Course overview
Combining artificial intelligence (AI)-driven online learning with hands-on, in-person training, you benefit from a unique blend of theoretical and practical experiences.
Through comprehensive training aligned with Cyber Essentials standards and pathways outlined by the UK Cyber Security Council, you develop both foundational and advanced cybersecurity competencies.
Top five reasons to join this programme:
- Hands-on learning: master practical cybersecurity skills through real-world labs, simulations, and exercises to tackle live security challenges and threats.
- Job-oriented skills: prepare for high-demand roles such as cybersecurity professional, IT support technician, security administrator, penetration tester, and threat analyst.
- Customisable and practical: learn to build secure systems for businesses of all sizes, aligning with industry standards like Cyber Essentials and the UK Cyber Security Council.
- Future-ready career path: establish a strong foundation to pursue advanced cybersecurity certifications and develop yourself in this fast-evolving industry.
- Industry-recognised and accessible: gain a highly valued foundational cybersecurity training, ideal for both beginners and advanced learners, with clear, step-by-step learning paths.
4 February – Foundations of Cybersecurity, Access Control, Phishing, Spyware, and Trojan
11 February – Computer Network, Network Security and Web Security
18 February – Secure System Design Principles and Secure Configuration
25 February – Security Governance and Business Continuity
4 March – Malware Protection, Incident Response and Risk Management
11 March – Ethical Hacking and Penetration Testing
18 March – Cyber Essentials Certification Preparation
25 March – Final Assessment and Feedback
Course details
What you study
This cybersecurity training programme offers a comprehensive curriculum designed to build a strong foundation in cybersecurity while advancing into specialised topics. Topics include:
Foundations of cybersecurity: learn the basics of cybersecurity, including key concepts, terminology, and the importance of securing digital environments. Understand how to manage access permissions, recognise common cyber threats such as phishing and spyware, and analyse real-world case studies to identify vulnerabilities.
Computer networks and web security: explore the structure and functionality of computer networks, essential for understanding how data is transmitted securely. Learn to protect networked systems and web applications from unauthorised access and cyber threats.
Secure system design and configuration: discover how to design systems with built-in security features and configure them securely to protect against exploitation.
Security governance and business continuity: understand policies, procedures, and compliance standards in managing organisational security. Learn strategies to ensure business operations continue during and after security incidents.
Malware protection, incident response, and risk management: gain skills in identifying, mitigating, and managing malware threats while responding effectively to security incidents.
Ethical hacking and penetration testing: understand the ethical hacking process and use industry-standard tools to perform vulnerability assessments and penetration testing.
Cyber Essentials certification preparation: prepare for the Cyber Essentials certification by revisiting key concepts and practising test scenarios.
Final assessment and feedback: demonstrate your understanding and readiness through a final evaluation.
How you learn
The programme combines theoretical knowledge with practical application, ensuring participants gain a comprehensive understanding of cybersecurity concepts. Teaching is delivered through:
• weekly sessions lasting five hours
• hands-on labs and interactive discussions
• guidance from experienced academic staff
• you are also encouraged to dedicate additional time for self-study to reinforce learning.
How you are assessed
Assessment includes practical assignments, in-class participation, and a final evaluation to measure understanding and readiness.
Entry requirements
Entry requirements
The programme welcomes participants from underrepresented groups in the Tees Valley with an interest in cybersecurity. No prior experience is required, though basic IT literacy is beneficial.
Employability
Career opportunities
You can expect to pursue a variety of entry-level roles, including:
• Cybersecurity support specialist: assist with basic security operations, monitoring, and troubleshooting systems under the guidance of senior professionals.
• IT support technician: provide technical support and implementing basic security protocols to protect organisational IT infrastructure.
• Junior security analyst: monitor systems for vulnerabilities, responding to basic security alerts, and supporting incident response teams.