This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

Qufaro Cyber EPQ

The Cyber Extended Project Qualification (The CyberEPQ). Brought to you by

Break into a Cyber Security career with the Cyber EPQ.
An exclusive Cyber Security online course.

Enrol or Find out more

What is The CyberEPQ?

The CyberEPQ is the UK’s first and only Extended Project Qualification (EPQ) in Cyber Security. This unique Cyber Security qualification has been developed by a consortium of education and Cyber Security partners to help provide a starting point for anyone considering a career in Cyber Security. The Cyber EPQ qualification is delivered online using distance learning tools with its content guided by the National Occupational Standards and Chartered Institute of Information Security Skills Framework.

The EPQ is a Level 3 qualification, certified by City & Guilds, worth up to an extra 28 UCAS points. The course is delivered using a distance learning platform (the Moodle) and can be studied through your school or independently. School Learners are supervised by their teachers and Independent Learners will have a supervisor assigned to them.

delivered online
11 modules
extensive video content
quizzes
downloadable resources
games

Who is Qufaro’s Cyber EPQ for?

Everybody. There are no formal entry requirements for studying the course, it is open to everyone. It is recommended that you have studied at Level Two (GCSE level or equivalent) prior to the course. You must be 14 years old or above on enrolment.

The CyberEPQ was designed to bridge the gap in Cyber Security qualifications between GCSE Computer Studies and a degree in Cyber Security. It also assists in training potential Cyber Security professionals and those who are looking for a change in career in Cyber Security.

What will I learn?

The History of Computing

A look back at computing from the breaking of the Enigma code at Bletchley Park, the world’s first programmable computer - Colossus, through to the development of mainframes, personal computers and the development of the internet.

Cryptography

Explore the study of the techniques of secret writing, especially code and cipher systems, methods as well as the procedures, processes, methods of making and using secret writing, as codes or ciphers.

InfoSec Management

Look at Identity and Access Management (IAM) which is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.

Vulnerability Assessment and Pen Testing

Learn about Vulnerability Assessment which is a risk management process used to identify, quantify and rank possible vulnerabilities to threats in a given system. Examine Penetration Testing (pen-testing or pentesting) which is a method of testing, measuring and enhancing established security measures on information systems and support areas.

Information Security Vulnerability Concepts

Explore Information Security Vulnerabilities which refer to a flaw in a system that can leave it open to attack. A vulnerability may also refer to any type of weakness in a computer system itself, in a set of procedures, or in anything that leaves information security exposed to a threat.

Intrusion, Incident and Digital Forensics

Examine the fields of computer security and information technology, where Computer Security Incident Management involves the monitoring and detection of security events on a computer or computer network and the execution of proper responses to those events. Explore Digital Forensics which is the process by which information is extracted from data storage media.

OpSec Management

Discover Operational Security (OPSEC), also known as procedural security, which is a risk management process that encourages managers to view operations from the perspective of an adversary in order to protect sensitive information from falling into the wrong hands.

Audit Compliance and Assurance

Explore Audit Compliance functions which are meant to reasonably ensure that the company is complying with all applicable laws, rules and regulations, as well as internal codes of conduct, policies and procedures. The Internal Audit function is designed to monitor and evaluate the company’s internal control environment as to its adequacy, efficiency and effectiveness.

GDPR

Study GDPR which is designed to ensure that the integrity of any personal data that is collected, managed, stored or processed by an organisation is fully protected. It brings new mandatory requirements for data controllers and processors.

What are people saying about the Cyber EPQ?

“I think it was very useful as it helped to improve my independent study and it allowed me to learn new things about cyber that I wouldn’t have learned before”

Olivia Naish
Student

“It really really is something that focused your mind on potential career paths. And in terms of the doors that are opened for these students, it’s just absolutely fantastic”

Jackie Samosa
Teacher

“What it does give you is a starter, a very broad understanding about what is in the cyber discipline and what cyber security is all about”

How do I enrol for the CyberEPQ?

You can enrol online. On enrolment, to gain access to the online content, you will receive a temporary Moodle password via email. You will need to change this password. The fastest way to access the Cyber Security course is to pay by card. However, you can pay by BACS or cheque if required.

Once enrolled, you will receive your log on details and a document which provides information such as how to navigate around the Moodle and what you should be doing next. Please contact us if you have any issues, we are happy to assist.

Let your friends, family and teachers know about the Cyber EPQ

Find us on social media, and start your own conversation with #cyberepq

Sponsored by

Deloitte

Our partners, sponsors and supporters

Heart of Worcestershire College
Immersive Labs
Sonicwall
CIISec
Try Hack Me

Sign up to our mailing list for news and updates

Your data will only be used by QUFARO to send you relevant news. Your data will never be shared with third parties unless you provide your consent for us to do so. Your data will be held securely and monitored under EU data protection law. You may unsubscribe at any time using the options provided in-email or by proactively contacting our administration team at [email protected]

© Bletchley Park Qufaro Ltd. Privacy Policy Refund Policy Site by Dgtl