Cybersecurity breaches continue to rise, and organisations recognise that security is the responsibility of the entire business. In order to help out, here at New Horizons we are offering a range of cybersecurity resources to help mitigate and prevent the growing sophistication of cyber-attackers and build cyber-safe practices and systems.

Security Courses

Cybersecurity Recorded Webinars

New & Notable: Certified Cybersecurity Technician

Learn how to elevate your life and start a career in the Cybersecurity Industry with the Certified Cybersecurity Technician (C|CT) program from EC-Council. The C|CT is focused on hands-on practice, with more than 50% of training time dedicated to labs. C|CT develops participants’ fundamental cybersecurity skills across the fields of network defense, ethical hacking, digital ...

Building Cyber Resilience in One Day

All too often cyber attackers find it easier to influence and engage with us and our staff. The fact is that the majority of successful cyber-attacks succeed because of human error - cyber resilience is fundamentally a human and not just a technology issue. We need to change behaviors, providing the simple, practical guidance that is needed to make the right decisions at the ri...

A Hacker's Guide to Certification CND, CEH and CPENT

The next big thing in Cybersecurity Skill Development is here.

Cybersecurity Resources



Latest Blog Posts

Cybersecurity threats and how you can help

11 Tips for Small Business Cybersecurity Protection

The Ultimate CompTIA Security+ Guide

How To Become A Cybersecurity Professional

Are You Opening the Door to Black Hats?

More Recorded Webinars


True or false? A wireless device is immune to traditional wire-based attacks?

Take our FREE cyber security assessment to see how prepared your organisation is for cyber threats. The test is made up of 15 questions and will determine if you can recognise and avoid common issues like phishing, malware and non secure website. 

Take the quiz

View all our cybersecurity courses

Highlighted Courses

CertNexus Certified CyberSec First Responder

The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.

Learning Objectives

In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will:

  • Assess cybersecurity risks to the organization.
  • Analyze the threat landscape.
  • Analyze various reconnaissance threats to computing and network environments.
  • Analyze various attacks on computing and network environments.
  • Analyze various post-attack techniques.
  • Assess the organization's security posture through auditing, vulnerability management, and penetration testing.
  • Collect cybersecurity intelligence from various network-based and host-based sources.
  • Analyze log data to reveal evidence of threats and incidents.
  • Perform active asset and network analysis to detect incidents.
  • Respond to cybersecurity incidents using containment, mitigation, and recovery tactics.
  • Investigate cybersecurity incidents using forensic analysis techniques.

View dates

5 day course Normally runs 14:00 to 22:00 Live Online Can be run in person.
Contact us for details.

CertNexus CyberSAFE

Welcome to CyberSAFE: Exam CBS-410. Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to:

  • Understand both security and compliance needs and requirements.
  • Recognize and avoid phishing and other social engineering attempts.
  • Recognize and avoid viruses, ransomware, and other malware.
  • Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud.

In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely.


In this course, you will identify many of the common risks involved in using conventional computing technology, as well as ways to use it safely, to protect yourself from those risks. You will:

  • Identify security compliance measures.
  • Address social engineering attempts.
  • Secure devices such as desktops, laptops, tablets, smartphones, and more.
  • Use the Internet securely.

View dates

Half day course Normally runs 14:00 to 22:00 Live Online Can be run in person.
Contact us for details.