CS-centric software at Flemish companies
As part of this ESF project BeCode will develop a number of specific modules for ICT employees of companies who want to study the Cybersecurity aspects of their job.
White Hacker: a project supported by
As part of this project BeCode wants to develop a number of specific modules for ICT employees of companies who want to study the CS aspects of their job.
A number of components of the existing curriculum for jobseekers will be reworked and a format will be designed based on BeCode’s active pedagogy, allowing participants to apply their new insights straight to their own business cases.
The project is supported by the European Social Fund.
As part of this project BeCode wants to develop a number of specific modules for ICT employees of companies who want to study the Cybersecurity aspects of their job. A number of components of the curriculum for jobseekers will be reworked and a format will be sought that monitors active pedagogy from applications on their own business cases.
The training is aimed at all companies that are confronted with CS – and that is the vast majority of Flemish companies today, since a lot of critical infrastructure is nowadays running in networks and even the Cloud.
When these companies develop a CS strategy, we see in practice the need to quickly provide software developers and ICT staff in general with the necessary CS insights and to allow them to apply them in an efficient and effective way – either to better secure existing software applications and possibly even to detect and repel attacks, or to develop new software applications in a CS-centric way.
The training is aimed at the development of expert competencies for ICT employees (mainly programmers) who want to study the security of software applications.
The cyber security specialist has a thorough knowledge of hacking and defending a system. They need to acquire a strong knowledge base on the theory of cybersecurity (protocols, security procedures, etc.) and the internal functioning of modern operating systems (Linux, BSDs). They should be able to monitor, evaluate, advise and prevent the risks of a setup.
The following aspects are covered:
- Challenges to attack and defend a system (white hat hacker approach)
- Knowledge of UNIX and how computers work
- Evaluation set-ups
- Theoretical cyber security concepts & related technologies (incl. peer coaching)
- Use cases by & with field experts
- DevSecOps attitude & principles: scripting, programming, managing a system, etc …
For each concrete application, the following aspects are always addressed :
- Technical analysis
- Testing and validation
- Technical Support
- Technical control
The project will take place in several phases:
- Market validation & co-creation (December 2019 – October 2020)
- Development of training (March 2020 – November 2020)
- Pilot training (December 2020 – May 2021)