Boot Camp Lessons In Cyber Security

Northumbria University has teamed up with two leading cyber security organisations to run a boot camp training event for computer science teachers and academics. The two-day ‘Certified Ethical Hacker’ course will teach attendees how to test for weaknesses in online security systems which could be exploited by malicious hackers.

The aim is to ensure teachers at schools, colleges and universities in the UK have the very latest cyber security skills, and can pass these onto their students.

The course is being organised by the International Council of Electronic Commerce Consultants (EC-Council) and the cyber security educators’ community organisation CISSE UK, in partnership with Northumbria University. It will take place at Northumbria’s award-winning Computer and Information Sciences building this weekend.

Northumbria has a strong reputation in the field of cyber security and is an academic partner of the EC-Council, as well as an accredited examination centre for the Certified Ethical Hacker assessment – an internationally recognised qualification.

All final year students on Northumbria’s Computer Networks and Cyber Security BSc (Hons) degree are given the opportunity to undertake the Certified Ethical Hacker exam, receiving a separate qualification from the EC-Council alongside their degree if successful.

Dr Neil Eliot is a Senior Lecturer within Northumbria’s Department of Computer and Information Sciences and has coordinated the University’s partnership with CISSE and the EC-Council which led to this weekend’s boot camp event.

A certified ethical hacker since 2014, Neil believes giving teachers the latest cyber security skills is essential to ensuring students have the skills needed to stay safe in an increasingly digital world.

He said: “So much of our lives are conducted online these days, and while this is often more convenient it also means our personal information is at risk from hackers.

“It is vital that we teach young people about the risks of sharing information online, how to spot a potential threat and what to do if they suspect they are being targeted.

“The best time to do this is while they are studying at school, college or university, before they enter the world of employment, but this means ensuring their teachers are up-to-date with the latest cyber security developments.

“We are delighted to be hosting this first Certified Ethical Hacker boot camp at Northumbria University and hope this is the first of many such events we can offer to educators across the North East and beyond.”

Philip Blake, EC-Council Regional Director (Europe), said: “EC-Council's Academia division strongly believes in supporting faculty, students, and Cybersecurity ecosystems across the world.

“Groups such as CISSE, in partnership with higher education, industry, and government have also been instrumental in influencing Cybersecurity program expansion and development.

Find out more about Northumbria University’s Department of Computer and Information Sciences, CISSE UK, and the EC-Council.

Northunbria University:

 

« Business Must Avoid Cyber Complacency
The US & Britain Edge Closer To An Agreement On Huawei »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Government Communications Headquarters (GCHQ)

Government Communications Headquarters (GCHQ)

GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.

Code Dx

Code Dx

Code Dx is a software application vulnerability correlation and management system.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

Saviynt

Saviynt

Saviynt is a leading provider of Cloud Security and Identity Governance solutions.

SecureNinja

SecureNinja

SecureNinja provides professional training, certifications & professional services related to all facets of Information Technology and Cyber Security.

Cybersecurity Professionals

Cybersecurity Professionals

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

Beyond Encryption

Beyond Encryption

Mailock by Beyond Encryption is a secure email solution that allows businesses to exchange email securely, safe in the knowledge that their email can only be read by their intended recipient.

Melius Cyber Security

Melius Cyber Security

Melius Cyber Security has developed a world-leading SaaS platform, Cyber Safe Plus, built around continuous assessment and improvement through vulnerability scanning and penetration testing

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

Think|Stack

Think|Stack

Think|Stack is a managed IT services company specializing in cloud and cybersecurity with human-centered design.

Orro Group

Orro Group

Orro create 'future now' solutions that make it faster, simpler and safer for you to access, store and share information. Wherever, whenever and with whomever you want.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.

Pango

Pango

Pango is a leading provider of digital consumer security solutions.