Academia

Sorinteq is proud to announce our new exciting partnership with the University of Buckingham.  Sorinteq and UOB now jointly offer a range of Academic qualifications for cyber and Intelligence professionals. 

Our new program allows learners to either join structured pathways to build their academic credits to build to the level required or build their own pathway that fits their personal, operational and learning needs. 

Our pathway allows learners to complete a full MSc in Cyber Security and Intelligence, however  learners are able to step off at annual points to qualify in a Post Graduate Certificate, PGCert or a Post Graduate Diploma, PGDip. 

Buckingham University Collaboration

Sorinteq are extremely proud to announce our collaboration with the university of Buckingham. Our unique MSc in cyber
security and intelligence allows students to study at the following levels:

Pg Certificate in Cyber Security and Intelligence

All courses offered by Sorinteq are credit bearing in regards to our Academic program.  Whilst there is no requirement or expectation for students to embark on the academic program this is available to present and past students of Sorinteq courses. 

Our students can embark on one of our foundation pathways to build the necessary credits towards academic qualification or are able to select and build their own course content from our suite of training courses available. 

On reaching the necessary hours required for study and classroom attendance, students embark on a final exercise which runs as an intelligence gathering exercise on the live internet.  The exercise is ran as a Capture The Flag process allowing a full review and management of a learners progress, including answers, both correct and incorrect, time spent on a particular question or subject  and evidence uploaded to the platform.  Students are required to conduct a written deployment record following the exercise and are provided a personal record and feedback for their time spent on the program. 

Students can leave the program at this point and receive a PGCert from the University of Buckingham or stay on to year 2 to qualify for the PGDip.  Students graduate from the university and attend a graduation ceremony for their qualification certificate. 

Overview of PGCert Content 

Phoenix Program 

9 modules each module 2 days in duration 

Written essay on cyber crime 5000 words 

Modules covered include; 

  • Introduction to cyber crime 
  • Crypto currency 
  • Darknet investigations 
  • Security in Cyber Ops 
  • Fundamental Cyber Recon 
  • Fundamental RF exploitation  
  • Fundamental Humint in Cyber Ops 
  • Intermediate Cyber Recon 
  • Covert Account Access 

Athena Program 

9 modules each module 2 days in duration  

Written essay on building your covert exploitation toolkit 5000 words 

Subjects covered in program; 

  • Building a deployment platform module 
  • Security device management module 
  • Android Operating System module 
  • Operating systems overview Module 
  • Network communications module 
  • Language module 
  • Infrastructure of the Internet Module 
  • Encryption and secure data transmission Module 
  • Server creation and interrogation Module 

Covert Internet Investigator Program 

8 modules each module 2-5 days in duration 

Written essay on Digital Humint 5000 words 

Modules covered include; 

  • Legal considerations in digital investigations 
  • Building your CII toolkit and team 
  • Intermediate Internet Intelligence & Investigation course 
  • Fundamentals in Digital Humint 
  • Fundamental Darknet Investigations 
  • Fundamental Crypto currency investigations 
  • Intermediate Digital Humint  
  • Fundamental Cyber Recon 

Protective Security Pathway 

9 modules each module 2 days in duration  

Written essay on conducting a client security assessment 5000 words 

Subjects covered in program; 

  • Physical Security module 
  • Personnel security module 
  • Digital Security module 
  • Application and design of security Module 
  • Security Risk & analysis and investigative 101 module 
  • Physical and technical counter surveillance module 
  • Technical security support to Physical security Module 
  • OSINT supporting Protective security role Module 

Pg Diploma in Cyber Security and Intelligence

Students embarking on year two of the MSc program will have to have successfully completed a year one pathway and be accredited to a Pg Certificate level.  Year 2 offers learners the opportunity to tailor their academic study to an area they have a specialised Students embarking on year two of the MSc program will have to have successfully completed a year one pathway and be accredited to a PGCert level.  Year 2 offers learners the opportunity to tailor their academic study to an area they have a specialised interest or operational need in.  As the MSc is a research degree there is an expectation that students will work towards conducting research in their chosen field to both enhance their knowledge and understanding but also provide leading edge knowledge in their chosen field and enhance their operational capability. 

All students embark on module One which is an introduction to Academic study.   This module ensures students are ready to study at post graduate level regardless of their prior learning or academic experience.  Once Module One is completed students can elect a pathway that best suits their needs, experience and operational requirement to focus their study and research in their chosen pathway.  Learners PGDip studies culminates in the completion of an essay which will detail what research they intend to conduct when progressing to the MSc year Three.  As this is still the vocational element of the Academic program Learners will have access to experts from the Sorinteq team to assist in the identification and development of their chosen research area. 

Overview of PGDip content 

Compulsory 

Module One – Classroom Phase 

Orientation to Academic Study 

Overview of Academic writing, Literature review and conducting research methodology 

Module One – Distance learning phase 

Literature review in subject related to their choice of pathway for the course 5000 words 

Pathway One Artificial Intelligence and cyber reconnaissance  

Module One - AI in cyber Ops 

Classroom taught module 

2 day course in AI 

Written element 

Written paper on how AI can assist or develop current cyber ops 7500 words 

Module Two - Advanced cyber recon techniques  

Taught classroom phase 

2 day course in advanced recon techniques 

Written element 

Written paper on how AI can implement and support advanced recon  techniques in cyber ops.  7500 words 

Module Three 

Written paper on planned research related to AI and advanced recon in cyber ops. 7500 words 

Pathway Two – Human Intelligence techniques in advanced cyber Ops 

Module One - Intermediate Humint in cyber Ops (This can change to Advanced if we run a humint year one pathway) 

Classroom phase  

2 days – Intermediate humint 

Written element 

Written paper on how Humint tactics can be utilised in cyber ops 5000 words 

Module Two - Use of Humint delivered technical attack 

Classroom phase 

2 days – IP grabbing and Delivery mechanisms 

Written element 

Written paper on the creation and use of Humint delivered technical attack techniques in cyber ops 7500 words 

Module Three 

Written paper on planned research related to Humint delivered technical attack techniques.  7500 words 

Pathway Three – Digital media investigations 

Module One - Advanced Digital media investigations 

Classroom phase 

2 day course in Advanced Digital Media Investigation techniques 

Written element 

Written paper on the use of digital media investigative techniques to support cyber ops 

Module Two - Use and development of tools to support Digital Media investigations 

Classroom Phase 

2 day course in tool use and development in DM investigations 

Written element 

Written paper on the use or development of DM investigative tools 

Module Three 

Written paper on planned research related to tool use or development in Digital Media investigations.  7500 words 

Pathway Four – Technical Equipment Interference Operations 

Module One – Advanced network exploitation 

Classroom phase 

2 day course in Advanced network exploitation techniques 

Written element 

Written paper on the use of network exploitation techniques to support cyber ops 

Module Two - Use and development of tools to support network exploitation activities 

Classroom Phase 

2 day course in tool use and development in TEI activity 

Written element 

Written paper on the use or development of network exploitation tools 

Module Three 

Written paper on planned research related to tool use or development in network exploitation activity.  7500 words