Champions 4 Change digital skills outreach training aims to increase awareness of cybersecurity through online events, such as weekend bootcamps and intensive training courses.
Our training programmes are designed to combine theory and hands-on laboratory sessions in order to provide trainees with the knowledge, skills and abilities (KSA) needed to operate as part of a competent cybersecurity workforce.
Hands-on laboratory exercises
Hands-on laboratory sessions provide course participants with the command line skills necessary to identify, detect and defend against cyber criminals.
Ethics form a core part of the cybersecurity training methodology at Cyber Benab. Therefore, our training courses are designed to create a community of cybersecurity professionals who are motivated to defend society against cybercrime.
CompTIA Security+ Certification
At the end of our 12-week introduction courses, participants are expected to achieve CompTIA certification in cybersecurity and systems administration.
While the achievement of certification is a positive outcome metric, the main benefit of certification is for course participants to move directly into cybersecurity careers or gain access into further education and training in cybersecurity.
Growth in cybercrime
Cybersecurity skills shortage
- Approximately 697,000 businesses (51%) have a cybersecurity basic skills gap. That is, the people in charge of cyber security in those businesses lack the confidence to carry out the kinds of basic tasks laid out in the government-endorsed Cyber Essentials scheme and are not getting support from external cyber security providers. The most common of these skills gaps are in setting up configured firewalls, storing or transferring personal data, and detecting and removing malware
- Approximately 451,000 businesses (33%) have more advanced skills gaps, most commonly in areas such as penetration testing, forensic analysis, and security architecture
- Almost 4 in 10 businesses (37%) have an internal skills gap when it comes to incident response and recovery, and do not have this aspect of cyber security resourced externally