Learning & Development

Keeping you informed, trained and ready to work.

A well-trained and resilient team is invaluable when considering the long-term outcomes of new system rollouts. Our experts possess both advanced technical knowledge and excellent communications skills that enable them to successfully convey highly detailed knowledge to teams of any skill level.

All of our holistic training courses are offered in both face-to-face and e-learning formats.

This course provides participants with a good understanding of the notions of biometric identification and verification. At the end of this session, participants will have a good understanding of the notions of biometric identification and verification and they relate to identity.

Our Biometrics Vulnerability Essentials course provides specialised training on biometric vulnerability assessment and testing. Participants will develop a deeper understanding of the general methods of assessment, testing, and mitigation of security risks specifically for operational biometric systems.

This course is focused on providing participants with the knowledge and practical experience to undertake a statistical analysis of a biometric system, including an understanding of accuracy, performance characteristics, evidential weighting (likelihood ratios) and outlier conditions.

Our Automated Border Control Systems course imbues participants with an understanding of the concept of Automated Border Control (ABC) and outlines the main differences between ABC and manual processes. In addition, this course provides an overview of the process flow, operational requirements and functional requirements of an ABC system.

This course will provide participants with specialised training on biometric vulnerability assessment and testing. Participants will garner a deeper understanding of the general methods of assessment, testing, and mitigation of security risks, specifically for operational face biometric systems.

Our Biometrics Systems Red Teaming course provides participants with a deeper understanding of potential attack vectors including digital image manipulation (morphing), make-up attacks, mask attacks and other known vulnerabilities. This course equips participants withthe ability to systematically consider the processes required to undertake biometric red teaming operations.