Cybersecurity Training


Akimbo Core deliver cybersecurity workshops all around the UK, as well as remotely. Our workshops cover a range of topics from technical subjects such as how to get the most out of cybersecurity testing, to security awareness issues within businesses.

Bespoke Cybersecurity Training and Workshops

Our workshops are tailored to your organisations needs and interests. Previous workshops have included how organisations can recognise and detect threats, including both technical measures that can be put in place to detect and block them, as well as staff security awareness training.

Our speakers are experienced ethical hackers and can give first-hand examples of how different threats can be built and delivered, such as how attackers put together attacks and “What happens next” when a staff member falls for a social engineering scam.

Security Awareness Training

Awareness Training can be a key part to reducing the risk of threats such as social engineering and phishing – but many companies struggle to put together effective security awareness training sessions. It’s an understandable problem though, putting together a talk about passwords and emails, but keeping it interesting, is ...

Building and Breaking: Web Applications

Our “Building and Breaking” series is ideal for those looking to break into cyber security as a career or develop their security testing skills. So whether you’re a software developer looking to build more secure applications, or wanting to become a penetration tester in the future – this course will ...

Building and Breaking: Networks and Infrastructure

Our “Building and Breaking” series is ideal for those looking to break into cyber security as a career or develop their security testing skills. So whether you’re a system admin looking to build more secure networks, or wanting to become a penetration tester in the future – this course will ...

Benefits of our bespoke workshops:

Raise cybersecurity awareness within your organisation.

Up-skill your technical teams on how to more effectively defend your systems.

Deploy and improve internal protections to defend against attacks.

Speaker Profile: Holly Grace Williams

Holly Grace has delivered cybersecurity and security awareness training to hundreds of delegates throughout her career, with a key focus on delivering cybersecurity training for SMEs.

She has spoken publicly about cybersecurity and security awareness on both Sky News and BBC Breakfast, as well as at many events such as Infosecurity Europe, TEISS, DTx, and Scot-Secure.

She was awarded her CREST Fellowship in 2023; was included as one of SC’s “Women of Influence” in the “30 Top Cybersecurity Leaders” of 2021 and 2019; as well as being awarded Computing’s Security Woman of the Year award in 2018.

Holly Grace has been working in cybersecurity since 2007. She holds a Master of Science in Information Security and Privacy, from Cardiff University, and is a CREST Certified Penetration Tester.

Left: Holly Grace speaking on BBC Breakfast about Travelex’s 2020 breach

In addition to Cybersecurity Training we also offer Penetration Testing and Cybersecurity Consultancy to offer a comprehensive suite of cybersecurity services.

Penetration Testing

Penetration Testing is one of the most effective ways to assess your systems security, discover vulnerabilities, and determine the real-world risk of any vulnerabilities that are present.

It goes much further than simply checking for missing software updates or weak passwords. Plus, it’s more effective than simple vulnerability scanning.

Cybersecurity Consultancy

From security architecture to security assessment, we offer a wide range of services to ensure the protection of your assets. We use a highly flexible methodology to ensure that our services are fully aligned to your needs, delivered by a bespoke team with the precise skills and depth of experience needed to understand your issues and then effectively deliver the desired outcome. With our security assurance services, you can have peace of mind knowing that your systems and data are well-protected.

CONTACT US


WE CAN FIND YOUR VULNERABILITIES

BEFORE YOU ARE BREACHED

GET IN TOUCH

    Play Cover Track Title
    Track Authors