CYBER SECURITY SKILLS AND TALENT SOLUTIONS

Size: px
Start display at page:

Download "CYBER SECURITY SKILLS AND TALENT SOLUTIONS"

Transcription

1 CYBER SECURITY TRAINING CYBER SECURITY SKILLS AND TALENT SOLUTIONS Learning Apprenticeships Consulting Higher Education

2 QA are uniquely positioned to help solve your security skills gap. We understand that one of the predominant threats to the way we all do business is Cybercrime. Breaches are exponentially rising year on year leading to an ever increasing Cyber Security threat. In response to this growing threat, QA have developed the most comprehensive, end-to-end, Cyber Security skills and talent solutions, from CyberFirst, Apprenticeship and Higher Education Programmes to Learning Solutions, Certifications and Cyber Security Consultancy. QA are well equipped to help solve the Security skills gap. CYBER.QA.COM

3 QA are helping to solve the Cyber Security skills gap, through award winning programmes, learning solutions and certifications. Learning Consulting CyberACADEMY Apprenticeships Higher Education CYBER.QA.COM

4 Inspiring young Cyberists through the CyberFirst Programme. "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy , HM Government The CyberFirst Programme - a collaboration between NCSC, QA and The Smallpeice Trust - is a pivotal part of the UK Government s National Cyber Security Programme. It aims to give talented young people the support, skills, experience and exposure they need to become the Cyberists of the future. Brought to you by in Association with CYBER.QA.COM/CYBERFIRST

5 The CyberFirst Programme. The CyberFirst Programme aims to give talented young people the support, skills, experience and exposure they need to become the Cyberists of the future. Subjects in the programmes include: QA has successfully designed and delivered a number of engaging and inspiring project-based CyberFirst education programmes for year old school students nationwide. We engage with schools, parents and education and industry partners to demystify technology and Cyber to encourage young people into STEM subjects and Cyberrelated careers and opportunities. QA s CyberFirst events are held residentially at University campuses or on-site at secondary schools. THREATS & THREAT ACTORS TECHNICAL SECURITY NETWORKING & COMMS ENCRYPTION DIGITAL FORENSICS OPEN SOURCE INTELLIGENCE OPERATING SYSTEMS CYBER.QA.COM/CYBERFIRST PROTECTING NETWORKS NETWORK & INTERNET SECURITY PENETRATION TESTING PERSONAL SECURITY

6 Developing cyber talent of the future. The course is aimed at students who have not yet made their GCSE choices, so that they get the opportunity to see how studying Computer Science could potentially augment and enhance their future career prospects. As children s GCSE choices are often made in conjunction with their parents, teachers and career s advisors, the course is designed to involve these adults too, so that they can see the benefit of the children studying Computer Science, as well as how positive a mutual experience it can be too. Inspires and excites pupils about the subject of Cyber Security. It is designed for year old pupils with a demonstrable interest in Computing and provides them with a valuable introduction to all the tools, knowledge and skills Cyberists need to build and protect small networks and personal devices. It complements the GCSE Computing curriculum and takes it a step further, offering practical methods to help protect and secure everyday devices, apps and software. Introduces the more advanced practical features of Cyber Security. It is designed for year old pupils who are familiar with Computing and Programming and are planning to take relevant A-Levels. The course deals with the Cyber Security concerns of businesses and large networks. Builds upon the content of the Computer Science A-Level and will inspire students with an interest in Computing and Cyber Security. On this course, students will be fully immersed in the Cyber Security subject areas which will help them to form their education and career path. How to Take Part We are always looking for passionate Cyber Security enthusiasts to help us inspire the next generation of Cyberists. The available roles include: Technical Facilitators If you are a current Computing or Cyber Security student or a recent graduate, we have exciting paid work experience. Cyber Security Trainers If you have experience teaching technical subjects to young people we d love to talk to you about a wide range of opportunities. Guest Speakers If you are an industry or academic expert we d like to invite you to share your personal, professional and educational experiences to inspire young people by talking about relevant areas of interest and demonstrating the roles and career opportunities which are available in the exciting field of Cyber Security. If you are interested in supporting any of these events, or have any questions about CyberFirst please cfsupport@qa.com or call us on and one of the CyberFirst team members will be able to assist. CYBER.QA.COM/CYBERFIRST

7 Cyber Apprenticeship Programmes. Our Cyber Apprenticeship Programmes are arming UK organisations with the defenders of the future. QA designed and delivered the first Cyber Security Apprenticeship programme in the UK, working initially with a single Public Sector client and then extending this work to run open programmes for clients including CGI, Atos, Civil Service Departments and the National Grid. CYBER.QA.COM/CYBER-APPRENTICES After spending a number of weeks learning the theory behind networks, malware and attack vectors, I was then able to try my hand at successfully launching a malware attack against a test machine and gained control of it Elliot, DVLA Cyber Apprentice

8 Our Cyber Apprenticeship Programme. Programme units, structured around knowledge modules, projects, summative portfolios and interviews cover a number of fundamental Cyber Security principles, including: Our Cyber Security Level 4 Apprenticeship combines high-quality classroom training with online learning, face-to-face coaching and onthe-job experience, to develop real world skills in information security. SETTING UP, CONFIGURING AND SECURING NETWORKS UNDERSTANDING CYBER THREATS OPEN SOURCE INTELLIGENCE AND SECURITY OPERATIONS Our programme provides apprentices with the qualifications, skills and technical grounding needed to thwart cybercrime, decrypt data and tackle malware. Over the last 5 years, QA has delivered our programme to over 250 Cyber Apprentices. This provision is expanding rapidly, particularly through QA s work with Critical National Infrastructure companies, in partnership with DCMS. These apprentices are initially working towards a Level 4 qualification and it is expected that a high proportion will progress on to a Degree Apprenticeship after completion of their current programme. UNDERSTANDING CRYPTOGRAPHY AND ITS APPLICATION WITHIN BUSINESS SIMULATED ATTACK AND DEFENCE IN THE QA CYBER LABS ETHICAL HACKING CYBER.QA.COM/CYBER-APPRENTICES DEVELOPING PENETRATION TESTING SKILLS AND EFFECTIVE INCIDENT RESPONSE

9 Professional Cyber Security training for every role. "Learning new Cyber Security skills is not just for specialist IT Technologists. Every single employee has their part to play in countering the threat." Richard Beck, Director of Cyber, QA Ltd QA have over 75 public Cyber courses, channelled through our 10 Cyber domains. We offer Cyber Certifications, Cyber Assurance and Cyber Defence training for the whole organisation. In a supportive, hands-on learning environment, our public, private and bespoke training courses meet the needs of individuals, employers and enterprise. Our courses are for all verticals and audiences including: Staff of all levels Information Security Practitioners Project Managers Software Developers and Test Teams Law Enforcement and Civil Service Network and Infrastructure Specialists Cyber Security Professionals. CYBER.QA.COM/CYBER-COURSES

10 OUR CYBER DOMAINS The most comprehensive, end-to-end Cyber Security training portfolio Cyber Certifications Cyber Incident Response Cyber Awareness Cyber Secure Developer HMG Information Assurance Cyber Intelligence Cyber Compliance Digital Forensics Cyber Security Operations Cyber Offensive Defence Cyber Simulation Events hosted in our Cyber Labs

11 Fully immersive learning in our state-of the-art Cyber Labs. QA s state-of-the-art Cyber Labs enable teams to learn in a way that no other training does. Providing something you just can t get isolated in an online lab - we create an environment to enable genuine teamwork and collaboration skills under pressure, a vital success criteria for any cyber team! OSINT INVESTIGATIONS Understand how to conduct digital investigations relating to malicious activity Learn how to accurately collect and analyse evidence Gather Social Media intelligence on Digital Treasure Hunts Conduct investigations online and across multiple devices. CYBER CRISIS MANAGEMENT Rehearse incident response techniques Learn to lead and communicate in a Cyber crisis Simulate press and media liaison exercises Practice effective inter-department communications Rehearse industry specific scenarios. CYBER.QA.COM/CYBER-LAB PROACTIVE SECURITY Immerse yourself in a full 'hands-on' simulated attack Secure development challenges for application developers Learn to 'detect, deter and defend' Cyber attacks with hands-on labs Understand and practice effective security incident triage. OFFENSIVE DEFENCE Learn how to develop a defensive shield Cyber Defender skills for your industry - from beginner to advanced Hands-on Cyber trade craft tools & techniques to identify vulnerabilities Develop proactive Cyber defence skills.

12 QA s Cyber Labs are state-of-the art facilities that provide an ideal opportunity for practical hands-on training. Our Cyber Challenge events help harness the talent within teams enabling them to solve the challenges before they have to do it for real. The labs allow organisations to simulate and react to real life Cyber threats in a safe environment. The Cyber Labs enable teams to develop and practice a variety of Cyber Defender events.

13 "Developing talent is the single most important thing an organisation can do to protect its future." Richard Beck, Director of Cyber, QA Ltd Attract, develop and deploy your Cyber Security talent through the QA Cyber Academy. QA offer a unique Cyber Security talent development solution. Built from a foundation of critical skills the QA Cyber Academy offers organisations a real effective method to train to become a Cyber Professional. Tailored to the needs of individual organisations, and aligned to their business objectives, Cyber Academy pathways ensure delivery of grounded Cyber Security professionals for now and the future. CYBER.QA.COM/CYBER-ACADEMY

14 How can we help? By providing organisations with scalable solutions, QA Cyber Academy hosts specific programmes and pathways dedicated to individual organisational needs to help future proof your talent. CYBER.QA.COM/CYBER-ACADEMY CyberACADEMY CYBER SCHOOL CyberACADEMY Attract, select and train your own Cyber professionals with your bespoke Cyber School programme to produce the skills your business requires. Unique multi-entry point hands-on Cyber Analyst pathways delivering practical skills to your team, to ensure you optimise your triage and incident response processes and develop Cyber adversary behaviours to enhance your offensive defence capability. CyberACADEMY CYBER GRADUATE PROGRAMMES Bespoke programmes to fast track your Graduates to embed them in your business a blend of Cyber technical skills and business soft skills to increase their productivity and understanding of your business.

15 "Cyber Security is a never-ending game; it s about finding something new and working with it. Having a Masters degree can help you through all of these challenges in a systematic and methodical way." Stephen Sampana, MSc Cyber Security (Part-Time) Stand out and further your education in Cyber Security. QA Higher Education partners with Northumbria University to deliver a Cyber Security Masters programme that is designed to give students the specialist skills required to meet the increased demand and continue the fight against cybercrime. Students will develop the key skills that are required to handle security incidents, alongside the ability to identify new and existing threats, and learn the methods by which to reduce them. CYBER.QA.COM/HIGHER-EDUCATION

16 Meet the demand for skilled Cyber Security professionals. You can choose to study your Cyber Security Masters with us in the following modes: Part-time: Taught over 15 weekends in a 2 year period, minimising the impact on your current work schedule. Full-time: A 1 year programme where you will have classes on campus across 2 or 3 days a week. The MSc Cyber Security is delivered at the Northumbria University London Campus, near Liverpool Street station, and covers the following: ETHICAL HACKING NETWORK SECURITY Full-time with Advanced Practice: A month Masters programme with the inclusion of a week credit-bearing research project or internship, allowing you to put your learning into practice. This programme is one of a range of Masters degrees delivered at the Northumbria University London Campus in partnership with QA Higher Education. All of the programmes at the London Campus are validated by the University and taught by QA Higher Education and University staff. WIRELESS NETWORKS AND SECURITY CYBER.QA.COM/HIGHER-EDUCATION INFORMATION ASSURANCE AND RISK MANAGEMENT INFORMATION GOVERNANCE AND SECURITY

17 QA Cyber Consultants. Consulting for Cyber Security. QA Consulting has been providing enterprise solutions, consulting and managed services, for leading Commercial and Public Sector organisations for over 15 years. CYBER.QA.COM/CYBER-CONSULTANTS "Your organisation simply may not be able to find enough qualified people to help drive a successful Cyber Security and privacy programme" PWC

18 QA Cyber Consultants. For project-based or permanent deployment. Our Cyber Security speciality is: INCIDENT RESPONSE QA Consulting provides Cyber Security Services through our four Engagement Models: VULNERABILITY ASSESSMENTS INFRASTRUCTURE SECURITY Enable Time and materials delivery model designed to recruit, train, deploy, and transfer specialist graduate consultants trained in Cyber capabilities that are in high demand and low supply. Structured Teams Leverage the expertise of our senior consultants alongside the flexibility of our Enable model. Consult Our Consulting Team can provide you with Delivery and Advisory services to help fasttrack the implementation of your Cyber technology transformation projects. Accelerate One off end-to-end hiring model designed in collaboration with you to rapidly scale your Cyber capability. Full training and on-boarding of talented Cyber graduate consultants. INFORMATION SECURITY SECURITY MONITORING AND OPERATIONS SECURITY COMPLIANCE, ASSURANCE AND GOVERNANCE SECURITY TESTING CYBER.QA.COM/CYBER-CONSULTANTS

19 Meet some of the QA Cyber Experts Paul Fennell Mark Haringman Mike Hopkins Ryan Ackroyd James Aguilan Mark Amory Mark Hutchings Dr Darryl Macgregor Mark Martin Stuart Paintain Graeme Batsman Richard Beck Spencer Collins Guy Davis King Samuel Brad Stone Richard Westwood For more information on our Cyber experts, visit: Rob Edwards David Etherington Shaun Ferris CYBER.QA.COM/EXPERTS

20 Discuss your Cyber Security needs with one of our Learning Advisors or drop in to one of our national training centres.

21 To talk to us about your Cyber Security training needs and talent solutions: For a list of our latest courses please visit CYBER.QA.COM Search #SkillsfortheDigitalAge QA-ltd QALtd QALtd QAtraining QALearning 2.2 Published September 2018

Cyber Security School

Cyber Security School Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy 2016-2021, HM Government

More information

CYBER SECURITY TRAINING

CYBER SECURITY TRAINING CYBER Security skills for the digital age. Cyber Crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat.

More information

Cyber Analyst Academy. Closing the Cyber Security Skills Gap.

Cyber Analyst Academy. Closing the Cyber Security Skills Gap. Cyber Analyst Academy Closing the Cyber Security Skills Gap. Why do the Cyber Analyst Academy? Why QA? There is a huge gap in the market for this skills set and QA are excited to deliver a new hands-on

More information

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we

More information

DIGITAL APPRENTICESHIPS

DIGITAL APPRENTICESHIPS DIGITAL Networking, Infrastructure Technician, Unified Communication Technician and Software & Web Development Technician - Advanced and Higher Apprenticeships WHY CHOOSE US? OVERVIEW OF PROGRAMMES ESTABLISHED

More information

School of Engineering & Built Environment

School of Engineering & Built Environment School of Engineering & Built Environment BEng (Hons) in Digital Security, Forensics & Ethical Hacking Programme Specification Proforma (PSP) August 2015 P a g e 1 GLASGOW CALEDONIAN UNIVERSITY Programme

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER

Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER Apprenticeships CYBER SECURITY ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED SECURITY ENGINEER WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we

More information

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level

More information

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable

More information

Information Technology

Information Technology Information Technology 2017-2018 Well connected. Right here 2 Contents weltec.ac.nz/it Introductory NZ Certificate in Information Technology Essentials 6 NZ Diploma in Information Technology (Technical

More information

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are:

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are: Qualification Title: OCR Level 3 Cambridge Technical Diploma in IT Qualification Number: 601/7101/7 Overview This qualification is designed for you if you re 16 years old or over and prefer to study IT

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

IT Systems and Networking Degree Apprenticeship

IT Systems and Networking Degree Apprenticeship IT Systems and Networking Degree Apprenticeship THE ROAD TO BECOMING A HIGHLY-SKILLED GRADUATE IT ENGINEER Apprenticeships Content Programme Overview... Mandatory Units Part 1... Optional Units Part 1...

More information

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science School of Electrical Engineering and Computer Science Programme Specification Faculty of Engineering and Informatics Programme title: BSc (Hons) Computer Science for Business Academic Year: 2017/18 Degree

More information

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission

CATALOG 2017/2018 BINUS UNIVERSITY. Cyber Security. Introduction. Vision. Mission Cyber Security Introduction Cyber attack is raising and threaten ubiquitous world on internet today. Industry and government need cyber security expert to counter and defend from this threaten. Cyber Security

More information

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent Keeping Your SOCs Full May 26, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical

More information

STUDENT AND ACADEMIC SERVICES

STUDENT AND ACADEMIC SERVICES PROGRAMME SPECIFICATION Part 1: Information Awarding Institution Teaching Institution Delivery Location Study abroad / Exchange / Credit recognition Faculty responsible for programme Department responsible

More information

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill

More information

MSc Computing and Technology (Part-Time)

MSc Computing and Technology (Part-Time) MSc Computing and Technology (Part-Time) Campus: London Level of study: Postgraduate Tuition fee: 7,650 (UK/EU) Entry requirements: 2:2 (second class) honours degree or equivalent in any discipline English

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

Implementation Strategy for Cybersecurity Workshop ITU 2016

Implementation Strategy for Cybersecurity Workshop ITU 2016 Implementation Strategy for Cybersecurity Workshop ITU 2016 Council for Scientific and Industrial Research Joey Jansen van Vuuren Intricacies and interdependencies cyber policies must address potential

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Apprenticeships IT SYSTEMS AND NETWORKING ADVANCED TO HIGHER APPRENTICESHIP FROM GCSE-LEVEL TO FULLY-SKILLED IT ENGINEER

Apprenticeships IT SYSTEMS AND NETWORKING ADVANCED TO HIGHER APPRENTICESHIP FROM GCSE-LEVEL TO FULLY-SKILLED IT ENGINEER Apprenticeships IT SYSTEMS AND NETWORKING ADVANCED TO HIGHER APPRENTICESHIP FROM GCSE-LEVEL TO FULLY-SKILLED IT ENGINEER WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think

More information

Security Awareness Training Courses

Security Awareness Training Courses Security Awareness Training Courses Trusted Advisor for All Your Information Security Needs ZERODAYLAB Security Awareness Training Courses 75% of large organisations were subject to a staff-related security

More information

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Strengthening Capacity in Cyber Talent sans.org/cybertalent SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

Faculty of Computing, Engineering and Science

Faculty of Computing, Engineering and Science Faculty of Computing, Engineering and Science Sera Evans, Head of UK Student Recruitment Eric Llewellyn, Deputy Head of Computing and Maths Faculty of Computing, Engineering and Science 3 academic schools

More information

BCS Level 4 Certificate in Cyber Security Introduction Syllabus QAN 603/0830/8

BCS Level 4 Certificate in Cyber Security Introduction Syllabus QAN 603/0830/8 in Cyber Security Introduction Syllabus QAN 603/0830/8 Version 1.2 November 2016 This is a United Kingdom government regulated qualification which is administered and approved by one or more of the following:

More information

Bachelor of Information Technology

Bachelor of Information Technology Higher Education Northern Sydney Institute Bachelor of Information Technology [ Network security ] www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security ] Cybercrime

More information

CCNA Cybersecurity Operations. Program Overview

CCNA Cybersecurity Operations. Program Overview Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System

More information

Challenges and games to inspire the next generation of cyber security professionals

Challenges and games to inspire the next generation of cyber security professionals Challenges and games to inspire the next generation of cyber security professionals What is CyberStart? CyberStart: a suite of challenges, tools and games designed to introduce children and young adults

More information

The UK s National Cyber Security Strategy

The UK s National Cyber Security Strategy The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

Secure Systems Administration and Engineering

Secure Systems Administration and Engineering Secure Systems Administration and Engineering Program Information The job outlook for careers in Cybersecurity and Information Technology continues to be very strong. Many experts predict a continued shortage

More information

A BRIGHTER FUTURE FOR DIGITAL IT APPRENTICESHIPS. Apprenticeship End-Point-Assessment for Employers

A BRIGHTER FUTURE FOR DIGITAL IT APPRENTICESHIPS. Apprenticeship End-Point-Assessment for Employers A BRIGHTER FUTURE FOR DIGITAL IT APPRENTICESHIPS An End Point Assessment guide written for employers for the Digital IT Apprenticeship Standards Apprenticeship End-Point-Assessment for Employers We are

More information

TQUK Level 3 Diploma in Design Engineer Construct! The Digital Built Environment (RQF) Purpose Statement Qualification Number: 603/1993/8

TQUK Level 3 Diploma in Design Engineer Construct! The Digital Built Environment (RQF) Purpose Statement Qualification Number: 603/1993/8 TQUK Level 3 Diploma in Design Engineer Construct! The Digital Built Environment (RQF) Purpose Statement Qualification Number: 603/1993/8 Qualification Purpose Statement Qualification Regulation Details

More information

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

MSc Cyber Security. International Students Can Apply

MSc Cyber Security. International Students Can Apply MSc Cyber Security International Students Can Apply UCAS Code: Course Length: P052286 12-18 Months Full-Time, 2-3 Years Part-Time Start Dates: September 2019, January 2020, Department: Location: September

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

Start with every Pearson option in one go and choose your path to success

Start with every Pearson option in one go and choose your path to success Start with every Pearson option in one go and choose your path to success Key Stage 4 Year 10 & 11 ages 14-16 mostly at grades D-G mostly at grades A*-C BTEC L1 with Traineeship BTEC L1 BTEC First Apprenticeship

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

Current skills gap for capable CTI analysts: Training for forensics & analysis

Current skills gap for capable CTI analysts: Training for forensics & analysis Current skills gap for capable CTI analysts: Training for forensics & analysis WORKSHOP CTI EU Bonding EU Cyber Threat Intelligence 30-31 October, Link Campus University, Rome, Italy Ing. Selene Giupponi

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

MSc Digital Marketing

MSc Digital Marketing MSc Digital Marketing Become a Certified Digital Marketing Master 2 YEARS PART-TIME STUDY ONLINE www.springhouse.com 610-321-3500 info@springhouse.com Validated by the Industry Advisory Council. Including

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Security Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

FULL STACK FLEX PROGRAM

FULL STACK FLEX PROGRAM THE CODING BOOT CAMP AT UNC CHARLOTTE OVERVIEW: FULL STACK FLEX PROGRAM Prepare for a career as an end-to-end web developer at The Coding Boot Camp at UNC Charlotte. Our Full Stack Flex course gives you

More information

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans. Building new cybersecurity pipelines NICE Conference 2017 November 8, 2017 Strengthening Cyber Workforce Development sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory

More information

Computer Information Science xxx

Computer Information Science xxx 1 xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World CYBER CAMPUS THE CYBER SCHOOL FOR THE REAL WORLD. KPMG BUSINESS SCHOOL The Business School for the Real World In the real world, cyber security applies to all: large firms and small companies, tech experts,

More information

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB

Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB Awareness and training programs OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB 2 OPTUS MACQUARIE UNIVERSITY CYBER SECURITY HUB In today s digital world, safeguarding data, intellectual property, financial

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot STANDING COMMITTEES A 1 Academic and Student Affairs Committee Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot INFORMATION This item is for information only. BACKGROUND To help

More information

Foundation Learning as a progression route to. Apprenticeships. The Toolkit

Foundation Learning as a progression route to. Apprenticeships. The Toolkit Foundation Learning as a progression route to Apprenticeships The Toolkit Introduction Although Middlesbrough has a higher than average take up on Apprenticeship programmes, a significant number of 16

More information

(FHEQ) level 6] 3 years full-time; 4 years full-time including a year of study abroad and/or work placement. I301 (4-years) Computing, Engineering

(FHEQ) level 6] 3 years full-time; 4 years full-time including a year of study abroad and/or work placement. I301 (4-years) Computing, Engineering Faculty of Engineering and Informatics Programme Specification Programme title: BEng (Hons) Software Engineering Academic Year: 2018/19 Degree Awarding Body: Partner(s), delivery organisation or support

More information

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning.

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning. AIPM Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO The Leading Standard and Certification for PMO Professionals Today Understand the Value of High-Performing

More information

UNDERGRADUATE PROGRAMME SPECIFICATION

UNDERGRADUATE PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: BSc (Hons) Computer Networks (progression award) Staffordshire University Faculty of Computing,

More information

Electronic warfare, information and cyber

Electronic warfare, information and cyber Electronic warfare, information and cyber 2018-2019 Symposia Symposia at Shrivenham provides a forum to Government agencies, military and civilian, industry and research establishments for the exploration

More information

Case Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform

Case Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform Summary For the University of Aberdeen, protecting IT infrastructure serving

More information

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 EC-Council Certified Incident Handler v2 Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1 THE CRITICAL NATURE OF INCIDENT HANDLING READINESS An organized and

More information

SECURITY TRAINING SECURITY TRAINING

SECURITY TRAINING SECURITY TRAINING SECURITY TRAINING SECURITY TRAINING Addressing software security effectively means applying a framework of focused activities throughout the software lifecycle in addition to implementing sundry security

More information

SCHEDULE OF COURSES FOR THE YEAR 2018

SCHEDULE OF COURSES FOR THE YEAR 2018 SCHEDULE OF COURSES FOR THE YEAR 2018 It s not just about training your workforce. It s about progress. Our training is guaranteed to helps your business move forward with the right technology and the

More information

A Comparative Study of Teaching Forensics at a University Degree Level

A Comparative Study of Teaching Forensics at a University Degree Level A Comparative Study of Teaching Forensics at a University Degree Level Martin Mink University of Mannheim, Germany IMF 2006, Stuttgart October 19 Joint Work Laboratory for Dependable Distributed Systems

More information

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience

More information

MSc Digital Marketing

MSc Digital Marketing MSc Digital Marketing Become a 2 YEARS PART-TIME Digital Marketing Master STUDY ONLINE www.imarcomms.com Validated by the Industry Advisory Council. Including members from Content MSc Digital Marketing

More information

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science. Academic Year: 2017/18

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science. Academic Year: 2017/18 School of Electrical Engineering and Computer Science Programme Specification Faculty of Engineering and Informatics Programme title: BSc (Hons) Computer Science Academic Year: 2017/18 Degree Awarding

More information

Qualification Specification. Higher Apprenticeship in Business & Professional Administration Level 4 (England)

Qualification Specification. Higher Apprenticeship in Business & Professional Administration Level 4 (England) Qualification Specification Higher Apprenticeship in Business & Professional Administration Level 4 (England) Version 3.0 (October 2017) Qualification Specification: Business Administration: Higher Apprenticeship

More information

Challenges and games to inspire the next generation of cyber security professionals

Challenges and games to inspire the next generation of cyber security professionals Challenges and games to inspire the next generation of cyber security professionals What is CyberStart? CyberStart: a suite of challenges, tools and games designed to introduce young people to the field

More information

Programme Specification

Programme Specification Programme Specification DTS-CSA-2017: Digital and Technology Solutions (Cyber Security Analyst) LU Bachelor of Science (Honours) awarded by Lancaster University (FHEQ Level 6) Status: Approved Version:

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year

More information

All LJMU programmes are delivered and assessed in English

All LJMU programmes are delivered and assessed in English PROGRAMME SPECIFICATION Master of Science in Computer Forensics Awarding institution Teaching institution JACS Code Programme Duration Language of Programme Subject benchmark statement Programme accredited

More information

Assessment for all units is ongoing and continuous consisting of tests, assignments and reports. Most units have a final two-hour examination.

Assessment for all units is ongoing and continuous consisting of tests, assignments and reports. Most units have a final two-hour examination. Diploma of Computing Course Outline (T3, 2017) Campus Intake CRICOS Course Duration Teaching Methods Assessment Course Structure Units Melbourne Burwood Campus / Jakarta Campus, Indonesia March, June,

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

School of Engineering & Built Environment

School of Engineering & Built Environment School of Engineering & Built Environment BSc (Hons) in Cyber Security and Networks Programme Specification Proforma (PSP) 2015/2016 Programme Specification Document 2015/2016 BSc (Hons) in Cyber Security

More information

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec. National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity

More information

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents Services to Help You Prepare for and Quickly Respond to Security Incidents The Challenge The threat landscape is always evolving and adversaries are getting harder to detect; and with that, cyber risk

More information

to Enhance Your Cyber Security Needs

to Enhance Your Cyber Security Needs Our Service to Enhance Your Cyber Security Needs Since the business critical systems by its nature are ON all of the time and the increasingly connected world makes you open your organization to everything

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

160 DEPARTMENT OF COMPUTING

160 DEPARTMENT OF COMPUTING 160 DEPARTMENT OF COMPUTING 161 DEPARTMENT OF COMPUTING With over 90,000 people employed in ICT, Ireland is currently the world s largest exporter of computer software with unparalleled employment prospects

More information

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established PERSON SPECIFICATION Area: Crime and Intelligence Directorate Job Title: Cyber PROTECT Officer Weekly Hours: Section: CAID Scale: Grade 6 Version: 1.2 Post No: GI080 Status: Established Version Date: 37

More information

DIGITAL TRUST Making digital work by making digital secure

DIGITAL TRUST Making digital work by making digital secure Making digital work by making digital secure MARKET DRIVERS AND CHALLENGES THE ROLE OF IT SECURITY IN THE DIGITAL AGE 2 In today s digital age we see the impact of poor security controls everywhere. Bots

More information

A BRIGHTER FUTURE FOR DIGITAL IT APPRENTICESHIPS. Apprenticeship End-Point-Assessment for Training Providers

A BRIGHTER FUTURE FOR DIGITAL IT APPRENTICESHIPS. Apprenticeship End-Point-Assessment for Training Providers A BRIGHTER FUTURE FOR DIGITAL IT APPRENTICESHIPS An end point assessment guide for training providers on the Digital IT Standards Apprenticeship End-Point-Assessment for Training Providers We are BCS

More information

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning.

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning. AIPMO Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO Learning The Leading Standard and Certification for People Working in PMO Today Understand the Value of

More information

Apprenticeships IT SYSTEMS AND NETWORKING ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED IT ENGINEER

Apprenticeships IT SYSTEMS AND NETWORKING ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED IT ENGINEER Apprenticeships IT SYSTEMS AND NETWORKING ADVANCED TO TECHNICAL MODERN APPRENTICESHIP FROM NQ-LEVEL TO SKILLED IT ENGINEER WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think

More information

Eight units must be completed and passed to be awarded the Diploma.

Eight units must be completed and passed to be awarded the Diploma. Diploma of Computing Course Outline Campus Intake CRICOS Course Duration Teaching Methods Assessment Course Structure Units Melbourne Burwood Campus / Jakarta Campus, Indonesia March, June, October 022638B

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020. PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting

More information

Are we breached? Deloitte's Cyber Threat Hunting

Are we breached? Deloitte's Cyber Threat Hunting Are we breached? Deloitte's Cyber Threat Hunting Brochure / report title goes here Section title goes here Have we been breached? Are we exposed? How do we proactively detect an attack and minimize the

More information

Programme Specification

Programme Specification Programme Specification BSc Honours Forensic Computing 1. Awarding institution Middlesex University 2. Teaching institution Middlesex University 3. Programme accredited by 4. Final qualification BSc Honours

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

Diploma Of Computing

Diploma Of Computing Diploma Of Computing Course Outline Campus Intake CRICOS Course Duration Teaching Methods Assessment Course Structure Units Melbourne Burwood Campus / Jakarta Campus, Indonesia March, June, October 022638B

More information

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements UK Permanent Salary Index ember 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

FULL STACK FLEX PROGRAM

FULL STACK FLEX PROGRAM UNIVERSITY OF WASHINGTON CODING BOOT CAMP FULL STACK FLEX PROGRAM CURRICULUM OVERVIEW The digital revolution has transformed virtually every area of human activity and you can be part of it as a web development

More information