British Students Learn About Ethical Hacking

Becoming a Certified Ethical Hacker (CEH) can be a smart career move and can also be incredibly lucrative with average salaries of $90k. Right now, UK students are being actively recruited to help strengthen cyber security  using ethical hacking methods as the skills shortage leaves businesses highly vulnerable to attack.

The South West Cyber Resilience Centre (SWCRC) has announced a partnership with Bristol’s UWE (University of the West of England) to work with students with expertise in ethical hacking and cyber security. 

The SWCRC is a not-for-profit operation led by the police, in partnership with the private sector and academics, and facilitated by Business Resilience International Management (BRIM), which works with the Home Office on preventing cyber crime.

“Our role at the SWCRC is to support smaller businesses and charities to strengthen their cyber resilience and to make this support either free, or very accessible and affordable,” said Mark Moore, director at SWCRC and a serving police superintendent with Devon and Cornwall Police. “One service we’ve been keen to offer is ethical hacking, and working with students means we get the relevant levels of expertise at an affordable cost.
“We pay the students for the levels of work they commit to, and they get to deploy their skills in a business setting, so it’s a win-win for everyone involved.”

Ethical hacking involves the testing of an IT system with the knowledge and permission of its owner so that the strengths and weaknesses of the system are exposed and tested.

  • It involves studying the mindset, tools and techniques of hackers and penetration testers to learn how to identify, triage and correct vulnerabilities in software and computer networks. 
  • Ethical hacking is the process of attempting to penetrate computer systems and networks with the intention of locating weaknesses and vulnerabilities (real and potential) that could be exploited by malicious hackers. Any information uncovered is then used to improve the system’s security and plug loopholes. 

Studying ethical hacking can be useful to employees in a variety of job roles, including network defence, risk management, software developer, quality assurance tester, management and legal. It’s a widely used technique employed by multinational organisations to find the vulnerabilities of their cyber security but it’s harder for small organisations to tap into, due to resource shortages and the costs involved.

A recent survey by SWCRC showed that smaller business owners are wary of committing to cyber security because they fear unexpected costs in upgrading systems and software licenses. Employing SWCRC Student Services means that business owners benefit from impartial advice which they can trust.

Dr Phil Legg, associate professor in cyber security at UWE, said: "At UWE we are keen to support our students through academic study but also more broadly to think about their future employability and skills development.
“Working with the SWCRC has been a perfect opportunity for our students - they get to put their academic skills to the test to help secure industry partners in the region within a supportive environment, to gain the valuable experience that prospective employers will be looking for".

Some things to think about when deciding which ethical cyber hacking course is right for you:  

Don’t go in over your head: Some courses assume a certain level of background knowledge, while others are targeted at complete beginners. Choose a course that’s at the right level for you.

Consider minimum requirements: Bear in mind that you’ll need specific software to follow some courses, so be prepared to gather some resources if needed.

Look for special offers:  Paid courses are often of higher quality, but they can get pricey. However, many companies run special offers so you end up paying very little for a superior-quality course.

Watch out for scammers: Unethical hackers prey on amateurs, so be careful you don’t sign up with unethical hackers who promise to teach you the ropes.

One useful resource to look at when considering ethical hacking training is Comparitech,  a website providing information, tools, reviews and comparisons to help students and potential re-training workers in the US, UK and the rest of the world, with the aim to improve their cyber security and privacy online and potentially get jobs in ethical cyber hacking.

Plymouth Herald:      Cornwall Live:     Daily Advent:    Flipboard:    Infosec Institute:   IT Pro

You Might Also Read: 

How Ethical Hacking Can Improve Your Security Posture:

 

« Nobelium - Long Term Threat Activity
How Does IAM Help In GDPR Compliance? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

JumpCloud

JumpCloud

JumpCloud's Directory-as-a-Service (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need.

Hitachi ID Systems

Hitachi ID Systems

Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.

Agenci

Agenci

Agenci are specialists in cyber security and information security and deliver ISO 27001 Certification.

Leviathan Security Group

Leviathan Security Group

Leviathan provides a broad set of information security services ranging from low-level technical engineering to strategic business consulting.

Uniwan

Uniwan

Uniwan is an IT services company specializing in networking and security.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

BLOCKO

BLOCKO

BLOCKO is a blockchain specialized technology company that has experienced and achieved the largest amount of business in South Korea.

FortifyData

FortifyData

FortifyData is the next generation of cyber risk management–a comprehensive platform that continuously evaluates your third-party, internal and people risks.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.

Infinavate

Infinavate

Infinavate Fort CyberVault offers end-to-end services that comprehensively responds to the organization’s information security and privacy needs.

Multipoint Group

Multipoint Group

Multipoint is an information security and protection solutions company operating in the South EMEA region through value-added distribution channels.

Neosoft

Neosoft

Néosoft is an independent digital transformation consulting group with expertise in Consulting & Agility, Cybersecurity, Data, DevOps, Infrastructure & Cloud and Software Engineering.

View

View

View is the leader in smart building technologies including OT cybersecurity to securely connect buildings to the cloud and manage building networks and OT devices.

Technoware Solutions

Technoware Solutions

Technoware Solutions is a global company committed to helping entities navigate the digital waters of modernizing their system processes in an ever changing cybersecurity landscape.

Axoflow

Axoflow

Axoflow helps organizations to consolidate their existing solutions for logs, metrics, and traces, and evolve them into a cloud native observability infrastructure.