Feeds

GCHQ names the Hogwarts for Hackers

Security agency certifies Master of Cyber Security degree at 6 Brit universities

Secure remote control for conventional and virtual desktops

The UK's Government Communications Headquarters (GCHQ) has certified six Masters of Cyber Security degrees.

The certifications were issued under the UK's Cyber Security Strategy that, among other things, calls for the nation to “Strengthen postgraduate education to expand the pool of experts with in-depth knowledge of cyber.” With more postgraduates qualified in security disciplines, the argument goes, the UK will have more expert practitioners that can keep the nation safe by offering superior security services to public and private sector organisations.

While the Strategy was issued in 2011, it was only earlier this year that Universities were asked to put their courses under the microscope for assessment. That process saw at least three assessors, including one academic, run their eyes over each tertiary institution's applications. Four made the grade, namely:

  • Edinburgh Napier University's MSc in Advanced Security and Digital Forensics
  • Lancaster University's MSc in Cyber Security
  • University of Oxford's MSc in Software and Systems Security
  • Royal Holloway, University of London's MSc in Information Security

Cranfield University's MSc in Cyber Defence and Information Assurance and the University of Surrey's MSc in Information Security won provisional certification, which means the courses look great but as there hasn't been a cohort complete the qualification GCHQ is reserving final judgement.

The announcement of this batch of certifications isn't the end of things, as GCHQ plans to open the books to universities again later in 2014. The agency also plans to continue identifying security centres of excellence to advance research and defensive efforts. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.