{"id":382,"date":"2025-03-30T19:12:21","date_gmt":"2025-03-30T18:12:21","guid":{"rendered":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/?p=382"},"modified":"2025-03-30T19:12:47","modified_gmt":"2025-03-30T18:12:47","slug":"2024-icss-cyber-security-conversion-student-prize","status":"publish","type":"post","link":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/2025\/03\/30\/2024-icss-cyber-security-conversion-student-prize\/","title":{"rendered":"MSc Computer Science (Cyber Security) student Andrew Phipps won 2024 iCSS Cyber Security Conversion Prize"},"content":{"rendered":"<p>Congratulations to Andrew Phipps who won the 2024 iCSS Cyber Security Conversion Prize (master course)!<\/p>\n<p>Andrew has won the Institute of Cyber Security for Society (iCSS) prize as he achieved the <em>highest final average mark <\/em>of the <a href=\"https:\/\/www.kent.ac.uk\/courses\/postgraduate\/3816\/computer-science-artificial-intelligence-industrial-placement\" target=\"_blank\" rel=\"noopener\">MSc Computer Science (Cyber Security)<\/a> \u2013 a conversion degree course designed for graduates with little or no prior knowledge of Computer Science.\u00a0His final project \u201cThe nature, structure, and dynamics of ransomware groups: A case study of Conti, LockBit and BlackCat\/ALPHV\u201d under the supervision of <a href=\"https:\/\/www.kent.ac.uk\/school-of-computing\/people\/3103\/nurse-jason\" target=\"_blank\" rel=\"noopener\">Dr Jason Nurse<\/a>.<\/p>\n<h3><strong>Interview with Andrew<\/strong><\/h3>\n<h3><span style=\"color: inherit;font-family: inherit;font-size: 18px\">What was your background before the masters?<\/span><\/h3>\n<p>&#8220;<em>Before I completed my masters, I had previously completed a history degree at the University of Kent. I later developed an interest in IT and completed the ISC2\u2019s Certified in Cybersecurity certification. I enjoyed this a lot and decided that I wanted to pursue further education in Computer Science and Cyber Security, therefore I joined the conversion course MSc Computer Science (Cyber Security) at Kent.<\/em>&#8221;<\/p>\n<h4>Could you tell us about your experiences studying at Kent?<\/h4>\n<p>&#8220;<em>I had a really great time studying at Kent. There were a wide range of interesting modules available to choose from. Some of my favourites included learning about Cyber Law, Digital Forensics and programming my own Internet of Things device. I especially enjoyed conducting research on ransomware groups for my dissertation project. It was also fun to work and make friends with other people on the course and I made many fond memories spending time at the Canterbury campus.<\/em>&#8221;<\/p>\n<h4>What are your plans for the future?<\/h4>\n<p>&#8220;<em>I am looking to publish a journal article based on the research I did for my dissertation project. I am also planning to gain more experience working in IT and am looking into completing the CISSP certification in the future.<\/em>&#8220;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Congratulations to Andrew Phipps who won the 2024 iCSS Cyber Security Conversion Prize (master course)! Andrew has won the Institute of Cyber Security for Society &hellip; <a href=\"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/2025\/03\/30\/2024-icss-cyber-security-conversion-student-prize\/\">Read&nbsp;more<\/a><\/p>\n","protected":false},"author":81794,"featured_media":383,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[237402],"tags":[283071,107,283131,57952,397],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/posts\/382"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/users\/81794"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/comments?post=382"}],"version-history":[{"count":2,"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/posts\/382\/revisions"}],"predecessor-version":[{"id":385,"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/posts\/382\/revisions\/385"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/media\/383"}],"wp:attachment":[{"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/media?parent=382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/categories?post=382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/tags?post=382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}