British Students Learn About Ethical Hacking

Becoming a Certified Ethical Hacker (CEH) can be a smart career move and can also be incredibly lucrative with average salaries of $90k. Right now, UK students are being actively recruited to help strengthen cyber security  using ethical hacking methods as the skills shortage leaves businesses highly vulnerable to attack.

The South West Cyber Resilience Centre (SWCRC) has announced a partnership with Bristol’s UWE (University of the West of England) to work with students with expertise in ethical hacking and cyber security. 

The SWCRC is a not-for-profit operation led by the police, in partnership with the private sector and academics, and facilitated by Business Resilience International Management (BRIM), which works with the Home Office on preventing cyber crime.

“Our role at the SWCRC is to support smaller businesses and charities to strengthen their cyber resilience and to make this support either free, or very accessible and affordable,” said Mark Moore, director at SWCRC and a serving police superintendent with Devon and Cornwall Police. “One service we’ve been keen to offer is ethical hacking, and working with students means we get the relevant levels of expertise at an affordable cost.
“We pay the students for the levels of work they commit to, and they get to deploy their skills in a business setting, so it’s a win-win for everyone involved.”

Ethical hacking involves the testing of an IT system with the knowledge and permission of its owner so that the strengths and weaknesses of the system are exposed and tested.

  • It involves studying the mindset, tools and techniques of hackers and penetration testers to learn how to identify, triage and correct vulnerabilities in software and computer networks. 
  • Ethical hacking is the process of attempting to penetrate computer systems and networks with the intention of locating weaknesses and vulnerabilities (real and potential) that could be exploited by malicious hackers. Any information uncovered is then used to improve the system’s security and plug loopholes. 

Studying ethical hacking can be useful to employees in a variety of job roles, including network defence, risk management, software developer, quality assurance tester, management and legal. It’s a widely used technique employed by multinational organisations to find the vulnerabilities of their cyber security but it’s harder for small organisations to tap into, due to resource shortages and the costs involved.

A recent survey by SWCRC showed that smaller business owners are wary of committing to cyber security because they fear unexpected costs in upgrading systems and software licenses. Employing SWCRC Student Services means that business owners benefit from impartial advice which they can trust.

Dr Phil Legg, associate professor in cyber security at UWE, said: "At UWE we are keen to support our students through academic study but also more broadly to think about their future employability and skills development.
“Working with the SWCRC has been a perfect opportunity for our students - they get to put their academic skills to the test to help secure industry partners in the region within a supportive environment, to gain the valuable experience that prospective employers will be looking for".

Some things to think about when deciding which ethical cyber hacking course is right for you:  

Don’t go in over your head: Some courses assume a certain level of background knowledge, while others are targeted at complete beginners. Choose a course that’s at the right level for you.

Consider minimum requirements: Bear in mind that you’ll need specific software to follow some courses, so be prepared to gather some resources if needed.

Look for special offers:  Paid courses are often of higher quality, but they can get pricey. However, many companies run special offers so you end up paying very little for a superior-quality course.

Watch out for scammers: Unethical hackers prey on amateurs, so be careful you don’t sign up with unethical hackers who promise to teach you the ropes.

One useful resource to look at when considering ethical hacking training is Comparitech,  a website providing information, tools, reviews and comparisons to help students and potential re-training workers in the US, UK and the rest of the world, with the aim to improve their cyber security and privacy online and potentially get jobs in ethical cyber hacking.

Plymouth Herald:      Cornwall Live:     Daily Advent:    Flipboard:    Infosec Institute:   IT Pro

You Might Also Read: 

How Ethical Hacking Can Improve Your Security Posture:

 

« Nobelium - Long Term Threat Activity
How Does IAM Help In GDPR Compliance? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

Inspired eLearning

Inspired eLearning

Inspired eLearning deliver solutions that help clients nurture and enhance workforce skills, protect themselves against cyberattacks and regulatory violations.

Mitchell Sandham

Mitchell Sandham

Mitchell Sandham is an, independent insurance and financial services brokerage. Business products include Cyber/Privacy Liability insurance.

DCX Technology

DCX Technology

Recognized as a leader in security services, DXC Technology help clients prevent potential attack pathways, reduce cyber risk and improve threat detection and incident response.

LevelOps

LevelOps

LevelOps is an industry application security platform that tracks and develops your application security.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

QuantiCor Security

QuantiCor Security

QuantiCor Security is one of the world’s leading developers and manufacturers of quantum computer resistant security solutions for IT infrastructures and the Internet of Things (IoT).

AutoSec

AutoSec

AutoSec supports the FFI program Electronics, Software and Communication by dissemination and exploitation of the results of projects related to automotive cybersecurity.

Unciphered

Unciphered

Unciphered was created as the first company providing services for opening locked hardware cryptocurrency wallets.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

Amyna Systems

Amyna Systems

Amyna has developed an IoT cybersecurity platform that prevents malignant attacks, helping users to protect themselves from cyberattacks.