Get hands-on skills in security

Why go with our training?

The cyber security industry is still relatively new and ever-evolving. We believe there is a significant gap between the current offerings and what is required of security professionals.


At Sunred Security, we believe that cyber security educators must be active in the industry to keep up with trends.


The content we offer always has a practical and hands-on spin. Our belief is that training must always be engaging and fun.

Security Operations Course Set

Protection Shield Icon

Incident Responder

Management Icon

Incident Management

meeting icon

Tabletop & Functional Exercices

Threat Management Course Set

Intelligence

Threat Intelligence

coming soon

hacker

Threat Modelling

coming soon

Vigilance

Threat Hunting

coming soon

Security Engineering Course Set

operating

Detection Engineering

coming soon

Automate Icon

SOAR Management

coming soon

Shield with Eye

Purple Teaming

coming soon

Contact us

Our training modules are designed to be run over a single day. Multiple modules can be combined to make up a course set.


Pricing for courses has not been listed because venue hire can fluctuate costs. If you are able to provide a venue so that a course module can be run for your entire team at once then we can discuss further by emailing colby@sunredsecurity.au.

Let's Connect

Email Glyph Icon
LinkedIn Logo 蓝白领英社交媒体

Incident Responder Course Module

Protection Shield Icon

Incident responders are the frontline of cyber security. They are responsible for the alerting, containment and eradication of malicious activity.

The Incident Responder Course Module covers:

  • Introduction to popular IR frameworks (e.g., NIST, ISO 27035)
  • Understanding the incident lifecycle
  • Mapping frameworks to real-world scenarios


  • Techniques for detecting and classifying incidents
  • Developing an incident taxonomy
  • Incident severity levels and prioritisation


  • Strategies for containment without disrupting operations
  • Methods for eradicating threats
  • Coordination with other teams and stakeholders
  • Developing and implementing recovery plans
  • Restoring systems and data integrity
  • Lessons learned and continuous improvement


  • Importance of documentation in incident response
  • Creating incident reports
  • Communicating effectively with stakeholders


  • Practical exercises in incident response
  • Simulated scenarios for skill development
  • Real-world case studies and analysis

Incident Management Course Module

Management Icon

Incident managers learn to take control of a security incident on an organisational strategic level. They are the glue that pulls together multiple teams to communicate and mitigate security incidents.

The Incident Management Course Module covers:

  • Overview of the incident manager's role
  • Exploration of incident management frameworks
  • Mapping frameworks to real-world scenarios


  • Developing leadership skills in incident management
  • Effective communication strategies during incidents
  • Building and maintaining stakeholder relationships


  • Coordinating efforts across different departments
  • Establishing effective teamwork and collaboration
  • Delegating tasks to specialists with actionable results
  • Techniques for quickly assessing incident severity
  • Resource allocation for efficient response
  • Prioritising incidents based on risk


  • Strategies for managing incident resolution
  • Developing recovery plans
  • Conducting post-incident reviews and analysis


  • Practical exercises
  • Simulated scenarios for decision-making
  • Real-world case studies and analysis

Tabletop & Functional Exercises

meeting icon

This course is designed to equip individuals with the knowledge and skills necessary to plan, develop, and manage an effective Test, Training, and Exercise (TT&E) program in the field of cybersecurity.

The Tabletop & Functional Exercises Course Module covers:

  • Overview of the TT&E lifecycle
  • Integration with incident response and risk management
  • Creating a TT&E strategy aligned with organisational goals


  • Crafting realistic and relevant cyber scenarios
  • Incorporating threat intelligence into scenario development
  • Aligning scenarios with organisational risk profiles


  • Developing and delivering cybersecurity training programs
  • Identifying training needs based on roles and responsibilities
  • Leveraging e-learning and other training methodologies


  • Planning and facilitating tabletop exercises
  • Evaluating and documenting tabletop exercise outcomes
  • Incorporating feedback for improvement


  • Designing and executing functional exercises
  • Planning and conducting full-scale cyber exercises
  • Managing logistics and coordination during large-scale exercises


  • Creating and running realistic scenarios
  • Developing metrics for TT&E program evaluation
  • Analysing and documenting outcomes for improvement