Break into a Cyber Security career with the CyberEPQ.
The CyberEPQ is the UK’s first and only Extended Project Qualification (EPQ) in Cyber Security. This unique Cyber Security qualification has been developed by a consortium of education and Cyber Security partners to help provide a starting point for anyone considering a career in Cyber Security; to go to university, start an apprenticeship or change career.
The Cyber EPQ qualification is delivered online using distance learning tools with its content guided by the National Occupational Standards (NOS), and aligned with the Chartered Institute of Information Security (CIISec) and the Cyber Security Body of Knowledge (CyBOK) Skills and Knowledge Framework.
The EPQ is a Level 3 qualification, accredited by City & Guilds, worth up to an extra 28 UCAS points. The course is delivered using a distance learning platform (the Moodle) and can be studied through your school or independently. School Learners are supervised by their teachers and Independent Learners will have a supervisor assigned to them.
Everybody. There are no formal entry requirements for studying the course, it is open to everyone. It is recommended that you have studied at Level Two (GCSE level or equivalent) prior to the course. You must be 14 years old or above on enrolment.
The CyberEPQ was designed to bridge the gap in Cyber Security qualifications between GCSE Computer Studies and a degree in Cyber Security. It also assists in training potential Cyber Security professionals and those who are looking for a change in career into Cyber Security.
A look back at computing from the breaking of the Enigma code at Bletchley Park, the world’s first programmable computer - Colossus, through to the development of mainframes, personal computers and the development of the internet.
Explore the study of the techniques of secret writing, especially code and cipher systems, methods as well as the procedures, processes, methods of making and using secret writing, as codes or ciphers.
Look at Identity and Access Management (IAM) which is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities.
Learn about Vulnerability Assessment which is a risk management process used to identify, quantify and rank possible vulnerabilities to threats in a given system. Examine Penetration Testing (pen-testing or pentesting) which is a method of testing, measuring and enhancing established security measures on information systems and support areas.
Explore Information Security Vulnerabilities which refer to a flaw in a system that can leave it open to attack. A vulnerability may also refer to any type of weakness in a computer system itself, in a set of procedures, or in anything that leaves information security exposed to a threat.
Examine the fields of computer security and information technology, where Computer Security Incident Management involves the monitoring and detection of security events on a computer or computer network and the execution of proper responses to those events. Explore Digital Forensics which is the process by which information is extracted from data storage media.
Discover Operational Security (OPSEC), also known as procedural security, which is a risk management process that encourages managers to view operations from the perspective of an adversary in order to protect sensitive information from falling into the wrong hands.
Explore Audit Compliance functions which are meant to reasonably ensure that the company is complying with all applicable laws, rules and regulations, as well as internal codes of conduct, policies and procedures. The Internal Audit function is designed to monitor and evaluate the company’s internal control environment as to its adequacy, efficiency and effectiveness.
Study GDPR which is designed to ensure that the integrity of any personal data that is collected, managed, stored or processed by an organisation is fully protected. It brings new mandatory requirements for data controllers and processors.
“I chose the CyberEPQ to extend my knowledge in Cyber Security beyond the A-Level curriculum and to complete an independent project. For me the highlights were being able to contact professionals in the industry for interviews which I found really informative and shaped my project but I also enjoyed many of the modules.”
“We were looking for a course that would actually be relevant to the changing world of employment particularly for our computing students and when I came across the CyberEPQ I thought it’s a perfect course that would allow them to develop independent study skills as well as actually becoming more au fait and knowledgeable about the sector as it were.”
“What it does give you is a starter, a very broad understanding about what is in the cyber discipline and what cyber security is all about”
“For a future career, I think the CyberEPQ is fantastic because she has been exposed to so many people, the networking opportunities have been fabulous and that will go on. But as a girl, in particular, it has given her confidence to feel that she can be in this industry, she doesn’t have to be intimidated by it”
“It really really is something that focused your mind on potential career paths. And in terms of the doors that are opened for these students, it’s just absolutely fantastic”
“I think that (the CyberEPQ) is a really good way to be able to enable young people to learn the skills to be able to give them a real grounding and good foundations to get into Cyber Security”
To indicate your interest please complete the pre-registration form. You will then receive an information pack by email. To keep you informed about the course we will send you regular monthly updates. Please [contact us] if you have any questions, we are happy to assist.
Your data will only be used by QUFARO to send you relevant news. Your data will never be shared with third parties unless you provide your consent for us to do so. Your data will be held securely and monitored under EU data protection law. You may unsubscribe at any time using the options provided in-email or by proactively contacting our administration team at [email protected]