[et_pb_section fb_built=”1″ fullwidth=”on” _builder_version=”3.22.5″ bottom_divider_height=”24px” bottom_divider_flip=”vertical”][et_pb_fullwidth_slider _builder_version=”3.22.5″ height=”55vh” auto=”on”][et_pb_slide admin_title=”Slide 2″ _builder_version=”3.22.5″ background_image=”https://cyberengineers.co.uk/wp-content/uploads/2019/05/guard.jpg”][/et_pb_slide][/et_pb_fullwidth_slider][/et_pb_section][et_pb_section fb_built=”1″ fullwidth=”on” next_background_color=”#ffffff” _builder_version=”3.22.5″ background_color=”#205867″ use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0.32)” background_color_gradient_end=”rgba(255,255,255,0)” bottom_divider_style=”arrow”][et_pb_fullwidth_header title=”TLM Level 2 Certificate in Cyber Security and Digital Forensics ” text_orientation=”center” button_one_url=”#gain-new-skills” button_two_url=”#our-courses” _builder_version=”3.22.7″ background_color=”rgba(0,0,0,0)”][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.22.5″ custom_padding=”14px||0px|||”][et_pb_row custom_padding=”||0px|||” _builder_version=”3.22.5″][et_pb_column type=”3_5″ _builder_version=”3.22.5″][et_pb_text admin_label=”Text” module_id=”gain-new-skills” _builder_version=”3.22.5″ text_font=”||||||||” header_font=”|600|||||||” header_text_align=”left” header_3_font=”|600|||||||” header_3_text_align=”left” header_3_letter_spacing=”1px” header_3_line_height=”1.3em” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone” background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” custom_margin=”||1px|||” custom_padding_tablet=”|2.5%||2.5%||true” custom_padding_phone=”|1.1%||1.1%||true” custom_padding_last_edited=”on|desktop”]

TLM Level 2 Certificate in Cyber Security and Digital Forensics

[/et_pb_text][et_pb_text admin_label=”Text” _builder_version=”3.22.5″ header_font=”|600|||||||” header_text_align=”left” header_3_font=”|600|||||||” header_3_text_align=”left” header_3_letter_spacing=”1px” header_3_line_height=”1.3em” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”2.5%||” custom_margin_phone=”5.5%||” custom_margin_last_edited=”on|desktop” custom_padding_tablet=”2.5%|2.5%||2.5%||true” custom_padding_phone=”|0%||0%||true” custom_padding_last_edited=”on|desktop”]

This qualification is designed for students who have an interest in digital security and the threats to IT systems. It is designed to give them a broad understanding of open systems so that they can then apply these to the understanding of threats to IT systems and how to counter these. It would suit any students interested in working in the growing industry related to cyber security, but also students interested in general employment involving IT, networking professions, infrastructure management and data management.

Cyber threats now affect all aspects of IT and organizations connected to the Internet, which is almost all.

[/et_pb_text][et_pb_text admin_label=”Text” module_id=”gain-new-skills” _builder_version=”3.22.5″ header_font=”|600|||||||” header_text_align=”left” header_3_font=”|600|||||||” header_3_text_align=”left” header_3_letter_spacing=”1px” header_3_line_height=”1.3em” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”||1px|||” custom_padding_tablet=”|2.5%||2.5%||true” custom_padding_phone=”|1.1%||1.1%||true” custom_padding_last_edited=”on|desktop”]

What could this qualification lead to?

It could lead to direct employment in the cybersecurity industry in a junior role or in a Modern Apprenticeship or further study at college or university levels. Will it lead to employment? The amount and complexity of online crime is growing by the day. There are currently nowhere near enough people to deal with it and that will only get worse. The government is putting significant resources into recruiting cyber aware people at all levels of industry. The opportunities for work in IT in relation to this subject area are very strong.

[/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”3.22.5″][et_pb_code _builder_version=”3.22.7″]

[/et_pb_code][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.22.5″ background_color=”#f2f2f2″ top_divider_style=”arrow3″ top_divider_color=”#ffffff” top_divider_height=”110px” top_divider_arrangement=”above_content”][et_pb_row custom_padding=”52px|||||” _builder_version=”3.22.5″][et_pb_column type=”4_4″ _builder_version=”3.22.5″][et_pb_text admin_label=”Text” module_id=”our-courses” _builder_version=”3.22.5″ text_font=”||||||||” header_font=”|700|||||||” header_text_align=”center” header_letter_spacing=”2px” header_3_font=”||||||||” header_3_line_height=”1.3em” header_3_line_height_phone=”1.3em” header_3_line_height_last_edited=”on|phone” background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” custom_margin=”||1px|||” custom_padding_tablet=”|2.5%||2.5%||true” custom_padding_phone=”|5%||5%||true” custom_padding_last_edited=”on|phone”]

Our Partners

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.22.7″ width=”100%” width_phone=”80%” width_last_edited=”on|tablet” module_alignment=”center”][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/04/cisco-e1556326646506.png” url=”https://www.netacad.com/” url_new_window=”on” align=”center” _builder_version=”3.22.7″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover_enabled=”on” filter_saturate__hover=”100%” filter_opacity__hover_enabled=”on” filter_opacity__hover=”100%” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/04/tlm-e1556326683259.png” url=”https://thelearningmachine.co.uk/” url_new_window=”on” align=”center” _builder_version=”3.22.7″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”on” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”on” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/05/bit-defender.jpg” url=”https://www.bitdefender.com” url_new_window=”on” align=”center” _builder_version=”3.22.7″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”on” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”on” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/05/f-secure-logo.png” url=”https://www.f-secure.com” url_new_window=”on” align=”center” _builder_version=”3.22.7″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”on” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”on” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.22.5″][et_pb_image src=”https://cyberengineers.co.uk/wp-content/uploads/2019/05/nord-vpn.png” url=”https://nordvpn.com” url_new_window=”on” align=”center” _builder_version=”3.22.7″ filter_saturate=”0%” filter_opacity=”45%” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”on” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”on” transform_styles__hover_enabled=”on” transform_scale__hover_enabled=”on” transform_translate__hover_enabled=”on” transform_rotate__hover_enabled=”on” transform_skew__hover_enabled=”on” transform_origin__hover_enabled=”on” transform_scale__hover=”105%|105%”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section]