Personal Learning Account

Are you aged over 19 and earning under £26,000? Or, has your employment been negatively impacted by Covid-19? Then this course could be available for free through the Personal Learning Account.

How to apply: To apply through the Personal Learning Account, visit this information page.

Is this course right for me?

This programme has been developed for individuals who wish to transition their career path towards the ever-growing Cyber Security sector as a certified Ethical Hacker. 

This course ensures you receive specialist training from an internationally recognised awarding body (EC-Council) and master all the technical skills and knowledge required to succeed within the industry, including CompTIA Network+, CompTIA Cyber Security Analyst+ (CySA), Microsoft Python, EC-Council Certified Ethical Hacker (CEH), Information Security Management (ISO27001).

This programme will also ensure you land a job placement within the sector; all candidates who enrol will have the opportunity to participate in a series of ‘Challenge Labs’, one-to-one sessions, recruitment workshops, mock interviews and be introduced to an excellent pool of employers who are actively looking for newly qualified candidates like you. 

Entry requirements:

There are no formal requirements but it would be advantageous to:

  • Have a basic or intermediate understanding of computing and networks and:
  • Be a fast learner
  • Be hardworking
  • Be committed to succeed


Online learning


The course includes exams which are invigilated online and you need to have access to an internet enabled device with a microphone and a webcam.


Once you have completed this course, we recommend you to look at the CompTIA Advanced Security Practitioner (CASP+) Course

Additional campus/course information:

  • Remote Learning

    The course includes:

    CompTIA Network+ Certificate

    • Networking Concepts – Be able to explain the purpose of networking concepts and implement them accordingly
    • Infrastructure – Explain and determine the most appropriate cabling, device and storage technologies
    • Network Operations – Understand how to use best practice to manage a network and ensure business continuity
    • Network Security – Summarise common attacks and physical security issues while securing a wired and wireless network
    • Network Troubleshooting and Tools – Be able to explain the network troubleshooting methodology and list appropriate tools to help support performance and connectivity

    CompTIA CySA+ Certificate:

    • Threat and Vulnerability Management - Use proactive threat intelligence to support organisational security
    • Software and Systems Security - Apply security solutions and explain best practices for software and hardware assurance
    • Compliance and Assessment - Use security concepts in support of organisational risk mitigation
    • Security Operations and Monitoring - Analyse data throughout continuous security monitoring activities and improve overall security
    • Incident Response - Apply the correct incident response procedures, analyse indicators of compromise and use digital forensics techniques

    EC-Council Certified Ethical Hacker (CEH):

    • Introduction to Ethical Hacking
    • Footprinting and Reconnaissance
    • Scanning Networks
    • Enumeration
    • Vulnerability Analysis
    • System Hacking
    • Malware Threats
    • Sniffing
    • Social Engineering
    • Denial-of-Service
    • Session Hijacking
    • Evading IDS, Firewalls, and Honeypots
    • Hacking Web Servers
    • Hacking Web Applications

    SQL Injection

    • Hacking Wireless Networks
    • Hacking Mobile Platforms
    • IoT Hacking
    • Cloud Computing
    • Cryptography

    Microsoft Python:

    • Python Basics
    • Functions and Modules
    • Maths
    • Python Strings
    • Iterables
    • Virtual Environments
    • Flow Control
    • Exception Handling
    • Python Dates and Times
    • File Processing
    • PEP8 and Pylint

    Information Security Management (ISO27001):

    • The available standards and management system documentation
    • The benefits of ISMS certification
    • An overview of ISO 27001 and its application
    • Key elements of ISMS implementation project planning
    • The core elements of the ISMS
    • The key steps of an ISO 27001 risk assessment
    • An overview of the ISO 27001 Annex A controls