
How one Glasgow school used new courses to open pathways for pupils
The experience with that course was largely positive. The lack of an exam at the end of a NPA was a key benefit for many, and the school found that young people taking part were more engaged because they were being permitted to focus on and pursue a really specific area of interest.
So when a new NPA in Cybersecurity was introduced in 2015, the school once again decided to give it a go.
But even with their existing experience of these courses, and a committed Computing Science department, this new programme seemed daunting, with students to be given the chance to explore areas such as data security, digital forensics and, most worrying of all, ethical hacking.
Fortunately, the department's earlier work paid off at this point when a former student now working in the field offered to work with the school to establish the programme.
'I thought it sounded really interesting,' explains George Mullin, a computing teacher at the school, 'and one of my ex-pupils had gone on to study cyber security at Glasgow Caledonian University. We were still in touch with each other so I mentioned it to him and he was really generous with his time. He was showing me the systems that the university used and I thought that looked fantastic.'
Despite the enthusiasm for developing the course, the technical logistics were still an issue – but when the university agreed to allow teachers and pupils to use their software, the possibilities really opened up.
'We became a pilot school to basically get this up and working, and obviously we had to configure that to match the needs of the NPA course that we're delivering. So there was a lot of work done around that and ironing out the kind of technical issues, but once we had that proof of concept we thought we could roll that out to other schools in Glasgow that are looking at deliver the NPA.'
CyberFirst lead teacher at Hyndland Secondary George Mullin (Image: Gordon Terris)
Today, schools across Glasgow benefit from this relationship with Glasgow Caledonian University, allowing many more young people to pursue a course that may otherwise have remained too difficult to deliver.
Mr Mullin is also keen to highlight the support of Education Scotland, which in recent years has provided access to a platform called TryHackMe.
The support they have received, combined with the hard work of staff, has helped to ensure that these new courses can offer real value for students at Hyndland:
'We could do the bare minimum and just get through the course but because we've got these toys, for want of a better expression, to play with it makes it a much richer learning experience for the kids.'
That is clearly beneficial for those completing this particular programme, but the school has also seen wider benefits. Some of those completing NPA courses in the school's Business and Computing Faculty have used them as a bridge between National 5 and Higher qualifications, and broader interest in Computing Science as a subject also seems to have improved.
And benefits go further still. The success of these innovations has helped school to develop other NPA offers and even inspired more options for BGE. One example of this work has culminated in Hyndland achieving the Gold Award in the CyberFirst programme, which has been developed by the National Cyber Security Centre in GCHQ, and coming first in Scotland for the recent Cyberfirst Girls' Competition.
According to headteacher Louise Edgerton, the success of programmes like Cybersecurity the NPA show the importance of opening up 'pathways' for students in schools, and working to ensure that as many options as possible are made available to them.
And for the computing department, the results are clear: 'We've get kids in our department now that we probably wouldn't have if we weren't offering these opportunities,' Mr Mullin says.
'That's the bottom line.'
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Business News Wales
25-07-2025
- Business News Wales
Computer Games Design Graduates Selected for Tranzfuser 2025 Competition
A team of Computer Games Design graduates at USW has once again been selected for Tranzfuser 2025 – the UK's flagship competition for emerging game development talent. RuneCube Studios – made up of Rhys Jones, Connor Elsbury and Cameron Fritz, along with BA Music Producing graduate Wigg Grant – is one of just 21 teams across the UK to be chosen for this year's programme. Their game, Overstaffed, is a two-player co-op action adventure set in the world of Arrilla. The wizards the players control are exploring an ancient area known as the Forsaken Ruins, home to different environments each with their own climate and inhabitants, in order to retrieve an extremely powerful artefact. The game features multiple co-op elements such as Overstacking, which allows players to throw each other, reach areas which are usually unreachable, and defeat more difficult enemies. Now in its 10th year, Tranzfuser gives graduate teams the opportunity to independently develop a vertical slice of their game over the summer, culminating in a public showcase this September. The programme goes far beyond game development: teams are given the freedom to pursue their entrepreneurial ambitions, supported by the Games Biz Academy, a curated resource hub designed to develop real-world business and studio leadership skills. Over the course of 14 weeks, RuneCube Studios, with support from the BA Computer Games Design course team, will work with a handpicked industry mentor, often a seasoned developer from the UK Games Fund portfolio. Alongside independent development and support from their local hub, the team will take part in cohort-wide activities and mentoring sessions, giving them a unique opportunity to grow not just as developers, but as founders building the foundations of a sustainable studio. At the end of the programme, all teams will have the chance to pitch for grant funding of up to £25,000 from the UK Games Fund to support the commercial development of their game – a crucial stepping stone towards taking their work to market. Connor Elsbury, programme lead for RuneCube Studios, said: 'We are delighted to be a part of the Tranzfuser 2025 lineup and are ready to work our hardest to bring the best possible game we can. Tranzfuser is a great opportunity for each team member to develop their skills, and potentially push Overstaffed out to the public and find fans. 'The competition is one of the best opportunities we could have received right after coming out of University. It is a great way for the team to develop their skills both existing and new by working on a game we are all familiar with developing. We also see it as an opportunity to put our names out in the industry, potentially create our own studio and also have it become a hallmark of our experience as developers.' Dann Rees, course leader for Computer Games Design, added: 'We are very proud that 2025 marks the 10th consecutive year that USW teams have earned a place in Tranzfuser – an incredible achievement that underscores the course's strong track record in producing talented, ambitious, and industry-ready graduates.'


Geeky Gadgets
02-07-2025
- Geeky Gadgets
AI Meets Cybersecurity : Entry Level CIA Hacking Test Taken Using AI Assistance
What if the next generation of cybersecurity experts didn't just rely on their own skills but also leaned on artificial intelligence to crack complex challenges? Imagine a scenario where an aspiring CIA analyst uses AI to unravel hidden clues embedded in a single image—decoding GPS coordinates, uncovering usernames, and even extracting passwords. This isn't the plot of a spy thriller; it's a real-world exercise in using AI to solve entry-level open source intelligence (OSINT) puzzles. The integration of AI into cybersecurity tasks is reshaping how we approach problem-solving, offering both efficiency and precision in ways that were once unimaginable. But does this reliance on AI raise questions about the future of human expertise in the field? All About AI explore how AI tools, particularly large language models (LLMs), are being used to tackle OSINT challenges like those hosted on platforms such as TryHackMe. You'll discover how AI can analyze metadata, pinpoint locations, and even connect the dots between seemingly unrelated data points. But it's not just about the technology—context engineering and creative problem-solving remain critical to guiding AI toward meaningful insights. Whether you're curious about the mechanics of metadata analysis or the ethical implications of AI-assisted hacking, this exploration will shed light on the evolving relationship between human ingenuity and machine intelligence. As we dive deeper, one question lingers: are we witnessing the dawn of a new era in cybersecurity, or the outsourcing of critical thinking to machines? AI in OSINT Tasks Understanding the OSINT Challenge The OSINT challenge centers on analyzing a single image file to extract specific pieces of information. This task requires a combination of technical expertise and creative problem-solving. The key objectives include identifying: The username associated with the image. The location where the image was taken. The SSID (Wi-Fi network name) and BSSID (MAC address) of the network. An email address and password embedded within the data. This challenge is an excellent opportunity to apply AI tools in cybersecurity, as it involves uncovering hidden details that are not immediately visible. By using AI, you can streamline the process, making it faster and more precise. AI's Role in Metadata Analysis Metadata analysis is a critical component of the OSINT challenge, and AI tools like LLMs are particularly well-suited for this task. Metadata, often embedded within image files, contains valuable information that can reveal: GPS coordinates: These can pinpoint the exact location where the image was captured. These can pinpoint the exact location where the image was captured. Timestamps: These indicate when the image was taken, providing a temporal context. These indicate when the image was taken, providing a temporal context. Device details: Information about the camera or device used, which can hint at the user's identity. For instance, extracting GPS metadata can lead directly to the image's location, while timestamps and device details can offer additional context. AI tools excel at processing such data quickly and accurately, making them indispensable for this type of analysis. How AI is Transforming Cybersecurity Watch this video on YouTube. Master Cybersecurity with the help of our in-depth articles and helpful guides. Enhancing Precision with Context Engineering To maximize the effectiveness of AI tools, context engineering plays a crucial role. This involves crafting precise and targeted queries to guide the AI toward relevant insights. For example: When analyzing metadata, you can instruct the AI to focus on specific fields, such as GPS coordinates or camera settings, to extract meaningful information. When searching for user-related data, you can direct the AI to cross-reference metadata with external platforms like GitHub, LinkedIn, or social media profiles. By narrowing the AI's focus, context engineering minimizes irrelevant outputs and enhances the accuracy of the results. This approach ensures that the AI delivers actionable insights rather than overwhelming you with extraneous data. Advanced Techniques for Comprehensive Analysis While metadata analysis is a powerful starting point, solving the OSINT challenge often requires additional techniques to uncover all the necessary details. Two advanced methods include: HTML Source Code Analysis: Examining the HTML code of related web pages can reveal hidden information, such as embedded email addresses or passwords. For instance, a blog linked to the image might store sensitive data in plain text within its source code. Examining the HTML code of related web pages can reveal hidden information, such as embedded email addresses or passwords. For instance, a blog linked to the image might store sensitive data in plain text within its source code. Online Database Querying: Platforms like allow you to map BSSID to SSID. By inputting the BSSID extracted from the image metadata, you can identify the corresponding Wi-Fi network name, adding another layer of context to your findings. These techniques highlight the importance of combining AI with traditional cybersecurity tools. By integrating multiple approaches, you can achieve a more comprehensive analysis and uncover details that might otherwise remain hidden. Key Insights from the OSINT Challenge By systematically applying AI tools and traditional techniques, you can extract all the required information from the OSINT challenge. The key findings often include: The username and email address associated with the image. The GPS metadata pinpointing the image's location. The SSID and BSSID of the Wi-Fi network, identified through metadata and online databases. A password discovered through HTML source code analysis. These results demonstrate the potential of AI to streamline and enhance cybersecurity investigations. By effectively guiding AI tools, you can uncover meaningful insights from complex datasets, making the process both efficient and precise. Expanding Applications and Future Potential The OSINT challenge serves as a valuable educational tool, showcasing how AI can be integrated into cybersecurity exercises. By solving real-world problems with AI, you gain practical experience with both the technology and the underlying principles of cybersecurity. The techniques demonstrated—metadata analysis, context engineering, and database querying—can be applied to more advanced scenarios, such as cryptographic analysis or network security assessments. Looking ahead, the role of AI in cybersecurity is expected to grow significantly. As AI tools become more sophisticated, they will enable you to tackle increasingly complex challenges with greater speed and accuracy. Whether you are a seasoned cybersecurity professional or an enthusiast exploring the field, the intersection of AI and cybersecurity offers exciting opportunities for innovation and learning. By staying engaged with these technologies, you can remain at the forefront of a rapidly evolving domain. Media Credit: All About AI Filed Under: AI, Top News Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.


The Herald Scotland
21-05-2025
- The Herald Scotland
How one Glasgow school used new courses to open pathways for pupils
In an effort to open up the options available to young people, staff at Hyndland decided to introduce a new qualification: a National Progression Award in Computer Games Development. The experience with that course was largely positive. The lack of an exam at the end of a NPA was a key benefit for many, and the school found that young people taking part were more engaged because they were being permitted to focus on and pursue a really specific area of interest. So when a new NPA in Cybersecurity was introduced in 2015, the school once again decided to give it a go. But even with their existing experience of these courses, and a committed Computing Science department, this new programme seemed daunting, with students to be given the chance to explore areas such as data security, digital forensics and, most worrying of all, ethical hacking. Fortunately, the department's earlier work paid off at this point when a former student now working in the field offered to work with the school to establish the programme. 'I thought it sounded really interesting,' explains George Mullin, a computing teacher at the school, 'and one of my ex-pupils had gone on to study cyber security at Glasgow Caledonian University. We were still in touch with each other so I mentioned it to him and he was really generous with his time. He was showing me the systems that the university used and I thought that looked fantastic.' Despite the enthusiasm for developing the course, the technical logistics were still an issue – but when the university agreed to allow teachers and pupils to use their software, the possibilities really opened up. 'We became a pilot school to basically get this up and working, and obviously we had to configure that to match the needs of the NPA course that we're delivering. So there was a lot of work done around that and ironing out the kind of technical issues, but once we had that proof of concept we thought we could roll that out to other schools in Glasgow that are looking at deliver the NPA.' CyberFirst lead teacher at Hyndland Secondary George Mullin (Image: Gordon Terris) Today, schools across Glasgow benefit from this relationship with Glasgow Caledonian University, allowing many more young people to pursue a course that may otherwise have remained too difficult to deliver. Mr Mullin is also keen to highlight the support of Education Scotland, which in recent years has provided access to a platform called TryHackMe. The support they have received, combined with the hard work of staff, has helped to ensure that these new courses can offer real value for students at Hyndland: 'We could do the bare minimum and just get through the course but because we've got these toys, for want of a better expression, to play with it makes it a much richer learning experience for the kids.' That is clearly beneficial for those completing this particular programme, but the school has also seen wider benefits. Some of those completing NPA courses in the school's Business and Computing Faculty have used them as a bridge between National 5 and Higher qualifications, and broader interest in Computing Science as a subject also seems to have improved. And benefits go further still. The success of these innovations has helped school to develop other NPA offers and even inspired more options for BGE. One example of this work has culminated in Hyndland achieving the Gold Award in the CyberFirst programme, which has been developed by the National Cyber Security Centre in GCHQ, and coming first in Scotland for the recent Cyberfirst Girls' Competition. According to headteacher Louise Edgerton, the success of programmes like Cybersecurity the NPA show the importance of opening up 'pathways' for students in schools, and working to ensure that as many options as possible are made available to them. And for the computing department, the results are clear: 'We've get kids in our department now that we probably wouldn't have if we weren't offering these opportunities,' Mr Mullin says. 'That's the bottom line.'