One of the highest-value, fastest-growing and top-paying industries in the world right now is cyber security. The sector is experiencing a huge skills gap, with the growing demand for information security professionals severely outpacing supply.
By 2021, experts expect there to be 3.5 million unfilled cyber security jobs worldwide, one reason why thousands of professionals are turning their attention to cyber security. Whether you are a recent graduate starting out, a mid-career professional or an experienced CEO gaining or developing further cyber security skills and knowledge can provide a salary boost and scope for professional development.
Often the most practical way of developing your cyber security knowledge and skills is by taking a course. That’s why the following list looks at 50 of the popular courses available now, ranging from half-day classes to several year-long master’s programmes. The list begins by covering:
- Introductory cyber security courses (for business professionals and executives)
- Intermediate cyber security courses (for IT professionals).
- Advanced cyber security courses (for experienced IT/cyber security professionals)
- Masters in cyber security (for business and IT professionals/executives)
Disclaimer: This list is purely for informational purposes. The details below were accurate at the time of publishing, we will endeavour to keep this list up to date but as courses are provided by third parties details may change at anytime, thus we are not able to guarantee the accuracy of details/pricing for courses. You should also always carry out your own further research and seek professional advice before deciding on which course is right for you.
Introductory cyber security courses
These introductory courses provide baseline skills and understanding in cyber security. They’re business/management focused and suitable for those with little to no IT experience.
1. Cyber Security Tools for Busy Executives
- Provider: Lockcode
- Study method: Self-paced
- Duration: Lockcode suggest completing the course within three months, but all participants will have 12 months’ access.
- Cost: £499
- Assessment: Students can make use of interactive self-assessment scorecards to demonstrate their progress within their organisations.
- Certification: GCHQ and NCSC certified.
Lockcode developed this self-paced course to respond to the critical skills gap in the sector, allowing busy, senior professionals to develop their skills alongside their professional commitments. It targets executives, in particular, operating at senior and Board level, in heavily regulated sectors such as the finance sector or the UK government supply chain. Participants will gain an understanding of potential cyber-attacks which could threaten their business and learn how to implement security controls to protect their enterprise from cybercrime.
This is a comprehensive course covering all the fundamental aspects of cyber security. There are 14 topics covered, including threat, risk, hacking, passwords, phishing and more. Each topic includes several sections, concluding with a self-assessment so that learners can track their progress. The subjects divide into four broad categories: information security management, information risk management, implementing secure systems, information assurance methodologies and testing.
Access to course content: Students can complete the course at their leisure – all course materials are available for 12 months’. Included in the price are three 30-minute one-to-one consultancy and mentoring sessions.
Professional development outcomes: Course graduates will have a significant competitive advantage in the field. Coupled with years of industry experience, these validated skills will demonstrate the employee’s understanding of cyber security in a technical field.
2. Diploma in Cyber Security
- Provider: Reed
- Study method: Self-paced
- Duration: 9 months
- Cost: £950 inc VAT. This course offers flexible payment options, with monthly, quarterly or half-yearly instalment options. Alternatively, you can get a 5% discount if you pay in full.
- Assessment: Participants complete assessment through written assignments and in some cases, a dissertation project.
- Certification: Level 4 Diploma in Cyber Security, accredited by Qualifi and OfQual-UK-gov regulated.
This professional, regulated course offered by Reed targets professionals looking to develop a career in the cyber security and risk management sector. Course graduates will possess the skills currently used by organisations globally to secure their organisations and implement strategies to mitigate the risk of cyber-attack. The course design aims to shape the next leaders of cyber security teams, departments and corporations by equipping participants with the latest industry knowledge. Finally, participants will also gain an understanding of the interplay between cyber security, ethics and social concerns in a business setting.
The course consists of 5 mandatory modules and one optional module, equating to 120 overall credits. The compulsory units are:
- Cyber Security Threat and Risk (20 credits)
- Network Security and Data Communications (20 credits)
- Database Security and Computer Programming (20 credits)
- Incident Response, Investigations and Forensics (20 credits)
- Security Strategy: Laws, Policies and Implementation (20 credits).
On top of these, pupils can pick from two optional modules: Cyber security threats and risk: banking and finance (20 credits) or Cyber Wars (20 credits).
Access to learning material and course content: All the learning materials and course content are accessible online from anywhere at any time using a laptop, phone or tablet. The course provides comprehensive study material including an e-library. Participants will also receive support from tutors over live chat and email.
Professional development outcomes: This certification offers validated, credible skills in cyber security to a professional working standard. As it is regulated by Ofqual (Office of the Qualifications and Examinations Regulation), students with the Level 4 Diploma can enter directly into the second year of a three-year UK bachelor’s degree programme.
3. Professional Certificate in Essentials of Cyber security
- Provider: University of Washington
- Study method: Self-paced
- Duration: 6 months, 2-5 hours per week
- Cost: Normally $796 (approximately £653, currently discounted to $716.40 (about £588)
- Assessment: Self-assessment tasks
- Certification: Professional Certificate
Provided by the University of Washington, this course is aimed at learners wanting to gain entry into cyber security. The provides an insight into the field and the different career pathways available for cyber security professionals. Participants will learn what procedures, policies and strategies are put in place to mitigate the risk of cyber-attack to organisations and systems.
Participants study a series of four courses of 6 weeks in length, requiring 2-5 hours per week. The courses are:
- Introduction to cyber security
- Cybersecurity: the CISO’s view
- Building a cybersecurity toolkit
- Finding your cybersecurity career path.
Access to course content: Students can progress at their own speed, having full access to the course materials online whenever, wherever they like.
Professional development outcomes: This course is the first step for any individuals looking to develop a career in cyber security. By the end of the course, attendees will have verified and marketable skill suitable for entry-level positions. In addition, the course includes an introduction to a multitude of roles within the industry as well as a self-assessment so that students can determine their optimal career path based on their demonstrated strengths.
4. Cyber Security Risk Assessment & Management training
- Provider: Learning Tree International
- Study method: Instructor-led
- Duration: 4 days
- Cost: £2095
- Assessment: The cost includes the Learning Tree end-of-course exam.
- Certification: 23 CompTIA CEUs.
This GCHQ, NCSC and CompTIA accredited course run by Learning Tree International teaches pupils how to carry out security risk assessments and analyses to identify weak points and vulnerabilities in a system and implement reinforcement to protect an organisation’s systems and networks.
Students will also learn about the laws and regulations affecting their organisation and how to remain compliant with the cyber security requirements and standards set out by the industry. Combining this knowledge, pupils will know how to develop a compliance assessment and use a risk management process based on industry standards to secure their organisation. The course content divides into seven parts:
- Introduction to risk assessment and management
- Characterising system security requirements
- Selecting appropriate security controls
- Reducing risk through effective control implementation
- Assessing compliance scope and depth
- Authorising system operation
- Maintaining continued compliance.
Access to learning material: Students can access the entire course online through live classes. After the training, students also have access to one-on-one instructor coaching.
Professional development outcomes: Through completing this course, professionals can earn 23 CompTIA CEUs (continuing education units) which can go towards the upkeep of other CompTIA certifications, contributing to career progression. Its accreditation by key certification bodies makes the course highly reputable, giving course participants validated skills in cyber security, opening access to intermediate level cyber security positions.
5. BCS Certificate in Information Security Management Principles (CISMP)
- Provider: QA
- Study method: Instructor-led. Classroom & virtual combination available.
- Duration: 5 days
- Cost: £3,050
- Assessment: A 2-hour multiple-choice BCS examination, sat on the last afternoon of the course. The course price includes an exam voucher which students can use at any official exam centre.
- Certification: BCS Certificate in Information Security Management Principles.
Students will gain a thorough insight into cyber security through this course provided by QA. While the programme assumes no prior knowledge, on completing the course, students will have a comprehensive skill set which will set them apart from other professionals in the field. Participants will have competency in managing information security, information assurance and information risk-based processes. The course is aligned with the most current information assurance frameworks, including 13 CIISec (formerly IISP) skills. The course targets anyone working in information security: IT managers, security and systems managers, information asset owners and employees that deal with legal compliance.
The course follows the current BCS syllabus, preparing students for the BCS exam. Learners will finish the course with an understanding of confidentiality, integrity, vulnerability, threats, risks and countermeasures, as well as an understanding of compliance with current laws and regulations. The course covers 17 topics over five days, including:
- Information risk management
- Corporate governance
- Organisational responsibilities
- Policies, standards & procedures
- Cryptographic models
- Incident management
- Business continuity
- Security investigations and forensics.
Access to learning material: All learning material is available online. Candidates can also sit the exam online.
Professional development outcomes: The CISMP certification is one of the most popular choices for IT professionals and is widely recognised as an essential first step in a cyber security career. It’s a particularly apt choice for anyone in the public sector, as it’s part of the CSEG Certified Professional (CCP) scheme, the government’s approved standard of competency for cyber security. It is fully certified by the NCSC who lists it as a certified awareness level course.
6. Cyber Security for Beginners (with 4 official CompTIA exams)
- Provider: Hudson
- Study method: Self-paced
- Duration: 12-30 hours per certification, up to four certifications. 12 months’ access.
- Cost: £889
- Assessment: There are four exams within the bundle, earning you four CompTIA certifications.
- Certification: CompTIA A+ 220-1001, CompTIA A+ 220-1002, CompTIA Network+ N10-007, CompTIA Security+ SY0-501
Aimed at complete beginners to IT, this course bundle provided by Hudson covers four well-recognised certifications offered by CompTIA+, culminating in their most prestigious qualification, the CompTIA Security+. The course begins with necessary IT skills and competencies on which learners will build more technical knowledge for a career in cyber security. The bundle comprises seven core courses:
- CompTIA IT Fundamentals, CompTIA A+ 220-1001 and 1002 which include two exams
- Cyber Security Awareness and Prevention, Computer hacking prevention, Data security compliance and the CompTIA Network+ which involves one exam
- CompTIA Security+ which also requires one exam.
Access to learning material: Participants need only have a stable internet connection and a computer, laptop or portable device, although a PC or laptop is recommended. The course provider also recommends using Google Chrome for an optimum experience.
Professional development outcomes: The course affords participants credibility in the field by validating entry-level security skills with well-known certifications. The course is highly reputable, awarded the Trusted Partner Award 2020. CompTIA itself has endorsed the courses provided by Hudson, naming Hudson as a CompTIA Authorised Partner. Additionally, the CompTIA Security+ is recognised globally as a standard of cyber security competency and can propel IT professionals in the early stages of their career into intermediate-level positions in the sector.
7. Risky Business: Managing your information risk
- Provider: Lockcode
- Study method: Self-paced
- Duration: 6 months’ access
- Cost: £499
- Assessment: The course has no formal assessment but includes two quizzes for participants to monitor their progress and measure their understanding.
- Certification: Certificate of completion, recognised by NCSC and GCHQ.
Provided by Lockcode LTD, this fundamental course in cyber security-related risk management aims to lay the foundation in risk management, addressing GDPR and the central privacy and security concerns in the UK. The course is assessed against the rigorous ISSP skills framework. It also has full certification by APGM, in association with the NCSC, ensuring that the training provides sufficient competency to deal with real-life security matters in commercial and government organisations.
The course comprises 13 stages, covering the fundamentals of risk management, GDPR and how it can affect small businesses as well as enforcement action and compliance. The sections are:
- Introduction to risk management
- Risk management: 10 steps to cyber
- 10 steps: Deeper dive
- Risk management
- Risk management methods & framework
- Fundamentals of risk management
- Risk management principles for cyber security
- General Data Protection Regulation (GDPR)
- GDPR for micros and small businesses
- ICO enforcement action
- GDPR security outcomes
- Consultation on the safe use of drones.
Within the course, there are nine activities for students to complete as well as two quizzes for students to assess their progress.
Access to learning material/course content: All learning materials, activities and quizzes are available online. Included in the course are nine downloadable resources.
Professional development outcomes: In terms of professional development, course participants can expect to gain valuable, marketable skills for jobs in the cyber security sector. The course is aimed primarily at those wishing to gain an understanding of the cyber threat landscape to protect their organisation and ensure enterprise-wide practises comply with data protection regulations.
8. NIST Cyber Security Professional (NCSP) v2.0 Foundation
- Provider: itSM
- Study method: Self-paced
- Duration: 1 day
- Cost: Approximately £570 ($695) for the self-paced video training with exam voucher.
- Assessment: The duration of the exam is 60 minutes, during which examinees must answer 40 multiple-choice questions. Candidates must get 24 correct answers out of 40 (60%) to pass.
- Certification: NIST Cyber Security Professional Foundation certification
Provided by itSM Solutions, the foundation course requires no previous IT or security knowledge. Students receive an introduction to the basic principles of digital transformation, cyber security risk management, the NIST cyber security framework and NIST cyber security risk management systems.
Seven chapters make up the itSM foundation course in cyber security. These are as follows:
- Course introduction
- Digital transformation: becoming digital
- Understanding cyber risks
- NIST Cybersecurity Framework fundamentals
- Core functions, categories & subcategories: Organisational cyber security capabilities
- Implementation tiers & profiles: Understanding current and future capabilities
- Cybersecurity improvement: Getting ‘there’ from ‘here’.
At the end of each chapter is a knowledge check, so that pupils can verify their understanding and check their progress.
Access to learning material: Students can access the video training any time, for up to a year.
Professional development outcomes: The foundation course is perfect for early-stage or mid-career IT, cyber security or audit professionals looking to move up the career ladder. By completing this course, professionals will have APMG, and NCSC/GCHQ accredited skills in cyber security risk management within an internationally accepted framework of industry standards and guidelines, which can be a steppingstone into higher-up cyber security, IT and even management positions. On top of this, completion of the course earns the pupil CPE (continuing professional education) units, which are valid to maintain CompTIA, ISACA and PMI certifications.
9. Network Security Introduction training
- Provider: Learning Tree International
- Study method: Instructor-led
- Duration: 4 days
- Cost: £2,095
- Assessment: The course concludes with an end-of-course exam. Successful examinees will receive certification.
- Certification: Independent APMG-International GCT certification.
Professionals with no technical background or IT experience can gain valuable foundation skills with this foundation course run by Learning Tree International, including how to analyse network risks and implement appropriate countermeasures. Participants will apply their knowledge to practical exercises, looking for operating system vulnerabilities to minimise an organisation’s risk to cyber-attack. Other aspects covered on the course include use of firewalls, data encryption and authentication. The course has a high satisfaction rate, with 4.69/5 stars based on 349 reviews.
Participants learn through live, online training sessions. The four-day course covers the following six areas:
- Building a secure organisation
- A cryptography primer
- Verifying user and host identity
- Preventing system intrusions
- Guarding against network intrusions
- Ensuring network confidentiality.
Access to learning material: Participants can take the course live online or in class. This option also offers many post-course benefits, including one-to-one instructor coaching and computing sandbox.
Professional development outcomes: Completion of this course provides 23 ‘A-level’ CPE units, which course attendees can use towards maintaining the CISSP certification.
10. Introduction to Cyber Security
- Provider: The Open University
- Study method: Self-paced
- Duration: 8 weeks, 3 hours per week. The course offers flexible start dates.
- Cost: The course is free, allowing students ten weeks’ access to the materials. For £62, students can enjoy unlimited access and will also be able to obtain the certificate.
- Assessment: Learners that opt for the upgraded, paid version will be able to take the online tests to assess their progress.
- Certification: Paying participants will receive a Certificate of Achievement.
This beginners’ course offered by the Open University provides an essential foundation for cyber security. It does not assume any prior knowledge or experience of cyber security, making it suitable for any level. Learners will receive an introduction to key concepts such as viruses, malware and trojans, as well as how to identify and prevent them. Students also study network security, cryptography, identity theft and risk management, which apply to a multitude of entry-level roles in the sector. The course is fully GCHQ certified, supported by the NCSC, meaning that the course adheres to the NCSC’s exacting standards for cyber security education.
There are eight sections to course, giving pupils a broad introduction to topics including:
- The cyber threat landscape
- Authentication
- Malware
- Networking and communications
- Cryptography
- Network security
- When your defences fail
- Managing security risks.
Through these eight sections, not only will course-participants have a grounding in the principles of cyber security, but they will also gain an understanding of their application in a business setting.
Access to learning material: Participants have access to all learning material online for ten weeks if they are using the free version. With the paid version, students will have access to the course and its contents for as long as the course is available.
Professional development outcomes: The course has received accreditation from GCHQ, APMG on behalf of the NCSC and the IISP (Institute of Information Security Professionals). The Certificate of Achievement indicates an awareness of cyber security issues across 12 of the IISP skills groups. It demonstrates that certificate-holders have a sufficient level of skills to meet the requirements of the GCHQ Certified Training.
11. Cyber Security Diploma
- Provider: Brentwood Open Learning College
- Study method: Self-paced
- Duration: 320 hours
- Cost: £760 inc VAT
- Assessment: Students complete one online assessment per unit of study.
- Certification: Cyber Security Diploma level 5
One of the most in-depth courses available on the market, this course offered by Brentwood Open Learning College turns complete beginners into cyber security experts. Starting with the basic concepts of cyber security, participants will gain a detailed understanding of the current cyber threat landscape before exploring the most effective techniques and tools needed to mitigate risk. The latter half of the course delves into computer forensics and concludes with developing a cyber security policy.
The course structure consists of 6 large units:
- Understanding cyber security
- Types of malware
- Cyber security tools & techniques
- Computer forensics
- Developing cyber security policies
- Developing a cyber security and risk mitigation plan.
Access to learning material: Learners require access to a computer with an internet connection.
Professional development outcomes: Professionals who complete this course will have a comprehensive grasp of all the critical areas of cyber security, from implementing security strategies to governance and compliance. Course graduates can expect access to entry-level and intermediate-level cyber security positions.
12. Mitigate
- Provider: Xyone
- Study method: Self-paced
- Duration: 3 hours, available for 12 months
- Cost: £99 for individuals. For enterprises, packages start at £3.50 per user per month.
- Assessment: Learners must take an assessment at the end of each of the four topic areas. Each test takes a maximum of 20 minutes to complete, and students must achieve 80% to pass.
- Certification: Certificate on completion, accredited by NCSC and GCHQ.
Mitigate provided by Xyone offers a grounding in cyber security, making participants aware of current cyber threats and up to date mitigation techniques in four key areas: online safety, information security, remote security and personal security. The course aligns with the IISP professional skills framework, presenting information in small, digestible segments, requiring no previous technical knowledge or experience.
Students take 12 small modules, 3 per area of concern, each taking 15 minutes to complete. In each e-learning module, students are presented with a scenario and must follow a storyline and complete tasks while gathering skills and knowledge. Topics covered include:
- Best practices to mitigate cyber security threats
- Secure internet, password and email use
- Physical risks to data and the need for clean desk, secure networks and data destruction
- The importance of creating backups
- Encryption and classifying data.
Access to learning material: All course materials are accessible online any time for 12 months. Users must have an up to date browser and stable internet connection.
Professional development outcomes: Put together by Lancaster University, learners acquire skills used daily in the cyber security field. As such, those who complete the course have the necessary skills for entry-level information security jobs, providing the first stepping stone into a lucrative cyber security career.
13. CYBERAWARE Certified User
- Provider: ICSI
- Study method: Self-paced
- Duration: 1 week
- Cost: £50
- Assessment: 1-hour multiple choice exam.
- Certification: Students will receive a Digital Certificate of Completion.
With no previous technical knowledge required, this basic security course offered by ICSI introduces learners to proper technology practises to maximise online security and mitigate cyber security risks. It’s relevant for anybody who uses a computer, mobile devices, the internet or other systems and networks.
The course adopts a modular structure. Each module involves a written introduction followed by an informative video, a summary, and a quiz to test the participant’s understanding. There are 13 modules which cover fundamental aspects such as securing devices, protecting your data, browsing the web safely, using social networking, email and cloud services securely, identify and mitigate malware.
Access to learning material: Students need only a stable internet connection to access the course and study materials and can access lessons from anywhere at any time. Course content delivery is in a video format.
Professional development outcomes: The course is NCSC certified, giving students credibility in their newfound skills. It’s also delivered by the ICSI, International Cyber Security Institute, which is an internationally-recognised accreditation body in cyber security, known for offering a variety of courses at an affordable price.
14. ICS Managers Security
- Provider: Siker Cyber
- Study method: Instructor-led
- Duration: 4 hours
- Cost: £125
- Assessment: No assessment
- Certification: Certificate on completion
Although this is an awareness-level course, it targets those in managerial positions, to provide them with an understanding of what cyber security threats and concerns affect their businesses or organisations. It will teach managers to identify cyber security risks, mitigate them and implement appropriate strategies to prevent against cyber-attack. The course is suitable for any manager responsible for any ICS environment or people working on system security.
Part one of the course focuses on the current information security landscape and emerging risks, while part two covers risk reduction planning to mitigate the risk of cyber-attack as well as incident response following a breach. The course covers the following topics:
- ICS description and terminology
- ICS Vs IT, differences and similarities
- ICS Attack surface
- Introduction to ICS security risk
- Known ICS security incidents
- Planning to reduce the security risk
- Introduction to cyber incident response
- Operational security
- Vendor management
- Building security into the procurement processes.
Access to learning material: Students can take the course online, with supporting materials provided.
Professional development outcomes: The course provider Siker has created this course in conjunction with the Centre for the Protection of National Infrastructure (CPNI) in the UK and leading Critical National Infrastructure (CNI) organisations to ensure it responds to industry needs and standards. Aimed at managerial-level workers, these professionals will have the skills to secure their organisation against common threats. It also lays the groundwork for more advanced training, such as the GIAC Global Industrial Control Systems Professional (GICSP) certification.
15. Cyber Security Analyst
- Provider: With You With Me
- Study method: Self-paced
- Duration: Less than 100 hours
- Cost: $3000 AUD ex VAT (approximately £1,607), or free for ex-military veterans.
- Assessment: N/A
- Certification: N/A
Founded in 2016, With You With Me specialises in training ex-military veteran job seekers. The courses are also now open to non-military professionals, providing preparation training for technical careers. This foundation course provides basic knowledge in cyber security, preparing course participants with the skills needed to be successful in entry-level cyber security positions. It covers the most common information security threats and provides an introduction in security practises and essential concepts such as malware, cryptography and incident response. The course structure consists of seven sections:
- Course introduction, providing an overview of cyber security
- WYWM Cyber pathway, covering the skills acquired and next steps
- Introduction to cyber security, covering defence, types of data, malware, cryptography, social engineering, threat actors and the job role of a security analyst
- Introduction to the Security Operations Centre (SOC), including job roles in the SOC
- Tier 1 Analyst role, covering the responsibilities and areas of expertise of a security analyst
- Incident response, covering how to respond in the event of a security breach
- Understanding Security Information and Event Management platforms (SIEMs).
Access to learning material: Students can access all contents online on the With You With Me portal.
Professional development outcomes: With You With Me assures that participants of the course will be job competent and ready for entry-level roles after completing the course. The course is fully GCHQ certified, meaning that course attendees will gather industry-wide accredited skills, which can set them apart from other applicants in the job market. The entry salary for roles accessible after completing the course is AUD 75K (approximately £40K)
16. GDPR Foundation training
- Provider: Me Learning
- Study method: Self-paced
- Duration: 3 hours 30 minutes
- Cost: £195. Purchase of 10 or more courses will receive a 10% discount. The course provider advises charities and organisations looking to bulk-purchase training to get in touch to arrange a price reduction.
- Assessment: There’s no official assessment for this course.
- Certification: PDF certificate
NCSC-certified, this is one of a range of courses provided by Me Learning to teach participants about GDPR. The Foundation course is appropriate for anybody executing policies and responsible for best practice within an organisation. The Foundation training was put together in conjunction with data privacy lawyers to offer practical advice to individuals and organisations tasked with handling and processing personal data.
The course consists of seven modules covering definitions and principles of GDPR, individual rights, consent, information privacy notices, breach management as well as the steps to data protection compliance.
Access to learning material: All course materials are available online and are mobile-friendly. Users can replay the information an unlimited amount of times and have access to all resources for one year.
Professional development outcomes: The course is GCHQ certified for GDPR compliance, meaning those completing the course will have the latest knowledge of their role and responsibilities as a Data Protection Officer. It ensures that those in positions of accountability are aware of industry best practises that they can apply within their job roles to adhere to the relevant guidelines and frameworks for compliance.
17. Certificate in Cyber Security (Level 1)
- Provider: Oxford Home Study Centre
- Study method: Self-paced
- Duration: Approximately 80 hours with ongoing start dates.
- Cost: £140, comprising a £20 deposit followed by ten instalments of £12 per month. Alternatively, a discounted rate of £99 applies if you pay in full straightaway.
- Assessment: Learners complete several assessments during the course to achieve the certificate.
- Certification: Certificate of Achievement from ABC Awards and Certa Awards, along with a Learner Unit Summary which lists the components completed by the learner.
One of the more affordable courses available, Oxford Home Study Centre aims to provide a comprehensive grounding in cyber security for beginners. It explores cyber security and its applications, aims and limits as well as looking at common cyber threats such as malware, viruses and rogue software and, finally, strategies to minimise cyber security threats by way of encryption and authentication. Candidates cover the basics of cyber security across two units:
- Unit 1 – Understanding Cyber Security introduces learners to the main objectives of cyber security and the main challenges faced by internet users and organisations.
- Unit 2 – Cyber Security Tools & Techniques covers the most essential tools and techniques to implement for effective cyber security, including firewall and antivirus technology as well as encryption.
Access to learning material: Learning takes place online.
Professional development outcomes: The course is ideal for IT workers at the beginning of their careers, or for business owners and managers looking to attain a general understanding of cyber security. ABC Awards and Certa endorsement indicates that the course has passed rigorous quality audits and complies with the awarding bodies’ standards of quality, which gives certificate-holders an advantage when applying for positions.
Intermediate cyber security courses
These courses assume some knowledge in either IT, cyber security or a technical subject. This often entails some work experience in a related field. In some cases, course participants require specific academic qualifications.
18. Certified ISO27001 lead implementer
- Provider: ICSI
- Study method: Self-paced
- Duration: Typically takes 1-2 months to complete
- Cost: £750
- Assessment: At the end of the course, students sit the three-hour exam to achieve certification, made up of several case studies. Students will get a digital certificate of completion, too.
- Certification: Certified ISO27001 Lead Implementer
The ISO27001 is perhaps the global standard with the highest recognition for implementing an Information Security Management System (ISMS) in an organisation. Over the course of this ICSI training, students learn about the importance of information security as well as the tools and methodologies required to implement ISMS in line with the ISO27001. Nine modules make up the course:
- Introduction to cyber security and ISO27001
- The ISO27K family definitions and security concepts
- ISO27001 Mandatory requirements – context, scope and leadership
- Security planning and risk management
- ISO27001 Mandatory requirements support, operation, monitoring and improvement
- ISO27001 Annex-A controls
- ISO27001 Certification and beyond
- ISMS Training and awareness
- Cybersecurity and case study.
Access to course content: Students can access the course material at any time they like with a reliable internet connection. Learning material includes high-quality instructive videos and knowledge checks throughout, as well as support from the instructor via email.
Professional development outcomes: The ISO27001 course offered by ICSI counts for 20 credits towards an MSc Cybersecurity course, which may lead onto more senior positions. Produced by the University of Central Lancashire in conjunction with NCSC, the course is well-regarded by employers, and certification-holders can expect promotion opportunities and salary boosts.
19. Certificate in Digital Forensics Fundamentals
- Provider: QA
- Study method: Instructor-led
- Duration: 3 days.
- Cost: £1,655 ex VAT
- Assessment: The course price includes an exam voucher, valid at any of the official exam centres. Students must book their own exam slot once they’ve completed the training. The exam lasts 90 minutes and features 70 multiple choice questions, and candidates must achieve 50% to pass.
- Certification: Certificate in Digital Forensics Fundamentals, certified by APMG on behalf of NCSC.
Delving into the cybercrime side of information security, this digital forensics course offered by QA aims to help organisations gather evidence in the way of digital artefacts which can be used by investigators in cases of cybercrime. Participants will learn the fundamentals of digital forensics in line with the framework for investigations set out by The National Police Chiefs’ Council (NPCC). Although there are no official prerequisites for the course, the provider assumes that participants have IT experience. It’s therefore appropriate for anyone working in IT, security, internal audit, law enforcement and government.
There are 11 modules in the course, which cover topics such as the legal framework to cyber security, digital evidence and how to collect it, hardware, information representation, Windows artefacts, Metadata, mobile phone forensics, forensic tools and reporting.
Access to learning material: Participants will need an additional monitor to access the hands-on labs.
Professional development outcomes: Those who complete the course will have validated skills in digital forensics, in line with the best practices laid out by the National Chiefs’ Council (NPCC). This training offers participants marketable skills in the security sector, and its NCSC accreditation makes it particularly valuable in applications for government-backed organisations.
20. Defending the perimeter from cyber attacks training
- Provider: Learning Tree International
- Study method: Instructor-led
- Duration: 4 days
- Cost: £2,095
- Assessment: The course includes a Learning Tree end-of-course exam for pupils to assess their understanding.
- Certification: Although participants who complete the course won’t receive any specific certifications, they will earn 23 CEU credits to maintain other qualifications.
Provided by Learning Tree International, this intermediate-level course is ideal for professionals looking to learn how to protect their organisations or develop their information security training. Participants will benefit from live online training, learning how to secure their organisation’s information and data, ensuring the information’s availability, integrity and confidentiality. Learners will also understand fundamental security principles and how to implement protection tools such as firewalls, VPN tunnels, and other safeguards to secure the organisation’s network perimeter. Course satisfaction is high, with the training achieving 4.72/5 stars from 53 reviews.
There are six main components of the course. Students will learn skills in:
- setting your security objectives
- deploying a secure firewall
- detecting and preventing intrusion
- configuring remote user Virtual Private Networks (VPNs)
- creating site-to-site VPNs
- integrating perimeter defences.
Access to learning material: Students can access online content from wherever they like. Online courses are delivered live.
Professional development outcomes: Accredited by both NCSC and CompTIA, completion of the course will indicate verified competency against industry standards, seen favourably by employers for professionals hoping to boost their careers.
21. Certified Cyber Security Foundation course
- Provider: IT Governance
- Study method: Self-paced
- Duration: 1 day
- Cost: £350
- Assessment: The price of the course includes sitting the Certified Cyber Security Foundation exam. It’s a one-hour multiple-choice online exam, comprising 40 questions, and students must achieve 65% to pass. IT Governance offer a first-time pass guarantee, allowing you to retrain for free if you don’t pass the first time.
- Certification: Certified Cyber Security Foundation certification. The course is accredited by IBITGQ, the International Board for IT Governance Qualifications.
IT Governance provides this foundation course, which gives a broad overview of information security. The course doesn’t assume any previous knowledge of information security, but participants should have some IT knowledge. By the end of the course, learners will have the tools to begin reinforcing their organisation’s cyber security defences, understanding the types of threats that exist, how to identify a cyber-attack and what to do in the event of an intrusion. Participants will learn how to secure system vulnerabilities and will also gain an understanding of the legal and contractual obligations that organisations have.
There are 18 topics covered in the course content, which students can work through at their own pace. Some of these include:
- Threat intelligence
- Malware
- Humans and social engineering
- Phishing
- Password security
- Mobile device, web application and social media security
- An introduction to risk management
- Security standards and frameworks
- Security in the Cloud (ISO 27018).
Access to learning material: Students can access the training materials online through the learning management system at any time, making progress at their own pace. Participants will have access to a digital copy of the course materials 20 days before the course begins.
Professional development outcomes: Anybody working in any IT roles or looking to start a career in cyber security should consider this course the first step into entry-level cyber security positions.
22. Certified Ethical Hacker (CEH) training
- Provider: IT Governance
- Study method: Instructor-led
- Duration: 5 days
- Cost: £2,250 ex VAT
- Assessment: The course price includes the CEH exam. The exam lasts 4 hours, during which time candidates must answer 125 multiple-choice questions.
- Certification: EC-Council Certified Ethical Hacker
IT Governance uses EC-Council accredited trainers to deliver this fundamental ethical hacking course. Widely regarded to be the first essential step towards any career in penetration testing or digital forensics, the CEH is a popular option for entry-level professionals. The course teaches students how to plan and carry out penetration testing, abiding by the necessary regulations. Having accredited training in these skills assures both employers and clients that the certification-holder carries out hacking techniques using the industry’s best ethical practices. At the end of the five-day course, students can take the ANSI-compliant exam to become fully certified.
The course is split into five days and is fully instructor-led. Students have the option to take the course entirely online or attend some of the course in person at one of the training centres around the UK. With the latter option, students may attend online at any point if they prefer. The course covers topics such as:
- ethical hacking methodology
- pre-attack reconnaissance,
- how to fingerprint and enumerate targets
- how to perform networking scanning and sniffing
- how to assess system vulnerability
- web attacks.
Access to learning materials: Students have access to 140 labs which simulate real-life scenarios, where students can practise their penetration testing strategies, tools and technology. Students will have six months’ access to the virtual labs beyond the course.
Professional development outcomes: The CEH can translate into rapid career progression for any early-stage professionals looking to embark on a career in cyber security. It holds recognition around the world and sets the bar for industry standards in ethical hacking. This accredited course offers high-quality training, with 100% of participants finding that the course content reached their expectations. IT Governance also offers a pass-first-time guarantee, or try again for free.
23. CompTIA Security+
- Provider: Bluescreen IT
- Study method: Self-paced
- Duration: 5 days
- Cost: £1750 ex VAT
- Assessment: The course value includes an exam voucher to sit the Security+ assessment. Candidates have 90 minutes to answer a variety of multiple-choice and performance-based questions.
- Certification: CompTIA Security+
This course by Bluescreen IT provides a comprehensive grounding in IT, providing the core skills needed to pursue a career in IT security. It’s a globally recognised accreditation, indicating the holder’s competence in the central aspects of information security. Students will learn the fundamentals of cyber security, including how to implement essential security controls, how to respond to security breaches and how to mitigate an organisation’s security risk. The course provider recommends that participants have around two years’ experience in IT before taking the course.
The course provides a solid foundation of knowledge in skills in the following six areas:
- Threats, attacks and vulnerabilities
- Technology and tools
- Architecture and design
- Identity and access management
- Risk management
- Cryptography and PKI.
Access to course content: In purchasing the course, students have 24/7 access to the Official CompTIA courseware for the Security+ certification.
Professional development outcomes: The Security+ is a prerequisite for a significant number of roles in the cyber sector, indicating competency in essential cyber security practices. It’s globally recognised, holding particularly high esteem in the USA. Course graduates can expect to gain access to both entry-level and intermediate-level cyber security positions.
24. Data Breach and How to Manage It
- Provider: Trust Bridge
- Study method: Self-paced
- Duration: One year’s access
- Cost: £775
- Assessment: The course concludes with a short, informal, multiple-choice test so that participants can measure their understanding and grasp of the course content. The course does not prepare participants for a particular exam or certification, but NCSC regulation lends participants credibility in the field.
- Certification: N/A
Provided by the Trust Bridge and certified by NCSC, this course teaches pupils how to comply with GDPR legislation when it comes to a data security breach. Participants will learn how to identify a security breach, at what point their organisation must provide notification of the breach and what a notification must include.
Participants cover four main areas by undertaking the course:
- how to identify a notifiable breach and understand the implications for your organisation
- how to contain the breach and manage the response
- understanding the factors to consider when assessing risk and how to mitigate risk
- how to avoid breaches as well as how to deal with and recover from breaches when they occur.
Access to learning material: Available online for one year, students can access all the course materials 24/7 online and revisit the material as many times as required. Access requires a stable internet connection and a compatible browser: Internet Explorer 8 or above, Google Chrome, Safari 6 or higher, or Mozilla Firefox.
Professional development outcomes: This training is a fundamental course for any data protection or security officer in an organisation. Anybody tasked with GDPR, or cyber security compliance can benefit from this course and develop their professional skills.
25. Certified C# and web application security
- Provider: QA
- Study method: Instructor-led
- Duration: 3 days
- Cost: £2,905 ex VAT
- Assessment: To achieve the certification, students must sit the remotely proctored exam in their own time after completing the course.
- Certification: Certified C# and Web Application Security certification
This QA-run course targets professionals in the industry, teaching coders and programmers how to identify weaknesses and vulnerabilities in their C# code. Attendees will learn the importance of best practises by understanding the potential consequences of a cyber attack on their code or system. By using the tools learned in the course, coders will know how to best protect their systems and employ methods such as Code Access Security and cryptography to reinforce their networks. The course features a series of live practical exercises, where students can learn practical skills in a fun and engaging environment.
The content is covered over three days, spanning a huge range of concepts and skills. The main topics covered include:
- IT security and secure coding
- Web application security
- Client-side security
- .NET security architecture and services
- Practical cryptography
- Common coding errors and vulnerabilities
- Principles of security and secure coding
- Knowledge sources.
Access to course content: All learning takes place online through live practical exercises. After completing the course, attendees get two weeks’ access to Avatao, an online security training platform where participants can put their secure coding skills into practice.
Professional development outcomes: With NCSC accreditation, certification-holders are well-received among employers, demonstrating skills which have been rigorously assessed against quality standards for the industry as defined by NCSC.
26. Security Essentials Bootcamp style
- Provider: Sans
- Study method: Instructor-led
- Duration: 6 days
- Cost: Course not including exam attempt: $7,020 (approx. £5,740). Exam attempt in conjunction with the course: $799 (approx. £650). Note that the course attempt is only available at this price for seven days after purchasing the course.
- Assessment: The course prepares pupils for the GIAC Certification exam, although the course price does not include an exam attempt. The exam consists of 180 questions and lasts five hours, and candidates must achieve 73% to pass.
- Certification: Preparation course for the GIAC Certification Exam (exam not included)
This Sans course focuses on the mantra “prevention is ideal, but detection is a must”. Professionals receive a comprehensive grounding in cyber security, with an introduction to the current cyber threat landscape. Attendees will learn how to identify the signs of a cyber attack, as well as tools and techniques to protect an organisation’s networks and systems. Students will gain practical skills that they are ready to apply straight away in their current or future job roles.
The course syllabus is broken down into six modules:
- Network security essentials
- Defense-in-depth and attacks
- Threat management
- Cryptography
- Risk management and response
- Windows security
- Linux security.
Through these modules, students will learn how to design, build and implement security architecture using VLANs to respond to identified threats. They will also be able to install VMWare and create virtual labs in which they can test the security of their tools and systems. The course also covers policy, teaching pupils how to create an effective company-wide security policy which encompasses training and cyber awareness to encourage best practices across the company.
Access to learning material: Pupils can digitally access the course and course materials from anywhere they choose. They can rewind, fast-forward and repeat study sections and labs as many times as they like within the four months’ access granted with the course purchase. Students must have a laptop with a 64-bit version of Windows or macOS as the core operating system. During the access period, pupils can get advice from experts via live chat or email.
Professional development outcomes: The course is suitable for anybody with a technical background in IT as well as for mid-career professionals in the cyber sector, including security managers, forensic analysts and penetration testers. The GSEC is, therefore, an excellent steppingstone for professionals in the early to mid-stages of their careers, looking to transition to, or make progress in, a role in cyber security. It’s a highly-reputable certification, catering for those new to security as well as those looking to develop their skills in the sector.
27. Certified Data Protection Foundation & Practitioner
- Provider: QA
- Study method: Instructor-led
- Duration: 5 days
- Cost: £2,550 ex VAT
- Assessment: The exam takes place on the last day and consists of 70 multiple-choice questions. Candidates have 70 minutes to complete the test and must achieve 50% to pass.
- Certification: Certified GDPR Foundation and Practitioner
Another course offered by QA, this course teaches participants how to ensure GDPR compliance within an organisation, in line with the newest General Data Protection Regulations. This includes practical skills addressing planning, implementing, and maintaining data protection and compliance, as well as knowledge of cyber security threats, risks, secure design, and the legal framework which underpins GDPR. Learners will also understand how to manage a data breach and the appropriate steps to take to recover in the event of one occurring.
The five-day course covers three broad domains, which are broken down into four daily groups of modules. The training concludes with the examination on day 5.
- Day 1 focuses on GDPR & legislation and consists of eight modules which cover the different aspects of current GDPR.
- Day 2: Information governance, risk management and security comprises three larger modules, covering the governance of information security and the different information assurance and accreditation available, as well as different methods for risk management. Finally, it addresses the cyber security essentials concerned with limiting incidences and the incident management process following a data breach.
- Days 3 & 4: Implementation, cover four modules concerned with introducing GDPR-compliant processes and the obligations of data controllers and processors. The second implementation day, Day 4, takes a deeper dive into implementation, covering cloud data, remaining compliant and enforcement. On the final day, candidates sit the remotely proctored GDPR Foundation & Practitioner exam.
Access to course content: Aimed at existing data protection officers, HR professionals, compliance officers, auditors, IT & security professionals, this course requires prior technical experience in the field.
Professional development outcomes: A qualification in GDPR compliance is essential for anybody working in IT, risk, strategy, governance or compliance positions. Those looking to access managerial roles should also consider taking the course.
28. Certified Ethical Hacker
- Provider: QA
- Study method: Instructor-led
- Duration: 5 days
- Cost: £3,285 ex VAT
- Assessment: The course finishes with the CEH exam, which is a four-hour session in which students must answer 125 multiple-choice questions. To achieve certification, students must reach a pass mark of 70%.
- Certification: EC-Council Certified Ethical Hacker.
This NCSC certified training programme by QA prepares participants for the esteemed EC-Council Certified Ethical Hacker certification. Course participants will learn the techniques, tools and methodologies practised by malicious hackers and be able to apply them in line with ethical practise to test an organisation’s security posture. Learners will get an introduction to a comprehensive range of common cyber threats and tools to mitigate risk as well as ways to respond to and recover from security breaches.
The course takes participants through 20 modules in preparation for the CEH exam. The modules begin with footprinting and reconnaissance, vulnerability analysis and network scanning, before looking at malware threats, sniffing, hacking techniques for web servers, applications, wireless networks, mobile platforms and IoT, concluding with cloud computing and cryptography.
Access to learning material: All course materials are available online. Participants also have six months’ post-course access to the CEHv10 iLabs to practise and further develop their skills.
Professional development outcomes: The CEH is a globally recognised certification, setting industry standards in ethical hacking. The CEH provides certification-holders with the accreditation and credibility they need to establish a trusting relationship with clients and indicates a high level of competency, ensured by the exacting standards of the NCSC. Course graduates will have access to intermediate cyber security positions or be able to work independently as an ethical hacker using their validated pen-testing skills.
29. Practitioner Certificate in Cloud Security
- Provider: QA
- Study method: Instructor-led
- Duration: 5 days
- Cost: £2,550 ex VAT
- Assessment: The course price includes an exam voucher, though students must book their exam slot independently and sit the online proctored examination in their own time after the course has finished. The exam lasts 70 minutes and has 70 multiple-choice questions. Pupils must achieve 50% to receive certification.
- Certification: Practitioner Certificate in Cloud Security
QA’s NCSC-certified course in cloud security introduces learners to cloud architecture, DevSecOps, data and assurance, governance, web application security and cloud security operations. Pupils will get an understanding of all the concepts and principles of cloud security within legal frameworks concerning data protection and compliance, as well as how to design, develop and implement cloud security architecture to protect data and comply with statutory regulations.
The course content is delivered through a mixture of presentations, discussions, practical demonstrations, and practical hands-on labs. That way, students learn both the theory and practical, applied skills necessary for implementing effective cloud security. Each day covers a comprehensive range of topics, using the following structure:
- Day 1: Cloud concepts & virtualisation, cloud security frameworks, principle, patterns and certifications and AWS security technologies
- Day 2: Microsoft Azure and Office 365, Google Apps for Work, assurance and data protection and compliance
- Day 3: Containers, web application security and cloud identity services
- Day 4: Serverless, cloud security as a service
- Day 5: Automation, continuous integration pipeline, DevSecOps labs.
Access to learning material: All materials are accessible online, and pupils should have a smartphone or tablet. Although there are no official prerequisites, the course provider recommends that delegates are familiar with operating systems, networking, and security principles. Ideally, pupils would also have experience using cloud services and secure technologies.
Professional development outcomes: Another course certified by the NCSC, this course validates in-depth cloud security skills. The curriculum aligns with 13 of the IISP skills and counts for up to 15 CPD (continuing professional development) points for GCHQ accredited certifications. Given the recommended prerequisite knowledge, this course is suitable for mid-career professionals in IT and cyber security and can be a significant platform to reach senior cyber roles, including management positions and strategy-based roles.
30. Hands-on web application penetration testing training course
- Provider: Tranchulas
- Study method: Instructor-led
- Duration: 3 days
- Cost: Price on request
- Assessment: Students must successfully complete the online labs to receive certification. In the labs, examinees must discover and exploit vulnerabilities to pass.
- Certification: Certified Web Application Security Professional (CWASP) Certification.
Accredited by the IISP as well as the NCSC, this course leads to the Tranchulas Certified Web Application Security Professional (CWASP) certification. It forms a series of interactive training sessions, where participants will use practical skills to acquire hands-on experience in identifying, exploiting and protecting against vulnerabilities and security flaws in web applications. By learning how to identify security loopholes and fully exploit them using highly-skilled penetration techniques, attendees will learn how best to sew up these holes and protect against malicious hackers.
The course uses a formation of 15 modules covering all the stages of penetration testing. The modules are as follows:
- General concepts
- Information gathering
- Vulnerability scanning
- SQL injection vulnerabilities
- Cross site scripting (XSS) vulnerabilities
- Improper input validation
- Insufficient transport layer protection
- Openssl HeartBleed vulnerability
- Authentication vulnerabilities
- Browser manipulation
- Insecure session management
- Authorisation bypass
- Mass assignments
- Server-side request forgery
- Looking at the big picture.
Access to learning material/content: Students have 24/7 access to the Tranchulas Online Labs to put their skills into practice. After completing the course, certification-holders will continue to have access to the labs for hacking practise for 90 days. The course provider’s technical team are also on hand via email, Skype and over the phone to offer technical and learning support.
Professional development outcomes: The course has GCHQ, NCSC and IISP accreditation, meaning that certification-holders are well-positioned to access intermediate and senior penetrating testing roles. It can also provide a career boost for those heading for management positions or a more strategic role within an organisation.
Advanced cyber security courses
These expert-level courses provide specialised technical knowledge in several fields. For almost all of these courses, a significant amount of professional experience is a mandatory prerequisite. In some cases, a bachelor’s degree is sufficient, but students will need to demonstrate high-level skills and boast impressive grade averages.
31. EC-Council Certified Chief Information Security Officer
- Provider: QA
- Study method: Instructor-led
- Duration: 5 days
- Cost: £3,190 ex VAT for the classroom/virtual course, £1,850 ex VAT for the e-learning course.
- Assessment: The course price includes an exam voucher, which candidates can use to book an exam in any of the official test centres. The duration of the exam is 4 hours, in which time candidates must answer 250 multiple-choice questions.
- Certification: EC-Council Certified Chief Information Security Officer (CCISO)
Widely regarded as an elite qualification, CCISCO sits at the very top of the ladder when it comes to cyber security careers. QA’s CCISO training course targets aspiring and sitting senior-level managers looking to advance their career and access the very top-paying positions in the industry.
It’s also beneficial for those already in security management roles, such as existing CISSP, CISM or CISA certification holders. As the qualification is especially advanced, interested candidates must complete an exam eligibility application and submit it to EC-Council before they can sit the exam. Only applicants with at least five years of experience in three out of five domains may take the exam.
The course goes into in-depth knowledge and competencies within the five CCISO domains. The first deals with governance concerns such as cyber security policy, legal issues, and compliance. The second addresses security controls, assurance, and implementation and the third looks at the role and responsibilities of a CISO. The fourth covers the technical aspects of the CISO job role, including disaster recovery continuity planning, encryption and computer forensics, and the final domain focuses on in-depth strategic planning and analysis.
Access to course content: Course content is available online, through video training, webinars and practical online learning environments.
Professional development outcomes: The CCISO is a highly prestigious cyber security certification, providing a springboard for mid-career IT and information security professionals to propel their careers and enhance their salaries. CCISO holders differentiate themselves in the job market, which is reflected in impressive salaries: the average CISO in the UK earns around £82K.
32. Certified Information Security Manager (CISM) training course
- Provider: IT Governance
- Study method: Instructor-led online or classroom/online combination
- Duration: 4 days. Courses may be taken online or at one of the London centres.
- Cost: £1,595
- Assessment: The course price does not include the exam, but IT Governance recommends that students book an exam for 2-4 weeks after completing the course.
- Certification: CISM certified by the ISACA.
IT Governance provides this advanced course in preparation for one of the most prestigious certifications in the industry. The course is designed for mid-career professionals in IT or IT security: primarily, IT or IT security directors, managers, auditors and consultants look to achieve the CISM. The qualification can, however, also benefit managers and CEOs. Course participants will learn industry best practice alongside advanced information security concepts. The training also includes preparation exercises for the CISM exam.
The course covers four domains:
- Information security governance
- Information risk management
- Information security program development and management
- Information security incident management.
Access to course content: Students receive full course materials in a digital copy in a PDF format, where comments are enabled.
Professional development outcomes: The CISM is one of the most highly respected qualifications in cyber security, sought after by many of the top organisations across the world. The exam is only open to individuals with at least five years’ experience in the sector. Certification holders can expect to enhance their career significantly; CISM holders earn an average of £128,000 per year. 9/10 people would recommend this training course to a friend, and 97% of participants found that the course content matched their expectations.
33. CASP+ training
- Provider: Bluescreen IT
- Study method: Instructor-led
- Duration: 5 days. Next course begins 1st June 2020, either at Plymouth or in the virtual classroom.
- Cost: £2,000
- Assessment: The course price includes an exam voucher, which candidates can use in any of the Pearson test-centres, or online. The exam lasts 165 minutes during which time candidates must answer 90 questions, a mixture of multiple-choice and performance-based questions. Candidates won’t receive a score – only pass or fail.
- Certification: CompTIA Advanced Security Practitioner (CASP+)
Bluescreen IT is a specialist cyber security training provider with strong industry links, and their courses are known to accelerate careers and are well-regarded by top industry players, including Microsoft and CompTIA. They offer a range of courses at all levels, including their advanced online training for the CompTIA Advanced Security Practitioner (CASP+). This training is ideal for any senior cyber security professionals looking to develop their career while remaining in a hands-on enterprise security role, rather than going into management or policy development. The qualification sits at the top of the pyramid when it comes to certifications, as candidates are expected to have at least 5-10 years’ experience.
The course covers the following areas:
- Risk management: analysis of security risks and frameworks, executing strategies for risk mitigation
- Enterprise security architecture: integration of network and security components, implementation of security controls
- Enterprise security operations: implementing incident response, recovery procedures
- Technical integration of enterprise security: integration of all online components into secure enterprise architecture, including hosts, storage, networks and applications, using physical and cloud technology
- Research, development and collaboration: determine industry trends and their implications for the enterprise using applied research methods.
Access to learning material: People who purchase the training will have access to the official online CompTIA courseware to learn the content for the exam.
Professional development outcomes: This course and subsequent qualification allow IT professionals to develop their career within the hands-on domain of cyber security, focusing on the implementation of advanced solutions within a company’s policies and frameworks. It can be a useful steppingstone for any cyber security practitioners hoping to move up without following the traditional path of proceeding into management or policy creation. An NCSC-accredited course, the course quality is reflected in its 5.0/5.0 rating over 83 reviews on TRUSTist.
34. Certified Information Systems Security Professional (CISSP) training
- Provider: Bluescreen IT
- Study method: Instructor-led
- Duration: 5 days.
- Cost: £2,000
- Assessment: The course price does not include the CISSP exam, which candidates must book separately.
- Certification: Certified Information Systems Security Professional
One of the more advanced training programmes offered by Bluescreen IT, this NCSC certified training prepares participants for the CISSP exam, one of the most highly sought-after qualifications in cyber security. Delegates must have significant prerequisite knowledge, with at least five years’ professional experience across at least two domains in the CBK. The course covers 16 of the IISP’s core skills and 3 of its secondary skills, offering an extensive, specialised skillset across a multitude of domains.
The course guides candidates through the eight domains of knowledge set out in the CBK (common body of knowledge) for the CISSP. Participants learn about each of the eight areas in eight separate modules, covering:
- Security and risk management
- Asset security
- Security Engineering
- Communication & Network security
- Identity & access management
- Security Assessment & testing
- Security operations
- Software security development.
Access to learning material/course content: All participants receive the official CISSP study guide as part of the course.
Professional development outcomes: The course targets security practitioners, managers and executives and can be a path into leadership roles in cyber security. The CISSP is a globally recognised certification, vouching for expert knowledge and skills in the industry. It can be a considerable career-accelerator and salary booster, with the average salary for certification-holders currently at $112K (approximately £92K) according to PayScale.
35. Certified Security Analyst
- Provider: QA
- Study method: Instructor-led
- Duration: 5 days.
- Cost: £3,155 ex VAT
- Assessment: The ECSA exam can be sat at any time after completion of the course, though the course provider recommends additional post-study between the course and the exam. The exam lasts four hours and consists of 150 questions. Candidates must achieve 70% to pass. While the CEH is not an official prerequisite for the ECSA, both QA and EC-Council strongly advise that pupils achieve the CEH before sitting the ECSA.
- Certification: EC-Council Certified Security Analyst: Penetration Testing
Run by QA, this advanced cyber security course prepares candidates for the EC-Council Certified Security Analyst exam. The ECSA is an advanced ethical hacking certification, indicating expert skills and knowledge in hacking and penetrating testing as well as an in-depth understanding of the relevant legislation to assure efficient, ethical, and legal practise. Course participants will learn ground-breaking penetration testing techniques, which is why the certification has been coined the ‘pen testing’ certification.
The course comprises 13 modules, beginning with the introduction of key concepts before moving into advanced penetration testing methodologies. Content is delivered in a mixture of online lectures and practical labs. The modules are:
- Penetration Testing Essential Concepts
- Penetration Testing Scoping and Engagement Methodology
- Open-Source Intelligence (OSINT) Methodology
- Social Engineering Penetration Testing Methodology
- Network Penetration Testing Methodology – External
- Network Penetration Testing Methodology – Internal
- Network Penetration Testing Methodology – Perimeter Devices
- Web Application Penetration Testing Methodology
- Database Penetration Testing Methodology
- Wireless Penetration Testing Methodology
- Cloud Penetration Testing Methodology
- Report Writing and Post Testing Actions
The course concludes with a final module on report writing and post-testing actions.
Access to learning material: In addition to the online learning materials, participants can also access the iLabs platform for six months after completing the course. While the course price includes the exam, participants are encouraged to book their assessment for a while after completing the course, leaving enough time to practise the learned principles and complete some post-study.
Professional development outcomes: The ECSA is the logical next step to the CEH, following on from where the CEH left off. It’s an advanced course which can act as a springboard into senior pen-testing roles, as well as cyber security roles in management and strategy.
36. Certified Information Systems Security Professional (CISSP)
- Provider: QA
- Study method: Instructor-led
- Duration: 5 days, classroom/online.
- Cost: £3,215 ex VAT
- Assessment: The price of the course does not include the exam. Students will need to purchase a Pearson VUE testing voucher, valid for one year. The exam is 3 hours in length and features 100-150 questions in a primarily multiple-choice format, and candidates must achieve 700/1000 to pass the exam successfully.
- Certification: This is a preparation course for sitting the exam for the Certified Information Systems Security Professional qualification (CISSP).
One of the most advanced courses on the list, this QA-provided course prepares students for the highly esteemed CISSP qualification. Delegates must have extensive experience spanning at least two CBK domains over 5 years. The programme provides an in-depth dive into the information security field, where learners will acquire skills by a theory-based approach and will discuss the application of concepts and techniques listed in the CBK in real-life scenarios. The course therefore provides an excellent pathway into security management, architecture, and engineering. The course is also certified by (ISC)².
The course structure comprises eight sessions which correlate to the CBK. Each session is theory-based. There are no hands-on labs, and for this reason, the course cannot replace significant self-study. As such, QA recommends that students take the course several months before sitting the CISSP exam, to allow for this self-study and practise. The eight modules are as follows:
- Security and risk management
- Asset security
- Security engineering
- Communication and network security
- Identity and access management
- Security assessment and testing
- Security operations
- Software security development.
Access to course content: Participants can take the course entirely online in a virtual classroom or in-person.
Professional development outcomes: The CISSP is one of the most highly esteemed qualifications in the cyber security industry, holding prestige across the world. In Europe, the CISSP holds recognition as equivalent to a master’s degree. Acquiring the CISSP can be a springboard into top-paying leadership positions in the industry and is a worthwhile course for any IT professionals wanting to accelerate their careers.
37. NIST Cyber Security Professional (NCSP) v2.0 Practitioner
- Provider: itSM
- Study method: Self-paced
- Duration: 4 days
- Cost: $1395 (approximately £1,140) for the course plus an exam voucher
- Assessment: The price includes an exam voucher for the NIST Cyber security professional Practitioner exam, where students have 120 minutes to answer 65 multiple-choice questions. Pupils must get 39 correct answers out of 65 to achieve the passing score of 60%.
- Certification: NIST Cyber Security Professional Practitioner certification
itSM’s practitioner course targets existing cyber security, IT and audit professionals looking to specialise their skills. Over this training, they will learn how to use industry best practice to design and implement an enterprise risk management cyber security programme within their organisation, drawing on the NIST Cyber Security Framework. The course begins with an overview, providing a look at the overlap between digital transformation and cyber security. After this, learners get a comprehensive insight into the threat landscape as it currently exists, accompanied by recommended approaches to implementing appropriate cyber security controls. Beyond this, practitioners learn how to structure cyber security within an organisation, creating a supportive environment that fosters governance and compliance in three areas: work, communication and improvement.
The course uses a nine-chapter structure:
- Course introduction
- Digital transformation & cyber security
- Threat landscape
- The controls
- Adopt & adapt
- Adaptive way of working
- Rapid adoption & rapid adaption fast-track
- CIIS practice
- Course summary.
The course concludes with tools for the pupils to use to determine the current state and desired state of cyber security, to develop a plan to transition from the former to the latter.
Access to course content: Participants learn through video training. While the course should take approximately four full days, pupils have up to a year to access the materials, complete the course and sit the exam.
Professional development outcomes: This organisational, management and governance-centred certification can be a fantastic career booster for experienced IT or cyber security professionals looking to transition into managerial or strategic roles. The course also equates to CPE credits for the upkeep of CompTIA, PMI and ISACA-certified qualifications.
38. Certified Ethical Hacker
- Provider: Robust IT
- Study method: Self-paced
- Duration: 5 days
- Cost: Price on request
- Assessment: The course concludes with the CEH exam, in which candidates must answer 125 multiple-choice questions in 4 hours.
- Certification: EC-Council Certified Ethical Hacker.
“To beat a hacker, you need to think like a hacker”. This EC-Council quote forms the basis of this course, introducing students to the tools, methods and knowledge used by malicious hackers, for use ethically and lawfully to assess the security of an organisation’s networks and systems. Course graduates will be able to spot system vulnerabilities and weaknesses, using ethical practises recognised and trusted by the industry.
Twenty modules make up the course, providing a comprehensive grounding in ethical hacking. Examples of modules include:
- Footprinting and reconnaissance
- Scanning networks
- Social engineering
- Evading IDS, Firewalls and Honeypots
- Hacking web servers, web applications, wireless networks and mobile platforms
- Cloud computing and cryptography.
Across these 20 modules, students learn the five phases of ethical hacking: reconnaissance, gaining access, enumeration, maintaining access and covering your tracks.
Access to course content: Students have 24/7 access to course materials online. After completing the course, graduates also have access to CV support and continuing career advice.
Professional development outcomes: The CEH is the first, essential step towards a career in penetration testing. It’s the first of a series of three certifications for professionals to become pen-test masters, followed by the ECSA and the APT course. It’s one of the most widely-recognised and sought-after certifications by employers in the field, and certification-holders can expect access to any ethical hacking or penetration testing positions, with impressive starting salaries.
39. Cyber Security MicroMasters: Cybersecurity fundamentals
- Provider: RITx
- Study method: Instructor-led
- Duration: 10-12 hours per week for eight weeks
- Cost: Usually $1,200 (approximately £990), although there is currently a discount taking the course price to $1,080.
- Assessment: Students must achieve 80% or higher in all four cyber security courses within the MicroMasters programme to achieve certification. During the capstone, students must perform a series of hands-on lab exercises in a virtual lab environment online. For this exam, students must have access to a computer or laptop with a modern web browser with Javascript enabled, with a fast internet connection.
- Certification: If you invest in the certificate, you will receive a certificate signed by your instructor, featuring the institution’s logo to boost your credibility. Certificate-holders can easily add the certificate to their CV or post it on LinkedIn.
RITx is a world-leader in computer security education, and their course graduates earn top salaries with the world’s greatest companies. This MicroMasters course targets graduates who have a degree in a STEM subject or professionals with at least five years’ work experience in a technical environment. The course is designed to provide a pathway to an advanced degree and can count towards a master’s programme.
The programme provides a comprehensive introduction to computing security. Students will gain a broad grounding in all the domains of cyber security, covering concepts, issues and tools critical to generating cyber security solutions.
The MicroMasters programme requires successful completion of the four graduate-level courses:
- Cybersecurity fundamentals
- Computer forensics
- Cybersecurity risk management
- Network security.
Students will have to acquire a verified certificate from each of these courses before they can take the cyber security capstone, which they must pass to achieve the Program Certificate. Other topics covered on the course include network and system administration fundamentals, information assurance fundamentals such as confidentiality, integrity and availability and basic cryptography concepts.
Access to learning material: All learning material is available online. The course language is in English, and video transcripts are also available in English only.
Professional development outcomes: If you are already in the IT sector, you can expect a 9% pay rise if you acquire security expertise. Job opportunities include positions as a security analyst, security engineer, security architect, forensics investigator, cyber security specialist.
40. Advanced Penetration Testing (APT)
- Provider: iClass EC-Council
- Study method: Self-paced or live online training
- Duration: 12 months’ access
- Cost: From $1,069 (approximately £880)
- Assessment: Participants must complete each stage to access the next part of the course.
- Certification: Certificate of Completion.
By far the most advanced course on this list is the Advanced Penetration Testing course by EC-Council. It serves as a follow on from the highly esteemed ECSA. Professionals who complete this course will, therefore, have elite skills, knowledge, and expertise in ethical hacking, putting them at the very forefront of the industry. Students will cover advanced concepts in scanning against defences, pivoting between networks, using web shells and deploying proxy chains. There are ten main sections to the course structure:
- Introduction to vulnerability assessment and penetration testing
- Information gathering methodology
- Scanning and enumeration
- Identify vulnerabilities
- Exploitation
- Post exploitation
- Advanced tips and techniques
- Preparing a report
- Practice ranges
Access to course content: All course material, activities and practical learning environments are available online. Students can choose to learn in a self-paced manner or through live online training.
Professional development outcomes: While this course does not include the exam, this training prepares candidates for the LPT Master Certification, which sets professionals vastly apart from others in the industry. The LPT exam alone is a gruelling 18 hours long, pointing to its elite status as the pinnacle of all ethical hacking qualifications. Experts from around the world designed this course with more than 25 years of professional security testing experience, and course graduates can expect access to the highest-paying positions, with the median annual salary for LPT-holders currently £90,000 in the UK.
Masters in cyber security
41. Master in Computer Science with a concentration in Cyber Security, Data Analytics and Artificial Intelligence
- Provider: MIA Digital University
- Study method: Instructor-led
- Duration: 1 year
- Cost: € 3,900 (approximately £3,500)
- Assessment: Assessment is online and interactive, using a mixture of tests and case studies which students must solve.
- Certification: Master’s in computer science with a concentration in Cyber Security, Data Analytics and Artificial Intelligence
This digital course developed in Barcelona aims to equip students with the professional skills to pursue lasting careers in the big data and AI industry. It targets explicitly working professionals looking to develop and progress their careers in the sector.
The course delves into artificial intelligence, big data analytics and cyber security. While the specific modules are not available on the site, the curriculum covers topics including:
- AI concepts
- Principles and technologies
- Intelligent web systems
- Web mining techniques
- Neural networks
- Analysing cryptography
- Secure software engineering
- Machine learning.
Access to learning material: The courses uses a completely online structure. Professors upload video-recorded classes and host real-time webinars, where students can interact with tutors and instructors. PowerPoint presentations are available which summarise the contents of the video lessons, which students can download at any time.
Professional development outcomes: The intended audience is both graduates who hold a bachelor’s degree as well as security professionals looking to further their careers. The course aligns with the skills gap in the industry, preparing students for future positions in cyber security.
42. Master of Science in Cybersecurity
- Provider: DePaul University
- Study method: Instructor-led
- Duration: 1-2 years
- Cost: Approximately $40,551 (approx. £33,200) per year
- Assessment: Exams take place online, monitored by a proctor.
- Certification: Master of Science in Cybersecurity
DePaul University in Chicago offers this in-depth post-graduate security course, aiming to educate professionals who want to specialise in cyber security. Students will learn not only the concepts and theories of information security but will acquire the necessary skills to design, develop and implement secured IT infrastructure and security policy in an enterprise.
DePaul featured as the second-best cyber security school in the US in Study.com’s 2019 rankings. The institution has particular links with Cisco as a designated Cisco Networking Academy, though the course provides competency across a range of systems. Aside from specialised technical knowledge, students will gain an insight into the legal, ethical and social framework of information security and what this means for business.
Students can choose from three concentrations in the degree programme: Networking and infrastructure, computer security or governance, risk management and compliance. DePaul has one of the broadest offerings in terms of modules, with current modules for the Master’s including:
- Digital forensic techniques
- Computer networks and data systems
- Governance policies in information assurance
- Enterprise security infrastructure controls and regulatory compliance
- Business continuity/disaster recovery theories and strategies
- Cryptology
- Cyber-physical system security
- Software risk management.
Access to course content: Students can access the course materials 24/7 online and may complete the same assignments and projects as students studying on campus.
Professional development outcomes: DePaul graduates can expect excellent career prospects. Graduates typically go on to pursue careers in digital forensics, incident response and risk assessment, among others. Those already in professional positions can expect both a career and salary boost, as DePaul cyber security graduates have a median salary of $78,000 (approximately £63,600) six months after completing the course.
43. Master of Science in Cybersecurity
- Provider: John Hopkins University
- Study method: Instructor-led/self-paced
- Duration: 2-5 years
- Cost: $5,535 (approx. £4,500) per course (MSc completion requires ten courses)
- Assessment: Assessments can all take place online.
- Certification: Master of Science in Cybersecurity
One of the most prestigious universities in the country, John Hopkins University in Baltimore, USA offers an online master’s programme in cyber security with three possible concentration options: analysis, networks or systems.
The curriculum is continually evolving to align with the latest industry developments and cutting-edge research. The instructors are pioneers in cyber security research, meaning that graduates are equipped to step into leadership roles at the forefront of the industry. Students will get a grounding in enterprise security risk, being able to implement a strategy for cyber security within an organisation. They will also gain in-depth knowledge and competency in cryptology, with a focus on encryption, hash functions, signature schemes and authentication.
To earn the master’s, students must take ten courses: three foundation courses, five security courses and two electives. Just some of the many topics on offer include:
- Quantum computation
- Intrusion detection
- Digital forensics technologies and techniques
- Reverse engineering and vulnerability analysis
- Intelligent vehicles: cybersecurity for connected and autonomous vehicles
- Public key infrastructure and managing e-security
- Cryptography and coding.
Access to learning material: Students can complete 100% of the coursework online and benefit from the same teaching as on-campus students, from world-renowned faculty members.
Professional development outcomes: This well-rounded and world-renowned course prepares graduates for long-lasting careers in information security. John Hopkins Engineering for Professionals targets employees in the mid-stages of their careers, looking to obtain valuable, validated skills to help them with their career progression. A master’s from John Hopkins can open the door to senior-level cyber security positions owing to its frequent citation as one of the best cyber security schools in the world.
44. Master of Information and Cybersecurity
- Provider: University of California, Berkeley
- Study method: Instructor-led
- Duration: 20 months
- Cost: Tuition fees on request.
- Assessment: Assessment varies from module to module.
- Certification: Master of Information and Cybersecurity (MICS)
Berkeley is among the top universities in the world. For computer science, it enjoys particular global prestige, ranked fourth in the world in the QS World University rankings. Their online master’s course targets professionals with significant industry experience, to train them for cyber security positions. Not only will students gain a thorough knowledge and comprehensive skill set in information security, but they will also benefit from the valuable links that the university has with the neighbouring Silicon Valley.
The multidisciplinary course covers everything from coding and information security principles to their application in a legal, economic, and commercial context. Teaching is delivered online through live classes. The course content covers the following topics:
- Secure coding
- Network and web security
- Operating systems security
- Law, ethics and privacy
- Cyber offence and cyber defence
- Government and national security
- Economics of cyber security
Access to course content: Enrolled students can access interactive classes and coursework from anywhere with an internet connection. Students will get significant support from the school both during and after the programme.
Professional development outcomes: Designed for mid-career professionals, this course acts as a career booster, opening entry into leadership positions. Course graduates go on to secure leadership positions in a variety of fields, in private sector tech companies as well as government and military organisations. Career prospects for Berkeley graduates are particularly bright, owing in part to the University’s global reputation, and partly due to the institution’s strong connections with the nearby Silicon Valley.
45. M.Eng. Cybersecurity Policy and Compliance
- Provider: George Washington University
- Study method: Instructor-led
- Duration: Approximately 2.5 years
- Cost: Tuition fees are $1,125 (approximately £920) per credit hour (most master’s students take 30 credit hours.) Students must also pay additional charges, such as registration fees and matriculation fees.
- Assessment: Assessment consists of coursework assignments completed throughout the degree programme.
- Certification: Master of Engineering in Cybersecurity Policy and Compliance
Assigned a Centre of Academic Excellence in Cyber Defence research by the Department of Homeland Security and the National Security Agency in the US, GWU sits at the forefront of cyber security. Their online master’s programme in Cyber Security and Compliance is a management-focused course which targets professionals in the sector looking to develop their careers, access top jobs and boost their salaries. As such, the curriculum aligns with the university’s mission to arm graduates with skills to lead and innovate in their careers.
Throughout the course, students will learn the best industry practices to implement within their organisation, particularly in the areas of cryptography, security systems, algorithms and software paradigms. The management focus puts particular emphasis on the intersections between policy, business and technology and looks at cyber security against an economic, social and ethical context. Course graduates will be well-rounded leaders, competent in forensic analysis following a cyber incident, confident in defining and implementing enterprise-wide strategies and policies which ensure compliance with the relevant laws and frameworks. Finally, they will be able to mitigate risk and manage exploits efficiently.
The course structure consists of a blend of computer science modules and modules dealing with policy, management, compliance and risk management, each worth three credits. The following courses make up the 30 required credits for the M.Eng.:
- Cybersecurity and privacy
- Information policy
- Management of information and systems security
- Security in mobile computing
- Information security in government
- Secure cloud computing
- Cybersecurity risk management and compliance
- Managing the protection of information assets and systems
- Auditing, monitoring and intrusion detection for Security managers
- Cybercrime for Information Security managers.
Access to learning content: Classes are all delivered live, online. Students in full-time employment can participate in the classes while completing their coursework around their professional commitments.
Professional development outcomes: GWU’s master’s programmes aim to enable professionals to develop their careers and learn valuable new skills which they can apply in their jobs and future positions. Many master’s students have years of professional experience and use the master’s qualification to progress into senior leadership roles. GWU graduates have an impressive 92% employment rate after six months, with many going on to earn a six-figure salary.
46. MSc Advanced Security & Digital Forensics
- Provider: Edinburgh Napier University
- Study method: Instructor-led & self-paced
- Duration: 5-4 years
- Cost: Fees are calculated on a modular basis. For home students/EU students taught modules for 2020/21 are currently £960, and £570 for dissertation modules. For overseas students, taught modules are £2,459, and dissertation modules are £1,634 each.
- Assessment: Assessment for the master’s programme uses a variety of methods, including written reports, exams, and practical assessments. Assessments are all online, including the practical assessments, taken in virtualised practical environments.
- Certification: MSc in Advanced Security and Digital Forensics
One of the few Master’s programmes to be fully certified by the NCSC, this post-graduate programme provides students with in-depth knowledge of information security and digital forensics. The course is informed both by current research and industry links, ensuring the knowledge and expertise learned responds to the needs of the industry. Students will gain an understanding of network security, penetration testing, incident response, malware analysis, cryptography, audit and compliance and digital forensics, and also have the option to specialise in any of these domains by undertaking a research-based dissertation in one of these areas.
The course follows a modular structure. Modules available to MSc Security students include:
- Computer penetration testing
- Hot-based forensics
- Incident response and malware analysis
- Master’s dissertation
- Network security
- Security, audit & compliance
- e-Security.
The modules reflect the research areas of the current faculty members, so are subject to change year on year.
Access to course content: Materials are entirely online, including virtualised lab environments. The distance e-learning option aligns with the same three 15-week academic trimesters as with the on-campus course. Distance learners have far more flexibility, however, and can take their time completing the course depending on their availability and commitments, with a window of up to four years to complete the degree programme.
The entry requirement for the course is a 2:2 minimum bachelor’s degree in a computing discipline. Edinburgh Napier also considers candidates without the required academic background if they can demonstrate industry experience.
Professional development outcomes: The master’s programme integrates much of the content and materials from professional courses, meaning students are well-prepared for many highly sought-after industry certifications, such as the Cisco Security Certifications and the CISSP. Graduates typically have immediate access to intermediate-level positions, while many professionals already in full-time positions enjoy promotion and a salary boost with the qualification. This course enjoys particular prestige, awarded the Best Cyber Education Programme by the Scottish Cyber Awards 2019.
47. MSc Information Security
- Provider: University of London
- Study method: Instructor-led
- Duration: Two to five years, part-time
- Cost: The total MSc cost is currently £17,736, though students must also factor in exam centre fees.
- Assessment: The majority of modules use an unseen written examination as the assessment method. This is usually a two-hour paper. The principal exception to this is the project, of which 20% is an unseen written examination, and 80% is the dissertation.
- Certification: MSc in Information Security
This University of London master’s course is administered by Royal Holloway, one of the leading institutions when it comes to cyber security research and policy in the UK and the rest of the world. The university is at the forefront of cutting-edge research in the global cyber security scene, collaborating with four other international universities under the International Cybersecurity Centre of Excellence (INCS-CoE) to address critical issues faced by cyber security professionals.
Completion of a course at this institution affords graduates with validation of skills from a globally recognised research centre in the field. Principally aimed at professionals, the course covers both the technical and management sides of cyber security. The course covers computer and network security, cryptography, security management and the social, commercial, legal, and ethical issues that cyber security intersects.
Master’s students must take four core modules, two elective modules and complete a project. The core modules are:
- Security management
- An introduction to cryptography and security mechanisms
- Network security
- Computer security.
Optional modules include:
- Application security
- Advanced cryptography
- Cybercrime
- Digital forensics
- Security testing: theory and practice
- Human aspects of information security and privacy.
Access to course content: On enrolling in the course, all students receive a Programme Handbook of practical information, a Subject Guide for each class as well as past exam papers and accompanying commentaries. All course teaching takes place online with the use of a Virtual Learning Environment.
Professional development outcomes: Graduates of this course have excellent career prospects, owing to Royal Holloway’s numerous connections with large corporations in the industry, including Cisco, Adobe, Hitachi and Fujitsu. MSc graduates can expect to have access to expert roles in cyber security, as well as access to senior management roles. NCSC accreditation validates graduates’ skills all over the world.
Final thoughts & FAQ’s
These courses represent some of the most highly esteemed and comprehensive online courses on the market but barely scratch the surface compared to the thousands of courses that exist today. Finding the right course for you will depend on your specific career goals, the time you can commit and your level of experience.
Still stuck on choosing? Below is a list of the most frequently asked questions concerning cyber security education, to help you make the best decision for you.
What are CPD units/hours/points?
Continuing Professional Development units, hours or points, sometimes referred to as Continuing Education Units (CEUs) or Continuing Professional Education (CPE) units, correspond to further education taken to maintain a certification or qualification. As the security industry evolves so quickly, professionals need to be up to date with the latest cyber threats, information security techniques and industry developments to do their jobs successfully.
Many certifications including the CISSP, CISM, CompTIA Security+ and many more require certification-holders to complete a specific amount of CPD hours or units per year to hold onto their qualification. Many of the training courses in this list count as CPE credits for certification-holders.
What is a ‘regulated qualification’?
If a qualification is regulated, it means it is delivered by an institution regulated by a government body. Regulated qualifications of the same level are interchangeable, and the Ofqual framework means that some qualifications can substitute the first years of study in degree programmes if they cover the same skills.
What are the best universities for cyber security?
The universities which feature in this list are among the best cyber security schools in the world. Most of these universities rank in the world’s top universities generally. However, other, less reputable universities offer courses which are widely considered to be among the best cyber security courses in the world. For more information on university rankings, QS Top Universities and Times Higher Education offer university rankings which you can filter by discipline or location.
What’s the difference between a qualification and certification?
The terms qualification and certification tend to appear interchangeably. While a qualification can refer to academic achievements, such as a master’s degree, the term certification tends to refer to qualifications awarded by government-backed or independent organisations. A certificate, however, indicates that you have completed a training programme, which may or may not include assessment. Certificates usually come from shorter courses and often hold less value.
What is an accredited course, and what are the benefits?
An accredited course indicates that the training programme lives up to the rigorous standards of a national regulatory body. In the UK, for example, the NCSC is a government-run body which offers certification to training courses which adhere to their exacting industry standards. Taking an accredited course provides substantial credibility in the industry and is a prerequisite for many government positions.
Will these courses lead to a job?
As we have seen, there’s absolutely no shortage of jobs in the field. All of these courses will provide you with at least a baseline understanding of cyber security, which can be valuable in securing a position in the industry. Although not many of the courses offer a job guarantee, typically skilled cyber security professionals find work quickly.
What can I expect to earn in a cyber role?
Cyber roles are some of the most lucrative positions in the market. Starting salaries without a degree tend to sit at around £20K-£30K, although many universities report the average salary of their graduates to be more like £50K-£70K. In the UK, the average salary for a cyber security role is currently £62,500, according to CW Jobs.