View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Leadership
  2. Workforce
January 17, 2020

Free Cybersecurity Training: Institute of Coding Ratchets Up its Offering

Basics of network security course counts towards an MSc

By CBR Staff Writer

The UK’s Institute of Coding (IoC), which launched in December 2018, says that it has now signed up over 32,000 learners in little over a year – including to free cybersecurity training modules such “Basics of Network Security“, which can be used as a building block towards an MSc in Cyber Security at Coventry University,

The news represents welcome success for the Institute, which was founded with £20 million of funding from Theresa May’s government; a figure then matched by a further £20 million from industry champions like Cisco, IBM, and Microsoft.

The IoC’s course catalogue gives a flavour of new and upcoming units, including a range of free cybersecurity training programmes. (The catalogue aggregates the 180+ courses from the Institute’s partners in one place for the first time.)

Free Cybersecurity Training 

The Institute works with higher education partners to deliver bite-sized courses for adult learners, with a focus on skills that employers will welcome, amid a growing recognition that static degrees often provide skills that are redundant (owing to the fast-moving nature of tech) by the time graduates hit the labour market.

As the IOC’s chairman earlier told Computer Business Review: “Saying come to one of the university buildings and stay here for three years doesn’t work… [and] there is no point us saying #here is a great course, good luck see you'”.

Those seeking to take the free network security course will need a PC capable of running Virtual Machines (VMs), with at least a dual core CPU, 8GB of memory and about 100GB of hard disk space to store the VMs.

Participants will need to download and install VMware Workstation Playe, which is free for non-commercial/educational use, and be familiar with core Linux commands, input/output redirecting and piping, file manipulation, basic network configuration and user account management, the Institute said.

Content from our partners
How to engage in SAP monitoring effectively in an era of volatility
How to turn the evidence hackers leave behind against them
Why food manufacturers must pursue greater visibility and agility

See also: Fix England’s “Fragmented, Centralised” Skills System Urgently or Face a 2.5 Million Worker Deficit: LGA

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU