Feeds

UK.gov to train up 11-year-old cyberwarriors

Biz-backed scheme aims to create white hat apprentices

The Essential Guide to IT Transformation

British schoolkids as young as 11 will be trained in cyber security as part of a new drive to protect the UK from digital threats.

The government will produce learning materials designed to get 11- to 14-year-olds up to speed on cyber security.

If the kids show a willingness to strap on a keyboard and fight in some foreign corner of the internet, they will be able to take part in higher-level and advanced cyber-security apprenticeships.

The scheme was announced in a report entitled "Cyber Security Skills: Business Perspectives and Government’s Next Steps" which is published today.

Universities and Science Minister David Willetts said: "Today countries that can manage cyber security risks have a clear competitive advantage.

"By ensuring cyber security is integral to education at all ages, we will help equip the UK with the professional and technical skills we need for long-term economic growth."

The plans in the new report were directly inspired by chats with business leaders.

As well as "UK employer-led cyber security higher and advanced level apprenticeship schemes", there will be special lessons aimed at Key Stage Three (age 11-14) pupils.

A Massive Open Online Course will be set up for interested pupils, whilst an educational scheme called Secure Futures will roll out in London and Manchester.

Sir David Pepper, of the Cyber Security Skills Alliance, said: "We warmly welcome this report and the actions it proposes. It is clear from this and our own research that the national shortage of cyber skills is a key issue for businesses and government in the fight against the growing threat from cyber crime.

"We will work closely with the government and industry in support of this programme, in particular to help establish career paths in cyber security and improve recruitment and training." ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.