2T Security creates and delivers specialist security training for its clients, delivering security information effectively to all
areas of their business. We can reuse our own training materials, or create custom training for clients depending on their needs. This
can range from a single presentation focussing on a key topic, through to a multi-day training course delivering information relating to
Our consultants are experienced in developing and delivering training to both Government and private-sector clients. They have designed
and authored an extensive range of training materials over the past decade. A particular speciality is the creation of threat briefings based
around CESG threat assessments, setting out the context of the threats to the services and systems of our clients.
Extensive experience in writing training materials and designing training courses.
Close working relationship with the NCSC on the assessment of threats.
Our consultants have strong presentation skills.
The following list provides a selection of capabilities indicating the breadth of our services:
Custom threat briefings based upon NCSC Threat Assessments.
Education for crypto custodians on managing keymat for secure systems.
Senior management briefings on internet and malware threats.
Training for staff on good security practice, supporting Security Operating Procedures (SyOPs).
…created the framework for a modular four-week security training course for new graduates at a leading consultancy company,
and then wrote and delivered several of the modules.
…extensively briefed staff and suppliers at several major Government departments on the threat of taking their services on-line,
based on threat intelligence from GCHQ; this briefing received consistently positive feedback from all who attended.
…developed a custom day-long course on security essentials for a Government agency, explaining everything from security principles
to standards and policies, and encryption to malware.
…developed induction training for new staff joining the accreditation team in a Government agency.
…create a hands-on training course for developers to give them a feel for how attackers deploy malware and what they can do
to defend against it, based around a virtual machine environment.