of quizzes. These tests are relatively short and should only take 5-6 minutes to complete. 

Port scanning

Take quiz

 

Ethical Hacking Databases

Take quiz

 

Password attacks

Take quiz

 

Ethical hacking Windows

Take quiz

 

 

 

 

 

 

 

Ethical Hacking Linux

Take quiz

 

 

Ethical Web Hacking

Take quiz

 

 

 

 

 

Cloud Security Foundation

Take quiz

 

 

 

 

 

 

 

Security Audit Foundations

Take quiz

 

 

Security Architecture Fundamentals

Take quiz

 

 

 

 

 

Application Security

Take quiz

 

 

 

 

 

 

 

Secure by Design

Take quiz

 

 

 

 

 

Icon_Articles

Weekly Newsletter

Sign up to our Weekly Cyber Pulse Newsletter


Stay in the know. Sign up for our Cyber Pulse newsletter and stay up to date with the latest Cyber news!

Subscribe today
ONEQA_LP_HI_Arrowdesign#4
Bluearrowsmall_Icon

In-person events

QA are proud to be exhibiting at expos, conferences and shows around the UK. Come and visit us at one of our events, connect with other industry professionals and learn about the latest cybersecurity innovations! Take a look below to see where we'll be next.

Icon_Course

Featured courses

View more

Sign-up to our Cyber Newsletter


The Cyber Pulse Newsletter is your weekly round-up of key news in the Cyber Space. In such a fast-moving industry, it can be tough to keep your finger on the pulse - so let QA do it for you! Sign-up for the Cyber Pulse newsletter today.

Sign-up
ONEQA_LP_HI_Arrowdesign#4