Boudica Cybersecurity Logo

Specialist Cybersecurity training by experienced academics, industry experts & researchers.

From our classroom & e-learning platform, we help you to defend digital realms from technologically advanced invaders.

Contact Us Now

Services

We offer a wide range of education and training, from individuals to corporate delivery.

Bespoke Education & Training

We offer bespoke high-level training, education, and consulting in cybersecurity fundamentals, including compliance with relative standards and laws. We design bespoke courses that meet specific employment standards, and we work directly with local employers and recruiters to ensure students find their ideal roles. Both courses can be attended at our classrooms in Southampton, live from the office in and outside the UK or remotely via our e-learning platform with full tutor support.

Open Access Learning

We produce the Spotify chart-topping podcast, The Cyber Show, where our experts discuss pressing cybersecurity issues that impact our daily lives. Thousands of listeners world-wide stream the podcast each week and engage with the blog, which is often endorsed by other publications such as The Times HE and TechRights. Our podcast is backed by industry experts, enjoyed by millions, accessible, cost-free, and promotes our remit of "cybersecurity for everyone".

News & Events

A short collection of recent events, visits and news in the cybersecurity realm.

Why is Cybersecurity Training Important?

A part about us, what we do, and why.

Keeping organisations and citizens safe from bad actors is paramount in today's digital landscape. Cyber threats are becoming increasingly sophisticated, targeting our networks, systems, and devices daily. Just like Boudica, who fiercely defended her people, we must be equipped to defend ourselves against digital invaders.

Cybersecurity training plays a crucial role in preparing individuals to combat these threats effectively. By investing in comprehensive training programs, organizations can empower their employees with the knowledge and skills necessary to mitigate risks and protect sensitive data.

Here's why cybersecurity training is Important:

Defence Against Advanced Threats

As cyber-attacks become more complex, having highly trained employees is essential in maintaining robust defence mechanisms.

Cost Reduction

Effective cybersecurity training can significantly reduce the impact and costs associated with cyber incidents. By proactively identifying and addressing vulnerabilities, organisations can minimise the financial repercussions of breaches.

Fostering a Culture of Security Awareness

Cybersecurity training cultivates security awareness, fostering a proactive mindset where everyone in organisations takes responsibility for safeguarding sensitive information and detecting threats.

Compliance and Regulation

Staying compliant with industry regulations and standards is imperative for businesses. Cybersecurity training ensures that employees are aware of their responsibilities and helps organisations stay up to date with evolving compliance requirements.

Mitigating Supply Chain Risks

Research suggests that a significant portion of cyber threats originate from the supply chain. By educating employees on potential risks and best practices, organisations can mitigate these threats and safeguard their operations.

Countering Social Engineering Tactics

Social engineering remains one of the most prevalent methods used by cybercriminals. Training equips employees with the knowledge to recognise and thwart social engineering attacks, reducing the likelihood of successful breaches.

Investing in cybersecurity training is an investment in the resilience and security of your organisation. By arming employees with the necessary skills and knowledge, you can fortify your defences and mitigate the ever-evolving cyber threats that we face today.

Did You Know?

Supply Chain

Research suggests that up to 45% of cyber threats are now occurring directly through the supply chain.

Social Engineering

98% of cybercrimes rely on social engineering to work successfully.

Budget

According to industry giants, your cybersecurity budget should consist of 9-14% of your IT budget.

Training & Courses

We offer a range of bespoke training packages and courses, bespoke exactly to your needs.

1-Day Comprehensive Cybersecurity Bootcamp
Suited for: All computer users and employees

  • Location: Remote and/or in our classrooms in Southampton, UK
  • Time: Can be booked every other Thursday or in your own time with our pre-recorded lectures with full access to our learning platforms.
  • Cost: £750 for Individual bookings, £2,500 for groups of 5 participants. For larger bookings, further discounts can be applied by contacting our booking team.
  • Assessment: Attendance Only
  • Recognition of Learning: Digital Certificate of Attendance

Our 1-day Bootcamp has been designed for all those who work with computers every day to improve their digital literacy and cybersecurity abilities. With conventional training not quite ironing out the phishing errors and GDPR failures, we created our 1-day bootcamp to address this growing digital skills gap.


Read more
1-Week Advanced Cybersecurity Course (full/part time)
Suited for: Intermediate computer users, ⁠Technical Industry Professional, ⁠Career Upgrade and ⁠Professional Certification

  • Location: Remote and/or in our classrooms in Southampton, UK
  • Time: The course runs full-time every other week during academic terms and can be taken part-time over 5 weeks remotely with access to pre-recorded lectures, our learning platforms and mentor support.
  • Cost: £3,000 for Individual bookings, £10,000 for groups of 5 participants. For larger bookings, further discounts can be applied by contacting our booking team.
  • Assessment: A technical interview and presentation.
  • Recognition of Learning: Portfolio, academic reference, digital badge and certificate

Our 1-week advanced bootcamp has been designed to give those with advanced computer or technical skills the ability to immediately begin cybersecurity practises in the workplace or in education.


Read more

Testimonials

Dave Morton

Finance Professional

Top notch teaching from a professional and friendly team. Highly recommend!

Tanya Nikolova

UX Designer

Andy, Helen & Ed have shown great dedication, impressive knowledge and comprehension of Cyber Security. They were able to explain the hard ways and methods by which networks, systems, and devices work. They have been great consultants and teachers to have around. Do not hesitate to attend their training!

Marissa Jackson

Software Engineering Student

These guys care a great deal about their students and will go above and beyond to support their learning!

FAQs (Frequently Asked Questions)

Absolutely, we have a capacity of 30 onsite and another 30 remote which can be block booked for team training. If you enter all the contact information required in our booking section, we will onboard the whole team. We may not be able to accommodate a full booking on the specified date if we have already accepted students, but we will work with you to ensure a private training course.

In person is always advised as the lessons are more engaging and aid in memory retention. We also make it fun and social with a group drink at the end of the day.

The classroom will be open at 9:45am on site and at 9:30am online to iron out any IT related issues. Classes will start at 10pm and end at 6pm both on site and remote.

Remote lessons will be live streamed from our classrooms with our movement tracking technology giving students a great view. Students can interact live asking the online tutor questions in chat, just like in the classroom and the sessions will be recorded and uploaded to Moodle for all students to access at any time.

All students will need access to Microsoft Teams (this can be accessed via any web browser), a laptop for classroom training with minimum computer and network connection of the following specs:
  • Requires a 64-bit processor and operating system
  • OS: Windows 10/11 or Debian/Ubuntu Linux
  • Processor: Intel® Core™ i7-4770K / AMD Ryzen 5 1500X (or equivalent/newer)
  • Memory: 8 GB RAM (Windows), 4GB RAM (Linux)
  • Network: 20Mbps Down / 2Mbps Up
  • Storage: 150 GB available storage
Remote students can use any computer with the minimum specs, plus a microphone and webcam.

It is not required, we will go over everything as the course is intended for beginners.

Yes, we have a free car park at the front and left side of the building, which can become full quickly. Alternatively, road parking is free and always available along Brunel Road.

We do not provide catering. However, the Testwood pub with great food is a 5 minute walk from our building. There is also a Starbucks within walking distance.

We issue you with a digital badge within 5 working days of the course completion, in addition to a congratulatory announcement from Boudica Cybersecurity, which is shared across our platforms with our partners.

We teach in a classical lecture format, adided by a digital and AI infused presentation. In addition, each module is completed with an exciting real time demonstration or activity.
Have any additional questions? Don't hesistate to contact us!

Upcoming Dates

1-Day Comprehensive Cybersecurity Bootcamp
Date Availability
Thursday 14th December Booking Closed  
Thursday 11th January Booking Closed  
Thursday 18th January Booking Closed  
Thursday 25th January Booking Closed  
Thursday 01st February Booking Closed  
Thursday 08th February Booking Closed  
Thursday 29th February Booking Closed  
Thursday 14th March Available to Book   Book
Thursday 28th March Available to Book   Book
Thursday 25th April Available to Book   Book
Thursday 09th May Available to Book   Book
Thursday 23rd May Available to Book   Book
Thursday 13th June Available to Book   Book
Thursday 11th July Available to Book   Book
1-Week Advanced Cybersecurity Course
Date Availability
Monday 19th February Booking Closed  
Monday 04th March Booking Closed  
Monday 18th March Available to Book   Book
Monday 15th April Available to Book   Book
Monday 29th April Available to Book   Book
Monday 13th May Available to Book   Book
Monday 03rd June Available to Book   Book
Monday 17th June Available to Book   Book
Monday 01st July Available to Book   Book
Monday 15th July Available to Book   Book

Training & Consulting Services

Bespoke Consulting

We offer bespoke consultation for existing systems and products; producing a detailed report on suggested security improvements to reduce the risk of cyber-attacks, ensuring compliance to laws and standards such as GDPR and ETSI 303 645.
We provide bespoke cybersecurity consultation services to small-medium businesses in our catchment area (South Central/South East of England). We start with a 1-hour free consultation to understand our clients' requirements followed by an individual quotation, on a case-by-case basis.

Enquire

Our Amazing Team

With a combined 40+ years of experience, our compact yet highly accomplished team excel in research, authorship, teaching, and cybersecurity.

Andy Farnell

Dr Andy Farnell
PhD BSc (Hons)

Research & Ethics Lead

Helen Plews

Helen Plews
MSc BA (Hons) MBCS

Vendor & Malware Lead

Ed Nevard

Ed Nevard
MSc BSc (Hons) OND MBCS

Pentesting & Resillience Lead

We bring a wealth of knowledge to our endeavours, making us a formidable force in our respective domains. As researchers, authors, educators, and cybersecurity experts, our team is dedicated to excellence, pushing the boundaries of knowledge and innovation in our fields.

Working Closely With

Cybershow Logo
British Computer Society Logo
KP Acoutics Logo
Tequate Logo

Contact Us

We would love to hear from you!

(+44) 01202 022249

Give us a call Monday - Friday between 9AM - 5PM (except bank holidays).

contact@boudicasecurity.com

Send us an email, we will endeavour to get back to you within 1-2 business days.

1-Day Comprehensive Cybersecurity Bootcamp

Our 1-day Bootcamp has been designed for all those who work with computers every day to improve their digital literacy and cybersecurity abilities. With conventional training not quite ironing out the phishing errors and GDPR failures, we created our 1-day bootcamp to address this growing digital skills gap.

Our comprehensive and balanced bootcamp caters to all levels, including those who struggle with technology. The bootcamp is both practical and theoretical because we know nothing works better than show, tell and do.

Our participants gain access to our bespoke test environment to run their own simple cyber-attacks and get real industry backed knowledge in how hackers, gangs and criminals on the internet operate, to defend against it every time. They dramatically improve their entire way of working with technology both at work and home, putting security and data protection first.

Learning Path *For large licencing for remote lectures and platform access please contact our on-boarding team for a bespoke price reduction suitable for your needs. Enquire
1-Week Advanced Cybersecurity Course (full/part time)

Our 1-week advanced bootcamp has been designed to give those with advanced computer or technical skills the ability to immediately begin cybersecurity practises in the workplace or in education.

7 hours of lectures are spread out over 5 subjects for a total of 35 hours teaching time with 24/7 remote access to our learning platforms, test environment, textbooks, with an extra 7 days of access for assessments.

Participants will learn how to secure data, systems, networks, applications and to begin monitoring and penetration testing immediately upon completion. The bootcamp ends with a guided assessment which forms a portfolio for each student showcasing their new abilities and technical talent.

For many industries the pace of technological advancement is incredibly fast and cybersecurity skills and practises are often left behind, putting companies at risk. Our advanced bootcamp will give technical staff and advanced computer operators the high-level cybersecurity skills required to mitigate risk with existing and future technology.

The course is extensive and so is highly advised as an aid to professional certificate examinations such as CompTIA Security+, Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH) which our mentors can offer guidance.

Subjects

Our students learn how to keep their company and personal data secure with cyber security fundamentals exploring topics such as memorable password creation, controlling metadata, updating systems, authentication and trust policy.

This subject looks at how computer networks operate in our homes, businesses and worldwide creating the internet. It covers machine language, the transmission of data at a scientific level, OSI/TCP model for network engineering, secure network designs, secure cloud management, and securing IoT devices and websites.

This subject looks forensically at each of the components in computer from the hardware to how operating systems function whilst studying the history of computer science and programming. The practical side of the subject will teach participants the Linux operating system and the programming language BASH used on the command line to an intermediate level.

We end the bootcamp by looking at the psychology of hackers, victims, and everyday users of the internet. Participants will learn how to reduce digital footprints, avoid dangerous websites and scams, and put 0-trust into practise. It uses real world examples to identify and defend against even the most advanced social engineering attacks such as pretexting and business email compromise.

Delve into the realm of ethical hacking, where participants learn to harness their cybersecurity skills for proactive defense. This subject empowers students with the knowledge and tools required to identify and address vulnerabilities in computer systems, networks, and applications, covering topics including penetration testing, security assessment, legal and ethical frameworks, incident response, and more.

Here we look at cryptography, the history of secret communications and how that works today. Students will look at cryptographic processes such as Diffie-Hellman, the blockchain and cryptographic key creation. Participants will learn how to use those skills to send and obscure data, files and information securely across the internet.

Course Funding Advice & Resources

Enquire