• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Resources
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Resources
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find resources
      Search by title or subject area
      View all resources
  • SMB Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Government seeks cyber security heroes with retraining courses open to all

10-week course will offer up to 50 people a chance to retrain

digital-superhero
Could you be a cyber hero? Government seeks new cyber warriors
  • Dan Worth
  • Dan Worth
  • @danworthV3
  • 02 November 2016
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

The government has announced the launch of a 10-week boot camp training initiative designed to churn out more skilled cyber security experts as part of the newly unveiled National Cyber Security Strategy.

The Cyber Retraining Academy course does not require those interested to have any prior cyber expertise, but is looking for those with natural aptitude. Interested parties can undertake a quiz online to determine their suitability.

Training will be given by experts from the SANS Institute, and graduates on the course will tackle everything from fending off malware attacks to hacking into flying drones.

Applications can be made from today, and the training will take place in London from 23 January 2017. The aim is to roll out the programme to other cities in the years ahead.

The course will cram two years' worth of cyber training into just 10 weeks, and Matt Hancock, minister of state for digital and culture, explained that speed is vital in reducing the UK cyber skills shortage.

“This new academy will give students the skills the nation needs to fight cyber attacks and help us achieve our ambition of making the UK the safest place to live and do business online,” he said.

“The programme is integral to our ambitious skills plan, and will fast track new talent into this competitive, exciting and rewarding field which last year contributed almost £22bn to the UK economy.”

SANS Institute UK managing director ‎Stephen Jones added that the intensive nature of the course is ideal for making candidates understand the realities of the ever-changing nature of the cyber threats facing the UK.

“There’s no substitute for recreating a real-life environment, and here students are exposed to malicious code and practical challenges not seen in other training programmes," he said.

Jones promised that the job prospects for those completing the course will be strong, given how important cyber security is to all of the UK.

“This is a great opportunity for candidates looking for a secure and exciting career, and one where they can command a very good salary," he said.

"The industry is only showing signs of growth as organisations and governments continue to strengthen their cyber defences.”

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Government
  • Cloud Computing
  • Government
  • malware

V3 Latest

BT plan to close down conventional fixed-line phone network by 2025 and go all-IP
BT plan to close down conventional fixed-line phone network by 2025 and go all-IP

BT wants to make the public switched telephone network history within eight years

  • Communications
  • 20 April 2018
Facebook Login hijacked by hidden web trackers, claim security researchers
Facebook Login hijacked by hidden web trackers, claim security researchers

Personal data being purloined by third parties via Facebook Login API

  • Security
  • 20 April 2018
Apple: we've no plans to merger iOS and MacOS
Apple: we've no plans to merger iOS and MacOS

MacOS and iOS are better off apart, says CEO Tim Cook

  • Desktops
  • 20 April 2018
Oracle: Java SE 8 business users must buy a licence from January next year
Oracle: Java SE 8 business users must buy a licence from January next year

Or they'll no longer be entitled to updates and bug patches

  • Developer
  • 20 April 2018
Back to Top

Most read

Oracle: Java SE 8 business users must buy a licence from January next year
Oracle: Java SE 8 business users must buy a licence from January next year
BT plan to close down conventional fixed-line phone network by 2025 and go all-IP
BT plan to close down conventional fixed-line phone network by 2025 and go all-IP
Avast reveals more information detailing how hackers compromised CCleaner
Avast reveals more information detailing how hackers compromised CCleaner
Facebook Login hijacked by hidden web trackers, claim security researchers
Facebook Login hijacked by hidden web trackers, claim security researchers
AMD Ryzen CPU release dates, specs and price: Second-generation AMD Ryzen desktop CPUs available today
AMD Ryzen CPU release dates, specs and price: Second-generation AMD Ryzen desktop CPUs available today
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017