Upskill in Cyber has successfully reskilled UK individuals through a focussed and intensive training programme, designed to produce certified cybersecurity professionals who are ready to make a positive impact on your business.
Successfully reskilled graduates have a strong understanding of computer hardware, networking, Linux, operating systems, data storage, and much more. They are suitable for a variety of security roles, including Cyber Security Analyst, SOC Analyst, Security Network Engineer, Risk Engineer, Cloud Security Analyst, Junior Penetration Tester and many more.
A large number of UK organisations have already taken advantage of this new talent pool, including Lloyds Banking Group, Kroll, NatWest Group, Bridewell, Cyber Resilience, Inzpire, National Crime Agency, and Financial Conduct Authority amongst those who have recruited Upskill in Cyber graduates.
Streamline your recruitment process
Employers interested in recruiting Upskill in Cyber candidates can engage with the programme in a number of ways and SANS' dedicated Industry Engagement and Recruitment Specialist will work with you on an individual basis to understand your needs. Support in identifying suitable candidates is offered at no cost to employers.
- Share active vacancies for the bespoke online jobs board
- Meet suitable candidates in dedicated virtual sessions
- Facilitate interview days and pre-screening sessions
- Request CV shortlists
Certifications Included
SEC275: Foundations - Computers, Technology, and Security
This course provides exactly what students need to go from zero technical and security knowledge to a level of sufficient theoretical understanding and applied practical skills that enables them to speak the same language as industry professionals. Students will then undertake the GFACT certification exam. Students will develop fundamental skills and knowledge in key IT subject areas, including:
• Computer Components & Concepts
• Operating Systems, Containers, & Virtualization
• Linux
• Networking Fundamentals
• The Web: Search Engine & Servers
• Practical Programming in Python & C
• Windows Foundations
• Encryption
• Advanced Computer Hardware
• Introduction to Basic Security Concepts
• Introduction to Forensics
• Introduction to Reconnaissance, Exploitation, & Privilege Escalation
• Introduction to Network & Computer Infiltration
Full course information can be found here https://www.sans.org/cyber-security-courses/foundations/
GIAC Foundational Cybersecurity Technologies (GFACT)
Once the SEC275 course is complete, the students can then book and take the GFACT certification exam.
Full certification information can be found here https://www.giac.org/certifications/foundational-cybersecurity-technologies-gfact/
SEC401: Security Essentials: Network, Endpoint, and Cloud
Organisations are going to be targeted, so they must be prepared for eventual compromise. Today more than ever before, timely detection and response is critical. The longer an adversary is present in an environment, the more devastating and damaging the impact becomes. The most important question in information security may well be, “How quickly can we detect, respond, and remediate an adversary?”
SEC401 will provide the essential information security skills and techniques needed to protect and secure critical information and technology assets, whether on-premises or in the cloud. SEC401 also shows students how to directly apply the concepts learned into a winning defensive strategy, all in the terms of the modern adversary.
GIAC Security Essentials (GSEC)
Once the SEC401 course is complete, the students can then book and take the GSEC certification exam.
Full certification information can be found here https://www.giac.org/certifications/security-essentials-gsec/
GIAC certifications are regulated under the ANSI/ISO/IEC 17024 Personnel Certification programme, ensuring international quality requirements.
GIAC currently has over 90,000 certified professionals globally and has issued more than 173,000 certifications since 1999. GIAC certifications provide the confidence that the candidate can apply specific, technical knowledge of a specific subject area, proving that they possess the skills and expertise needed to complete a specific job, as opposed to simply understanding information security principles.