British Students Learn About Ethical Hacking

Becoming a Certified Ethical Hacker (CEH) can be a smart career move and can also be incredibly lucrative with average salaries of $90k. Right now, UK students are being actively recruited to help strengthen cyber security  using ethical hacking methods as the skills shortage leaves businesses highly vulnerable to attack.

The South West Cyber Resilience Centre (SWCRC) has announced a partnership with Bristol’s UWE (University of the West of England) to work with students with expertise in ethical hacking and cyber security. 

The SWCRC is a not-for-profit operation led by the police, in partnership with the private sector and academics, and facilitated by Business Resilience International Management (BRIM), which works with the Home Office on preventing cyber crime.

“Our role at the SWCRC is to support smaller businesses and charities to strengthen their cyber resilience and to make this support either free, or very accessible and affordable,” said Mark Moore, director at SWCRC and a serving police superintendent with Devon and Cornwall Police. “One service we’ve been keen to offer is ethical hacking, and working with students means we get the relevant levels of expertise at an affordable cost.
“We pay the students for the levels of work they commit to, and they get to deploy their skills in a business setting, so it’s a win-win for everyone involved.”

Ethical hacking involves the testing of an IT system with the knowledge and permission of its owner so that the strengths and weaknesses of the system are exposed and tested.

  • It involves studying the mindset, tools and techniques of hackers and penetration testers to learn how to identify, triage and correct vulnerabilities in software and computer networks. 
  • Ethical hacking is the process of attempting to penetrate computer systems and networks with the intention of locating weaknesses and vulnerabilities (real and potential) that could be exploited by malicious hackers. Any information uncovered is then used to improve the system’s security and plug loopholes. 

Studying ethical hacking can be useful to employees in a variety of job roles, including network defence, risk management, software developer, quality assurance tester, management and legal. It’s a widely used technique employed by multinational organisations to find the vulnerabilities of their cyber security but it’s harder for small organisations to tap into, due to resource shortages and the costs involved.

A recent survey by SWCRC showed that smaller business owners are wary of committing to cyber security because they fear unexpected costs in upgrading systems and software licenses. Employing SWCRC Student Services means that business owners benefit from impartial advice which they can trust.

Dr Phil Legg, associate professor in cyber security at UWE, said: "At UWE we are keen to support our students through academic study but also more broadly to think about their future employability and skills development.
“Working with the SWCRC has been a perfect opportunity for our students - they get to put their academic skills to the test to help secure industry partners in the region within a supportive environment, to gain the valuable experience that prospective employers will be looking for".

Some things to think about when deciding which ethical cyber hacking course is right for you:  

Don’t go in over your head: Some courses assume a certain level of background knowledge, while others are targeted at complete beginners. Choose a course that’s at the right level for you.

Consider minimum requirements: Bear in mind that you’ll need specific software to follow some courses, so be prepared to gather some resources if needed.

Look for special offers:  Paid courses are often of higher quality, but they can get pricey. However, many companies run special offers so you end up paying very little for a superior-quality course.

Watch out for scammers: Unethical hackers prey on amateurs, so be careful you don’t sign up with unethical hackers who promise to teach you the ropes.

One useful resource to look at when considering ethical hacking training is Comparitech,  a website providing information, tools, reviews and comparisons to help students and potential re-training workers in the US, UK and the rest of the world, with the aim to improve their cyber security and privacy online and potentially get jobs in ethical cyber hacking.

Plymouth Herald:      Cornwall Live:     Daily Advent:    Flipboard:    Infosec Institute:   IT Pro

You Might Also Read: 

How Ethical Hacking Can Improve Your Security Posture:

 

« Nobelium - Long Term Threat Activity
How Does IAM Help In GDPR Compliance? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

Defense Advanced Research Projects Agency (DARPA)

Defense Advanced Research Projects Agency (DARPA)

DARPA's mission is to develop breakthrough technologies for national security. The Information Innovation Office undertakes cyber security activities.

Panzura

Panzura

Panzura optimizes enterprise data storage management and distribution in the cloud, making cloud storage simple and secure.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

Cyber Security Austria (CSA)

Cyber Security Austria (CSA)

Cyber Security Austria (CSA) is an independent non-profit association with the aim to address security issues in the area of IT/cyber security of critical/strategic infrastructures in Austria.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

H3Secure

H3Secure

H3 Secure focuses on Secure Data Erasure Solutions, Mobile Device Diagnostics and Information Technology Security Consulting.

CONCORDIA

CONCORDIA

Concordia is a Cybersecurity Competence Network with leading research, technology, and competences to build the European Secure, Resilient and Trusted Ecosystem.

Center for Education & Research in Information Assurance & Security (CERIAS)

Center for Education & Research in Information Assurance & Security (CERIAS)

CERIAS is one of the world’s leading centers for research and education in areas of information and cyber security.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

comforte AG

comforte AG

comforte AG is a leading provider of data-centric security technology. Organizations worldwide rely on our tokenization and format-preserving encryption capabilities to secure personal, sensitive data

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.

Advania UK

Advania UK

Advania are one of Microsoft’s leading partners in the UK, specialising in Azure, Security, Dynamics 365 and Microsoft 365.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.