Boudica Cybersecurity Logo

Specialist Cybersecurity training by experienced academics, industry experts & researchers.

From our classroom & e-learning platform, we help you to defend digital realms from technologically advanced invaders.

Contact Us Now

With over 40 years of experience in the cybersecurity and computer science, our team are experts in the field with academic, research and industry experience.


We offer a wide range of education and training, from individuals to corporate delivery.

Bespoke Education & Training

We offer bespoke high-level training, education, and consulting in cybersecurity fundamentals, including compliance with relative standards and laws. We design bespoke courses that meet specific employment standards, and we work directly with local employers and recruiters to ensure students find their ideal roles. Both courses can be attended at our classrooms in Southampton, live from the office in and outside the UK or remotely via our e-learning platform with full tutor support.

Open Access Learning

We produce the Spotify chart-topping podcast, The Cyber Show, where our experts discuss pressing cybersecurity issues that impact our daily lives. Thousands of listeners world-wide stream the podcast each week and engage with the blog, which is often endorsed by other publications such as The Times HE and TechRights. Our podcast is backed by industry experts, enjoyed by millions, accessible, cost-free, and promotes our remit of "cybersecurity for everyone".

News & Events

A short collection of recent events, visits and news in the cybersecurity realm.

Why is Cybersecurity Training Important?

A part about us, what we do, and why.

Keeping organisations and citizens safe from bad actors is paramount in today's digital landscape. Cyber threats are becoming increasingly sophisticated, targeting our networks, systems, and devices daily. Just like Boudica, who fiercely defended her people, we must be equipped to defend ourselves against digital invaders.

Cybersecurity training plays a crucial role in preparing individuals to combat these threats effectively. By investing in comprehensive training programs, organizations can empower their employees with the knowledge and skills necessary to mitigate risks and protect sensitive data.

Here's why cybersecurity training is Important:

Defence Against Advanced Threats

As cyber-attacks become more complex, having highly trained employees is essential in maintaining robust defence mechanisms.

Cost Reduction

Effective cybersecurity training can significantly reduce the impact and costs associated with cyber incidents. By proactively identifying and addressing vulnerabilities, organisations can minimise the financial repercussions of breaches.

Fostering a Culture of Security Awareness

Cybersecurity training cultivates security awareness, fostering a proactive mindset where everyone in organisations takes responsibility for safeguarding sensitive information and detecting threats.

Compliance and Regulation

Staying compliant with industry regulations and standards is imperative for businesses. Cybersecurity training ensures that employees are aware of their responsibilities and helps organisations stay up to date with evolving compliance requirements.

Mitigating Supply Chain Risks

Research suggests that a significant portion of cyber threats originate from the supply chain. By educating employees on potential risks and best practices, organisations can mitigate these threats and safeguard their operations.

Countering Social Engineering Tactics

Social engineering remains one of the most prevalent methods used by cybercriminals. Training equips employees with the knowledge to recognise and thwart social engineering attacks, reducing the likelihood of successful breaches.

Investing in cybersecurity training is an investment in the resilience and security of your organisation. By arming employees with the necessary skills and knowledge, you can fortify your defences and mitigate the ever-evolving cyber threats that we face today.

Did You Know?

Supply Chain

Research suggests that up to 45% of cyber threats are now occurring directly through the supply chain.

Social Engineering

98% of cybercrimes rely on social engineering to work successfully.


According to industry giants, your cybersecurity budget should consist of 9-14% of your IT budget.

Training & Courses

We offer a range of bespoke training packages and courses, bespoke exactly to your needs.

Corporate Training Course
Suited for: All computer users and employees

  • Location: Remote and/or in our classrooms in Southampton, UK
  • Time: Can be booked every other Thursday or in your own time with our pre-recorded lectures with full access to our learning platforms.
  • Cost: £400 for Individual bookings. For larger bookings (15+), further discounts can be applied by contacting our booking team.
  • Assessment: Attendance Only
  • Recognition of Learning: Digital Certificate of Attendance

Our Corporate Training teaches our participants to become 007 when using computer devices at work, open to all computer users in the workplace.

We create digital warriors who will instinctively put data security over convenience in their work, keeping corporate data safe. Our training creates a lasting secure mindset by giving them a slice of the training the security experts receive, they learn how hackers behave, take part in some of those practises safely and learn how to keep themselves and corporate data secure.

Read more
Foundation Degree-Style Course (full/part time)
Suited for: Intermediate computer users, ⁠Technical Industry Professional, ⁠Career Upgrade and ⁠Professional Certification

  • Location: Remote and/or in our classrooms in Southampton, UK
  • Time: The course runs full-time every other week during academic terms and can be taken part-time over 5 weeks remotely with access to pre-recorded lectures, our learning platforms and mentor support.
  • Cost: £3,000 for Individual bookings, £10,000 for groups of 5 participants. For larger bookings, further discounts can be applied by contacting our booking team.
  • Assessment: A technical interview and presentation.
  • Recognition of Learning: Portfolio, academic reference, digital badge and certificate

Our Foundation Degree-Style Course has been designed to give those with advanced computer or technical skills the ability to immediately begin cybersecurity practises in the workplace or in education.

Read more


Dave Morton

Finance Professional

Top notch teaching from a professional and friendly team. Highly recommend!

Tanya Nikolova

UX Designer

Andy, Helen & Ed have shown great dedication, impressive knowledge and comprehension of Cyber Security. They were able to explain the hard ways and methods by which networks, systems, and devices work. They have been great consultants and teachers to have around. Do not hesitate to attend their training!

Marissa Jackson

Software Engineering Student

These guys care a great deal about their students and will go above and beyond to support their learning!

FAQs (Frequently Asked Questions)

Absolutely, we have a capacity of 30 onsite and another 30 remote which can be block booked for team training. If you enter all the contact information required in our booking section, we will onboard the whole team. We may not be able to accommodate a full booking on the specified date if we have already accepted students, but we will work with you to ensure a private training course.

In person is always advised as the lessons are more engaging and aid in memory retention. We also make it fun and social with a group drink at the end of the day.

The classroom will be open at 9:45am on site and at 9:30am online to iron out any IT related issues. Classes will start at 10pm and end at 6pm both on site and remote.

Remote lessons will be live streamed from our classrooms with our movement tracking technology giving students a great view. Students can interact live asking the online tutor questions in chat, just like in the classroom and the sessions will be recorded and uploaded to Moodle for all students to access at any time.

All students will need access to Microsoft Teams (this can be accessed via any web browser), a laptop for classroom training with minimum computer and network connection of the following specs:
  • Requires a 64-bit processor and operating system
  • OS: Windows 10/11 or Debian/Ubuntu Linux
  • Processor: Intel® Core™ i7-4770K / AMD Ryzen 5 1500X (or equivalent/newer)
  • Memory: 8 GB RAM (Windows), 4GB RAM (Linux)
  • Network: 20Mbps Down / 2Mbps Up
  • Storage: 150 GB available storage
Remote students can use any computer with the minimum specs, plus a microphone and webcam.

It is not required, we will go over everything as the course is intended for beginners.

Yes, we have a free car park at the front and left side of the building, which can become full quickly. Alternatively, road parking is free and always available along Brunel Road.

We do not provide catering. However, the Testwood pub with great food is a 5 minute walk from our building. There is also a Starbucks within walking distance.

We issue you with a digital badge within 5 working days of the course completion, in addition to a congratulatory announcement from Boudica Cybersecurity, which is shared across our platforms with our partners.

We teach in a classical lecture format, adided by a digital and AI infused presentation. In addition, each module is completed with an exciting real time demonstration or activity.
Have any additional questions? Don't hesistate to contact us!

Upcoming Dates

Corporate Training Course
Date Availability
Thursday 28th March Booking Closed  
Thursday 25th April Booking Closed  
Thursday 09th May Booking Closed  
Thursday 23rd May Booking Closed  
Thursday 13th June Booking Closed  
Thursday 11th July Available to Book   Book
Thursday 05th September Available to Book   Book
Thursday 19th September Available to Book   Book
Thursday 03rd October Available to Book   Book
Thursday 17th October Available to Book   Book
Thursday 07th November Available to Book   Book
Thursday 21st November Available to Book   Book
Thursday 05th December Available to Book   Book
Thursday 19th December Available to Book   Book
Foundation Degree-Style Course
Date Availability
Monday 18th March Booking Closed  
Monday 15th April Booking Closed  
Monday 29th April Booking Closed  
Monday 13th May Booking Closed  
Monday 03rd June Booking Closed  
Monday 17th June Booking Closes Soon   Book
Monday 01st July Available to Book   Book
Monday 15th July Available to Book   Book
Monday 09th September Available to Book   Book
Monday 23rd September Available to Book   Book
Monday 07th October Available to Book   Book
Monday 21st October Available to Book   Book
Monday 11th November Available to Book   Book
Monday 25th November Available to Book   Book
Monday 09th December Available to Book   Book

Training & Consulting Services

Bespoke Consulting

We offer bespoke consultation for existing systems and products; producing a detailed report on suggested security improvements to reduce the risk of cyber-attacks, ensuring compliance to laws and standards such as GDPR and ETSI 303 645.
We provide bespoke cybersecurity consultation services to small-medium businesses in our catchment area (South Central/South East of England). We start with a 1-hour free consultation to understand our clients' requirements followed by an individual quotation, on a case-by-case basis.


Our Amazing Team

With a combined 40+ years of experience, our compact yet highly accomplished team excel in research, authorship, teaching, and cybersecurity.

Andy Farnell

Dr Andy Farnell

Read Bio

Research & Ethics Lead

Helen Plews

Helen Plews

Read Bio

Vendor & Malware Lead

Ed Nevard

Ed Nevard

Read Bio

Pentesting & Resillience Lead

We bring a wealth of knowledge to our endeavours, making us a formidable force in our respective domains. As researchers, authors, educators, and cybersecurity experts, our team is dedicated to excellence, pushing the boundaries of knowledge and innovation in our fields.

British Computer Society Logo

All of our leadership teaching staff are BCS Professional members.

Partnered With

Cybershow Logo
KP Acoutics Logo

Contact Us

We would love to hear from you!

(+44) 01202 022249

Give us a call Monday - Friday between 9AM - 5PM (except bank holidays).

Send us an email, we will endeavour to get back to you within 1-2 business days.

Corporate Training Course

Our Corporate Training teaches our participants to become 007 when using computer devices at work, open to all computer users in the workplace. We create digital warriors who will instinctively put data security over convenience in their work, keeping corporate data safe. Our training creates a lasting secure mindset by giving them a slice of the training the security experts receive, they learn how hackers behave, take part in some of those practises safely and learn how to keep themselves and corporate data secure.

Our course is highly educational and entertaining bringing a university environment for learning to a far broader audience. It covers the training requirements set out in the ISO 27001 standard, cyber essentials, EU standards such as the cyber resilience act and trains in depth GDPR compliance.

The course contains 6.5 hours of live recorded lectures, an ethical hacking workshop from our secure lab and 12 months licensed access to our e-learning materials for each participant. There are mini assessments throughout our course of a practical nature and not quiz-based, which can tracked by the training manager for full support.

Learning Path *For large licencing for remote lectures and platform access please contact our on-boarding team for a bespoke price reduction suitable for your needs. Enquire
Foundation Degree-Style Course (full/part time)

Our Foundation Degree-Style Course has been designed to give those with advanced computer or technical skills the ability to immediately begin cybersecurity practises in the workplace or in education.

7 hours of lectures are spread out over 5 subjects for a total of 35 hours teaching time with 24/7 remote access to our learning platforms, test environment, textbooks, with an extra 7 days of access for assessments.

Participants will learn how to secure data, systems, networks, applications and to begin monitoring and penetration testing immediately upon completion. The course ends with a guided assessment which forms a portfolio for each student showcasing their new abilities and technical talent.

For many industries the pace of technological advancement is incredibly fast and cybersecurity skills and practises are often left behind, putting companies at risk. Our advanced course will give technical staff and advanced computer operators the high-level cybersecurity skills required to mitigate risk with existing and future technology.

The course is extensive and so is highly advised as an aid to professional certificate examinations such as CompTIA Security+, Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH) which our mentors can offer guidance.


Our students learn how to keep their company and personal data secure with cyber security fundamentals exploring topics such as memorable password creation, controlling metadata, updating systems, authentication and trust policy.

This subject looks at how computer networks operate in our homes, businesses and worldwide creating the internet. It covers machine language, the transmission of data at a scientific level, OSI/TCP model for network engineering, secure network designs, secure cloud management, and securing IoT devices and websites.

This subject looks forensically at each of the components in computer from the hardware to how operating systems function whilst studying the history of computer science and programming. The practical side of the subject will teach participants the Linux operating system and the programming language BASH used on the command line to an intermediate level.

We end the course by looking at the psychology of hackers, victims, and everyday users of the internet. Participants will learn how to reduce digital footprints, avoid dangerous websites and scams, and put 0-trust into practise. It uses real world examples to identify and defend against even the most advanced social engineering attacks such as pretexting and business email compromise.

Delve into the realm of ethical hacking, where participants learn to harness their cybersecurity skills for proactive defense. This subject empowers students with the knowledge and tools required to identify and address vulnerabilities in computer systems, networks, and applications, covering topics including penetration testing, security assessment, legal and ethical frameworks, incident response, and more.

Here we look at cryptography, the history of secret communications and how that works today. Students will look at cryptographic processes such as Diffie-Hellman, the blockchain and cryptographic key creation. Participants will learn how to use those skills to send and obscure data, files and information securely across the internet.

Course Funding Advice & Resources

Dr Andy Farnell
Andy Farnell

Dr Andy Farnell
PhD BSc (Hons)

Research & Ethics Lead

Dr. Andy Farnell is a British computer scientist and electronics engineer who established the field of Procedural Audio. He authored the influential MIT textbook 'Designing Sound', described as the bible of computational sound design.

Andy’s role as a systems and signal processing specialist has involved work with prominent artists, directors and developers. His work includes machine learning, signal analysis, search, storage, hardware and software product design.

As a visiting professor at many European Universities and consultant to new media technology companies, Andy is a well-known teacher and mentor with over 30 years’ experience.

Alongside his role at Boudica, he is currently writing his new book, 'Ethics for Hackers'.

Helen Plews
Helen Plews

Helen Plews
MSc BA (Hons) MBCS

Vendor & Malware Lead

Helen Plews has an MSc in Cyber Security Engineering. She has a strong background in infrastructure development, support roles, system administration and security analysis working in diverse companies from entertainments to construction and ISPs, including The Listening Company where she worked on the launch of Sky Broadband in the UK and The Mayflower Theatre in Southampton.

Helen has research interests in cybersecurity, digital rights, women in tech, and child online safety and is a speaker and organiser of conferences, including Solent’s AI showcase conference, where she presented research work on Vendor Malware.

She combines a passion for technology since a young age with a talent for performing arts and media production, managing and touring as lead of a music stage act and founding a lable She is currently presenter and co-founder of The Cybershow.

Helen is a natural teacher and puts her Bachelors degree in Performing Arts to great use with classes. With the flair of a rock-star she turns seemingly dull subjects like Internet Protocols into captivating entertainment.

Ed Nevard
Ed Nevard

Ed Nevard

Pentesting & Resillience Lead

Ed has had an innate appreciation of technology since he can remember, following the footsteps of his late father, an IT field engineer, who configured and deployed the first production IP networks in the UK during the late 1980s and 90s. Ed always knew that he wanted to work in IT, recognising the endless possibilities and risks tech brings.

Ed carried this passion from secondary school, where he joined the Digital Leaders group. Over 5 years, Ed supported students and teaching staff with new technology implementation and represented the group at various events including BAFTA, BETT & Hampshire Council conferences, co-presenting talks on the future of IT in education to key decision-makers.

At college, Ed actively participated in events, including Lockheed Martin’s annual Code Quest. He discovered his passion for cyber security after discovering security vulnerabilities in his college’s IT systems, supporting the IT managers to mitigate them. Ed left college in 2018, achieving a Distinction*Distinction* in his Oxbridge & RSA OND in IT.

Ed then began studying Computer Systems & Networks Engineering at university. In his first year, alongside studies, he won the first academic excellence grant from a local charity and fostered the growth of one of the largest IT professional community groups worldwide to date, This is an IT Support Group; now with over 120k+ members worldwide. He graduated in 2021, achieving a 1:1 (1st) with Honours. Ed began studying his MSc in Cyber Security Engineering the same year and graduated in 2022 with a Distinction.

Alongside Boudica & The Cyber Show, Ed continues to manage a range of IT professionals’ networks and is currently writing The Cyber Self-Defence Handbook. He has been a member of the British Computer Society since 2020.