Download PDF version Contact company

CovertSwarm, a global ethical hacker, red team, and cybersecurity solution provider, launched its Academy Program last September and is welcoming its second intake at the same time this year. The first iteration of the Academy Program proved to be a huge success, with all three academy members kick-starting successful ethical hacking careers at CovertSwarm.

The program aims to make careers in cybersecurity more accessible, providing a clear pathway for individuals from any background to receive specialised training in core areas of cybersecurity, equipping participants with the technical skills and mindset needed to become ethical hackers.

Ethical hacking course

What do students say about the ethical hacking course from CovertSwarm’s Academy Program?

Joao - one of the first three academy members - gained the skills to perform a variety of different attacks

Joao - one of the first three academy members - gained the skills to perform a variety of different attacks, including reconnaissance, web application and perimeter attacks, vishing, and successfully socially engineered his way into one of CovertSwarm’s clients’ offices. Reflecting on his six months of the program, Joao said: “It has been a great experience having the time and resources to enhance my skills, along with the opportunity to learn from professionals who guide me in my new cybersecurity career.” 

John, another academy member, found his passion for hardware hacking, already helping to plan, code and build as part of the Academy’s DEFCON badge project. Jack Smith, a CovertSwarm Hive Leader and owner of the Academy Program, said: “Since joining the Swarm, John’s natural attention to detail has helped hone his OSINT skills, and his background in learning web application hacking has given him a strong platform to start his career."

Detailed training platforms

John had the following to say about his experience on the program so far: “The CovertSwarm Academy has been an amazing opportunity for me so far. It is refreshing to work in an environment where we are provided with the resources to learn about the cyber security world through detailed training platforms, whilst also being able to collaborate with and learn from the swarm in real-world cases."

"We are also able to work around our own schedule which is a massive help if you have any appointments that can’t be at the weekend — you don’t need to take time off to go to them.” This year’s intake see’s another six recruits joining the academy and hive member, Iain Jackson, promoted to Academy Hive Leader, offering closer support to the members and allowing the academy to scale up. 

Careers in cybersecurity

Jack Smith said: “We are thrilled with the success of our Academy Program and the incredible achievements of our first intake. Seeing our members, like Joao and John, develop their skills and kick-start their careers in ethical hacking has been immensely rewarding. Their success has paved the way for us to welcome a second intake and expand our support by promoting Iain Jackson into the newly created Academy Hive Leader role.

We are excited to continue empowering individuals to begin their careers in cybersecurity, making a real impact on their lives and significantly contributing to the fight against fraud."

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?