Through its National Technical Institute for the Deaf, the Rochester Institute of Technology is offering a new program for deaf and hard-of-hearing students.

Although RIT is currently on its spring break, there are 23 deaf and hard-of-hearing students who are working on a week-long, demanding training program that will give them experience in the field of computer security.

According to RIT, this Computer Forensics Boot Camp is the first of its kind. The students will receive 32 hours of training in hopes of receiving an EnCase certification, which is the standard certification in cyber forensics.

“We are incredibly grateful,” said Gerry Buckley, NTID president and RIT vice president and dean. “The students attending the boot camp represent some of RIT’s best and brightest, and they are eager to take advantage of this outstanding opportunity for training.”

These students will be able to provide help to a rapid-growing industry that has seen web-based security attacks rise by 23% since 2013.

With the recent increase in security attacks, other colleges are doing their part to spread awareness and teach security tactics.

Stockton University announced that they will be holding a free computer-security session for adults of all ages in the next few weeks.

Press of Atlantic City reports that due to the growing concerns Americans have for identity theft and web-based attacks, Stockton will host a free Cyberspace and Privacy workshop aimed at older adults.

“The workshop will discuss the strategies, skills and mindset needed to safeguard information and privacy when online,” Stockton officials said. “Participants will learn to be aware of the tricks used by scammers and hackers to steal data and personal information.”

Bureau of Labor Statistics data indicates that such efforts could not only aid in the fight to protect data, but it may also create jobs in the process.

“The proliferation of criminal activity on the Internet will increase the demand for private investigators,” the Bureau reported. “Opportunities are expected to be excellent for computer forensic investigators.”