Virtual Classroom - Cyber Security Job Academy Programme

Key Details

  • Available at
    Remote Learning
  • Level
  • Study Mode
  • Programme Area
    Personal Learning Account, IT and Media
  • Course Length

    This course is delivered as a combination of virtual classrooms and self-paced eLearning and runs for 6 months.

    Virtual classrooms are equivalent to face-to-face classroom courses, but delivered in an online environment.

    eLearning is self-paced and this means that you should be motivated to study in a self-organised manner using an internet enabled device.

    The Job Academy Programme includes multiple exams which are invigilated online and you need to have access to an internet enabled device with a microphone and a webcam.

    You must attend all classes and pass all exams before any job opportunity can be offered.

    If you pass the programme, you will be invited to a prestigious venue for your graduation ceremony.

  • Course Type
  • Bilingual

Course Description

This programme has been developed for individuals who wish to transition their career path towards the ever-growing Cyber Security sector as a certified Ethical Hacker.

This course ensures you receive specialist training from an internationally recognised awarding body (EC-Council) and master all the technical skills and knowledge required to succeed within the industry, including CompTIA Network+, CompTIA Cyber Security Analyst+ (CySA), Microsoft Python, EC-Council Certified Ethical Hacker (CEH), Information Security Management (ISO27001).

This programme will also ensure you land a job placement within the sector; all candidates who enrol will have the opportunity to participate in a series of ‘Challenge Labs’, one-to-one sessions, recruitment workshops, mock interviews and be introduced to an excellent pool of employers who are actively looking for newly qualified candidates like you.

Entry Criteria

There are no formal requirements but it would be advantageous to:

  • Have a basic or intermediate understanding of computing and networks and:
  • Be a fast learner
  • Be hardworking
  • Be committed to succeed


Online learning


The course includes exams which are invigilated online and you need to have access to an internet enabled device with a microphone and a webcam.


Once you have completed this course, we recommend you to look at the CompTIA Advanced Security Practitioner (CASP+) Course

Campus Information Remote Learning

The course includes:

CompTIA Network+ Certificate

  • Networking Concepts – Be able to explain the purpose of networking concepts and implement them accordingly
  • Infrastructure – Explain and determine the most appropriate cabling, device and storage technologies
  • Network Operations – Understand how to use best practice to manage a network and ensure business continuity
  • Network Security – Summarise common attacks and physical security issues while securing a wired and wireless network
  • Network Troubleshooting and Tools – Be able to explain the network troubleshooting methodology and list appropriate tools to help support performance and connectivity

CompTIA CySA+ Certificate:

  • Threat and Vulnerability Management - Use proactive threat intelligence to support organisational security
  • Software and Systems Security - Apply security solutions and explain best practices for software and hardware assurance
  • Compliance and Assessment - Use security concepts in support of organisational risk mitigation
  • Security Operations and Monitoring - Analyse data throughout continuous security monitoring activities and improve overall security
  • Incident Response - Apply the correct incident response procedures, analyse indicators of compromise and use digital forensics techniques

EC-Council Certified Ethical Hacker (CEH):

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications

SQL Injection

  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography

Microsoft Python:

  • Python Basics
  • Functions and Modules
  • Maths
  • Python Strings
  • Iterables
  • Virtual Environments
  • Flow Control
  • Exception Handling
  • Python Dates and Times
  • File Processing
  • PEP8 and Pylint

Information Security Management (ISO27001):

  • The available standards and management system documentation
  • The benefits of ISMS certification
  • An overview of ISO 27001 and its application
  • Key elements of ISMS implementation project planning
  • The core elements of the ISMS
  • The key steps of an ISO 27001 risk assessment
  • An overview of the ISO 27001 Annex A controls

Would you like to apply for this course?

This course is currently enrolling!

Personal Learning Account