[et_pb_section fb_built=”1″ fullwidth=”on” _builder_version=”3.22.5″ bottom_divider_height=”24px” bottom_divider_flip=”vertical”][et_pb_fullwidth_slider _builder_version=”3.22.7″ height=”55vh” auto=”on”][et_pb_slide admin_title=”Slide 2″ _builder_version=”3.22.7″ background_image=”https://cyberengineers.co.uk/wp-content/uploads/2019/05/introcs.jpg”][/et_pb_slide][/et_pb_fullwidth_slider][/et_pb_section][et_pb_section fb_built=”1″ fullwidth=”on” next_background_color=”#ffffff” _builder_version=”3.22.5″ background_color=”#205867″ use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0.32)” background_color_gradient_end=”rgba(255,255,255,0)” bottom_divider_style=”arrow”][et_pb_fullwidth_header title=”Introduction to Cybersecurity” text_orientation=”center” button_one_url=”#gain-new-skills” button_two_url=”#our-courses” _builder_version=”3.22.7″ background_color=”rgba(0,0,0,0)”][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.22.5″ custom_padding=”14px||0px|||”][et_pb_row custom_padding=”0px||0px|||” _builder_version=”3.22.5″][et_pb_column type=”3_5″ _builder_version=”3.22.5″][et_pb_text admin_label=”Text” _builder_version=”3.22.7″ text_font=”||||||||” ul_font=”||||||||” header_font=”|600|||||||” header_text_align=”left” header_3_font=”|600|||||||” header_3_text_align=”left” header_3_letter_spacing=”1px” header_3_line_height=”1.3em” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”2.5%||17px|||” custom_margin_phone=”5.5%||” custom_margin_last_edited=”on|desktop” custom_padding_tablet=”2.5%|2.5%||2.5%||true” custom_padding_phone=”|0%||0%||true” custom_padding_last_edited=”on|desktop”]

Introduction to Cybersecurity

The Introduction to Cybersecurity 2.1 explores the field of cybersecurity, specifically the
importance of cybersecurity, data confidentiality, best practices for using the internet and social media safely, and potential career opportunities in this growing field.

  • We assist organizations and businesses upgradethe practical skills of their clients, Staff in Cybersecurity and IT.
  • Train staff responsible for cyber-related tasks to fulfil their roles, help executives, management and staff understand the cyber domain.
  • Defend and support your IT network.

[/et_pb_text][et_pb_text admin_label=”Text” _builder_version=”3.22.7″ text_font=”||||||||” ul_font=”||||||||” header_font=”|600|||||||” header_text_align=”left” header_3_font=”|600|||||||” header_3_text_align=”left” header_3_letter_spacing=”1px” header_3_line_height=”1.3em” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”2.5%||17px|||” custom_margin_phone=”5.5%||” custom_margin_last_edited=”on|desktop” custom_padding_tablet=”2.5%|2.5%||2.5%||true” custom_padding_phone=”|0%||0%||true” custom_padding_last_edited=”on|desktop”]

Requirements

  • No prerequisites.

[/et_pb_text][et_pb_text admin_label=”Text” _builder_version=”3.22.7″ text_font=”||||||||” ul_font=”||||||||” header_font=”|600|||||||” header_text_align=”left” header_3_font=”|600|||||||” header_3_text_align=”left” header_3_letter_spacing=”1px” header_3_line_height=”1.3em” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”2.5%||17px|||” custom_margin_phone=”5.5%||” custom_margin_last_edited=”on|desktop” custom_padding_tablet=”2.5%|2.5%||2.5%||true” custom_padding_phone=”|0%||0%||true” custom_padding_last_edited=”on|desktop”]

Duration

  • This is a 15-hour self-paced course with instructor-led activities.

[/et_pb_text][et_pb_text admin_label=”Text” _builder_version=”3.22.7″ text_font=”||||||||” ul_font=”||||||||” header_font=”|600|||||||” header_text_align=”left” header_3_font=”|600|||||||” header_3_text_align=”left” header_3_letter_spacing=”1px” header_3_line_height=”1.3em” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”2.5%||17px|||” custom_margin_phone=”5.5%||” custom_margin_last_edited=”on|desktop” custom_padding_tablet=”2.5%|2.5%||2.5%||true” custom_padding_phone=”|0%||0%||true” custom_padding_last_edited=”on|desktop”]

Certification and Career Pathways

The demand for cybersecurity experts has grown 3 times faster than any other IT job
role and training a cybersecurity workforce is a priority of many governments.
Cybersecurity applies to any professionals responsible for security and privacy of
company or customer systems.

[/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”3.22.5″][et_pb_code _builder_version=”3.22.7″]


[/et_pb_code][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.22.5″ background_color=”#f2f2f2″ top_divider_style=”arrow3″ top_divider_color=”#ffffff” top_divider_height=”110px” top_divider_arrangement=”above_content”][et_pb_row custom_padding=”52px|||||” _builder_version=”3.22.5″][et_pb_column type=”4_4″ _builder_version=”3.22.5″][et_pb_text admin_label=”Text” module_id=”our-courses” _builder_version=”3.22.5″ text_font=”||||||||” header_font=”|700|||||||” header_text_align=”center” header_letter_spacing=”2px” header_3_font=”||||||||” header_3_line_height=”1.3em” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone” background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” custom_margin=”||1px|||” custom_padding_tablet=”|2.5%||2.5%||true” custom_padding_phone=”|5%||5%||true” custom_padding_last_edited=”on|phone”]

Our Partners

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.22.7″ width=”100%” width_phone=”80%” width_last_edited=”on|tablet” module_alignment=”center”][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/04/cisco-e1556326646506.png” url=”https://www.netacad.com/” url_new_window=”on” align=”center” _builder_version=”3.22.7″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover_enabled=”on” filter_saturate__hover=”100%” filter_opacity__hover_enabled=”on” filter_opacity__hover=”100%” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/04/tlm-e1556326683259.png” url=”https://thelearningmachine.co.uk/” url_new_window=”on” align=”center” _builder_version=”3.22.7″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”on” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”on” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/05/bit-defender.jpg” url=”https://www.bitdefender.com” url_new_window=”on” align=”center” _builder_version=”3.22.7″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”on” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”on” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/05/f-secure-logo.png” url=”https://www.f-secure.com” url_new_window=”on” align=”center” _builder_version=”3.22.7″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”on” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”on” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/05/nord-vpn.png” url=”https://nordvpn.com” url_new_window=”on” align=”center” _builder_version=”3.22.7″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”on” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”on” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section]