Public Sector

We've had the pleasure of working with UK and overseas central and local government departments, including Healthcare (NHS and Foundation Trusts), Defence, Education (Universities and colleges), many of the main Civil Service departments, Emergency Services; also public-owned corporations including the BBC, Bank of England, Ordnance Survey, and regulatory bodies such as Ofgem.

We are registered on Crown Commercial Service’s (CCS) Dynamic Purchasing System (RM6219 Training and Learning) and also with numerous tender portals such as Ariba, Coupa and Delta E-Sourcing.

Read more...

Graduate Training Schemes

Framework Training has a strong track record of providing a solid introduction into the working world for technical graduates across myriad industries. We provide the opportunity to learn and gain valuable hands-on experience in a supportive, friendly and sociable training environment.

Attract & retain the brightest new starters

We know it is vital for our clients to invest in the future of their talented grads; not only to provide them with high-quality, professional training essential for their roles, but to embed them within the organisation’s culture and guide them on the right path to a successful career.

After all, your new hires could well be the next leaders and their creative ideas and unique insights are invaluable to your business.

Read more ...

Learning & Development

Our unique portfolio of high-quality technical courses and training programmes are industry-respected. They’re carefully designed so that delegates can seamlessly apply what they’ve learnt back in the workplace. Our team of domain experts, trainers, and support teams know our field — and all things tech — inside out, and we work hard to keep ourselves up to speed with the latest innovations. 

We’re proud to develop and deliver innovative learning solutions that actually work and make a tangible difference to your people and your business, driving through positive lasting change. Our training courses and programmes are human-centred. Everything we do is underpinned by our commitment to continuous improvement and learning and generally making things much better.

Read more...

Corporate & Volume Pricing

Whether you are looking to book multiple places on public scheduled courses (attended remotely or in our training centres in London) or planning private courses for a team within your organisation, we will be happy to discuss preferential pricing which maximise your staff education budget.

Enquire today about:

  • Training programme pricing models  

  • Multi-course voucher schemes

Read more...

Custom Learning Paths

We understand that your team training needs don't always fit into a "one size fits all" mould, and we're very happy to explore ways in which we can tailor a bespoke learning path to fit your learning needs.

Find out about how we can customise everything from short overviews, intensive workshops, and wider training programmes that give you coverage of the most relevant topics based on what your staff need to excel in their roles.

Read more...

Penetration Testing Training Course

Gain practical experience of analysing and hardening your software applications and APIs against external threat

About the course

Our instructor-led Penetration Testing (aka Pen Testing) training course will give you practical skills and ethical hacking techniques to analyse and plan to address vulnerabilities in network-facing applications.

We will introduce you to scanning tools, walk you through best practices for fortifying against and mitigating against threat, and reporting security issues within your organisation.

Instructor-led online and in-house face-to-face options are available - as part of a wider customised training programme, or as a standalone workshop, on-site at your offices or at one of many flexible meeting spaces in the UK and around the World.

    • Why carry out Penetration testing?
    • What is Ethical Hacking?
    • Pen Testing Fundamentals
    • Recon & Analysis
    • Application Logic
    • Access Handling
    • Input Handling
    • Application Hosting
    • Other security testing disciplines
  • This workshop is aimed at Web Developers, Testers, Software Architects, Development Managers, Technical QA Managers and anyone interested in moving into a cyber security or information security role.

  • There are no pre-requisite skills needed for this training but some experience of software development or scripting in a language such as Java, C#, VB.NET, PHP, JavaScript, or Python would be useful. 

  • This Penetration Testing course is available for private / custom delivery for your team - as an in-house face-to-face workshop at your location of choice, or as online instructor-led training via MS Teams (or your own preferred platform).

    Get in touch to find out how we can deliver tailored training which focuses on your project requirements and learning goals.

  • Web Application Penetration Testing with OWASP 2021

    This is a fundamentals course for those interested in finding out how to start analysing and penetration testing a web application.

    Engagement

    In this section we learn how to ensure that boundaries of the testing are properly organised, permissions are obtained, and the scope of the testing engagement notified.

    Identifying Targets and Users

    How do attackers know who the users of a website are? How easy is it to push the website to disclose sensitive information. In this session we use OSINT (Open Source Intelligence) tooling to attempt to gain an understanding of the public profile of the application and its users.

    Footprint and Discovery

    Before any effective testing can take place it is important to understand the environment the application is hosted on and in. The web application should be analysed to identify structure and content, the results analysed and the application scanned.

    User Controls, Authentication and Session

    After analysing the web application’s login options we will begin to use our toolset to bypass login controls, brute force access and manipulate sessions and cookies.

    Automating Attacks on Databases, Encrypted and Hashed Resources

    Learn how to use tools to crack encrypted and hashed passwords and other secured resources, and find Database vulnerabilities in the application’s data stores.

    Input Validation

    The weakest part of any application is its need to accept data input. We will attempt to identify vulnerabilities in an application by intercepting and manipulating data, using fuzzing techniques and other attempts to identify weaknesses.

    Hosting Vulnerabilities

    In this session we will look to see what the most common vulnerabilities are in hosted environments and how to identify them.

    • OWASP Top Ten 2021 Web Application Security Risks: The specific list of top web application security risks referenced in this course. https://owasp.org/www-project-top-ten/

    • OWASP Application Security Verification Standard (ASVS): A comprehensive list of application security requirements that can be used to establish secure development standards. https://owasp.org/www-project-asvs/

    • OWASP Cheatsheet Series: Provides concise, practical guidance on preventing common web application vulnerabilities through secure coding. https://cheatsheetseries.owasp.org/

Trusted by

OVO Energy company logo IBM company logo V12 Retail Finance company logo Jato Dynamics company logo

Public Courses Dates and Rates

Standard duration: 2 days

Please get in touch for pricing and availability.

Course enquiry

Send us a no-obligation enquiry about this course

Choose how you first heard about Framework Training.

Related courses