Atoms/Iconography/360-white@2xion-briefcase - Ionicons Copy@2xAtoms/Iconography/calendar-dark@2xAtoms/Iconography/calendar-pinkAtoms/Iconography/calendar-pinkAtoms/Iconography/calendar-dark Copy@2x3B13F687-6EB2-452A-B918-16B02FF86090@2xchevron-right - FontAwesome@2x81A2B1C2-3C1E-48C0-8EAB-2BB76C1052E1@2xchevron-right - FontAwesome@2xchevron-right - FontAwesome@2xchevron-right - FontAwesome Copy@2x18D48E51-758C-47E9-949E-1E58FC9454A3@2xAtoms/Iconography/close-red@2xAtoms/Iconography/close-white@2xion-android-cloud-circle - Ionicons@2xAtoms/Brand/connected-uni-logo-white@2xAtoms/Iconography-download-icon-white@2xdropdown-chevron-black@2xAtoms/Iconography/dropdown-form-chevron-white@2xAtoms/Iconography/email-icon-light@1xF93E1E4C-136C-41CA-8FC9-02353765C1C0@2xA14CB21F-CD96-450C-BBD7-6647B25B0D0D@1xatoms/Iconography/facebook-icon@2xAtoms/Iconography/facebook-iconAtoms/Iconography/google-plus-icon@2xion-ios-information-outline - IoniconsAtoms/Iconography/instagram-iconGroup@2xAtoms/Iconography/linkedin-icon@2xion-android-menu - Ionicons@2x934F565B-4D4A-4BBE-B4EA-29E0D367BC7F@2xAtoms/Iconography/minus-icon@2xAEC8A5E2-9638-45F8-9E94-3C320D2410A9@2xAtoms/Iconography/nav-icon-white Copy@2xAtoms/Iconography/pause-icon-white@2xion-android-person - Ionicons@2xAtoms/Iconography/phone-icon-white@2x5131105A-B2E1-443D-A44D-E6DCCBBF53DD@2xAtoms/iconography/pintrest-icon@2xAtoms/Iconography/play-button-white@2xAtoms/Iconography-play-button-white-2@2xAtoms/Iconography/plus-icon-black@2xAtoms/Iconography/print-icon-light@2x34CD08DE-22EB-4484-B0B4-48190645DEBC@2xsearch - FontAwesome@2xAtoms/Iconography/search-white@2xAtoms/Iconography/snapchat-icon@2xAtoms/Iconography/tick-green@2xAtoms/Iconography/twitter-icon@2xAtoms/Iconography/twitter-iconAtoms/Iconography/youtube-icon@2xAtoms/Iconography/youtube-icon@2xAtoms/Iconography/icon-tiktok-iconAtoms/Iconography/icon-tiktok-colour Skip to content Skip to search
  •  

Outline

"A governmental department has been subject to a hostile cyber-attack and has had its digital infrastructure hacked by person or persons unknown. You are members of an elite team working for the security services who have been tasked with investigating the attack."

Key facts

Location:

  • On campus
  • Online

Duration:

  • Full day

Capacity:

  • 40

Key Stage:

  • Key Stage 3
  • Key Stage 4
  • Key Stage 5

Gatsby benchmarks:

  • 4. Linking curriculum learning to careers
  • 7. Encounters with further and higher education

Example programme

10.00 – Welcome and Overview to include Careers in Cyber Security

10.15 – Table-top Cyber event (NCSC/GCHQ verified), followed by DoS hands on demo, attacking Virtual server on-campus. 

12.00 – Lunch (staff and students to bring own lunch) 

12.30 – Hands-on on-line Cyber Quiz finding hidden data, followed by hands-on Encryption/Decryption exercise. 

14.15 – Feedback and departure 

Programme options:

Content can be amended for pre and post 16 students.

 

Book this masterclass

Complete an enquiry form and a member of Schools and Colleges Liaison Team will contact you to arrange the Masterclass.