Cyberhub Logo – Home

FAQs

Click on a question below to reveal the answer

The primary purpose of the Trust is to promote education and training of cyber security, to identify ‘at-risk’ technically capable young people, encourage them to become productive members of society and to facilitate a pipeline of well-trained, qualified and experienced young people into the relatively new industries of Cloud and Cyber Security.
The CyberHub Trust enjoys various levels of support, including Sponsors (such as the tech company AWS), Partners (like the Career College Trust) and Special Advisors (such as the NCA and NCSC’s CyberFirst Programme. In addition, Further Education Colleges, where the CyberHub SOCs are situated, provide educational training, apprenticeships and Community Outreach Programmes.
The NCA is the National Crime Agency, which leads the UK’s fight to cut serious and organised crime. They also act as ‘Special Advisors’ to The CyberHub Trust. They provide support and assistance with regard to Community Outreach Programmes that identify ‘at-risk’ technically capable young people and encourage them to become productive members of society.
A CyberHub is centralised location, usually situated within an FE College, where students and apprentices are trained to work with (and work alongside) IT, Cloud and Cyber Security professionals, in order to prevent Cyber Crime, while simultaneously achieving educational qualifications and/or serving an apprenticeship. These students and apprentices are therefore given practical, ‘hands on’ experience, providing pathways to develop careers in the field of Digital Technology and the fight against Cyber Crime.
The CyberHub Trust launched its first CyberHub in Barking, London in 2020. There is also a Security Operations Centre (HQ) in Plymouth, with several satellite SOCs across the UK. Three additional CyberHub SOCs will be launched in 2021 in Liverpool, Birmingham and Manchester and additional locations in Reading and Lincoln are currently under review.
Cyber Security is the application of technologies, processes and controls to protect systems, networks, programmes, devices and data from cyber attacks.
Cyber Crime is an umbrella term for offences that either take place online, or where technology is a means/target for the attack.
Cyber-enabled Crime is where a crime can occur without the use of technology, but it is enhanced by its use. One example of this is fraudulent emails. These communications can be sent via letter in the post, but criminals now use emails, as they are free and can be sent out in greater volume. Another example is drugs being sold through the dark web, which increases the size of the buyer’s market and the amount of people that drug dealers can sell to.
In Cyber-dependent Crime, technology is necessary for someone to be able to commit that crime. An example of this is ‘unauthorised computer hacking’, as without the computer target, the offence could not take place.
Activities that seek to compromise technology such as computers, smartphones, tablets, websites and networks. This is illegal if a person doesn’t have permission to access that technology.
The white hat, black hat terms come from the old cowboy films in which the directors at the time had the ‘good guy’ wear a white hat and the ‘bad guy’ wear a black hat, so that the audience knew who they should be supporting from early-on in the movie. In the Cyber Security world, the white hats operate within the boundaries of the law, and the black hats do not.
Many cyber criminals first become interested in hacking because they have an interest in how technology works, and not necessarily for financial gain. This interest in technology can manifest itself through the modification of video games, which requires many of the same skills as hacking. When these skills are developed using systems and networks which the individual does not have permission to access, the individual may inadvertently commit a cyber offence. Forums are often used to increase knowledge. The individual may not think about who may be providing the information, or advice, on these forums and what their real intentions are. This is just one example of a pathway (that the NCA sees), but there are others.
Attempts to damage, disrupt or gain unauthorised access to computer systems, networks or devices.
A SOC acts like the Hub, or central command post, taking in data from across IT infrastructure, networks, devices, appliances, and information stores. The function of a SOC is to monitor, detect, investigate, and respond to cyberthreats; monitoring and protecting assets such as intellectual property (IP), personnel data and business systems. The SOC is led by a SOC Manager, and may include incident responders, SOC Analysts (Tiers 1, 2 & 3), threat hunters and incident response managers.
A Security Operations Centre is a central unit that oversees a company’s security through the use of people, procedures and technology. The idea is to detect and protect against cyber threats by collecting data in one central location, processing it with the latest technology and having trained security analysts conduct investigations on any alerts and anomalies raised.
In the context of the CyberHub Trust, a Digital College is a Further Education College (in the UK), that offers a specialism in Digital, or Cyber Technology.
The CyberHub Business Model requires expert and specialist cyber security services, which are provided by appropriately vetted Service Providers. Service Providers manage the Secure Operations Centres, partner with educators and oversee cyber security training and education, as well as provide shadowing and training opportunities for apprentices.
The CyberHub Trust operates a series of Secure Operations Centres, which are located within participating FE Colleges. These become Cyber Centres of Excellence, not only providing training, shadowing and mentoring opportunities, but also providing local businesses with cyber security and cyber testing services, as well as local Community Outreach Programmes.
The CyberHub Trust will work with Colleges to provide Community Outreach Programmes tailored to their local communities. This will include working with local Law Enforcement & Cyber Choice officers, the CyberFirst Schools Programme, the Barefoot Programme, BCS, and iDEA Programmes, Cisco Networking Academy, the HACKED Programme and others. The Trust will target both individuals and groups, including schoolchildren (5 years +), students, parents, pensioners and adults wishing to re-skill. See the Community Outreach page for more information.
To develop a professional career in Cyber, students can look at gain qualifications in Cyber Security. The CyberHub Trust operates in Further Education Colleges and together, we offer courses and qualifications in Information Technology, Cloud Computing and Cyber Security, with the added incentive that students learn while simultaneously receiving ‘shadowing’ and on-the-job training and/or apprenticeships. See the Training or Work & Learn pages for more information.
An Apprentice is someone who is learning a trade from a skilled employer, having agreed to work for a fixed period and wage. A Cyber Security Apprentice is therefore someone who is learning about cyber security whilst ‘on-the-job’ – and being paid at the same time. See the Work & Learn page for more information.
There are many Cyber Security Qualifications. The CyberHub Trust offers a comprehensive range of IT and Cyber Security courses, from basic to expert; for individuals starting their careers, to professionals continuing to develop their skills. These courses are industry-recognised certifications from the leading global vendors including CompTIA, Cisco & Microsoft, as well as online courses and badges from the Barefoot Programme, BCS, and iDEA Programmes, AWS Educate, AWS re/start and others. See the Training or Work & Learn pages for more information.